The new Internet Explorer patch appears to be too little, too late, as modified exploits have already been released that circumvent the patch. (Number 2 below)
MySQL users who employ phpMyAdmin users quickly upgraded or worked around a flaw that allowed remote users to execute arbitrary code on web servers. (Number 4 below)
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
SANS largest Fall conference will be in Las Vegas this year - September 28 to October 6. The brochures started arriving last week. Network Security has seventeen immersion tracks and many special intense one day programs plus a big vendor expo.
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: An old vulnerability has been rediscovered in multiple browsers including the widely used Internet Explorer. This vulnerability permits a malicious website to inject a "frame" into the browser window of another website. For example, the content from http://www.malicious.com can be loaded into another window displaying the content from http://www.msdn.com. The flaw can be exploited by a malicious webpage to spoof its identity as a trusted site. This may lead to stealing sensitive user information such as passwords, or further compromise of the user system. Proof-of-concept exploit has been publicly posted.
Status: Vendors have not confirmed, no patches available. Mozilla Firefox version 0.9 and Mozilla version 1.7 are reportedly not vulnerable. Council Site Actions: Four of the reporting council sites are using the affected software. All sites are waiting for confirmation from the vendors before taking further action. In the mean time, they are doing additional analysis to determine the potential impact of the problem. If the vendors confirm the problem, most sites plan to roll out the patches during one of their regularly scheduled system update process.
Description: Microsoft has released a patch for Internet Explorer that disables the ADODB.STREAM ActiveX control. This control has been utilized in exploit code for many IE cross-domain vulnerabilities that permit an attacker to execute arbitrary code on client systems. This control is used because it supports methods to read and write files on the client computer. Note that disabling the control may prevent the exploitation of IE vulnerabilities via currently circulating exploits. However, the patch does not fix the root cause of the problem - the cross-domain IE vulnerabilities. Postings show how the existing IE exploit code can be modified to compromise a patched client system. An example of modified exploit code has been publicly posted. Council Site Actions: Due to late breaking nature of this issue, we were unable to solicit council site input.
Description: Cisco Collaboration Server (CCS) provides solutions for interactive customer services as well as tools for e-commerce sales management. The server uses the "ServletExec", a third party software that provides java servlets and java server pages. Specifically, the ServletExec's "UploadServlet" java servlet can be invoked by a remote unauthenticated attacker to upload any file to the CCS. The attacker can also invoke the uploaded file, and possibly obtain the administrative privileges on the server. The technical details required to exploit the flaw have been posted.
Status: Vendor confirmed, patches available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: phpMyAdmin, a PHP-based tool to manage MySQL databases, contains multiple vulnerabilities. An attacker can add an arbitrary MySQL server to the list of pre-configured SQL servers by issuing a specially crafted HTTP request. Further, if the "$cfg['LeftFrameLight']" variable is set to FALSE in the "config.inc.php" file (not a default configuration), an attacker may be able to execute arbitrary PHP code on the web server. In order to exploit the PHP code injection vulnerability, an attacker would need to add a malicious server to the phpMyAdmin configuration. Then, the attacker would need to issue an HTTP request that would result in the PhpMyAdmin server contacting the attacker controlled server. The posted advisory shows how to craft the various HTTP requests, and contains the exploit code that can be used to set up the malicious server.
Status: Vendor confirmed, upgrade to version 2.5.7-pl1. A workaround is to ensure that the firewall configuration does not permit the phpMyAdmin server to initiate outbound TCP connections.
Council Site Actions: Several sites were running the affected version of software. They have already upgraded to a corrected version.
Description: MPlayer, a Linux movie player, reportedly contains a stack-based buffer overflow. The flaw can be triggered when MPlayer attempts to open media files with overlong names. An attacker can exploit this flaw, by enticing a client to visit a webpage or click a link in an email, to execute arbitrary code on the client system. An exploit has been publicly posted. Note that the GUI support is available by default in MPlayer on some RedHat and FreeBSD systems.
Status: Vendor confirmed. Version 1.0 pre5 will fix this overflow and other vulnerabilities that were discovered during the code review for fixing this bug.
Council Site Actions: Only one of the reporting council sites is running the affected software on 200-300 systems; however, the software is not supported by their central IT department. They don't have any straightforward way to determine which systems have an unpatched version of MPlayer installed and they think that exploitation of this vulnerability is relatively unlikely. Therefore, they don't plan any actions at this time.
Description: HP has released 2 security bulletins regarding the vulnerabilities in HP-UX systems. 1) The Netscape browser, which is bundled with HP-UX, contains multiple vulnerabilities that may be exploited by a remote attacker to execute arbitrary code on HP-UX client systems. HP is no longer supporting the Netscape upgrade. Hence, users are advised to migrate to Mozilla web browser. 2) HP Object Action Manager (ObAM) is an HP internal tool, which is the interface technology between the GUI and many system management applications. The version of Apache server included with ObAM contains multiple vulnerabilities that may allow an attacker to compromise the server. Note that this Apache server is used to provide remote administration functionality for popularly used HP software like Servicecontrol Manager and Partition Manager. Limited technical details regarding the exact nature of the vulnerabilities have been posted.
Status: Vendor confirmed. A workaround for the ObAM vulnerability is to stop the Apache server. For further details, please refer to the HP advisories.
Council Site Actions: Several of the reporting council sites have HP-UX systems; however, they don't believe they are running the affected software. One site felt was relatively unlikely that there would be any widespread exploit code targeting Netscape and that it was unlikely there would be widespread use of an Apache exploit against HP-UX. Thus, they don't plan any action for this vulnerability.
Description: All Juniper routers running the JunOS contain a vulnerability in processing certain IPv6 packets. The Packet Forwarding Engine (PFE) responsible for forwarding packets to the router interfaces leaks memory upon handling specially crafted IPv6 packets. This can be exploited to exhaust the router's memory, which causes the router to reboot. Repeatedly performing the attack would cause an effective DoS against a Juniper router. Very limited technical details regarding how to exploit the flaw are publicly available.
Status: Vendor confirmed, patches available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3515 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.