[AusNOG] AusCERT Week in Review - Week Ending 18/09/2009	(AUSCERT#20073f686)
    Daniel McNamara 
    daniel at auscert.org.au
       
    Fri Sep 18 15:20:25 EST 2009
    
    
  
Greetings all,
 
In an interesting followup to last weeks release of Firefox 3.5.3 it was
shown that quite a large number of users are running outdated versions of
Flash. A new feature in Firefox 3.5.3 was a helper component which checked
the users Flash plugin version and informed them that they may wish to
upgrade to avoid security issues. It seems this feature is working quite
well and Mozilla have provided the metric to prove it. [1]
 
Chrome 3 was released this week which fixed some minor issues but was mostly
a feature update. As promising as Chrome is looking so far it's still
missing a lot of features we would like to see such as the ability to
disable JavaScript easily or better still allow/disallow on a per site basis
ala the NoScript addon for Firefox. [2]
 
In the server world there is talk of a local privilege escalation issue in
NetBSD which has been documented, assigned a CVE and even had a video made
showing how it's done. So far there has been no response on the NetBSD site
on this issue. [3]
 
Last, but certainly not least, an exploit targeting the unpatched execute
arbitrary code flaw in SMB that Microsoft advised about last week has been
released. Given the potential for this to be used in a worm this would be a
good time to ensure that you prevent SMB access from untrusted machines.
Learning lessons from the Conficker worm there is also a good argument for
limiting SMB access for trusted machines as well. [4,5]
 
Have a good weekend,
Daniel
      
[1] Helping People Upgrade Flash
    http://blog.mozilla.com/metrics/2009/09/16/helping-people-upgrade-flash/
 
[2] ASB-2009.1085
    https://www.auscert.org.au/render.html?it=11648
 
[3] Iret #GP on pre-commit handling failure: the NetBSD case (CVE-2009-2793)
    http://www.cr0.org/misc/CVE-2009-2793.txt
 
[4] ESB-2009.1269.2
    http://www.auscert.org.au/render.html?it=11608
 
[5] SMB2 remote exploit released
    http://isc.sans.org/diary.html?storyid=7141
 
--
 
AusCERT Week in Review
18 September 2009
 
 
AusCERT in the Media:
---------------------
 
Papers, Articles and other documents:
-------------------------------------
Title: The Internet Industry Association (IIA) has released a draft
eSecurity
       code - public responses invited. 
Date:  17 September 2009
URL:   http://www.auscert.org.au/11658
 
Title: AusCERT Certificate Service Project Update - September 2009 
Date:  14 September 2009
URL:   http://www.auscert.org.au/11634
 
 
Web Log Entries:
----------------
 
 
Alerts, Advisories and Updates:
-------------------------------
Title: ASB-2009.1083.2 - UPDATE [Win][UNIX/Linux] PostgreSQL: Multiple
       vulnerabilities 
Date:  18 September 2009
URL:   http://www.auscert.org.au/11641
 
Title: ASB-2009.1086 - [Win][UNIX/Linux] wireshark: Denial of service -
Remote
       with user interaction 
Date:  17 September 2009
URL:   http://www.auscert.org.au/11654
 
Title: ASB-2009.1087 - [Win][Netware][SUSE] Novell GroupWise: Cross-site
       scripting - Remote/unauthenticated 
Date:  17 September 2009
URL:   http://www.auscert.org.au/11655
 
Title: ASB-2009.1088 - [Win][UNIX/Linux] Bugzilla: Multiple vulnerabilities 
Date:  17 September 2009
URL:   http://www.auscert.org.au/11656
 
Title: ASB-2009.1085 - [Win] Google Chrome: Cross-site scripting - Remote
with
       user interaction 
Date:  16 September 2009
URL:   http://www.auscert.org.au/11648
 
Title: ASB-2009.1082 - [Win][UNIX/Linux] Horde Application
       Framework/Groupware: Execute arbitrary code/commands - Remote with
user
       interaction 
Date:  15 September 2009
URL:   http://www.auscert.org.au/11640
 
Title: ASB-2009.1084 - [Win][UNIX/Linux] IBM Tivoli Identity Manager:
       Cross-site scripting - Remote with user interaction 
Date:  15 September 2009
URL:   http://www.auscert.org.au/11642
 
Title: ASB-2009.1081 - [Win][Linux][HP-UX][Solaris][AIX] IBM HTTP Server:
       Denial of service - Remote/unauthenticated 
Date:  14 September 2009
URL:   http://www.auscert.org.au/11633
 
 
External Security Bulletins:
----------------------------
Title: ESB-2009.1303 - [RedHat] freeradius: Denial of service -
       Remote/unauthenticated 
Date:  18 September 2009
OS:    Red Hat Linux 
URL:   http://www.auscert.org.au/11659
 
Title: ESB-2009.1302 - [Solaris][OpenSolaris] Solaris IPv6 Networking Stack:
       Denial of service - Remote/unauthenticated 
Date:  17 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11657
 
Title: ESB-2009.1301 - [Solaris][OpenSolaris] pidgin: Execute arbitrary
       code/commands - Remote/unauthenticated 
Date:  17 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11653
 
Title: ESB-2009.1300 - [Win][Linux][Solaris][OpenSolaris][Mac][OSX]
       StarOffice/StarSuite: Execute arbitrary code/commands - Remote with
       user interaction 
Date:  17 September 2009
OS:    Solaris, Red Hat Linux, Windows 2003, Mac OS X, Debian GNU/Linux,
       Ubuntu, Windows XP, SUSE, Windows 2000, Windows Vista, Windows Server
       2008, Other Linux Variants 
URL:   http://www.auscert.org.au/11652
 
Title: ESB-2009.1299 - [Win][UNIX/Linux] Drupal third-party modules:
Multiple
       Vulnerabilities 
Date:  17 September 2009
OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Windows 2003, Mac OS X,
       Ubuntu, Debian GNU/Linux, HP-UX, Windows XP, Other BSD Variants,
SUSE,
       OpenBSD, Windows 2000, AIX, FreeBSD, Windows Vista, Other Linux
       Variants, Windows Server 2008 
URL:   http://www.auscert.org.au/11651
 
Title: ESB-2009.1298 - [Win][UNIX/Linux] Drupal core: Cross-site request
       forgery - Existing account 
Date:  17 September 2009
OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Windows 2003, Mac OS X,
       Ubuntu, Debian GNU/Linux, HP-UX, Windows XP, Other BSD Variants,
SUSE,
       OpenBSD, Windows 2000, AIX, FreeBSD, Windows Vista, Other Linux
       Variants, Windows Server 2008 
URL:   http://www.auscert.org.au/11650
 
Title: ESB-2009.1297 - [Debian] icu: Cross-site scripting -
       Remote/unauthenticated 
Date:  17 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11649
 
Title: ESB-2009.1296 - [SUSE] Multiple products: Multiple vulnerabilities 
Date:  16 September 2009
OS:    SUSE 
URL:   http://www.auscert.org.au/11647
 
Title: ESB-2009.1295 - [HP-UX] bootpd: Denial of service -
       Remote/unauthenticated 
Date:  16 September 2009
OS:    HP-UX 
URL:   http://www.auscert.org.au/11646
 
Title: ESB-2009.1294 - [Debian] Ruby on rails: Cross-site scripting -
       Remote/unauthenticated 
Date:  16 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11645
 
Title: ESB-2009.1293 - [Debian] openssl: Reduced security - Remote with user
       interaction 
Date:  16 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11644
 
Title: ESB-2009.1292 - [RedHat] kernel: Multiple vulnerabilities 
Date:  16 September 2009
OS:    Red Hat Linux 
URL:   http://www.auscert.org.au/11643
 
Title: ESB-2009.1291 - [Debian] iceweasel: Multiple vulnerabilities 
Date:  15 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11639
 
Title: ESB-2009.1290 - [Debian] xulrunner: Multiple vulnerabilities 
Date:  15 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11638
 
Title: ESB-2009.1289 - [Win][UNIX/Linux][Debian] nginx: Execute arbitrary
       code/commands - Remote/unauthenticated 
Date:  15 September 2009
OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Windows 2003, Mac OS X,
       Debian GNU/Linux, Ubuntu, HP-UX, Windows XP, Other BSD Variants,
SUSE,
       OpenBSD, Windows 2000, AIX, FreeBSD, Windows Vista, Other Linux
       Variants, Windows Server 2008 
URL:   http://www.auscert.org.au/11637
 
Title: ESB-2009.1288 - [UNIX/Linux][Debian] nagios2: Cross-site scripting -
       Remote/unauthenticated 
Date:  15 September 2009
OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Mac OS X, Debian
       GNU/Linux, Ubuntu, HP-UX, Other BSD Variants, SUSE, OpenBSD, AIX,
       FreeBSD, Other Linux Variants 
URL:   http://www.auscert.org.au/11636
 
Title: ESB-2009.1287 - [Appliance][Mac][OSX] Xsan: Read-only data access -
       Remote with user interaction 
Date:  15 September 2009
OS:    Mac OS X 
URL:   http://www.auscert.org.au/11635
 
Title: ESB-2009.1286 - [UNIX/Linux] htmldoc: Execute arbitrary code/commands
-
       Remote with user interaction 
Date:  14 September 2009
OS:    IRIX, HP Tru64 UNIX, Solaris, Red Hat Linux, Mac OS X, Ubuntu, Debian
       GNU/Linux, HP-UX, Other BSD Variants, SUSE, OpenBSD, AIX, FreeBSD,
       Other Linux Variants 
URL:   http://www.auscert.org.au/11632
 
Title: ESB-2009.1285 - [Debian] devscripts: Reduced security - Existing
       account 
Date:  14 September 2009
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/11631
 
Title: ESB-2009.1284 - [Solaris][OpenSolaris] TCP: Denial of service -
       Remote/unauthenticated 
Date:  14 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11630
 
Title: ESB-2009.1283 - [Solaris][OpenSolaris] w(1) Utility: Execute
arbitrary
       code/commands - Existing account 
Date:  14 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11629
 
Title: ESB-2009.1282 - [Solaris][OpenSolaris] lx branded zones: Denial of
       service - Existing account 
Date:  14 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11628
 
Title: ESB-2009.1253.2 - UPDATE [Win] Sun Java System Web Server: Access
       privileged data - Remote/unauthenticated 
Date:  14 September 2009
OS:    Windows Server 2008, Windows Vista, Windows 2000, Windows XP, Windows
       2003, Solaris 
URL:   http://www.auscert.org.au/11584
 
Title: ESB-2009.0620 -- [Solaris][OpenSolaris] -- Solaris Ghostscript
(GS(1)):
       Execute Arbitrary Code 
Date:  15 September 2009
OS:    Solaris 
URL:   http://www.auscert.org.au/11226
 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20090918/14c79c34/attachment.html>
    
    
More information about the AusNOG
mailing list