Those of you who picked this past week for a vacation chose wisely. It was a very light week, providing needed relief after last week.
A question: "What Works In Intrusion Prevention?" If you know the answer, skip the webcast. Otherwise, join us Wednesday, July 28 at 1:00 PM EDT (1700 UTC) where you'll hear from Los Alamos National Laboratory Senior Security Analyst Paul Criscuolo on how the lab found a very effective solution to the Intrusion Prevention problem. You'll even have a chance to ask Paul questions. Gartner just told its clients that intrusion prevention can help them "win the arms race" against hackers. Makes sense to know how.
If you have a SANS portal account just join us at 1 EDT on Wednesday at http://www.sans.org/webcasts/show.php?webcastid=90514 If you don't have a portal account, set yours up at portal.sans.org
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Featured Security Training Program: SANS Network Security 2004 Las Vegas, NV September 28 - October 6, 2004
The largest training conference in the world with 16 immersion training tracks and a large security exposition. Great courses for security managers and CISOs, for security experts, for auditors, for forensics scientists, and even for those just starting out. And Las Vegas is a great place to visit in the fall. Register soon to get a seat at your choice of courses. http://www.sans.org/ns2004
***********************************************************************
************************** SPONSORED LINKS ***************************
Note: some of these links take you to a non-SANS site.
(1) FREE Download - Take full control of remote access & support security with CrossTec NetOp Remote Control http://www.sans.org/info.php?id=535
(2) Step-by-Step Guides to security, from SANS,on topics from Business Law to hardening Oracle and Linux and Windows and more. https://store.sans.org/store_item.php?item=112
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Samba is a UNIX-based server that provides file and print services to the CIFS/SMB clients. The server contains multiple buffer overflow vulnerabilities. (a) The Samba Web Administration Tool (SWAT) allows an administrator to configure a Samba server via a web browser. The swat server, when enabled, runs of port 901/tcp by default. This server contains a buffer overflow that can be triggered by invalid base64 characters during the HTTP basic authentication. A remote unauthenticated attacker may exploit this flaw to possibly execute arbitrary code on the server with root privileges. A proof-of-concept exploit has been publicly posted. (b) Samba server supports "name mangling", which allows DOS and Windows clients to use files that do not conform to the "8.3 Windows" naming convention. The mangling method in the "smb.conf" file determines the algorithm that would be used to generate the mangled file name. The "hash" mangling method contains a buffer overflow vulnerability. No technical details regarding how to trigger this overflow have been posted. An attacker can obtain more details by comparing the fixed and the vulnerable versions of the software.
Status: Vendor confirmed. Version 3.0.5 fixes the flaw in the SWAT server. A workaround is to disable the SWAT service. Version 2.2.10 fixes the flaw in the hash mangling method. A workaround is to use "hash2" as the mangling method instead of "hash". A workaround for both the vulnerabilities is to block the ports 901/tcp, 139/tcp and 445/tcp at the network perimeter.
Council Site Actions: Most of the council sites are using SAMBA but not the SWAT or name mangling feature. Only one of the reporting council sites is using the SWAT feature on a handful of systems and plan to disable the feature. Most sites also reported that they are already blocking the associated ports at their network perimeter security control points.
Description: The "mod_ssl" module provides the SSL and TLS protocol support for the Apache webserver. This module contains a format string vulnerability in the "ssl_log()" function. The flaw can be reportedly triggered by an HTTP request like " http://foobar%s.mydomain.com", if the host "foobar%s" exists in the domain "mydomain.com". If the Apache server is configured as a proxy, an attacker may exploit this flaw to possibly execute arbitrary code. Note that the attacker would need to own a domain name, and configure a host in that domain with a name containing a format string. The technical details required to leverage the flaw have been posted.
Status: Vendor confirmed, upgrade to version 2.8.19. OpenPKG has issued an update for Apache that includes the fixed version of the mod_ssl.
Council Site Actions: Most council sites are running the Apache software with mod_ssl, but not as a proxy server, thus no action needed on their part. There are three sites running in the affected configuration on a very small number of systems. Two of these sites don't plan any action, as they consider the threat very low. The third site will install the patch during their next regularly scheduled systems update process.
Description: WebStore, a shopping cart software, contains a remote command execution vulnerability. The problem occurs because the user input passed to the "webstore_cgi" script's "page" parameter is not properly sanitized. An attacker can exploit this flaw to execute arbitrary commands on the webserver, by passing a value to the page parameter containing a "|"(pipe) character. The posting shows how to craft such a malicious request.
Status: Vendor not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: The following web-based software packages reportedly contain SQL injection vulnerabilities: PHP-Nuke, Web+Center, DNA HelpDesk and LBE Helpdesk. These flaws can be exploited to manipulate SQL queries issued against the backend database, potentially leading to the compromise of the affected application. The technical details required for exploitation have been posted.
Status: None of the vendors has confirmed the flaws, no updates available. The LBE Helpdesk software version 4.0.81 is reportedly not vulnerable.
Council Site Actions: The affected software and/or configuration is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: The following open source software packages reportedly contain remote file include vulnerabilities: WebStore, BLOG: CMS, PunBB and Nucleus. These flaws can be exploited by a remote attacker to run arbitrary code on the webserver hosting the vulnerable software package(s). The technical details can be obtained by examining the fixed and the vulnerable versions of the software.
Status: Vendor confirmed. Please upgrade to version 3.1.4 of BLOG: CMS, version 3.0.1 of Nucleus or version 1.1.5 of PunBB. Council Site Action: The affected software and/or configuration is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: SCO OpenServer, a UNIX-based server, contains multiple vulnerabilities in its Multi-channel Memo Distribution Facility (MMDF) software. MMDF is a mail transport agent (MTA) for UNIX systems similar to Sendmail. SCO has reported that the software contains multiple buffer overflows. These overflows may be possibly exploited to execute arbitrary commands with root privileges. No technical details regarding how to trigger the flaws have been released. The vulnerabilities can be exploited locally and possibly remotely (not confirmed).
Status: Vendor confirmed. Updated binaries for OpenServer are available.
Council Site Actions: The affected software and/or configuration is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: @Stake has released an advisory regarding the buffer overflow vulnerability in the HP's implementation of DCE/RPC protocol. This overflow was discussed in the last issue of the @RISK newsletter. @stake has confirmed that the buffer overflow in the DCE endpoint mapper, which runs on 135/tcp, can be exploited to execute arbitrary code with possibly root privileges.
Council Site Actions: The few council sites that are running the affected software have not changed their initial plans for responding to this vulnerability.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3599 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.