@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Highlighted Security Training For This Week
SANS largest Fall conference will be in Las Vegas this year - September 28 to October 6. The 400,000 brochures started arriving two weeks ago. Network Security has seventeen immersion tracks and many special intense one day programs plus a big vendor expo.
***********************************************************************
********************** SPONSORED LINKS ********************************
Note: these links may take you to non-SANS sites.
(1) PROPRIETARY INFORMATION? Would you know if proprietary information has left your network today? FREE WHITEPAPER http://www.sans.org/info.php?id=512
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: MySQL is a widely used, open-source database with reported five million installations world-wide. The database runs on a number of operating systems and is typically deployed as a back-end database for web applications. The software contains multiple vulnerabilities in its authentication module, specifically in the "check_scramble_323" function. An attacker can specify a certain value for the "client capability" flag, and obtain unauthorized access to the database via a null password. The attacker can obtain the privileges of any user on the MySQL server, provided the user name is correctly guessed. The attacker can also trigger a stack-based buffer overflow by providing an overlong password string. The overflow may be exploitable on a few platforms to execute arbitrary code. Note that the flaws cannot be exploited by using the available MySQL clients. The attacker would have to create a custom MySQL client. The technical details required to leverage the flaws and multiple exploits have been publicly posted.
Status: Vendor confirmed. Upgrade to version 4.1.3 and newer builds of version 5.0. A workaround is to provide access to the MySQL server port 3306/tcp to only trusted hosts in the network.
Council Site Actions: Four of the reporting council sites are running the affected software. One site is waiting for vendor updates for products they use. The second site is not widely using MySQL but will patch the systems during the next regularly scheduled system update process. The third site chose only to notify their system support group of the workarounds and let them decide how to proceed. The final site scanned their network for systems running MySQL on port 3306 shortly after they received the original advisory. Of the several hundred systems they found running MySQL, only a handful were running the affected version. The system administrators of these systems were advised to move to a non-vulnerable version. A large fraction of the systems were Linux systems running a Red Hat distribution, which uses version 3.23.*. They will address some of the vulnerable systems by downgrading from 4.1.* to 3.23.*, so that they can resume using the patch process provided by their operating-system vendor.
Description: The Mozilla project's Mozilla and Firefox web browsers, and Thunderbird email client for Windows contain a vulnerability in handling the "shell:" URIs. A malicious webpage or an HTML email can launch any executables present on a client system via specially crafted "shell:" URIs. Note that arbitrary command-line arguments cannot be passed to the launched executables, which limits the malicious actions an attacker can perform on the client system. Another attack vector has also been discussed to exploit this flaw. The "shell:" URL handler invokes various applications based on the file extension. For example, "shell:my.mp3" URL will launch the media player. It may be possible to trigger a buffer overflow in some applications by passing an overlong filename. It is reported that URL of the form "shell:AAA (over 221 characters).grp" triggers a buffer overflow in the "grpconv.exe" application. These buffer overflows may possibly be exploited to execute arbitrary code on the client system. The technical details required to exploit the vulnerability have been posted.
Status: Vendor confirmed, patches available. Upgrade to Mozilla 1.7.1, Firefix 0.9.2 and Thunderbird 0.7.2. It is worthwhile to note that Mozilla project group fixed the problems within a day of being reported.
Council Site Actions: We were unable to solicit council site input for this item.
Description: Microsoft has released a patch for Internet Explorer that disables the ADODB.STREAM ActiveX control. This control has been utilized in exploit code for many IE cross-domain vulnerabilities that permit an attacker to execute arbitrary code on client systems. This control is used because it supports methods to read and write files on the client computer. Note that disabling the control may prevent the exploitation of IE vulnerabilities via currently circulating exploits. However, the patch does not fix the root cause of the problem - the cross-domain IE vulnerabilities. Postings show how the existing IE exploit code can be modified to compromise a patched client system. An example of modified exploit code has been publicly posted.
Council Site Actions: All reporting council sites have either already installed the patch or are in the process of evaluating the patch for installation. One site that is evaluating the patch is waiting to see whether a patch for the cross-domain vulnerability is released next week. Another site that is evaluating the patch is also waiting to see if MS plans to release an actual fix and if so, they would deploy that instead. Several of the sites said they were evaluating FireFox for potential replacement of IE.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3528 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.