The Future of Global Information Security: Gartner Report

Gartner has released a report on the future of global information security.  This special report will explore the major tectonic forces at play that will change how business use of technology will be dramatically changed by rapid escalations in threat, defense and societal demands. The report can be accessed here.

Advertisements

Book review: Information security for non-technical managers

Information security for non-technical managers by Dr Eduardo Gelbstein

This book presents a non-technical overview of the main elements of managing information security, where everyone, not just technical people, has a role to play.

Modern economies are highly dependent on information systems and networks connected to “cyberspace” a virtual world with a population of several billion and growing.

Cyberspace is inherently insecure. Achieving acceptable information security requires building awareness of what it takes to achieve it, mitigating vulnerabilities in people, processes and technologies and constant adaptation to a rapidly changing environment.

A download of the e-book is available.

MS-ISAC advisory on Google Chrome Vulnerablities

MS-ISAC issued an advisory on Google Chrome vulnerabilities 

Multiple vulnerabilities have been discovered in Google Chrome that could allow remote code execution, bypass of security restrictions, or cause denial-of-service conditions. Google Chrome is a web browser used to access the Internet. Details are not currently available that depict accurate attack scenarios, but it is believed that some of the vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page.

Successful exploitation of these vulnerabilities may result in either an attacker gaining the same privileges as the logged on user, or gaining session authentication credentials. Depending on the privileges associated with the user, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

SYSTEMS AFFECTED:

  • Google Chrome Prior to 28.0.1500.71

RISK:

Government:

  • Large and medium government entities: High
  • Small government entities: High

Businesses:

  • Large and medium business entities: High
  • Small business entities: High

Home users: High

DESCRIPTION:

Multiple vulnerabilities have been discovered in Google Chrome. Details of these vulnerabilities are as follows:

  • A security vulnerability exists in Block pop-unders in various scenarios. [CVE-2013-2867]
  • A security vulnerability occurs due to confusion setting up sign-in and sync. [CVE-2013-2879]
  • A security vulnerability occurs due to the incorrect synchronization of the NPAPI extension component. [CVE-2013-2868]
  • An out-of-bounds-read condition exists when handling JPEG2000. [CVE-2013-2869]
  • A use-after-free vulnerability occurs when handling network sockets. [CVE-2013-2870]
  • A security-bypass vulnerability, which allows attackers to perform man-in-the-middle attacks against HTTP in SSL. [CVE-2013-2853]
  • A use-after-free vulnerability exists in input handling. [CVE-2013-2871]
  • A security vulnerability exists due to a possible lack of entropy in renderers. [CVE-2013-2872]
  • A use-after-free vulnerability exists in resource loading. [CVE-2013-2873]
  • An information disclosure vulnerability that allows screen data leak with GL textures. [CVE-2013-2874]
  • An out-of-bounds read condition exists in SVG. [CVE-2013-2875]
  • A security-bypass vulnerability due to Extensions permissions confusion with interstitials. [CVE-2013-2876]
  • An out-of-bounds read in XML parsing. [CVE-2013-2877]
  • A security vulnerability affects the ‘viewsource’ attribute on iframes.
  • An out-of-bounds read condition exists in text handling. [CVE-2013-2878]
  • Various fixes from internal audits, fuzzing and other initiatives (Chrome 28) [CVE-2013-2880]

Successful exploitation of some of the above vulnerabilities could result in an attacker gaining the same privileges as the user. Depending on the privileges associated with the user, an attacker could install programs; view, change, delete data; or create new accounts with full user rights. Failed exploit attempts will likely cause denial-of-service conditions.

RECOMMENDATIONS:

We reccomend the following actions be taken:

  • Update vulnerable Google Chrome products immediately after appropriate testing by following the steps outlined by Google.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Do not open email attachments or click on URLs from unknown or un-trusted sources. 

REFERENCES:

Google:

http://googlechromereleases.blogspot.com/2013/07/stable-channel-update.html

Security Focus:

http://www.securityfocus.com/bid/61041

CVE:

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2853
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2867
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2868
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2869
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2870
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2871
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2872
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2873
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2874
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2875
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2876
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2878
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2879
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2880