Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Clubic.com : Top Vulnerable Applications – 2010

Clubic.com : Top Vulnerable Applications – 2010

Ratings: (0)|Views: 3,440|Likes:
Published by GuillaumeB

More info:

Categories:Types, Research
Published by: GuillaumeB on Nov 17, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/12/2014

pdf

text

original

 
 0  0 E   OT   :  
 O UL  NE   B L  E  L  I    C I    ON S  
Report:TopVulnerableApplications–2010
Continuous Endpoint Monitoring
Malicious cyber attacks are happening with greater frequency, leveragingcommon applications and social media vehicles that are part of everydaylives. Consumers and enterprise IT are becoming more vigilant and takingmore precautions, but it still may not be enough.
 This report provides a wake-up call that users and companies need to be even more vigilant andproactive about knowing what’s on their computers and other endpoints—smart phones,PDAs,USBs,attachments—and protecting those endpoints.Hackers go where the people are and thesevulnerable applications are some of the most popular and prevalent ones out there today—usedto moved business,ecommerce and social media.It’s interesting to note that Apple applications are growing in number on this list.There was atime when Apple customers were secure in the knowledge that they“couldn’t”be hacked and“couldn’t”get a virus.The reality is the Apple footprint wasn’t big enough for malicious attackersto focus on.Now,as a byproduct of its success,both in the consumer market and with its growingfootprint in the enterprise,Apple is also now in the sights of attackers.
 The applications on this list meet the following criteria:
• Is an end-user/consumer application and not an enterprise-only application likea server or router.• Is not classified as malicious by enterprise IT organizations or security vendors.• Contains at least one critical vulnerability that was:• Reported between January 1,2010 through October 21,2010.• Registered in the NIST database at http://nvd.nist.gov,and given a severity ratingof high (between 7.0-10.0) on the CommonVulnerability Scoring System (CVSS).
Note:In most cases,the vendors of these applications have issued patches or other instructions for eliminatingthe vulnerability.
WhatYou Can Do to ControlVulnerable Applications
Bit9 recommends the followingsix-step approach to shield andprotect your endpoints:
Define a baseline by discovering andmapping all the existing applications.Create a full but flexible control policyfor applications on endpoints.Employ forensics to identify,validateand understand the reputation of software on endpoints.Monitor your PCs using continuousmonitoring and identification services.Monitor the Internet for newvulnerabilities.Enforce application controls usingApplicationWhitelisting.
123456
 
2010 REPORT:
TOP VULNERABLE APPLICATIONS FOR IT
2
CVE-2010-3658CVE-2010-3632CVE-2010-3631CVE-2010-3630CVE-2010-3629CVE-2010-3628CVE-2010-3627CVE-2010-3626CVE-2010-3625CVE-2010-3624CVE-2010-3623CVE-2010-3622CVE-2010-3621CVE-2010-3620CVE-2010-3619CVE-2010-2890CVE-2010-2889CVE-2010-2888CVE-2010-2887CVE-2010-2884CVE-2010-2883CVE-2010-2862CVE-2010-2212CVE-2010-2211CVE-2010-2210CVE-2010-2209CVE-2010-2208CVE-2010-2207CVE-2010-2206CVE-2010-2205CVE-2010-2204CVE-2010-2202CVE-2010-2201CVE-2010-2168CVE-2010-1295CVE-2010-1285CVE-2010-1297CVE-2010-1278CVE-2010-0204CVE-2010-0203CVE-2010-0202CVE-2010-0201CVE-2010-0199CVE-2010-0198CVE-2010-0197CVE-2010-0196CVE-2010-0195CVE-2010-0194CVE-2010-0193CVE-2010-0192CVE-2010-0191CVE-2010-1241CVE-2010-1240CVE-2010-0188
AdobeReaderandAcrobat
Adobe Reader and Acrobat 9.x before 9.4,and 8.x before8.2.5 onWindows and Mac OS X,allow attackers to executearbitrary code or cause a denial of service (memorycorruption) via unspecified vectors.
CVEIdentifiers
2
Software NatureofVulnerabilities—Examples
1
CVE-2010-3976CVE-2010-3975CVE-2010-2216CVE-2010-2214CVE-2010-2213CVE-2010-0209CVE-2010-0379CVE-2010-0378
AdobeFlash
Untrusted search path vulnerability in Adobe Flash Player10.1.82.76,and possibly other versions,allows local users,and possibly remote attackers,to execute arbitrary codeand conduct DLL hijacking attacks via aTrojan horsedwmapi.dll that is located in the same folder as a file that isprocessed by Flash.Adobe Flash Player before 9.0.280 and10.x before 10.1.82.76,and Adobe AIR before 2.0.3,allowsattackers to execute arbitrary code or cause a denialof service (memory corruption) via unspecified vectors.CVE-2010-1818CVE-2010-1799CVE-2010-0536CVE-2010-0529CVE-2010-0528CVE-2010-0527
AppleQuickTime
Apple QuickTime before 7.6.6 onWindows allows remoteattackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via acrafted BMP image.CVE-2010-2874CVE-2010-2882CVE-2010-2881CVE-2010-2880CVE-2010-2879CVE-2010-2878CVE-2010-2877CVE-2010-2876CVE-2010-2875CVE-2010-2873CVE-2010-2872CVE-2010-2871CVE-2010-2870CVE-2010-2869CVE-2010-2868CVE-2010-2867CVE-2010-2866CVE-2010-2864CVE-2010-2863CVE-2010-1291CVE-2010-1290CVE-2010-1289CVE-2010-1288CVE-2010-1287CVE-2010-1286CVE-2010-1284CVE-2010-1292CVE-2010-1283CVE-2010-1281CVE-2010-1280CVE-2010-0987CVE-2010-0986CVE-2010-0130CVE-2010-0129CVE-2010-0127
AdobeShockwave
Adobe Shockwave Player before 11.5.8.612 does notproperly validate a count value in a Director movie,whichallows remote attackers to cause a denial of service (heapmemory corruption) or execute arbitrary code via a craftedmovie,related to IML32X.dll and DIRAPIX.dll.AdobeShockwave Player before 11.5.8.612 allows attackers tocause a denial of service (memory corruption) or possiblyexecute arbitrary code via unspecified vectors.CVE-2010-1807CVE-2010-1806CVE-2010-1793CVE-2010-1792CVE-2010-1791CVE-2010-1790CVE-2010-1789CVE-2010-1788CVE-2010-1787CVE-2010-1786CVE-2010-1785CVE-2010-1784CVE-2010-1783CVE-2010-1782CVE-2010-1780CVE-2010-1774CVE-2010-1771CVE-2010-1770CVE-2010-1761CVE-2010-1759CVE-2010-1758CVE-2010-1419CVE-2010-1750CVE-2010-1749CVE-2010-1417CVE-2010-1415CVE-2010-1414CVE-2010-1412CVE-2010-1410CVE-2010-1405CVE-2010-1404CVE-2010-1403CVE-2010-1402CVE-2010-1401CVE-2010-1400CVE-2010-1399CVE-2010-1398CVE-2010-1397CVE-2010-1396CVE-2010-1392CVE-2010-1385CVE-2010-1939CVE-2010-1181CVE-2010-1180CVE-2010-1179CVE-2010-1177CVE-2010-1176CVE-2010-1120CVE-2010-1119CVE-2010-0054CVE-2010-0053CVE-2010-0052CVE-2010-0050CVE-2010-0049CVE-2010-0048CVE-2010-0047CVE-2010-0046CVE-2010-0045CVE-2010-0043CVE-2010-0040
AppleSafari
WebKit in Apple Safari 4.x before 4.1.2 and 5.x before 5.0.2does not properly validate floating-point data,which allowsremote attackers to execute arbitrary code or cause adenial of service (application crash) via a crafted HTMLdocument.Use-after-free vulnerability inWebKit in AppleSafari before 5.0 on Mac OS X 10.5 through 10.6 andWindows,and before 4.1 on Mac OS X 10.4,allows remoteattackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving DOMRange objects.
continued on page 3
1
All the vulnerabilities are not listed here due to space constraints.
2
CVE Identifiers are unique,common identifiers for publicly known information security vulnerabilities.More information can be found at:http://nvd.nist.gov/.
 
2010 REPORT:
TOP VULNERABLE APPLICATIONS FOR IT
3
1
All the vulnerabilities are not listed here due to space constraints.
2
CVE Identifiers are unique,common identifiers for publicly known information security vulnerabilities.More information can be found at:http://nvd.nist.gov/.
CVE-2010-1815CVE-2010-1814CVE-2010-1813CVE-2010-1812CVE-2010-1781CVE-2010-1760CVE-2010-1386CVE-2010-0659CVE-2010-0647
AppleWebKit
Use-after-free vulnerability inWebKit in Apple iOS before4.1 on the iPhone and iPod touch allows remote attackersto execute arbitrary code or cause a denial of service(application crash) via vectors involving scrollbars.WebKitin Apple iOS before 4.1 on the iPhone and iPod touchallows remote attackers to execute arbitrary code or causea denial of service (memory corruption and applicationcrash) via vectors involving form menus.CVE-2010-3331CVE-2010-3329CVE-2010-3328CVE-2010-3326CVE-2010-2560CVE-2010-2559CVE-2010-2558CVE-2010-2557CVE-2010-2556CVE-2010-1262CVE-2010-1261CVE-2010-1260CVE-2010-1259CVE-2010-0807CVE-2010-0805CVE-2010-0492CVE-2010-0491CVE-2010-0490CVE-2010-0489CVE-2010-0267CVE-2010-1175CVE-2010-1118CVE-2010-1117CVE-2010-0806CVE-2010-0555CVE-2010-0248CVE-2010-0247CVE-2010-0246CVE-2010-0245CVE-2010-0244CVE-2010-0027CVE-2010-0249
MicrosoftInternetExplorer
Microsoft Internet Explorer 6 through 8 does not properlyhandle objects in memory in certain circumstancesinvolving use of MicrosoftWord to readWord documents,which allows remote attackers to execute arbitrary codeby accessing an object that (1) was not properly initializedor (2) is deleted,leading to memory corruption,aka“Uninitialized Memory CorruptionVulnerability.”CVE-2010-4042CVE-2010-4040CVE-2010-4039CVE-2010-4035CVE-2010-4034CVE-2010-3730CVE-2010-3729CVE-2010-1822CVE-2010-1825CVE-2010-1824CVE-2010-1823CVE-2010-1773CVE-2010-1772CVE-2010-3416CVE-2010-3415CVE-2010-3414CVE-2010-3412CVE-2010-3258CVE-2010-3257CVE-2010-3255CVE-2010-3254CVE-2010-3253CVE-2010-3252CVE-2010-3249CVE-2010-3120CVE-2010-3119CVE-2010-3117CVE-2010-3116CVE-2010-3115CVE-2010-3114CVE-2010-3113CVE-2010-3112CVE-2010-3111CVE-2010-2903CVE-2010-2902CVE-2010-2901CVE-2010-2900CVE-2010-2898CVE-2010-2897CVE-2010-2651CVE-2010-2650CVE-2010-2648CVE-2010-2647CVE-2010-2646CVE-2010-2302CVE-2010-2300CVE-2010-2299CVE-2010-2298CVE-2010-2297CVE-2010-2296CVE-2010-2110CVE-2010-2109CVE-2010-2108CVE-2010-2107CVE-2010-2106CVE-2010-2105CVE-2010-1665CVE-2010-1663CVE-2010-1506CVE-2010-1505CVE-2010-1502CVE-2010-1500CVE-2010-1237CVE-2010-1236CVE-2010-1234CVE-2010-1233CVE-2010-1231CVE-2010-1230CVE-2010-1229CVE-2010-1228CVE-2010-0658CVE-2010-0657CVE-2010-0655CVE-2010-0649CVE-2010-0646CVE-2010-0645
GoogleChrome
Google Chrome before 7.0.517.41 does not properly handleelement maps,which allows remote attackers to cause adenial of service or possibly have unspecified other impactvia vectors related to“stale elements.”Use-after-freevulnerability inWebKit,as used in Google Chrome before6.0.472.59,allows remote attackers to cause a denial of service or possibly have unspecified other impact viavectors related to nested SVG elements.
CVEIdentifiers
2
Software NatureofVulnerabilities—Examples
1
CVE-2010-3242CVE-2010-3241CVE-2010-3240CVE-2010-3239CVE-2010-3238CVE-2010-3237CVE-2010-3236CVE-2010-3235CVE-2010-3234CVE-2010-3233CVE-2010-3232CVE-2010-3231CVE-2010-3230CVE-2010-3221CVE-2010-3220CVE-2010-3216CVE-2010-3215CVE-2010-3214CVE-2010-2750CVE-2010-2748CVE-2010-2747CVE-2010-2738CVE-2010-3142CVE-2010-3141CVE-2010-2562CVE-2010-1902CVE-2010-1901CVE-2010-1900CVE-2010-1263CVE-2010-1253CVE-2010-1252CVE-2010-1251CVE-2010-1250CVE-2010-1249CVE-2010-1248CVE-2010-1247CVE-2010-1246CVE-2010-1245CVE-2010-0824CVE-2010-0823CVE-2010-0822CVE-2010-0821CVE-2010-0815CVE-2010-0264CVE-2010-0263CVE-2010-0262CVE-2010-0261CVE-2010-0260CVE-2010-0258CVE-2010-0257CVE-2010-0243CVE-2010-0034CVE-2010-0033CVE-2010-0032CVE-2010-0031CVE-2010-0030CVE-2010-0029
MicrosoftOffice
Microsoft Excel 2002 SP3,Office 2004 and 2008 for Mac,andOpen XML File Format Converter for Mac do not properlyvalidate record information,which allows remote attackersto execute arbitrary code via a crafted Excel document,aka“Ghost RecordType ParsingVulnerability.”MicrosoftWord2002 SP3 and 2003 SP3,Office 2004 for Mac,andWordViewer do not properly handle a malformed record duringparsing of aWord document,which allows remote attackersto execute arbitrary code via a crafted document thattriggers memory corruption,aka“Word ParsingVulnerability.”
continued on page 4

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->