An enormous number of Windows flaws this week reqire rapid action, as does a PHP vulnerability that affects a large fraction of Apache web servers.
A note for those of you who are considering earning a CISSP credential. We have found the two most effective CISSP instructors in the United States. One of them has an extraordinary record of 97.2% passing rate by his students on their *first* try. The second teacher has a record exceeding 90%. We are going to be offering several immersion classes for people seeking CISSP, but once people learn how good they are, they'll all be full. This is an advanced notice for @RISK readers to give you and your coworkers a chance to sign up early. The first two are scheduled for Washington DC July 26-31 ( http://www.sans.org/washingtondc04/description.php?tid=13 ) And Las Vegas September 29- August 4 ( http://www.sans.org/ns2004/description.php?tid=61 ) We are also scheduling in-house classes if you have 25 folks who want to master the common body of knowledge tested in the CISSP exam. http://www.sans.org/onsite/
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************ The Most Useful Security Webcasts **************************
SANS "What Works" Webcasts take you inside leading organizations to learn what actually works in important areas of information security.
Your next opportunity to attend is Wednesday, July 28 at 1:00 PM EST (1700 UTC) where you'll hear from Los Alamos National Laboratory Senior Security Analyst Paul Criscuolo on how the lab found a very effective solution to the Intrusion Prevention problem. SANS' Director of Research Alan Paller will interview Paul and then you'll have a chance to ask questions as well.
Intrusion prevention is one of the most important technologies that every organization should be implementing or evaluating. This webcast can save you time and help you avoid mistakes.
Register at www.sans.org/webcasts
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Microsoft Task Scheduler (mstask.dll) allows a user or an administrator to schedule a task (certain commands) to be run at a specific time on a Windows system. The Task Scheduler stores the task information such as the command name in a ".job" file. The scheduler contains a stack-based buffer overflow that can be triggered by an overlong command in the .job file. An attacker can exploit this flaw by creating a specially crafted .job file in a shared folder, and enticing a client (via email or webpage) to browse the folder. Successful exploitation will result in the execution of arbitrary code on the client system with the privileges of the currently logged-on user. The exploit code has been publicly posted.
Status: Microsoft confirmed, patches available. Blocking ports 139/tcp and 445/tcp at the network perimeter will prevent access to the remote network shares.
Council Site Actions: All reporting council sites are responding to this vulnerability. Some sites have already completed the deployment of the patch; others are in the process of deploying the patch. The remaining few sites plan to deploy the patch during their next regularly scheduled systems update process. Some sites commented they are blocking 139/tcp and 445/tcp at their network perimeter control points. Several sites also said they have recently begun blocking various filenames and extensions (like .job) at their proxy servers.
Description: Internet Explorer reportedly contains a set of unpatched vulnerabilities. These vulnerabilities may be exploited by a malicious webpage or an HTML email to execute arbitrary code on a client system. (a) IE redirects a script function to another function with a similar name without checking any security context. This flaw reportedly can be exploited to compromise the client system when the user visits a malicious webpage. No action is required on the user's part. (b) The "window.createpopup" and the "show" methods are used to create and display a pop-up window respectively. IE's show method implementation reportedly contains a vulnerability that may be exploited to compromise a client system. The problem occurs because the "show" method can be used to move the pop-up window when the user clicks a link in a specially crafted webpage. This emulates the "drag-and-drop" behavior that can be used to create a malicious file on the client system. (c) During the download of certain webpages, IE stores the script files in the client computer's temporary directory. By using a number of IE vulnerabilities such as the local file and username enumeration, it may be possible to invoke the script file in the temporary directory, and compromise the client system.
Status: Microsoft has not confirmed these flaws, no patches are available. Users should be advised not to click the links in untrusted emails or webpages. Another alternative is to use browsers with fewer reported vulnerabilities like Mozilla.
Council Site Actions: All council sites plan to deploy patches or implement a workaround when they are available from the vendor. Several sites are actively investigating the possibility of changing to a different browser.
Description: The Microsoft Security Bulletin MS04-023 fixes two vulnerabilities in the HTML Help application (hh.exe). (a) The HTML application does not properly validate a compiled help file (CHM). This allows a file with any extension to be launched as a help file by using the "showHelp" method. For more details regarding this vulnerability please refer to a previous issue of the @RISK newsletter. Note that the exploit code has been publicly available since January 2004. (b) The HTML application does not validate the length parameters declared in a CHM file. A specially crafted CHM file can exploit this flaw to trigger a heap-based buffer overflow. The flaw can be exploited to execute arbitrary code with the privileges of the user viewing the malicious CHM file. In order to exploit the flaw, an attacker has to place the malicious file on the victim's system either by enticing the victim to download the file, or by exploiting other IE vulnerabilities. Limited technical details regarding how to trigger the overflow have been posted.
Status: Vendor confirmed, patches available.
Council Site Actions: All council sites are responding to this vulnerability in a similar fashion as item 1 above.
Description: PHP, a popularly used language for web development, is reportedly installed on 50% of the Apache servers used world-wide. PHP can be configured with the "memory_limit" directive, which sets the maximum amount of memory any script is allowed to use. The function that checks the "memory_limit" contains a vulnerability. The problem arises because the memory allocation can be terminated at unsafe stages such as when certain hash tables are initialized. This flaw may be exploited to control heap memory and execute arbitrary code on the server. The technical details required to exploit the flaw have been posted. The discoverer of the flaw has developed exploits that can compromise Apache and other servers running PHP. These exploits have not been publicly posted.
Status: Vendor confirmed, patches available. Version 4.3.8 fixes the flaw. Many Linux vendors such as Mandrake and Gentoo have also released updates.
Council Site Actions: Only two council sites are using the affected software and only in a limited manner. One site has notified the individual webmasters and they will do their own patching. The other site has several hundred web servers running PHP exposed to the Internet, most of which are Linux systems. Their update status depends on the Linux distribution. Systems running the "unstable" version of Debian GNU/Linux are already updated to PHP 4.3.8 in many cases. Systems running Mandrake Linux already have the MDKSA-2004:068 update, which resolves the problem, in many cases. Their Red Hat systems remain vulnerable (except in a few cases where the system administrator has chosen to replace PHP without using a Red Hat RPM package), as no update is available at this time. The few systems running Solaris are in the process of being upgraded as well.
Description: This vulnerability has been discussed in a prior @RISK newsletter as the "Internet Explorer File Extension Spoofing". The vulnerability can be exploited to trick a user into downloading a malicious file even when the IE download dialogue displays a "safe extension". Note that proof-of-concept exploits have been posted on the Internet since February 2004.
Status: Microsoft confirmed, patches available.
Council Site Actions: All council sites are responding to this vulnerability. Most sites plan to deploy the patch during their next regularly scheduled system update process. A few sites are in the process of distributing the patches now or have already completed the patch cycle process.
Description: The IIS redirection function allows the web server to redirect an HTTP request to another web server or a virtual directory on the same server. Depending on the IIS configuration, the redirected URL may contain sections of the original URL. This redirection function contains a buffer overflow vulnerability, which can be exploited to execute arbitrary code on the IIS server. Limited technical details regarding how to trigger the buffer overflow have been posted. The Microsoft advisory suggests that setting a maximum URL length of 16KB mitigates the attack; hence, a possible attack vector may be issuing overlong HTTP requests to the IIS server.
Status: Microsoft confirmed, patches available.
Council Site Actions: Most of the reporting council sites still have some NT4 IIS servers and are either in the process of patching the systems or will patch during their next regularly scheduled system update process.
Description: Adobe Reader, a popular PDF file viewer, contains a stack-based buffer overflow. The flaw can be triggered by a malicious filename containing NULL characters and an overlong extension. A webpage or an email delivering a malicious adobe file may exploit the flaw to execute arbitrary code with the privileges of the currently logged-on user. Limited technical details have been posted to the Internet.
Status: Adobe confirmed, upgrade to version 6.0.2. The release notes for this version say "Security update to further restrict malicious code execution."
Council Site Actions: Most of the reporting council sites plan to upgrade to the corrected version during their next regularly scheduled system update process. One site does not upgrade the end systems but does provide a download site for the software. They will place the new version on the download site. A few sites are running the affected software but don't plan any action at this time.
Description: This vulnerability affects the installations of Outlook 2000 or 2003 that use Word 2000 or 2003 as their email editor. The problem occurs because Word downloads the URL specified in the "data" attribute of an unclosed "OBJECT" tag, prior to forwarding an email. An attacker can exploit this flaw to execute arbitrary code on a user's computer by enticing the user to forward a specially crafted email. The code would execute with the privileges of the Outlook user irrespective of any Outlook security settings. Some spam emails are reportedly exploiting this flaw. Note that Outlook 2003 has Word 2003 set as the default email editor unlike the Outlook 2000. The posted advisories contain a proof-of-concept exploit.
Status: Microsoft has been notified, and may fix the vulnerability in future Office releases. A workaround is to disable Word as the email editor.
Council Site Actions: Most of the council sites plan to install the patches once released by the vendor. Some sites are investigating implementing the workaround in the mean time. One site commented that they turned off Word as the default editor a long time ago.
Description: The 4D WebSTAR software suite offers web, mail, webDAV and FTP servers for the Mac OS X operating system. The FTP server is vulnerable to a stack-based buffer overflow in handling overlong commands. Remote unauthenticated attackers can exploit the flaw to execute arbitrary code with the privileges of the "webstar" user. The attacker may further exploit a privilege escalation vulnerability to obtain administrative access to the server. The posted advisory contains technical details required to leverage the flaw. Note that an exploit for a similar vulnerability (FTP password overflow) is available on the Internet.
Status: Vendor confirmed. Upgrade to version 5.3.3.
Council Site Actions: Only one council site is using the affected software on a very small number of systems. They are investigating if these systems have the FTP server enabled.
Description: HP has reported a buffer overflow vulnerability in the OpenVMS DCE/RPC implementation. The overflow is triggered by the exploit code for the Microsoft RPC DCOM Interface buffer overflows. It is not clear at this point if the flaw can be exploited to execute arbitrary code on the OpenVMS systems.
Status: Vendor confirmed, patches available.
Council Site Actions: Only three of the reporting council sites are using the affected software. One site does not plan to take action at this time. One site is currently testing the patch for installation within the next two weeks and the third site plans to deploy the patch during their next regularly scheduled patching cycle.
Description: The Mozilla project's Mozilla and Firefox web browsers, and Thunderbird email client for Windows contain a vulnerability in handling the "shell:" URIs. A malicious webpage or an HTML email can launch any executables present on a client system via specially crafted "shell:" URIs. Note that arbitrary command-line arguments cannot be passed to the launched executables, which limits the malicious actions an attacker can perform on the client system. Another attack vector has also been discussed to exploit this flaw. The "shell:" URL handler invokes various applications based on the file extension. For example, "shell:my.mp3" URL will launch the media player. It may be possible to trigger a buffer overflow in some applications by passing an overlong filename. It is reported that URL of the form "shell:AAA (over 221 characters).grp" triggers a buffer overflow in the "grpconv.exe" application. These buffer overflows may possibly be exploited to execute arbitrary code on the client system. The technical details required to exploit the vulnerability have been posted.
Status: Vendor confirmed, patches available. Upgrade to Mozilla 1.7.1, Firefox 0.9.2 and Thunderbird 0.7.2. It is worthwhile to note that Mozilla project group fixed the problems within a day of being reported.
Council Site Actions: Five of the reporting council sites have small deployments of the affected software. Three of these sites have already upgraded to the corrected versions. The fourth site has sent email to the users requesting them to upgrade. The last site, which has about 200 affected users, is currently considering how to address the issue since they do note have an automated method for updates. They may just display a local security advisory on the web pages of their central IT department, with the advisory appearing only if the client User-Agent indicates Mozilla on Windows.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3572 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.