Everything you need to measure, manage, and reduce your cyber risk in one place
See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software
Gain an attacker’s view of your external internet-facing assets and unauthorized software
Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster
Consolidate & translate security & vulnerability findings from 3rd party tools
Automate scanning in CI/CD environments with shift left DAST testing
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Efficiently remediate vulnerabilities and patch systems
Quickly create custom scripts and controls for faster, more automated remediation
Advanced endpoint threat protection, improved threat context, and alert prioritization
Extend detection and response beyond the endpoint to the enterprise
Reduce risk, and comply with internal policies and external regulations with ease
Reduce alert noise and safeguard files from nefarious actors and cyber threats
Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.
Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.
Detect and remediate security issues within IaC templates
Manage your security posture and risk across your entire SaaS application stack
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.
Discover, track, and continuously secure containers – from build to runtime
Everything you need to measure, manage, and reduce your cyber risk in one place
Contact us below to request a quote, or for any product-related questions
See entire attack surface, continuously maintain your CMDB, and track EOL/EOS software
Gain an attacker’s view of your external internet-facing assets and unauthorized software
Discover, assess, prioritize, and patch critical vulnerabilities up to 50% faster
Consolidate & translate security & vulnerability findings from 3rd party tools
Discover, track, and continuously secure containers – from build to runtime
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Automate scanning in CI/CD environments with shift left DAST testing
Efficiently remediate vulnerabilities and patch systems
Quickly create custom scripts and controls for faster, more automated remediation
Advanced endpoint threat protection, improved threat context, and alert prioritization
Extend detection and response beyond the endpoint to the enterprise
Reduce risk, and comply with internal policies and external regulations with ease
Reduce alert noise and safeguard files from nefarious actors and cyber threats
Cloud-Native Application Protection Platform (CNAPP) for multi-cloud environment.
Continuously discover, monitor, and analyze your cloud assets for misconfigurations and non-standard deployments.
Detect and remediate security issues within IaC templates
Manage your security posture and risk across your entire SaaS application stack
Detect, prioritize, and remediate vulnerabilities in your cloud environment
Continuous real-time protection of the multi-cloud environment against active exploitation, malware, and unknown threats.
Discover, track, and continuously secure containers – from build to runtime
Vol. 12, Num. 52
This is a weekly newsletter that provides in-depth analysis of the latest vulnerabilities with straightforward remediation advice. Qualys supplies a large part of the newly-discovered vulnerability content used in this newsletter.
Archived issues may be found at the SANS @RISK Newletter Archive.
NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 12/20/2012 - 12/26/2012
vulnerability impacting users of the popular W3 TotalCache for Wordpress
plugin was announced this week, with all files touched by the caching
server being publicly available on the Internet by default with no
authentication. The author of the plugin is currently working on a fix,
but administrators can take simple action in the interim to reduce their
exposure.
Title: Wordpress W3 TotalCache Information disclosure
Description: A security researcher has discovered that, by default, the
popular W3 TotalCache plugin for Wordpress leaves cache files in
directories readable by the web server, with indexing enabled. That
allows for trivial web searches of all cached files of impacted servers,
including database session information, password-restricted data, etc.
At the time of writing, approximately 1.19 million results were returned
with appropriate Google searches, demonstrating the scope of the issue.
Impacted administrators should immediately disable indexing on all W3
TotalCache directories, and look for a patch that the author of the
product is currently working on.
Reference:
http://seclists.org/fulldisclosure/2012/Dec/242
http://wordpress.org/extend/plugins/w3-total-cache/
Snort SID: 25120
ClamAV: N/A
Title: NVidia Display Driver “Christmas 0-day”
Description: Proving that information security never sleeps, a security
researcher in the UK released exploit code for a new NVidia display
driver on PasteBin on Christmas Day. While the has stated on this
Twitter feed that it is likely “not wormable”, the issue is clearly
serious, and is likely to be addressed directly by NVidia soon. As the
exploit uses an SMB pipe, in the interim concerned users should ensure
that they are using a firewall to protect their systems from as much
exposure to Windows SMB protocols as possible without impacting
business.
Reference:
http://pastebin.com/QP7eZaJt
Snort SID: N/A
ClamAV: N/A
Title: AutoIt Trojan observed in the wild
Description: Several instances of this new trojan downloader have been
observed in the wild recently. The malware uses an encoded backdoor
channel to decrease the likelihood of detection.
Reference:
http://www.sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/Troj~Autoit-QN/detailed-analysis.aspx
Snort SID: 25109
ClamAV: AUTOIT.Trojan.Agent-8
Microsoft SQL Server link crawling command execution:
http://www.exploit-db.com/exploits/23649/
Defcon Doctumentary Preview:
http://vimeo.com/56234900
Partial FBI files for Occupy dumped on Pastebin:
http://pastebin.com/U2yaa3ex
Opsec for stained glass:
http://www.schnarff.com/blog/?p=192
The “hidden” backdoor: VirTool:WinNT/Exforel.A:
https://blogs.technet.com/b/mmpc/archive/2012/12/09/the-quot-hidden-quot-backdoor-virtool-winnt-exforel-a.aspx?Redirected=true
NSA targeting domestic computer systems in secret test:
http://news.cnet.com/8301-13578_3-57560644-38/revealed-nsa-targeting-domestic-computer-systems-in-secret-test/
Page weight matters:
http://blog.chriszacharias.com/page-weight-matters?utm_source=dlvr.it&utm_medium=twitter
Howto: distributed Splunk architecture:
http://blog.rootshell.be/2012/12/22/howto-distributed-splunk-architecture/
This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.
ID: : CVE-2012-2174
Title: IBM Lotus Notes URL Handler Design Error Vulnerability
Vendor: IBM
Description: The URL handler in IBM Lotus Notes 8.x before 8.5.3 FP2
allows remote attackers to execute arbitrary code via a crafted notes://
URL.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
ID: : CVE-2012-4959
Title: Novell File Reporter Agent XML Parsing Remote Code Execution Vulnerability
Vendor: Novell
Description: Directory traversal vulnerability in NFRAgent.exe in Novell
File Reporter 1.0.2 allows remote attackers to upload and execute files
via a 130 /FSF/CMD request with a .. (dot dot) in a FILE element of an
FSFUI record.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: : CVE-2010-2590
Title: SAP Crystal Reports Print ActiveX “PrintControl.dll” Heap Buffer
Overflow Vulnerability
Vendor: SAP
Description: Heap-based buffer overflow in the
CrystalReports12.CrystalPrintControl.1 ActiveX control in
PrintControl.dll 12.3.2.753 in SAP Crystal Reports 2008 SP3 Fix Pack 3.2
allows remote attackers to execute arbitrary code via a long
ServerResourceVersion property value.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
ID: : CVE-2012-5975
Title: SSH Tectia Authentication Bypass Remote
Vendor: SSH Communications
Description: A remote authentication bypass vulnerability was disclosed
which affects the current Unix/Linux versions of Tectia SSH Server. The
vulnerability exploits a bug in the SSH USERAUTH CHANGE REQUEST
function.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: : CVE-2012-5611
Title: Oracle MySQL Server Command Processing Buffer Overflow Vulnerability
Vendor: Oracle
Description: Stack-based buffer overflow in MySQL 5.5.19, 5.1.53, and
possibly other versions, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x
before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows
remote authenticated users to execute arbitrary code via a long argument
to the GRANT FILE command.
CVSS v2 Base Score: 6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
SHA 256: 1B8C2FC3E7324DE7D88A5A481F5FA9FC7A1CA6EA3EEEE6056ACFB749FCA4E046
MD5:
VirusTotal: https://www.virustotal.com/file/1B8C2FC3E7324DE7D88A5A481F5FA9FC7A1CA6EA3EEEE6056ACFB749FCA4E046/analysis/
Typical Filename:
Claimed Product:
Claimed Publisher:
SHA 256: 1B6BA4CD56E96FB455EA6C6A8041FBD179D3CDE67F9C0306798B78E15CF55929
MD5:
VirusTotal: https://www.virustotal.com/file/1B6BA4CD56E96FB455EA6C6A8041FBD179D3CDE67F9C0306798B78E15CF55929/analysis/
Typical Filename:
Claimed Product:
Claimed Publisher:
SHA 256: 521513811D2E9C051F8F4A5F5B18B6FED31A24D2608A3B9D6A76E1E21DF44480
MD5:
VirusTotal: https://www.virustotal.com/file/521513811D2E9C051F8F4A5F5B18B6FED31A24D2608A3B9D6A76E1E21DF44480/analysis/
Typical Filename:
Claimed Product:
Claimed Publisher:
SHA 256: 95B8892CB127AC1F21B55C0A19AE77D7561AB26D7131C03C3C9048C68EF27AF9
MD5:
VirusTotal: https://www.virustotal.com/file/95B8892CB127AC1F21B55C0A19AE77D7561AB26D7131C03C3C9048C68EF27AF9/analysis/
Typical Filename:
Claimed Product:
Claimed Publisher:
SHA 256: BAEC88CBCF585E268845970B332101B2EAF5FE194748AB5F7BBCE83F710745BB
MD5:
VirusTotal: https://www.virustotal.com/file/BAEC88CBCF585E268845970B332101B2EAF5FE194748AB5F7BBCE83F710745BB/analysis/
Typical Filename:
Claimed Product:
Claimed Publisher: