A light week for all, especially after patching the systems for the unscheduled Microsoft patch MS04-025.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Featured Security Training Program: SANS Network Security 2004 Las Vegas, NV September 28 - October 6, 2004
The largest training conference in the world with 16 immersion training tracks and a large security exposition. Great courses for security managers and CISOs, for security experts, for auditors, for forensics scientists, and even for those just starting out. And Las Vegas is a great place to visit in the fall.
Register soon to get a seat at your choice of courses. http://www.sans.org/ns2004
*************************************************************************
************************** SPONSORED LINK ***************************
Receive a FREE T-shirt after evaluating Enterprise Security Reporter from ScriptLogic http://www.sans.org/info.php?id=547
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Portable Network Graphics (PNG) is a format for rendering images, and used as an alternative to GIF. The libpng library is an implementation of the PNG image format, and is available for many platforms like Windows, Unix/Linux, Mac OS, OS/2 etc. Multiple applications such as web-browsers and email clients are linked with the libpng library. This library contains multiple buffer overflow vulnerabilities including a stack-based buffer overflow. A malicious PNG image in a webpage or an HTML email may trigger the overflows, and possibly execute arbitrary code on the client system. The code would execute with the privileges of the application opening the specially crafted PNG file. The technical details regarding all the vulnerabilities, and a proof-of-concept PNG file that triggers the stack-based buffer overflow have been publicly posted.
Status: Vendor(s) confirmed. Upgrade to version 1.2.6rc1 or 1.0.16rc1 for libpng. Many vendors have also provided patches for the applications linked against the vulnerable versions of the libpng library. Upgrade to Mozilla version 1.7.2, Firefox version 0.9.3 and Thunderbird version 0.7.3. Patches have also been distributed by multiple Linux vendors. For further information on other vendors, please refer to the CERT advisories.
Council Site Actions: Most of the council sites still have a very limited use of Mozilla/Firefox and some are only using the software in browsers. Most sites have advised/notified their users of the problem and suggested they upgrade or patch as appropriate. One site does have a very large installation of the affected software, most of which are on systems running Red Hat Enterprise Linux or Debian GNU/Linux. These systems are configured to retrieve all vendor updates, and thus will be patched accordingly. Systems for which administrator intervention is needed to trigger patching will most likely be updated later this month. They also maintain a local network fileserver from which users can execute the latest version of Mozilla from the Mozilla project's "nightly builds" download area. This has been updated with versions that have the libpng fix. Users who choose to run Mozilla from this server are not vulnerable, even if their own workstation is not yet updated.
Description: BlackJumboDog, a Windows based FTP, mail and web-proxy server in Japanese, contains multiple stack-based buffer overflows in its FTP server component. The problems arise because the server does not validate the length of the FTP command arguments. An unauthenticated attacker can pass an overlong argument (over 256 bytes) to the FTP "USER" command, and execute arbitrary code on the server. Exploit code has been publicly posted.
Status: Vendor confirmed, upgrade to version 3.6.2.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: The Simple Object Access Protocol (SOAP) defines the use of XML and HTTP to access web-based services in a platform independent fashion. The SOAPParameter object is used to pass parameters to the web services. Netscape and Mozilla's implementation of the SOAPParameter object contains an integer overflow. The flaw can be triggered by a specially crafted webpage, and reportedly exploited to execute arbitrary code on the client system. Limited technical details regarding the flaw have been publicly posted.
Status: Mozilla 1.7.1 is reportedly not vulnerable. Netscape has not confirmed the flaw.
Council Site Actions: The council sites reported their action on this vulnerability item is the same as for Item 1 above.
Description: MailEnable, a Windows based mail server, provides HTTPMail services. HTTPMail is a protocol that uses HTTP webDAV extensions, and can be used as an alternative to POP3 and SMTP protocols. MailEnable's HTTPMail service runs on port 8080/tcp by default. This service reportedly contains a buffer overflow that can be triggered by an HTTP request with a "Content-Length" header longer than 64 bytes. The overflow can be exploited to possibly execute arbitrary code (not confirmed). The technical details regarding the vulnerability have been posted.
Status: Vendor not confirmed, no updates available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: This vulnerability provides a way for an attacker to spoof the identity of a malicious site such that it appears to be a trusted site. The problem occurs because Mozilla does not prevent a webpage from using arbitrary XML user interface(XUL) files. These XUL files can be used to display attacker specified values for the tool bar, address bar, SSL certificate etc. Hence, the flaw can be exploited to conduct phishing attacks and steal sensitive user information. A proof-of-concept webpage that appears to be the "PayPal webpage" has been posted.
Status: Vendor confirmed, upgrade to Mozilla 1.7.2 and Firefox 0.9.3. Users should be advised not to follow links in suspicious webpages or emails.
Council Site Actions: The council sites reported their action on this vulnerability item is the same as for Item 1 above.
Council Site Actions: Only two of the reporting council sites are using the affected software. One site notified their small number of SGI users of the problem and advised them to patch as appropriate. The other site also has a small number of SGI/IRIX systems. However, their systems are not listening on UDP port 177 and thus are not vulnerable to the XDMCP remote attack. Since their SGI system administrations receive patch alerts via SGI's service, they presume the patches have already been installed.
Status: Microsoft has confirmed all the vulnerabilities. The patch MS04-025 should be installed on an expedited basis.
Council Site Actions: All of the council sites are responding to this group of vulnerabilities. Some sites have already started distributing the patches and a few sites have completed the process. The remaining sites will install the patches during their next regularly scheduled system update process.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3630 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.