A very tough week for vulnerable web sites using Microsoft IIS and for worried Internet Explorer users concerned about whether keystroke loggers were installed on their systems to steal credit cards and passwords. The biggest issue facing the web site victims is whether to go public to warn individual users that they might have been exploited. Those who don't warn their users risk both reputational and legal liability. Those who do tell are also at risk. The entire debacle reminds us of the enormous danger created when a software vendor persuades thousands of clients that installing a web site is so easy "anyone can do it." When that same vendor doesn't take responsibility for securing the systems installed by "anyone," lots of people are put at risk. (#6 in Part I) Lotus Notes users also were busy patching their systems quickly this week. (#2 in Part I)
Jeff Kirby from Cornell University graciously suggested an improved design for @RISK bringing more of the timely information to the front and pushing the static information to the back, plus other improvements. Tell us if you like it or you would rather we return to the old design.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
SANS largest Fall conference will be in Las Vegas this year - September 28 to October 6. The brochures will arrive in a week or so with seventeen immersion tracks and special one day programs and a big vendor expo. http://www.sans.org/ns2004
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: ISC's freely redistributable implementation of DHCP protocol includes a DHCP server, a DHCP client and a DHCP relay agent. This DHCP implementation ships with many operating systems and networking products. Specifically, the DHCP server, contains the following buffer overflows: 1) A malicious client can trigger a buffer overflow via DHCP "DISCOVER" or "REQUEST" packets that contain multiple "hostname" options. The "hostname" option allows a DHCP client to provide its host name to the DHCP server, which is logged by the server. The problem occurs because a malicious client can send multiple "hostname" options in a DHCP packet. The multiple hostnames are concatenated that leads to overflowing a fixed size buffer. This stack-based buffer overflow can be exploited to cause a DoS to the DHCP server, and possibly execute arbitrary code on the server with root privileges. 2) The "vsnprint" and "vsprintf" C functions copy variable arguments into a buffer according to a specified format string, with the difference that the "vsnprintf" function does bounds checking on the number of bytes copied, whereas "vsprintf" does not. On certain platforms "vsnprintf" support is not available. Hence, on these platforms the DHCP server may contain buffer overflows due to the lack of bounds checking on the client-supplied data. The technical details required to exploit these vulnerabilities have been posted. Note that in order to exploit the flaws remotely, an attacker may need to correctly guess the range of IP addresses being leased by the targeted DHCP server.
Status: Vendor confirmed, upgrade to version 3.0.1rc14. For a complete list of vulnerable vendors, please refer to the CERT advisory. A workaround is to block access to the DHCP server (port 67/udp) at the network perimeter.
Council Site Actions: The affected software or version of software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: The Lotus Notes software suite is designed to provide users a single access point to frequently used applications like e-mail, calendar, instant messaging and web browser. The software installs a URI handler that interprets URIs beginning with "notes:". This URI handler contains a remote command injection vulnerability. The problem occurs because the URI handler passes the "notes:" URI as an argument to the "notes.exe" program without sufficient sanitization. A malicious webpage or an email may exploit this flaw to invoke the "notes.exe" program with additional command-line options. The posted advisory shows how the command-line options can be used to run malicious DLLs, which may lead to the client compromise.
Status: Vendor confirmed, upgrade to version 6.0.4 or 6.5.2. A workaround is to remove the "registry key" for the "notes:" URI handler. Another possible workaround is to block access to the ports 139/tcp and 445/tcp at the network perimeter, which will prevent access to the attacker specified Lotus notes configuration file.
Council Site Actions: Only two of the reporting council sites are running the affected software. One site has already implemented the work around. They will deploy the patch during their next regularly scheduled system update process. The second site only has a handful of systems running the affected software. They believe the maintainers of their Lotus Notes installations stay up-to-date with patches. They also block ports 139 and 445 at their network security perimeters. Given these two conditions, they don't plan further action at this time.
Description: rlpr package includes printing utilities that offer enhanced functions compared to the "lpr", "lprm" and "lpq" programs on UNIX platforms. The rlprd server is a proxy that runs between the "rlpr" clients and the standard "lpd" printers. This server, which runs on port 7290/tcp by default, contains a format string vulnerability. An unauthenticated attacker can trigger the flaw by specifying a format string such as "%1" in the first 64 bytes of data to the server. The flaw can be exploited to execute arbitrary code with the rlprd privileges. An exploit has been publicly posted.
Status: Vendor confirmed, patches available.
Council Site Actions: Only one of the reporting council sites is running the affected software, but only on a handful of systems. The only action they have planned at this time is to scan their network to see if any machines have open connections on port TCP 7290. They don't believe that their Debian administrators would select rlprd as the default printer daemon.
Description: PHP-Nuke, a popular open-source portal, contains a SQL injection vulnerability in the "Journal" module's "search.php" script. An attacker can exploit the flaw by specifying arbitrary SQL statements in the script's "forwhat" parameter. This may lead to the back-end database and/or the portal compromise. The posted advisory shows how to craft an HTTP query to extract the portal administrator password's md5 hash.
Status: Vendor not confirmed, no patches available.
Council Site Actions: Only two of the reporting council sites are running the affected software. One site plans no action at this time since the number of affected systems is very low and the system owners are typically good at keeping the systems up to date. The second site plans to install the patches during their next regularly scheduled system update process. In the mean time, they have notified their UNIX support team.
Description: Asterisk, a Linux based open-source telephony software, contains multiple format string vulnerabilities in its logging functions. The flaws may be exploited to crash the Asterisk server and possibly execute arbitrary code. A proof-of-concept exploit has been publicly posted.
Status: Vendor confirmed, upgrade to version 0.9.0 Council Site Actions:The affected software or version of software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Multiple IIS servers have been reportedly compromised. These compromised servers are being used to install malware on the connecting clients by exploiting the Internet Explorer vulnerabilities. It is not entirely clear if the IIS servers were compromised by exploiting the "PCT SSL" buffer overflow (fixed in MS04-011 patch), or due to an yet unpublished flaw. The Internet Explorer vulnerabilities being exploited have been discussed in a previous issue of the @RISK newsletter. Note that no patch is yet available for these IE vulnerabilities.
Council Site Actions: None of the reporting council sites saw additional activity as the result of this exploit release. They have not changed from their original plans to install the patches, once they are released, during their normal systems update process.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3474 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner. ______________________________________________________________________
Why @RISK is so timely and comprehensive
Part I - the critical vulnerabilities - is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/ cva/#process"> http://www.sans.org/newsletters/ cva/#process Archives at http://www.sans.org/newsletters/
Part II - the comprehensive list of all newly discovered vulnerabilities - - is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3493 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.