Flaws in Internet Explorer allow phishing to succeed even if Active Scripting is turned off. It is important to remind your users about not providing any sensitive data to web sites sent them to via email.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Highlighted Security Training For This Week
SANS largest Fall conference will be in Las Vegas this year - September 28 to October 6. The 400,000 brochures started arriving two weeks ago. Network Security has seventeen immersion tracks and many special intense one day programs plus a big vendor expo.
***********************************************************************
********************** SPONSORED LINKS ********************************
Note: these links may take you to non-SANS sites.
(1) Free Download - Take full control of remote access & support security with CrossTec NetOp Remote Control http://www.sans.org/info.php?id=565
(2) Worried about today's constantly evolving network threats? Download McAfee® intrusion prevention white papers today. http://www.sans.org/info.php?id=566
***********************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Winamp, a popular Windows media player, has been downloaded over 3 million times. The player's user interface can be enhanced by installing "skin" files. Winamp contains a vulnerability in handling the skin files that can be exploited to execute arbitrary code on user's system. The exploitation scenario proceeds as follows: (a) An unsuspecting user clicks a malicious link in an email or a webpage that points to a file with a ".wsz" extension (skin file). The skin file format is similar to that of a zip file. If the browser is Internet Explorer, the skin file is downloaded silently to the client system. (b) Winamp decompresses the .wsz skin file, and reads the "skin.xml" file. The "skin.xml" invokes an HTML file in the zip archive, which is opened in the security context of the "local computer" zone. This HTML file leads to the execution of arbitrary code on the client system with the privileges of the currently logged-on user. This flaw is reportedly being exploited in the wild. Exploit code has been publicly posted.
Status: Nullsoft has confirmed the flaw. Upgrade to Winamp version 5.05. It is important to note that since the Internet Explorer downloads the Winamp skin file without any user prompting, IE users are at the greatest risk. Council Site Actions: Several sites have the vulnerable software running, but not have programs in place to upgrade client software. Some mentioned they are hoping that personal firewalls or general user awareness may make users too careful to get infected.
Description: The Netscape Network Security Services (NSS) library is designed to support multiple security standards such as SSL version 2 and 3, TLS, X.509 etc. The library is used by web servers like the Netscape Enterprise server and the Sun Java System Web Server (formerly Sun ONE). The NSS library contains a heap-based buffer overflow in handling the SSL version 2 connections. The overflow can be triggered by the initial "client_hello" packet containing an overlong "challenge" length. The flaw can be possibly exploited to execute arbitrary code with the privileges of the application using the NSS library. The technical details required to leverage the flaw have been posted. Immunity has released a working exploit in the CANVAS product for the Sun ONE server.
Status: Netscape confirmed, NSS library version 3.9.2 fixes the flaw. A workaround is to disable the SSLv2 protocol support in the affected application/servers. Note that although the SSLv2 support is not enabled in the default configuration of the Sun ONE or the Netscape Enterprise server, it is reported that enabling the SSLv2 support is a common practice. Council Site Actions: Two sites are using this software but they do not believe that SSLv2 is enabled.
Description: Entrust's LibKmp library is designed to handle IKE/ISAKMP communications for setting up a secure tunnel. LibKmp is used by multiple firewall and VPN software vendors including Symantec. This library contains a heap-based buffer overflow that can be triggered by specially crafted ISAKMP packets. An attacker may exploit this flaw to possibly execute arbitrary code on the vulnerable device/application. A remote compromise of a VPN server or an enterprise firewall may open up the enterprise network for further exploitation. Very limited technical details regarding the vulnerability have been publicly posted.
Status: Entrust has confirmed the flaw and released updates. Symantec has released updates for its multiple products. The status of other vendors that use Entrust's LibKmp library is not known at the present. Council Site Actions: Although none of the Council sites report using vulnerable Symantec software, and therefore none is taking action, the Internet Storm Center team reports that Libkmp is used in Cisco's VPN and Oracle's PKI and believes those products are also vulnerable.
Description: Axis network camera and video server products are used world-wide for surveillance purposes. The pictures/videos captured by the camera or video server can be accessed via a webserver. This webserver reportedly contains multiple vulnerabilities. An unauthenticated attacker can execute arbitrary shell commands, obtain the password file for the webserver as well as bypass authentication to obtain an administrative access. Thus, the attacker can possibly obtain a complete control over the surveillance system. The posted advisory shows how to craft the malicious HTTP requests to exploit the flaws.
Status: Vendor contacted, no fixes available yet. Note that a list of vulnerable camera servers can be obtained via a simple "google" search. A workaround is to block access to the camera's web sever from the Internet. Council Site Actions: The two Council sites using the vulnerable software report that their cameras are either not Internet-facing or that they are viewing only public areas and therefore are not security threats.
Description: xv is an image manipulation program for UNIX systems that can handle a large number of image formats such as gif, jpeg, tiff etc. The program ships by default with many Linux distributions, and can be configured as a default image viewer for web browsers. The program contains multiple stack and heap-based buffer overflows that can be triggered by specially crafted image files. A malicious webpage or an email may exploit these flaws to execute arbitrary code on the client system. Exploit code that creates a malicious BMP file has been publicly posted.
Status: Vendor not confirmed, no patches available. Council Site Actions: Some Council sites report as many s 2,500 copies of xv running. Because of limited resources and because this vulnerability is not known to be actively exploited, they are no taking action.
Description: Ipswitch Whatsup Gold is a network management system, which maps the network and alerts an administrator of any network problems. The software has a built-in webserver that facilitates remote network management. This webserver contains a buffer overflow that can be triggered by providing an overlong "instancename" parameter to the "_maincfgret.cgi" script. The flaw can be possibly exploited to execute arbitrary code on the server. Note that the webserver is not enabled in the default configuration of the software.
Status: Vendor confirmed. Upgrade to version 8.03 Hotfix 1. A workaround is to either disable or restrict access to the WhatsUp Gold webserver from the Internet. Council Site Actions: Several sites are patching these systems in the regular update cycle. They report that vulnerable systems are not accessible from the Internet or their deployment is very limited.
Description: Cisco Secure Access Control Server (ACS) for Windows and the Cisco Secure ACS Solution Engine are designed to manage user access for Cisco VPNs, routers, VoIP services, DSL and dialup services etc. These products contain the following vulnerabilities that can be exploited to either cause a denial-of service or obtain an unauthorized access. (a) The Cisco Secure ACS products runs a management server on port 2002/tcp that can be rendered unresponsive by initiating a large number of TCP connections. This may result in disrupting the ACS authentication services. (b) If configured as a LEAP RADIUS proxy, the ACS may crash when handling LEAP authentication requests. (c) The ACS Solutions Engine can authenticate users against other databases such as Novell Directory Services (NDS). If the NDS accepts "anonymous bind" requests, an attacker can authenticate to the ACS using a blank password. The attacker, however, would need to guess a right username.
Status: Vendor confirmed, patches available. Possible workaround for the denial-of service vulnerability is to restrict access to the management webserver on port 2002/tcp.
Council Site Actions: We were unable to solicit council site input for this item.
Description: Epixtech Webpac software provides a web-based catalogue solution that is used by a large number of libraries. The software reportedly contains multiple SQL injection vulnerabilities that may be exploited to execute commands on the back-end server, or bypass authentication. No technical details regarding the flaws have been posted.
Status: Vendor has been contacted, no fixes available. Council Site Actions: This software is not in use at Council sites.
Description: Multiple proof-of-concept examples have been posted that can be reportedly modified to conduct phishing attacks against Internet Explorer version 6.0 on Windows XP SP2. These attacks could be used to steal sensitive user information. Note that the attacks would work even when the "Active Scripting" option is disabled. Users should be advised not to enter login information and other credentials on web pages visited via clicking links in an email or another webpage. Council Site Actions: Nearly all sites report they are using some combination of user awareness programs and waiting for Microsoft to deliver patches.
Description: Council Site Actions: Most Council sites are using the automated patching capabilities built into RedHat and other Linux distributions to correct this flaw.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3671 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.