Last week's Windows Office JPEG vulnerability is now being exploited. (See Number 2 below) If you haven't repaired your systems, do so soon.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored This Week by Radware *************************
Radware Intrusion Prevention Switch protects against worms, viruses, malicious intrusions, Denial of Service attacks and Trojans - securing networked applications at 3-Gbps. Featuring inline security switching and accelerated, stateful and deep-packet inspection, DefensePro isolates attacks and dynamically moderates bandwidth to stop propagation across the network.
http://www.radware.com/content/products/dp/whtpaper/_download-20040204b/form.asp
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages.
Online threat worries? Download white papers on McAfee(r) intrusion prevention solutions now. http://www.sans.org/info.php?id=596
********************** Security Training Update *************************
Featured Training program of the Week: SANS Cyber Defense Initiative CDI is in two parts: CDI South in New Orleans November 1-4 ( http://www.sans.org/cdisouth04) and CDI East in Washington, DC, December 7-14 ( http://www.sans.org/cdieast04)
New Orleans offers a whole new type of program that many people have asked us to provide: 18 one and two day courses on issues shaping the future of information security, from the newest hacker tools to changes in legal issues surrounding security. Perfect for people who have taken SANS courses and want updates and for people who just don't have time to attend a full class. On the other hand, Washington offers 13 full length immersion courses an a few short courses.
**************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Under certain conditions, the firewall configuration of a Windows XP system after the XP SP2 upgrade, contains a flaw. The flaw may be exploited by any remote attacker to access the shared folders and printers on the system. An attacker can also leverage the flaw to launch a brute force password guessing attack for the "Administrator" account, which may result in a complete compromise of the system. The flaw affects a number of broadband users who rely on the Windows firewall feature to keep the hackers at bay.
Status: Microsoft has not confirmed the flaw. Please refer to the posted advisories for the steps to correct the firewall configuration. A workaround for the enterprises is to block ports 139 and 445 at the network perimeter.
Council Site Actions: Most of the sites are either testing SP2 or have not yet rolled it out. One site is blocking and monitoring ports 139 and 445. Another site is waiting for confirmation from Microsoft before deciding what action to take. They have notified the Windows administrators. The final site has approximately 7,000 XP SP2 machines. They said that the Windows Firewall special cases for ports 137, 138, 139, and 445 are not well suited to their site, although not for the same reasons that are stated in the PC.Welt article. They plan to advise their system owners to turn off file and printer sharing when not required.
Description: Multiple exploits and a toolkit (posted on the th-research mailing list) that create specially crafted JPEG files are now available. Viewing such JPEG files using Internet Explorer, Outlook, Word etc., results in the execution of arbitrary code. Some security analysts predict the outbreak of an email virus exploiting the JPEG vulnerability by the end of this month.
Council Site Actions: All of the council sites have either patched the systems, are in the process of patching the systems (or testing the patches) or plan to patch in the near future. In addition, one site is working with their network staff to enable appropriate IPS-like filters at the network perimeter. Another site reported they were hit with this attack and have taken steps to block it (details not provided).
Description: The Symantec Firewall/VPN and the Gateway Security appliances are designed to protect small business networks. These appliances use "public" as the default read/write community string for the SNMP service. In addition, the appliances do not perform sufficient checks on the UDP packets with the source port set to 53 i.e. a DNS response. An attacker can exploit these flaws in tandem via specially crafted SNMP "GET" or "SET" requests with a source port of 53. Such crafted requests may permit the attacker to make arbitrary changes to the firewall configuration, thereby putting the entire network protected by the firewall at risk. Note that the firewall administrator can neither disable the SNMP service nor change the default SNMP community string.
Status: Symantec confirmed. Firmware updates are available for all the affected products. The updates also fix a denial of service attack vulnerability that can be triggered by performing a UDP scan on the firewall appliances.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: The MDaemon SMTP and IMAP server contain multiple buffer overflows. The flaws in the SMTP server can be triggered by sending overlong arguments to the "SAML", "SOML", "SEND" or "MAIL" commands, and the flaw in the IMAP server can be triggered by an overlong argument to the "LIST" command. The flaws may be possibly exploited to execute arbitrary code with "SYSTEM" privileges on the Windows server running the MDaemon software. Whereas an attacker needs authentication privileges to exploit the flaw in the IMAP server, depending on the configuration, the flaws in the SMTP server may be exploited by an unauthenticated attacker. The proof-of-concept exploit code has been publicly posted.
Status: Vendor not confirmed, no updates available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Council Site Actions: Only one council site is responding to this issue. They are the process of disabling SSLv2 support everywhere.
Council Site Actions: Three of the reporting council sites are responding to this item. One site is currently testing the patch compatibility. The second site plans to let attrition deal with the problem since they don't have the Jetadmin port exposed to the Internet. The third site has a small number of machines that are directly exposed to the Internet. They will recommend Web Jetadmin version 7.6 on the affected hosts.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3729 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.