The Internet Explorer vulnerabilities announced Friday were important enough for Microsoft to make a special, unscheduled warning. That reinforces our HIGH priority rating and suggests a rapid response. CheckPoint Firewall and VPN users should definitely read Critical Vulnerability number 2.
There is also a gift enclosed for you to distribute to your unsophisticated users. It's a summary of the most important current viruses, phishing announcements, and damaging hoaxes - written without jargon. We're experimenting with it as a possible new service for security officers to distribute to users. You'll find it at the end of this issue. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Featured Security Training Program: SANS Network Security 2004 Las Vegas, NV September 28 - October 6, 2004
The largest training conference in the world with 16 immersion training tracks and a large security exposition. Great courses for security managers and CISOs, for security experts, for auditors, for forensics scientists, and even for those just starting out. And Las Vegas is a great place to visit in the fall.
Register soon to get a seat at your choice of courses. http://www.sans.org/ns2004
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft released a cumulative update, MS04-025, which fixes multiple vulnerabilities in the Internet Explorer. These vulnerabilities can be exploited by a malicious webpage or an HTML email to compromise a client system. (a) Internet Explorer contains a cross-domain vulnerability that can be triggered when handling a frame, a "modal dialog box" that is invoked from the frame, and a webserver "redirect" that points to a local file on the client computer. This vulnerability can be exploited to execute arbitrary code on the client system. The flaw has been leveraged in the wild by the "JS.Scob" Trojan. The exploit code has been publicly posted since early June 2004. (b) Internet Explorer contains an integer overflow vulnerability that can be triggered by a specially crafted bitmap (.bmp) image file. A malicious webpage can exploit this flaw to possibly execute arbitrary code on a client system with the privileges of the currently logged-on user. A proof-of-concept bitmap file has been publicly posted since February 2004. (c) Internet Explorer contains a "double free" vulnerability (the flaw resulting from the same memory being freed twice) that is triggered by certain GIF files. The flaw can be exploited by a malicious webpage to possibly compromise a client system. The "double free" bugs are known to be platform dependant and harder to exploit. Hence, a large-scale attack leveraging this vulnerability is unlikely. The technical details regarding the flaw have been posted since 2003.
Status: Microsoft has confirmed all the vulnerabilities. The patch MS04-025 should be installed on an expedited basis.
Council Site Actions: Due to the late breaking nature of the Microsoft patch announcement, we were unable to solicit the council site input from all the council sites. One of the sites reported that they will update all their desktops with this patch as soon as they finish their internal testing of the patch.
Description: The Internet Security Association and Key Management (ISAKMP) protocol is used for exchanging security keys and authentication data to set up a secure VPN connection. The protocol contains multiple fields that are encoded using the ASN.1 format. The CheckPoint VPN-1 server contains a heap-based buffer overflow that can be triggered by a specially crafted ASN.1 field in an ISAKMP packet. The flaw can be exploited by an unauthenticated attacker to possibly execute arbitrary code on the VPN-1 server with the privileges of the VPN process, typically "root" or "SYSTEM". Limited technical details regarding how to trigger the flaw have been publicly posted. Note that the same flaw exists in the CheckPoint VPN clients and can be exploited by a malicious VPN server. Hence, if an attacker obtains control of a VPN server, all connecting clients may be compromised.
Status: CheckPoint has confirmed the flaw, updates available. If the "Aggressive mode" IKE negotiation is enabled, the flaw can be exploited by a single spoofed UDP packet. Hence, this mode should be disabled.
Council Site Actions: Only one of the reporting council sites is using the affected software. They plan to distribute the patch/update during their next regularly scheduled system update process.
Description: ThinTune Linux-based client appliances contain a vulnerability that can be exploited to obtain a remote root access. The problem occurs because the appliances run a backdoor process that listens on port 25072/tcp. An attacker can authenticate to this process via the hard-coded password "jstwo", and invoke a root shell. The posted advisory shows how to exploit the flaw.
Status: Vendor confirmed, upgrade to the firmware version 2.4.39.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Citadel/UX is a room-based bulletin board system (BBS) that has been in popular use since 1988. The Citadel/UX server, which runs of port 504/tcp by default, reportedly contains a stack-based buffer overflow. The flaw can be triggered by the "USER" command with an overlong argument (over 97 bytes), and possibly exploited to execute arbitrary code. Writing an exploit for this vulnerability is challenging because only lower case characters can be utilized for such a purpose. The posted advisory contains a proof-of-concept exploit.
Status: Vendor notified but has not responded. No patches available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: This vulnerability in Mozilla allows a malicious website to spoof its SSL certificate, and appear to be a trusted site. The problem occurs because the Mozilla browsers cache the certificate of a trusted site, and display the "secure lock" even when the trusted site is replaced by a malicious site via "refresh" and "onunload" functions. The vulnerability can be exploited to conduct phishing attacks by enticing a victim to visit a malicious site. A proof-of-concept exploit has been posted.
Status: Vendor confirmed, patches available. The users should also be advised to not click links in suspicious emails.
Council Site Actions: Most of the council sites are starting to use the Mozilla Firefox browser, although the number of installations remains very small, except at one site. Several sites plan no action due to their limited deployment. Three sites plan to install the patch/update once it is available. The remaining site has a large installation of the software; however, they don't feel this vulnerability poses a significant threat. They update Mozilla every few months and don't plan a special update for this problem.
Description: It is important to note that the Samba versions 2.2.0 through 2.2.9 are vulnerable in their default configuration to the buffer overflow in the "hash" mangling method. To mitigate this overflow either include "mangled names = no" and/or "mangling method = hash2" in the smb.conf file. Samba versions prior to 3.0.5 are not vulnerable by default. The "mangling method" used by a Samba installation can be determined by using the "testparm" program.
Council Site Updates: Although most of the council sites are using SAMBA, they are not using SWAT or name mangling feature and thus are not vulnerable to this problem. One site that was using the feature immediately disabled it. Another site that has a large installation of Samba performs regular updates of the software and their next update is planned for early August for the Red Hat Linux systems. They are performing patch deployments on other Linux variants and awaiting a patch for Mac OS X and Solaris. Vendor Patches: Gentoo Linux http://www.gentoo.org/security/en/glsa/glsa-200407-21.xml HP http://www.securityfocus.com/archive/1/370074/2004-07-26/2004-08-01/0 RedHat http://rhn.redhat.com/errata/RHSA-2004-404.html Trustix http://www.trustix.net/errata/2004/0039/ Mandrake http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:071 SuSE http://www.suse.de/de/security/2004_22_samba.html Previous @RISK Newsletter Posting http://www.sans.org/newsletters/risk/vol3_29.php (Item #1)
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3615 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.
=============== A Gift For Your Unsophisticated Users ===================
OUCH: The Report On Identity Theft and Attacks On Computer Users August 2, 2004
Every day, thousands of people are fooled by emails from criminals trying to steal their identities or infect and take over their computers. This update is our attempt to help you avoid being one of the victims.
Part 1. Subject Lines You May See In Emails That Are Trying To Hurt You
I. Emails from people trying to infect your system and steal your friends' email addresses for spam I.1 Pictures of Osama Bin Laden hanging or Arnold Schwarzenegger's suicide note I.2. Email from your system administrator or other familiar sender that says your email could not be delivered, or some similar statement. I.3. Email with subject "Against!" or "Revenge" I.4. Email with subject Re_ and body with animals or foto or other subjects
II. Emails from people trying to steal your identity (and your money) II.1. Update Your Billing Information (from eBay) II.2. Your account at eBay has been suspended II.3. Your account at Wells Fargo has been suspended II.4. Notification of US Bank Internet Banking II.5. Attn: Citibank Update
III. Emails from people trying to fool you into hurting yourself or your friends and coworkers III.1 Subject: "jdbg" Virus: how to detect and remove.
Part 2. More Details About Each Attack
Part I: Emails from people trying to infect your system and steal your friends' names for spam
I.1. Name: Hackarmy
The bait: An email or news article claiming to offer you copies of pictures of Osama Bin Laden being hanged. A second form comes claiming to have a suicide note from Arnold Shwarzenegger.
How it infects your system: You click on a link that downloads a zip file. You execute the file thinking you will see the pictures.
What it does to you: Gives attackers remote control of your computer so they can use it in attacks on other people, or harvest email names for spam.
Where to find detailed information: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.hacarmy.d.html
I.2. Name: Mydoom-O
The bait: An email from your mail or system administrator or other familiar sender with any one of the following subjects: (1) say helo to my litl friend, (2) click me baby, (3) one more time, (4) hello, (5) error, (6) status, (7) test, (8) report, delivery failed, (9) Message could not be delivered, (10) Mail System Error - Returned Mail, (11) Delivery reports about your e-mail, (12) Returned mail: see transcript for details, (13) Returned mail: Data format error. Each has an attachment.
How it infects your system: you download and open the attachment.
What it does to you: steals all email addresses from you to be sold to spammers, spreads to other sites from your machine. It also uses your system to send requests to search engines like Google to look for more email addresses.
Where to find more detailed information: http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.m@mm.html
I.3. Name: Atak-C
The bait: An email that arrives with the subject "Attack!" or "Revenge" and a zipped attachment
How it infects your system: you download and open the attachment.
What it does to you: steals all email addresses from you to be sold to spammers.
Where to find more detailed information: http://www.sophos.com/virusinfo/analyses/w32atakc.html
I.4. Name: Beagle
The bait: An email that arrives subject Re_ and with an attachment.
How it infects your system: you download and open the attachment.
What it does to you: disables antivirus and other important software, mass mails itself to others, steals email addresses from throughout your files, gives attacker remote control of your computer to use to attack other systems.
Where to find more detailed information: http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39641
II. Emails from people trying to steal your identity (and your money)
II.1 Update Your Billing Information (from eBay)
The bait: An email coming from eBay saying the company has "detected a slight error in your billing information" and saying that you must fix it within 48 hours to continue to buy or sell on eBay.
What it tries to make you do: click on a link and tell them your eBay and paypal username and password, and your credit/debit card information
Where you can see how it actually appears: http://www.antiphishing.org/phishing_archive/07-27-04%20Ebay%20(Update%20Your%20
Billing%20Informations).html
II.2 Your account at eBay has been suspended
The bait: An email coming from eBay saying your account has been suspended and "We had to block your eBay account"
What it tries to make you do: click on a link and tell them your eBay and paypal username and password, and your credit/debit card information
Where you can see how it actually appears: http://www.antiphishing.org/phishing_archive/07-26-04_Ebay_(your_account_at_ebay
_has_been_suspended).html
II.3 Your account at Wells Fargo has been suspended
The bait: An email coming from eBay saying your account has been suspended and "Your account has been compromised by outside parties."
What it tries to make you do: click on a link and tell them your username, password, and credit card information
Where you can see how it actually appears: http://www.antiphishing.org/phishing_archive/06-29-04_Wells_Fargo_(Your_account_
at_Wells_Fargo_has_been_suspended).html
II.4. Notification of US Bank Internet Banking
The bait: An email coming from US Bank saying, "as a preventative measure, we have temporarily limited access to some features"
What it tries to make you do: click on a link and tell them username, password, credit card data or debit card data.
Where you can see how it actually appears: http://www.antiphishing.org/phishing_archive/07-23-04_US_Bank_(Notification_of_U
S_Bank_Internet_Banking).html
II.5. Attn: Citibank Update
The bait: "Click here" link in an email that seems to come from Citibank.
What it tries to make you do: click on a link and tell them personal information and credit card or debit card data.
Where you can see how it actually appears: http://www.fraudwatchinternational.com/fraud_alerts/040721_1046_citibank.htm http://www.antiphishing.org/phishing_archive/07-21-04_Citibank_(Attn_Citibank_Up
date).html
II.6 Confirm AOL Billing Info
The bait: An email coming from AOL saying your billing information is out of date and asking you to "spend several minutes and update your billing records"
What it tries to make you do: click on a link and tell them personal information and credit card or debit card data.
Where you can see how it actually appears: http://www.antiphishing.org/phishing_archive/07-20-04_AOL_(Confirm_AOL_billing_i
nfo).html
III. Emails from people trying to fool you into hurting yourself or your friends and coworkers
III. 1. jdbg Hoax
The bait: An email telling you about a virus and how to remove it.
Example: "Subject: "jdbg" Virus: how to detect and remove." May also talk about finding a teddy bear on the machine - because the file has a bear as a symbol.
What it is trying to make you do: remove a file that is not harmful
Where to find more information: http://www.symantec.com/avcenter/venc/data/jdbgmgr.exe.file.hoax.html
==end==
Thanks to CipherTrust for helping to providing some of the data on which this issue was based.
Copyright, 2004. The SANS Institute. Information security officers have permission to redistribute this material to employees of their organizations. Anyone else wanting to redistribute it must get prior written approval by telling us the groups to whom you would redistribute it and requesting approval. Email info@sans.org with subject "Permission to redistribute security awareness newsletter."