Mac users are busy this week deploying an important patch, but Windows users are enjoying a third quiet week in a row. On the other hand, on Tuesday June 8, Microsoft's monthly vulnerability announcement may give Windows users several high priority security tasks.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
This Week's Featured Security Training Program: SANSFIRE 2004 Monterey, CA, July 5-13, 2004 SANSFIRE offers you 14 immersion training tracks in one of the most beautiful and romantic places in America. Phenomenal training for auditors who want to master the challenges of security auditors, for managers who want to build a great security program, for security beginners who want to get a fast start, and, of course, the only place to go for technologists who want to master the most current methods for protecting systems and networks. SANSFIRE also offers lots of evening programs, extra one-day classes ranging from security business law to cyberwarrior training, and vendor exhibits, too.
Register soon to get a seat at your choice of courses. http://www.sans.org/sansfire2004
***********************************************************************
************ SPONSORED LINKS: FREE SANS RESOURCES **********************
(1) More than 1000 original research papers on 75 topics in computer security, now posted in the SANS Reading Room. A wealth of useful information. All free. http://www.sans.org/rr
(2) Security products explained - twenty four categories of products with an overview of what they do and the principal products in each category. http://www.sans.org/securityproducts/
(3) Internet Storm Center Threat Update Web Briefing Wednesday June 9 Johannes Ullrich monitors thousands of sensors in 60 countries. He has a unique overview of the types of attacks that are being launched every day. Listen to his monthly webcast on Wednesday June 9 at 2 PM EDT (1800 UTC). http://www.sans.org/webcasts/show.php?webcastid=90489
(4) New Series of "What Works" Webcast shows you which products actually do the job they claim to do, so you can recommend them with confidence. The first one, on vulnerability remediation, is available for your use at http://www.sans.org/webcasts/show.php?webcastid=90510 Full list of archived webcasts at: http://www.sans.org/webcasts/archive.php
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: MIT Kerberos is an implementation of the Kerberos network authentication protocol, which is used by many vendors in their products. The software contains multiple heap-based buffer overflows in the "krb5_aname_to_localname" function, which converts a Kerberos "principal" name to a Unix machine's local user name. The flaws in this function may be exploited to execute arbitrary code on hosts running Kerberized services, typically with root privileges. This is rated as a low risk vulnerability because 1) an attacker requires authentication credentials to the Kerberized service in order to exploit the flaws, and 2) the vulnerabilities can be leveraged only when "auth_to_local" or "auth_to_local_names" mappings are configured in the Kerberos configuration file (not a default configuration). The technical details required to exploit the flaws are exposed by comparing the fixed and the vulnerable version of the software.
Status: Vendor confirmed, updating to krb5-1.3.4 would fix the problem. For other vendors using the MIT Kerberos library, the CERT advisory provides the status.
Council Site Actions: Four of the reporting council sites are using the affected software. One site is not using the vulnerable configuration but they plan to update within the next few months. Another site is still investigating the potential impact. They use products such as HP Openview Operations Advanced Security where the vulnerable software is embedded. The third site is still investigating the potential impact and the fourth site is treating the vulnerability as low risk and does not plan any action at this time.
Description: This vulnerability in the Trend Micro PC-cillin anti-virus product reportedly enables a remote attacker to execute arbitrary code on the client machine. The problem occurs because the anti-virus software creates a local HTML alert file, and uses Internet Explorer to display that alert file, when any malware is found on the client machine. The Internet Explorer opens the alert file in the context of the "local" computer zone. Hence, a specially constructed zip file, which is detected as malware, can execute arbitrary code on the client system. An attacker can deliver such a crafted file to the client via a webpage, email or peer-to-peer network. Note that the PC-cillin anti-virus product does not examine a zip file for malicious content in its default configuration. A proof-of-concept exploit has been posted.
Status: Vendor not confirmed, no patches available.
Council Site Actions: Two sites are using the affected software, but in very small installations. The first site notified the system support groups as their only course of action. The second site has fewer than 40 potential users of the software. Their expectation is that some of the affected users will obtain a fix for the vulnerability through the Trend Micro Update Center, and other affected users will switch over to their supported anti-virus solution.
Description: Apple has released an update OS X 10.3.4 that fixes many vulnerabilities for which the technical details have not been published. However, more details about one of the corrected vulnerabilities, CAN-2004-0485, can be obtained from the information in the CVE database. This information indicates that the problems with the "disk://" URI handling have been fixed. This vulnerability has been discussed in two preceding issues of @RISK. It allows an attacker to silently execute arbitrary code on a client system. Hence, it is important to apply this update on a priority basis.
Council Site Actions: Four of the reporting council sites are using the affected software. Three of these sites provide support for MacOS and have started the patch deployment process. The final site has notified their user base and requested them to install the patches.
Description: e107, a PHP-based content management system (CMS), reportedly contains remote file include and multiple SQL injection vulnerabilities. Both problems arise due to lack of sanitization of the user-supplied values for the HTTP parameters in multiple PHP scripts. An attacker can execute arbitrary PHP script code by specifying a remote file in the "secure_img_render.php" script's "p" parameter. The "content.php" and the "news.php" scripts contain SQL injection vulnerabilities that can be exploited to extract the md5 hash of the administrator's password. Postings show how to craft the various HTTP requests. Note that the vulnerabilities can be exploited only if the server's "register_globals" PHP configuration parameter is turned "On". The default setting for this parameter is "Off" for PHP versions 4.2.0 or higher.
Status: Vendor confirmed. Upgrade to version 0.616.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Mail Manage EX, a PHP based online form management software, contains a remote file include vulnerability. An attacker can specify a remote file value for the "Settings" parameter in the "mmex.php" script, and execute arbitrary PHP scripts on the web server. The posting contains an example of such a malicious request.
Status: Vendor has been informed, no fix available yet.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Firebird is an open-source relational database that runs on Windows, Linux and many UNIX flavors. The Firebird source code is based on the code released by Borland for the Interbase database product. These databases contain a stack-based buffer overflow vulnerability. An unauthenticated attacker can trigger the overflow by supplying an overlong database filename. The flaw may be possibly exploited to execute arbitrary code on the database server. The technical details required to exploit the flaw have been posted.
Status: Upgrade to Firebird version 1.5, which is reportedly not vulnerable.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.References: Posting by Aviram Jenik http://archives.neohapsis.com/archives/vulnwatch/2004-q2/0029.html Posting by KF http://marc.theaimsgroup.com/?l=bugtraq&m=108627509221597&w=2 Firebird Homepage http://firebird.sourceforge.net/ Interbase Homepage http://www.borland.com/interbase/ Resources on Firebird and Interbase Databases http://www.interbase-world.com/ SecurityFocus BID http://www.securityfocus.com/bid/10446
Description: Eudora Internet Mail Server (EIMS), a freeware mail server for Mac OS, is reportedly vulnerable to a heap based buffer overflow. The flaw can be triggered by sending specially crafted data to port 105/tcp. Exploits of this flaw may execute arbitrary code on the mail server. Limited technical details regarding the flaw have been posted.
Status: Vendor not confirmed, no patches available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3466 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.