FortiGuard Advisory: Microsoft Internet Explorer Remote Memory Corruption Vulnerability
Microsoft Internet Explorer Remote Memory Corruption Vulnerability 2010.January.21 Summary: Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Microsoft's Internet Explorer. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of Internet Explorer versions affected, please see the Microsoft Security Advisory reference below. Additional Information: === In order to compromise a system / remotely execute code, an attacker would lure a user to a maliciously crafted website. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. Solutions: == Since an attack scenario would require a user to visit a malicious website, it is recommended to have a layered security solution through webfiltering and intrusion prevention for mitigation. * Use the solution provided by Microsoft (MS10-002). * FortiGuard Labs released the signature "MS.IE.MergeAttributes.Remote.Code.Execution". o Advanced zero-day protection has been available since September 3, 2009. FortiGuard Labs continues to monitor attacks against this vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by FortiGuard Labs, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguard.com/advisory/FGA-2010-05.html Microsoft Security Bulletin: http://www.microsoft.com/technet/security/bulletin/ms10-002.mspx CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0247 Acknowledgement: Haifei Li of Fortinet's FortiGuard Labs
FortiGuard Advisory: Microsoft Office Web Components Remote Memory Corruption Vulnerability
Microsoft Office Web Components Remote Memory Corruption Vulnerability 2009.July.13 Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption Vulnerability in Microsoft Office Web Components. Summary: A memory corruption vulnerability exists in the ActiveX Controls of Microsoft Office Web Components which allows a remote attacker to compromise a system through a malicious site. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of operating system and product versions affected, please see the Microsoft Security Advisory reference below. Additional Information: === A remote attacker could craft a malicious HTML document which exploits the Internet Explorer. The vulnerability lies in the default ActiveX Control installed by the Microsoft Office. A crafted object may be created and passed to a method of this control that will cause memory corruption in the Internet Explorer. After the corruption has occured, a few specific actions will cause Internet Explorer to cause remote code execution through a call instruction. Solutions: == Use the workaround solution provided by Microsoft (973472). The FortiGuard Global Security Research Team released a signature "MS.Office.Web.Components.Memory.Corruption", which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this remote code execution vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-27.html Microsoft Security Advisory: http://www.microsoft.com/technet/security/advisory/973472.mspx CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1136 Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
FortiGuard Advisory: Adobe Reader/Acrobat TrueType Font Processing Memory Corruption Vulnerability
Adobe Reader/Acrobat TrueType Font Processing Memory Corruption Vulnerability 2009.June.10 Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption Vulnerability in Adobe Reader / Acrobat. Summary: A memory corruption vulnerability exists when processing PDF documents and handling TrueType fonts, which could allow an attacker to execute arbitrary code with the privileges of the current user. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of product versions affected, please see the Adobe Security Bulletin reference below. Additional Information: === A crash will sometimes occur when processing a TrueType font within the document, leading to memory corruption and allowing the execution of remote code. Solutions: == Use the solution provided by Adobe (APSB09-07). The FortiGuard Global Security Research Team released the IPS signature "Adobe.Reader.Acrobat.TrueType.Font.Handling.Memory.Corruption", which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this memory corruption vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-25.html Adobe Security Bulletin: http://www.adobe.com/support/security/bulletins/apsb09-07.html CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1857 Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
FortiGuard Advisory: Apple Safari Remote Memory Corruption Vulnerability
Apple Safari Remote Memory Corruption Vulnerability 2009.June.09 Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in Apple Safari. Summary: A memory corruption vulnerability exists in Apple Safari which allows a remote attacker to execute arbitrary code through a malicious webpage. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of product versions affected, please see the Apple Security Update reference below. Additional Information: === The memory corruption vulnerability occurs when handling HTML table elements. A remote attacker may craft a malicious webpage and lure an unsuspecting user. When the page is viewed and these elements are processed, arbitrary code execution may occur resulting in the victims machine being compromised. Solutions: == Apple security updates are available via their Software Update mechanism. Apple security updates are available for manual download here. The FortiGuard Global Security Research Team released a signature "DHTML.Malicious.Table.Elements", which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this memory corruption vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-23.html Apple Security Updates for Safari 4.0: http://support.apple.com/kb/HT3613 Apple Security Updates for iPhone: http://support.apple.com/kb/HT3318 CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4231 Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
FortiGuard Advisory: Microsoft Internet Explorer DHTML Handling Remote Memory Corruption Vulnerability
Microsoft Internet Explorer DHTML Handling Remote Memory Corruption Vulnerability 2009.June.09 Fortinet's FortiGuard Global Security Research Team Discovers Memory Corruption Vulnerability in Microsoft's Internet Explorer. Summary: A memory corruption vulnerability exists in the DHTML handling of Microsoft's Internet Explorer which allows a remote attacker to compromise a system through a malicious site. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of operating system and product versions affected, please see the Microsoft Bulletin reference below. Additional Information: === The vulnerability occurs when Internet Explorer processes special DHTML functions. A crash may happen when destroying a window after making a sequence of calls on the "tr" element. These calls are linked to the insertion, deletion and attributes of a table cell. The crash may then allow the arbitrary execution of code on the browsers machine. Solutions: == Use the solution provided by Microsoft (MS09-019). The FortiGuard Global Security Research Team released a signature "MS.IE.DHTML.Function.Remote.Code.Execution", which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this memory corruption vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-22.html Microsoft Bulletin: http://www.microsoft.com/technet/security/bulletin/ms09-019.mspx CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1141 Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
Microsoft Office Excel Remote Memory Corruption Vulnerability
Microsoft Office Excel Remote Memory Corruption Vulnerability 2009.April.14 Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in Microsoft Office Excel. Summary: A memory corruption vulnerability exists in Microsoft Office Excel which allows a remote attacker to compromise a system through a malicious document. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == For a list of operating system and product versions affected, please see the Microsoft Bulletin reference below. Additional Information: === The vulnerability lies in "excel.exe", which is used when processing an Excel file. A maliciously crafted document will cause Excel to crash when processing. The crash occurs while calculating memory using an offset and a two-byte value contained in the document. If the two-byte value is set to a high value, an overflow condition will occur during memory calculation. A remote attacker can potentially control the memory referenced as a result of the overflow to alter program flow, and execute arbitrary code on a victims machine. Solutions: == Use the solution provided by Microsoft (MS09-009). The FortiGuard Global Security Research Team released a signature "MS.Excel.OBJ.Subrecord.Code.Execution", which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be protected against this memory corruption vulnerability. Fortinet's IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-16.html Microsoft Bulletin: http://www.microsoft.com/technet/security/Bulletin/ms09-009.mspx CVE ID: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0100 Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
FGA-2009-003:EMC RepliStor Buffer Overflow Vulnerability
FGA-2009-003:EMC RepliStor Buffer Overflow Vulnerability 2009.April.08 Summary: Fortinet's FortiGuard Global Security Research Team has discovered a buffer overflow vulnerability in EMC RepliStor. Impact: === Remote code execution. Risk: = Critical Affected Software: == EMC RepliStor 6.2 SP4 and earlier EMC RepliStor 6.3 SP1 and earlier Additional Information: == A remote, unauthenticated user may connect over TCP to the "ctrlservice.exe" or "rep_srv.exe" process and send a specially-crafted message to cause a heap based buffer overflow, which can result in arbitrary code execution. Solutions: === The FortiGuard Global Security Research Team released the signature "EMC.RepliStor.Integer.Overflow" Users should use EMC's Powerlink solution to upgrade to the following EMC RepliStor products: RepliStor 6.2 SP5: Navigate in Powerlink to Home > Support > Software Downloads and Licensing > Downloads P-R >RepliStor 6.2 SP5 RepliStor 6.3 SP2: Navigate in Powerlink to Home > Support > Software Downloads and Licensing > Downloads P-R >RepliStor 6.3 SP2 Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against this buffer overflow vulnerability. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. References: === FortiGuard Advisory: http://www.fortiguardcenter.com/advisory/FGA-2009-13.html EMC Powerlink: powerlink.emc.com CVE ID: CVE-2009-1119 Acknowledgments: Zhenhua Liu of Fortinet's FortiGuard Global Security Research Team Disclaimer: === Although Fortinet has attempted to provide accurate information in these materials, Fortinet assumes no legal responsibility for the accuracy or completeness of the information. More specific information is available on request from Fortinet. Please note that Fortinet's product information does not constitute or contain any guarantee, warranty or legally binding representation, unless expressly identified as such in a duly signed writing. About Fortinet ( www.fortinet.com ): Fortinet is the pioneer and leading provider of ASIC-accelerated unified threat management, or UTM, security systems, which are used by enterprises and service providers to increase their security while reducing total operating costs. Fortinet solutions were built from the ground up to integrate multiple levels of security protection--including firewall, antivirus, intrusion prevention, VPN, spyware prevention and anti-spam -- designed to help customers protect against network and content level threats. Leveraging a custom ASIC and unified interface, Fortinet solutions offer advanced security functionality that scales from remote office to chassis-based solutions with integrated management and reporting. Fortinet solutions have won multiple awards around the world and are the only security products that are certified in six programs by ICSA Labs: (Firewall, Antivirus, IPSec, SSL, Network IPS, and Anti-Spyware). Fortinet is privately held and based in Sunnyvale, California. *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities
RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities 2009.February.05 Fortinet's FortiGuard Global Security Research Team Discovers Two Vulnerabilities in RealNetworks RealPlayer. Summary: Two code execute vulnerabilities exist in RealNetworks RealPlayer 11 through malformed IVR files. Impact: === Remote Code Execution. Risk: = Critical Affected Software: == RealNetworks RealPlayer 11 Additional Information: === Internet Video Recording (IVR) files contain media content that is played and recorded by RealPlayer. A remote attacker could craft a malicious IVR file, that when sent to an unsuspecting user, may allow the execution of arbitrary code when viewed, using one of two vulnerabilities during RealPlayer's IVR processing routine: * A heap corruption vulnerability that occurs when altering a field that determines the length of a structure * A vulnerability that allows an attacker to write one null byte to an arbitrary memory address by using an overly long file name length value It should be noted that the victim does not necessarily have to open the malicious file for exploitation to occur: the vulnerabilities lie in a DLL that is also used as a plugin for the Windows Explorer shell. A successful attack could take place by merely previewing the IVR file through Windows Explorer. Solutions: == The FortiGuard Global Security Research Team released the signature "RealNetworks.RealPlayer.IVR.File.Processing.Code.Execution" Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against these code execute vulnerabilities. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. Acknowledgement: Haifei Li of Fortinet's FortiGuard Global Security Research Team References: === FortiGuard Advisory http://www.fortiguardcenter.com/advisory/FGA-2009-04.html CVE ID: CVE-2009-0375 (one byte rewrite) http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0375 CVE ID: CVE-2009-0376 (heap corruption) http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0376 *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Command Buffer Overflow Vulnerability
Oracle Secure Backup NDMP_CONECT_CLIENT_AUTH Command Buffer Overflow Vulnerability 2009.January.13 Fortinet's FortiGuard Global Security Research Team Discovers Vulnerability in Oracle Secure Backup Summary: A Buffer Overflow vulnerability exists Oracle Secure Backup 10.2.0.2 through a malformed NDMP packet. Impact: === Remote Code Execution Risk: = Critical (Base Score:10.0) Affected Software: == Oracle Secure Backup 10.2.0.2 Additional Information: === Sending a malformed NDMP client authentication(NDMP_CONECT_CLIENT_AUTH Command) packet will cause a overflow a buffer overflow due to invalid bounds checking. Solutions: == Use the solution provided by Oracle http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html The FortiGuard Global Security Research Team released a signature "Oracle.NDMP.CONNECT.CLIENT.AUTH.User.ID.Buffer.Overflow" on Jan 13 2009, which covers this specific vulnerability. Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against this Remote Code Execution Vulnerability. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. Acknowledgement: Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research Team References: === http://www.fortiguardcenter.com/advisory/FGA-2009-02.html http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html CVE ID: CVE-2008-5444 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5444 *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
Oracle Secure Backup's observiced.exe Denial Of Service vulnerability
Oracle Secure Backup's observiced.exe Denial Of Service vulnerability 2009.January.13 Fortinet's FortiGuard Global Security Research Team Discovers a vulnerability in observiced.exe of Oracle Secure Backup Summary: A Denial Of Service vulnerability exists Oracle Secure Backup 10.2.0.2 observiced.exe through malformed packet. Impact: === Remote Denial Of Service Risk: = Medium (Base Score:5.0) Affected Software: == Oracle Secure Backup 10.2.0.2 Additional Information: === Oracle Secure Backup listens, and receives Oracle's private Protocol data in a default configuration, on TCP port 400 By sending some malformed data to this port will lead Denial Of Service. Solutions: == Use the solution provided by Oracle http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against this Remote Denial Of Service vulnerability. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. Acknowledgement: Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research Team References: === http://www.fortiguardcenter.com/advisory/FGA-2009-02.html http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html CVE ID: CVE-2008-5445 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5445 *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***
Oracle Secure Backup Multiple Denial Of Service vulnerabilities
Oracle Secure Backup Multiple Denial Of Service vulnerabilities 2009.January.13 Fortinet's FortiGuard Global Security Research Team Discovers multiple vulnerabilities in Oracle Secure Backup Summary: Multiple Denial Of Service vulnerabilities exist Oracle Secure Backup 10.2.0.2 through malformed NDMP packets. Impact: === Remote Denial Of Service Risk: = Medium (Base Score:5.0) Affected Software: == Oracle Secure Backup 10.2.0.2 Additional Information: === 1>[CVE-2008-5441]Sending a malformed NDMP connect open(NDMP_CONNECT_OPEN command) packet will cause a crash. 2>[CVE-2008-5442]Sending a malformed NDMP connect close(NDMP_CONNECT_CLOSE command) packet will cause a crash. 3>[CVE-2008-5443]Sending a malformed NDMP mover get state(NDMP_MOVER_GET_STATE command) packet will cause a crash. Solutions: == Use the solution provided by Oracle http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html Fortinet customers who subscribe to Fortinet’s intrusion prevention (IPS) service should be protected against these Remote Denial Of Service vulnerabilities. Fortinet’s IPS service is one component of FortiGuard Subscription Services, which also offer comprehensive solutions such as antivirus, Web content filtering and antispam capabilities. These services enable protection against threats on both application and network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security Research Team, which enables Fortinet to deliver a combination of multi-layered security intelligence and true zero-day protection from new and emerging threats. These updates are delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows responsible disclosure guidelines to ensure optimum protection during a threat's lifecycle. Acknowledgement: Zhenhualiu and XiaopengZhang of Fortinet's FortiGuard Global Security Research Team References: === http://www.fortiguardcenter.com/advisory/FGA-2009-02.html http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html CVE ID: CVE-2008-5441 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5441 CVE ID: CVE-2008-5442 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5442 CVE ID: CVE-2008-5443 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-5443 *** This email and any attachments thereto may contain private, confidential, and privileged material for the sole use of the intended recipient. Any review, copying, or distribution of this email (or any attachments thereto) by others is strictly prohibited. If you are not the intended recipient, please contact the sender immediately and permanently delete the original and any copies of this email and any attachments thereto. ***