Everything you need to measure, manage, and reduce your cyber risk in one place
See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software
Gain an attacker’s view of your external internet-facing assets and unauthorized software
Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster
Consolidate & translate security & vulnerability findings from 3rd party tools
Automate scanning in CI/CD environments with shift left DAST testing
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Efficiently remediate vulnerabilities and patch systems
Quickly create custom scripts and controls for faster, more automated remediation
Advanced endpoint threat protection, improved threat context, and alert prioritization
Extend detection and response beyond the endpoint to the enterprise
Reduce risk, and comply with internal policies and external regulations with ease
Reduce alert noise and safeguard files from nefarious actors and cyber threats
Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.
Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.
Detect and remediate security issues within IaC templates
Manage your security posture and risk across your entire SaaS application stack
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.
Discover, track, and continuously secure containers – from build to runtime
Everything you need to measure, manage, and reduce your cyber risk in one place
Contact us below to request a quote, or for any product-related questions
See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software
Gain an attacker’s view of your external internet-facing assets and unauthorized software
Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster
Consolidate & translate security & vulnerability findings from 3rd party tools
Discover, track, and continuously secure containers – from build to runtime
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Automate scanning in CI/CD environments with shift left DAST testing
Efficiently remediate vulnerabilities and patch systems
Quickly create custom scripts and controls for faster, more automated remediation
Advanced endpoint threat protection, improved threat context, and alert prioritization
Extend detection and response beyond the endpoint to the enterprise
Reduce risk, and comply with internal policies and external regulations with ease
Reduce alert noise and safeguard files from nefarious actors and cyber threats
Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.
Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.
Detect and remediate security issues within IaC templates
Manage your security posture and risk across your entire SaaS application stack
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.
Discover, track, and continuously secure containers – from build to runtime
Vol. 13, Num. 7
This is a weekly newsletter that provides in-depth analysis of the latest vulnerabilities with straightforward remediation advice. Qualys supplies a large part of the newly-discovered vulnerability content used in this newsletter.
Archived issues may be found at the SANS @RISK Newletter Archive.
NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 2/5/2013 - 2/12/2013
off vulnerabilities that were being exploited in the wild as targeted
0-days, with payloads that used a new technique to evade
operating-system level mitigations of ASLR and DEP.
Title: Recently Patched Flash Vulnerabilities Actively Exploited In The Wild
Description: A pair of Adobe Flash vulnerabilities were patched last
week, closing holes that were being exploited in the wild at the time
of the patches. The attack payloads included creative new ways around
common operating system level mitigations such as ASLR and DEP, making
them particularly problematic for defenders. While attacks appear to
have been limited in scope, particularly compared to last month’s Java
0-day issues, high value targets in particular are urged to patch
immediately.
Reference:
https://krebsonsecurity.com/tag/cve-2013-0633/
http://www.securelist.com/en/blog/208194112/ Adobe_Flash_Player_0_day_and_HackingTeam_s_Remote_Control_System
http://labs.alienvault.com/labs/index.php/2013/adobe-patches-two-vulnerabilities-being-exploited-in-the-wild/
https://sites.google.com/site/zerodayresearch/smashing_the_heap_with_vector_Li.pdf
Snort SID: 25676 - 25683
ClamAV: BC.Exploit.CVE_2013_0633, SWF.Exploit.CVE_2013_0634
Title: Huge Microsoft Tuesday Includes Low-Level TCP/IP DoS
Description: Microsoft this week issued a huge set of patches, closing
off 57 distinct CVEs in a total of 11 security notices. While many of
these vulnerabilities will likely prove difficult to exploit in the
wild, the VML memory corruption attack (CVE-2013-0030) is already being
used for information disclosure in targeted attacks. Most likely to
wreak havoc is the TCP/IP “Finshake” denial of service (CVE-2013-0075)
stack” - which requires minimal attacker bandwidth and applies to any
Microsoft operating system, regardless of which services are made
available to the Internet. Administrators are urged to test and patch
their systems as rapidly as feasible, given the size of this release.
Reference:
http://technet.microsoft.com/en-us/security/bulletin/ms13-018
https://isc.sans.edu/diary/Microsoft+February+2013+Black+Tuesday+Update+-+Overview/15142
Snort SID: 25774
ClamAV: N/A
Title: Microsoft, Symantec Take Down Bamital Botnet
Description: Continuing its winning streak in US federal courts,
Microsoft’s Digital Crimes Unit - in conjunction with security provider
Symantec - executed a takedown of the massive Bamital botnet, which was
responsible for major advertising fraud activities across the globe and
distribution of copious amounts of peripheral malware. Infected users
are now getting messages with cleanup instructions; unlike previous
takedowns, such as DNSChanger, currently-infected systems are, however,
can still be used on the Internet generally.
Reference:
http://blogs.technet.com/b/microsoft_blog/archive/2013/02/06/microsoft-and-symantec-take-down-bamital-botnet-that-hijacks-online-searches.aspx
http://www.microsoft.com/en-us/news/download/blogs/2013/02-06MicrosoftBamitalComplaint.pdf
http://www.symantec.com/content/en/us/ enterprise/media/security_response/whitepapers/trojan_bamital.pdf
Snort SID: 25684 - 25763
ClamAV: W32.Trojan.Bamital, WIN.Ransom.Lockscreen
Title: Security Firm Bit9 Compromised
Description: After failing to install its own application whitelisting
product on all of its internal systems, security firm Bit9 revealed last
week that it had been compromised, and that intruders had used its
digital signing certificates to push malicious applications as if they
were trusted code. While the firm has responded promptly and is working
with all potentially impacted parties on cleanup, the compromise
reiterates the necessity of following internal security policy in all
circumstances, not just those where doing so is easy. Note that users
of Sourcefire’s FireAMP technology are protected from these malicious
binaries through certificate revocation technology.
Reference:
https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security/
Snort SID: N/A
ClamAV: N/A
Set your keylogger to report by email? Bad idea! (The case of Ardamax):
http://labs.alienvault.com/labs/index.php/2013/set-up-your-keylogger-to-report-by-email-bad-idea-the-case-of-ardamax/
Anatomy of a bug: how Mac OS X chokes if you say “file:///“:
http://nakedsecurity.sophos.com/2013/02/06/anatomy-of-a-bug-how-mac-os-x-chokes-if-you-type-file/
Amtel “secure” crypto co-processor series microprocessors leaking keys, plus bonus DESFire hack:
http://seclists.org/fulldisclosure/2013/Feb/42
Java 0-day offered on Russian dark market for $100K:
http://www.techweekeurope.co.uk/news/java-zero-day-russian-forum-sale-100000-106906
Forgotten watering hole attacks on space foundation and RSF Chinese:
http://eromang.zataz.com/2013/01/06/forgotten-watering-hole-attacks-on-space-foundation-and-rsf-chinese/
Hacker exposes George H W Bush emails:
http://www.bbc.co.uk/news/world-us-canada-21380393
Passwords found in the wild for January 2013:
http://blog.passwordresearch.com/2013/02/passwords-found-in-wild-for-january-2013.html
Is everything we know about password stealing wrong?
http://research.microsoft.com/pubs/161829/EverythingWeKnow.pdf
Excel cell injection:
http://blog.7elements.co.uk/2013/01/cell-injection.html
This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.
ID: CVE-2013-0422
Title: Oracle Java SE Security Bypass Vulnerability
Vendor: Oracle
Description: Multiple vulnerabilities in Oracle Java 7 before Update 11
allow remote attackers to execute arbitrary code by (1) using the public
getMBeanInstantiator method in the JmxMBeanServer class to obtain a
reference to a private MBeanInstantiator object, then retrieving
arbitrary Class references using the findClass method, and (2) using the
Reflection API with recursion in a way that bypasses a security check
by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method
due to the inability of the sun.reflect.Reflection.getCallerClass method
to skip frames related to the new reflection API, as exploited in the
wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and
a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE:
some parties have mapped the recursive Reflection API issue to
CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose
details are not public as of 20130114. CVE-2013-0422 covers both the
JMX/MBean and Reflection API issues. NOTE: it was originally reported
that Java 6 was also vulnerable, but the reporter has retracted this
claim, stating that Java 6 is not exploitable because the relevant code
is called in a way that does not bypass security checks. NOTE: as of
20130114, a reliable third party has claimed that the
findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update
ID: CVE-2012-5088
Title: Java Applet Method Handle Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote
attackers to affect confidentiality, integrity, and availability via
unknown vectors related to Libraries.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: CVE-2012-5076
Title: Java Applet AverageRangeStatisticImpl Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote
attackers to affect confidentiality, integrity, and availability,
related to JAX-WS.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: CVE-2012-5958
Title: Portable UPnP SDK unique_service_name() Remote Code Execution
Vendor: libupnp.org
Description: Stack-based buffer overflow in the unique_service_name
function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK
for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices)
before 1.6.18 allows remote attackers to execute arbitrary code via a
UDP packet with a crafted string that is not properly handled after a
certain pointer subtraction.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: CVE-2012-3569
Title: VMWare OVF Tools Format String Vulnerability
Vendor: VMWare
Description: Format string vulnerability in VMware OVF Tool 2.1 on
Windows, as used in VMware Workstation 8.x before 8.0.5, VMware Player
4.x before 4.0.5, and other products, allows user-assisted remote
attackers to execute arbitrary code via a crafted OVF file.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
SHA 256: AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615
MD5: 3291e1603715c47a23b60a8bf2ca73db
VirusTotal: https://www.virustotal.com/file/aa0bbaecb678868e1e7f57c7ca9d61b608b3d788be490790eb1d148beadf4615/analysis/
Typical Filename: avz00001.dta
Claimed Product: -
Claimed Publisher: -
SHA 256: B7B28E855B8C6225C605330760FF4DC407EFC83F72F1A04E974A72189D0F1D96
MD5: 573b6cc513e1b7cd9e35b491eacc38f3
VirusTotal: https://www.virustotal.com/file/B7B28E855B8C6225C605330760FF4DC407EFC83F72F1A04E974A72189D0F1D96/analysis/
Typical Filename: 573b6cc513e1b7cd9e35b491eacc38f3
Claimed Product: 573b6cc513e1b7cd9e35b491eacc38f3
Claimed Publisher: 573b6cc513e1b7cd9e35b491eacc38f3
SHA 256: 0585CDC0293EA6B8C86482608C08C583BF32E12CFA59D143F4A0411D2894C0F3
MD5: b3b9295385f4e74d023181e5a24f4d83
VirusTotal: https://www.virustotal.com/file/0585CDC0293EA6B8C86482608C08C583BF32E12CFA59D143F4A0411D2894C0F3/analysis/
Typical Filename: Keygen.exe
Claimed Product: Keygen.exe
Claimed Publisher: Keygen.exe
SHA 256: DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C
MD5: 25aa9bb549ecc7bb6100f8d179452508
VirusTotal: https://www.virustotal.com/file/DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C/analysis/
Typical Filename: File_0_2.ok
Claimed Product: -
Claimed Publisher: -
SHA 256: A6B140EC734C258C5EBF19C0BC0B414B5655ADC00108A038B5BE6A8F83D0BD03
MD5: e010f298c086c2e1d7265fd18aea2dfbaa9dcd35
VirusTotal: https://www.virustotal.com/file/A6B140EC734C258C5EBF19C0BC0B414B5655ADC00108A038B5BE6A8F83D0BD03/analysis/
Typical Filename: lpkjnn.sys
Claimed Product: -
Claimed Publisher: -