Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard

An interesting paper by Tim Proffitt titled, “Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard”

Vulnerability Assessment, according to wikipedia.org, is the process of

identifying and quantifying vulnerabilities in a system. Vulnerability assessment

can be used against many different types of systems such as a home security

alarm, the protection of a nuclear power plant or a military outpost. Note that

vulnerability assessment is different from risk assessments even though they share

some of the same commonalities. Vulnerability Assessment concerns itself with

the identification of vulnerabilities, the possibilities of reducing those

vulnerabilities and improving the capacity to manage future incidents. This paper

will focus primarily on vulnerability assessment as it pertains to information

technology infrastructure and how utilizing QualysGuard can ease the burden on

your technology staff.

With today’s global marketplace, companies cannot afford to tarnish their

reputation with a public security incident. Corporations can suffer major financial

losses if a security incident is encountered in the business. The fear of revenue

loss should motivate companies to begin taking proactive measures against

vulnerabilities in their infrastructure. The concept of vulnerability assessment is a

critical process that should be followed in any organizations as a way to identify,

assess and respond to new vulnerabilities before those vulnerabilities become a

threat.

To obtain a copy of this paper, you can find it here at SANS Reading Room

‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard

Last week a hacker named, “Iraq resistance” who has been trying to unite other like-minded hackers in a cyber jihad effort towards the U.S. initiated a malicious computer worm know as the “Here you have” worm.  A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.

The “Here you have” worm spread through many computer networks, bringing down e-mail servers at some of the biggest U.S. organizations, such as, Disney, Proctor and Gamble, Wells Fargo, and NASA.  It is known as the “Here you have” worm because of the subject line associated with the worm when it is sent out. Below is a description of the message:

Subject: Here you have

Hello:

This is The Document I told you about,you can find it Here.

(WEB)://malicious-link-omitted/library/PDF_Document21.025542010.pdf

Please check it and reply as soon as possible.

Cheers,

It seems the attack was partly motivated by the actions of Terry Jones, the Florida pastor who called for people around the world to burn copies of the Koran on Sept. 11.

Please make sure your security controls and applications are working and up to date on your systems.

Microsoft Security Bulletin Summary for September 2010 – Issued: September 14, 2010

********************************************************************
Microsoft Security Bulletin Summary for September 2010
Issued: September 14, 2010
********************************************************************

This bulletin summary lists security bulletins released for
September 2010.

The full version of the Microsoft Security Bulletin Summary for
September 2010 can be found at
http://www.microsoft.com/technet/security/bulletin/ms10-sep.mspx.

With the release of the bulletins for September 2010, this bulletin
summary replaces the bulletin advance notification originally issued
on September 9, 2010. For more information about the bulletin
advance notification service, see
http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

To receive automatic notifications whenever Microsoft Security
Bulletins are issued, subscribe to Microsoft Technical Security
Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

Microsoft is hosting a webcast to address customer questions on
these bulletins on September 15, 2010, at 11:00 AM Pacific Time
(US & Canada). Register for the Security Bulletin Webcast at
http://www.microsoft.com/technet/security/bulletin/summary.mspx.

Microsoft also provides information to help customers prioritize
monthly security updates with any non-security, high-priority
updates that are being released on the same day as the monthly
security updates. Please see the section, Other Information.

Critical Security Bulletins
===========================

Microsoft Security Bulletin MS10-061

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Server 2003 with SP2 for Itanium-based Systems
– Windows Vista Service Pack 1 and
Windows Vista Service Pack 2
– Windows Vista x64 Edition Service Pack 1 and
Windows Vista x64 Edition Service Pack 2
– Windows Server 2008 for 32-bit Systems and
Windows Server 2008 for 32-bit Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Windows Server 2008 for x64-based Systems and
Windows Server 2008 for x64-based Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Windows Server 2008 for Itanium-based Systems and
Windows Server 2008 for Itanium-based Systems Service Pack 2
– Windows 7 for 32-bit Systems
– Windows 7 for x64-based Systems
– Windows Server 2008 R2 for x64-based Systems
(Windows Server 2008 R2 Server Core installation affected)
– Windows Server 2008 R2 for Itanium-based Systems

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-062

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Vista Service Pack 1 and
Windows Vista Service Pack 2
– Windows Vista x64 Edition Service Pack 1 and
Windows Vista x64 Edition Service Pack 2
– Windows Server 2008 for 32-bit Systems and
Windows Server 2008 for 32-bit Systems Service Pack 2
(Windows Server 2008 Server Core installation not affected)
– Windows Server 2008 for x64-based Systems and
Windows Server 2008 for x64-based Systems Service Pack 2
(Windows Server 2008 Server Core installation not affected)

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-063

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Server 2003 with SP2 for Itanium-based Systems
– Windows Vista Service Pack 1 and
Windows Vista Service Pack 2
– Windows Vista x64 Edition Service Pack 1 and
Windows Vista x64 Edition Service Pack 2
– Windows Server 2008 for 32-bit Systems and
Windows Server 2008 for 32-bit Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Windows Server 2008 for x64-based Systems and
Windows Server 2008 for x64-based Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Windows Server 2008 for Itanium-based Systems and
Windows Server 2008 for Itanium-based Systems Service Pack 2
– Microsoft Office XP Service Pack 3
– Microsoft Office 2003 Service Pack 3
– Microsoft Office 2007 Service Pack 2

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-064

– Affected Software:
– Microsoft Outlook 2002 Service Pack 3
– Microsoft Outlook 2003 Service Pack 3
– Microsoft Outlook 2007 Service Pack 2

– Impact: Remote Code Execution
– Version Number: 1.0

Important Security Bulletins
============================

Microsoft Security Bulletin MS10-065

– Affected Software:
– Windows XP Service Pack 3
– Internet Information Services 5.1 ASP
– Internet Information Services 5.1 Authentication
– Windows XP Professional x64 Edition Service Pack 2
– Internet Information Services 6.0 ASP
– Windows Server 2003 Service Pack 2
– Internet Information Services 6.0 ASP
– Windows Server 2003 x64 Edition Service Pack 2
– Internet Information Services 6.0 ASP
– Windows Server 2003 with SP2 for Itanium-based Systems
– Internet Information Services 6.0 ASP
– Windows Vista Service Pack 1 and
Windows Vista Service Pack 2
– Internet Information Services 7.0 ASP
– Windows Vista x64 Edition Service Pack 1 and
Windows Vista x64 Edition Service Pack 2
– Internet Information Services 7.0 ASP
– Windows Server 2008 for 32-bit Systems and
Windows Server 2008 for 32-bit Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Internet Information Services 7.0 ASP
– Windows Server 2008 for x64-based Systems and
Windows Server 2008 for x64-based Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Internet Information Services 7.0 ASP
– Windows Server 2008 for Itanium-based Systems and
Windows Server 2008 for Itanium-based Systems Service Pack 2
– Internet Information Services 7.0 ASP
– Windows 7 for 32-bit Systems
– Internet Information Services 7.5 ASP
– Internet Information Services 7.5 FastCGI
– Windows 7 for x64-based Systems
– Internet Information Services 7.5 ASP
– Internet Information Services 7.5 FastCGI
– Windows Server 2008 R2 for x64-based Systems
(Windows Server 2008 R2 Server Core installation affected)
– Internet Information Services 7.5 ASP
– Internet Information Services 7.5 FastCGI
– Windows Server 2008 R2 for Itanium-based Systems
– Internet Information Services 7.5 ASP
– Internet Information Services 7.5 FastCGI

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-066

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Server 2003 with SP2 for Itanium-based Systems

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-067

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Server 2003 with SP2 for Itanium-based Systems

– Impact: Remote Code Execution
– Version Number: 1.0

Microsoft Security Bulletin MS10-068

– Affected Software:
– Active Directory Application Mode (ADAM) on
Windows XP Service Pack 3
– Active Directory Application Mode (ADAM) on
Windows XP Professional x64 Edition Service Pack 2
– Active Directory on
Windows Server 2003 Service Pack 2
– Active Directory Application Mode (ADAM) on
Windows Server 2003 Service Pack 2
– Active Directory on
Windows Server 2003 x64 Edition Service Pack 2
– Active Directory Application Mode (ADAM) on
Windows Server 2003 x64 Edition Service Pack 2
– Active Directory on
Windows Server 2003 with SP2 for Itanium-based Systems
– Active Directory Lightweight Directory Service (AD LDS) on
Windows Vista Service Pack 2
– Active Directory Lightweight Directory Service (AD LDS) on
Windows Vista x64 Edition Service Pack 2
– Active Directory and
Active Directory Lightweight Directory Service (AD LDS) on
Windows Server 2008 for 32-bit Systems and
Windows Server 2008 for 32-bit Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Active Directory and
Active Directory Lightweight Directory Service (AD LDS) on
Windows Server 2008 for x64-based Systems and
Windows Server 2008 for x64-based Systems Service Pack 2
(Windows Server 2008 Server Core installation affected)
– Active Directory Lightweight Directory Service (AD LDS) on
Windows 7 for 32-bit Systems
– Active Directory Lightweight Directory Service (AD LDS) on
Windows 7 for x64-based Systems
– Active Directory and
Active Directory Lightweight Directory Service (AD LDS) on
Windows Server 2008 R2 for x64-based Systems
(Windows Server 2008 R2 Server Core installation affected)

– Impact: Elevation of Privilege
– Version Number: 1.0

Microsoft Security Bulletin MS10-069

– Affected Software:
– Windows XP Service Pack 3
– Windows XP Professional x64 Edition Service Pack 2
– Windows Server 2003 Service Pack 2
– Windows Server 2003 x64 Edition Service Pack 2
– Windows Server 2003 with SP2 for Itanium-based Systems

– Impact: Elevation of Privilege
– Version Number: 1.0

Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse

Microsoft Windows Malicious Software Removal Tool:
==================================================
Microsoft will release an updated version of the Microsoft Windows
Malicious Software Removal Tool on Windows Update, Microsoft Update,
Windows Server Update Services, and the Download Center.

Non-Security, High-Priority Updates on MU, WU, and WSUS:
========================================================
For information about non-security releases on Windows Update and Microsoft
Update, please see:
http://support.microsoft.com/kb/894199: Microsoft Knowledge Base
Article 894199, Description of Software Update Services and
Windows Server Update Services changes in content.
Includes all Windows content.
http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates
from Past Months for Windows Server Update Services. Displays all
new, revised, and rereleased updates for Microsoft products other
than Microsoft Windows.

Microsoft Active Protections Program (MAPP)
===========================================
To improve security protections for customers, Microsoft provides
vulnerability information to major security software providers in
advance of each monthly security update release. Security software
providers can then use this vulnerability information to provide
updated protections to customers via their security software or
devices, such as antivirus, network-based intrusion detection
systems, or host-based intrusion prevention systems. To determine
whether active protections are available from security software
providers, please visit the active protections Web sites provided by
program partners, listed at
http://www.microsoft.com/security/msrc/mapp/partners.mspx.

Recognize and avoid fraudulent e-mail to Microsoft customers:
=============================================================
If you receive an e-mail message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious Web sites. Microsoft does
not distribute security updates via e-mail.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security bulletins, or
installing security updates. You can obtain the MSRC public PGP key
at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

To receive automatic notifications whenever Microsoft Security
Bulletins are issued, subscribe to Microsoft Technical Security
Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************
To cancel your subscription to this newsletter, reply to this
message with the word UNSUBSCRIBE in the Subject line.

To set your contact preferences for this and other Microsoft
communications, see the communications preferences section of the
Microsoft Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

Adobe Zero-Day Strikes Again

Maybe Steve Jobs has the right idea about Adobe flash running on its iDevices… Another 0-Day Adobe issue is causing a buzz in the industry, read what Brian Prince of eWeek.com had to say about it…

For the second time in nearly a week, Adobe Systems is warning users about a zero-day vulnerability under attack.

This time, the bug is in Adobe Flash Player. In a security advisory, the company said the flaw impacts versions 10.1.82.76 and earlier on Windows, Macintosh, Linux, Solaris and Android operating systems. The same vulnerability also impacts Adobe Reader and Acrobat versions 9.3.4 and earlier on Windows and Macs, though so far they are not known to have come under attack, Adobe said.

“This vulnerability (CVE-2010-2884) could use a crash and potentially allow an attacker to take control of the affected system,” according to Adobe’s Product Security Incident Response Team blog. “There are reports that this vulnerability is being actively exploited in the wild against Flash Player on Windows.”

Read the rest here at eWeek.com

Spammers Stay Busy Despite Pushdo Botnet Hit

This is an interesting article from eWeek.

From the shutdown of McColo to last week’s disruption of the Pushdo botnet, spammers have continually found ways to stay in business.

Nearly 20 of the 30 command and control (CnC)servers associated with Pushdo were taken offline last week due to efforts by security vendor LastLine. The servers were supported by eight hosting providers, some of which did not respond to the vendor’s requests for action.

To read more, check our the eWeek article here.

New Fake TweetDeck Update – Beware of Spreading Malware

Many TweetDeck users have awaken to an unfortunate surprise this morning when trying to launch the application.   What is the unfortunate surprise you

ask? “It did not work!”  Twitter has recently implemented major changes to how other applications access your Twitter account and hackers have taken the opportunity by implementing a malware since they know millions of Twitter users will be looking for the new updates.  The fake Tweetdeck update that is actually a Trojan virus.  A Trojan virus is malware that appears to perform a desirable function for the user but instead facilitates unauthorized access of the user’s computer system. “It is a harmful piece of software that looks legitimate” as stated on http://en.wikipedia.org/wiki/Trojan_horse_(computing).

A tweet about the fake update link is associated to a file named “tweetdeck-08302010-update.exe” and is often connected to the URL http://alturl.com.  The TweetDeck blog warns that many of the suspect tweets include the following:

TweetDeck will work until tomorrow, udate now!

1.Download TweetDeck udate ASAP!

2.Update TweetDeck!

3.Hurry up for tweetdeck update!

4.Sorry for offtopic, but it is a critical TweetDeck update. It won’t work tomorrow!

The only place users should go to download this update is:

http://www.tweetdeck.com/desktop/

Good Luck Y’all…