Last day to save $500 for SANS San Diego 2013

@RISK: The Consensus Security Vulnerability Alert

Volume: II, Issue: 51
December 18, 2003

Most of the clean up effort reported by the twelve organizations on the @RISK Security Council this week revolved around problems with Microsoft software. In addition to trying to provide protections against exploits of the Internet Explorer vulnerability that Microsoft had not patched (Part I, Number 1), they are also going back to be sure all their Internet-facing machines are patched with MS03-049 to protect against the new attack vectors reported to exploit the RPC vulnerability (Part I, Number 4 - Update).

The Internet Explorer vulnerability surprised Microsoft so much that the company's spokespeople first announced that they believed it hadn't been exploited (wrong!) and then expressed anger about the "irresponsible way it was announced." It would have been better for them to have gotten the patch out instead of trying to spin the news media. But this vulnerability reminds us that some part of defense will, at least for the foreseeable future, rely on users to practice "defensive computing." As an @RISK reader, you probably share the concern. Have you found a solution that works to make users more careful? Have you experimented with inoculation programs in which you tricked your users into doing something they should not have done and then embarrassed them when they took the bait? Any other effective methods? Please let us know so we can share your experiences with the community (with attribution or anonymously) Email info@sans.org with the subject "Defensive computing" if you have found a solution that actually works.

Alan

@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).

Summary of the vulnerabilities reported this week:

    • Category
    • # of Updates & Vulnerabilities
    • Other Microsoft Products
    • 2 (I & II)
    • Third Party Windows Apps
    • 4 (II)
    • Solaris
    • 1 (II)
    • UNIX
    • 5 (I & II)
    • Cross Platform
    • 15 (II)
    • Web Server & Application
    • 13 (II)
    • Network Device
    • 5 (I & II)

*************** Sponsored Links For This Week ************************* Privacy notice: These links redirect to non-SANS web pages.

Pending IDS or VA project? Complete our survey and win an iPod (chances are 1 in 50). http://www.sans.org/cgi-bin/sanspromo/CVA116

How to upgrade and simplify security? ***Free White Paper *** 'The Secret to Simplified Firewall and VPN Security' http://www.sans.org/cgi-bin/sanspromo/CVA117

The following link directs you to SANS web pages:

(4) Attend SANS Cyber Defense Initiative Conference in San Diego at the end of January: SANS highest rated teachers, small class sizes, all hands on, and the joy of San Diego in the middle of winter. http://www.sans.org/cdiwest04 ***********************************************************************

PART I Critical Vulnerabilities

Compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description on the process may be found at http://www.sans.org/newsletters/cva/#process

Widely Deployed Software
Other Software
  • (2) HIGH: Cyrus IMSPd abook_dbname() Buffer Overflow Affected Products: Carnegie Mellon Cyrus IMSPd versions 1.4, 1.5a6, 1.6a3, 1.7
  • Description: The Internet Message Support Protocol (IMSP) is designed to be a companion to the IMAP protocol and provide additional functionality such as address books and extended mailbox management. The Cyrus Project's IMSP server (IMSPd) is an open source implementation for UNIX systems which listens on port 406/tcp by default. IMSPd has been found vulnerable to a buffer overflow attack which can potentially yield root privileges to a remote unauthenticated attacker. The overflow is exploited by sending a specially crafted message that provides an overlong argument to IMSPd's "abook_dbname" function. The discoverer of the flaw has reportedly developed a working exploit but has not released it to the public.

  • Status: Versions 1.6a4 and 1.7a reportedly contain the fixes.

  • Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.References: Posting by Felix Lindner (discovered the flaw) http://archives.neohapsis.com/archives/bugtraq/2003-12/0222.html IMSP Protocol RFC http://asg.web.cmu.edu/cyrus /rfc/imsp.html"> http://asg.web.cmu.edu/cyrus /rfc/imsp.html Vendor Homepage http://asg.web.cmu.edu/cyrus SecurityFocus BID http://www.securityfocus.com/bid/9227

  • (3) MODERATE: Cisco ACNS Software Buffer Overflow Affected Products: ACNS Software 4.x versions prior to 4.2.11 ACNS software 5.x versions prior to 5.0.5
  • Description: The Cisco Application and Content Networking Software (ACNS) contains a buffer overflow vulnerability that can be exploited by providing an overlong password during user authentication. Remote attackers can leverage the flaw to cause a denial-of-service or to execute arbitrary code on a vulnerable Cisco device. Affected products running ACNS software include Content Routers, Content Distribution Manager and Content Engine. The vulnerability was discovered by Cisco during internal testing and no exploits are known to exist at this time.

  • Status: Vendor confirmed. ACNS software versions 4.2.11 and 5.0.5 have been released to fix the problem. A workaround is to disable the Content Engine GUI server using the "no gui-server enable" command.

  • Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.

  • References: Cisco Advisory
Patches
  • (4) UPDATE: Microsoft RPC Vulnerabilities Additional Attack Vectors
  • Description: CORE Security Technologies has publicly documented additional attack vectors for the RPC buffer overflow vulnerabilities disclosed in Microsoft Security Bulletins MS03-049 (Workstation Service), MS03-043 (Messenger Service), MS03-026 (DCOM RPC Interface), and MS03-001 (Locator Service). The most important point noted in CORE's announcement is that some of the affected RPC interfaces are bound to high numbered TCP and/or UDP ports on a Windows system. Thus, networks that only filter traffic on well known RPC-capable ports such as 135/tcp, 135/udp, 139/tcp and 445/tcp are still exposed to attacks issued against high numbered ports. Various public exploits could be modified to take advantage of this exposure. Systems that have had the appropriate Microsoft patches applied are immune to all attack vectors.

  • Council Site Actions: All council sites responded that their systems (or at least all of their Internet-facing systems) have been patched. Several sites also said their systems are exposed to only the limited set of ports necessary for the services running on those hosts. Some sites are also actively scanning for systems that may not have been patched in the earlier cycles or new systems that have been installed, but not patched yet. Several sites also expressed concern regarding this new information given the large impact of blaster and SQLslammer in previous attacks and they plan on closely watching for any potential activity.

  • References: CORE Security Advisory
Part II: Weekly Comprehensive List of Newly Discovered Vulnerabilities
Week 51, 2003

This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3125 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that can not be scanned remotely.


  • - CVE: Not Available Platform: Other Microsoft Products
  • Title: Microsoft Internet Explorer Remote Compromise Vulnerability
  • Description: There are reports of an Internet Explorer exploit that allows execution of malicious code on a vulnerable client. This is reported to affect all current versions of Internet Explorer with the latest patches installed on Windows 2000 and XP. The vulnerability has been referred to as "1stCleanRc".
  • Ref: http://www.securityfocus.com/archive/1/347458

(c) 2003. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.

==END OF PART II==

Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.

To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.

To change your subscription, address, or other information, visit http://portal.sans.org

Copyright 2003. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.