It is a quiet week for most of you in eliminating vulnerabilities.
Have any of you had success in using inoculation programs to reduce human error? We've gotten sporadic reports of organizations sending their employees phishing and similar email and then, if they fall for the scam, educating them about it. If you have experimented with this please send a note about your experience to info@sans.org with subject inoculation.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training Update *************************
Featured Training program of the Week: SANS Cyber Defense Initiative CDI is in two parts: CDI South in New Orleans November 1-4 ( http://www.sans.org/cdisouth04) and CDI East in Washington, DC, December 7-14 ( http://www.sans.org/cdieast04)
New Orleans offers a whole new type of program that many people have asked us to provide: 18 one and two day courses on issues shaping the future of information security, from the newest hacker tools to changes in legal issues surrounding security. Perfect for people who have taken SANS courses and want updates and for people who just don't have time to attend a full class. On the other hand, Washington offers 13 full length immersion courses an a few short courses.
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages.
(1) Need to improve network security policy compliance? Download the McAfee(r) ePolicy Orchestrator(r) white paper now. http://www.sans.org/info.php?id=603
(2) Stop Cyber Attacks Now. FREE White Paper: How to Evaluate Intrusion Prevention Systems http://www.sans.org/info.php?id=604
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: RealPlayer is one of the popular Internet media players that has over 200 million users. The player contains a heap-based overflow in the "pnen3260.dll" component. The overflow can be triggered by a real movie (".rm") file that has a specially crafted length for its "VIDORV30" section. A malicious webpage or an email (containing a link to the malicious webpage) may leverage the flaw to execute arbitrary code on a client computer. The technical details have been publicly posted.
Status: RealNetworks has confirmed the vulnerabilities and has issued updates.
Council Site Actions: Most of the council sites plan to respond to this problem. They will distribute the patches during their next regularly scheduled systems update process. Some sites don't officially support the software, but they plan to make patches available for users to install themselves.
Description: The Samba server contains a vulnerability that can be exploited by an authenticated attacker to read/write arbitrary files on the server. The problem arises because the function "unix_clean_name()", which removes "./" and ".." characters from a file or a directory name, is applied twice to the same file or the directory name. The flaw can be exploited via specially crafted filenames to bypass any share access restrictions. For instance, an authenticated user may read arbitrary configuration files in the "/etc" directory, and launch further attacks against the server. Note that Samba shares that allow "anonymous" access face the maximum risk from the vulnerability. The flaw is easy to exploit as an attacker can use the "smbclient" command-line program to leverage the flaw i.e. no exploit code is required.
Status: Samba confirmed. Upgrade to version 2.2.12 or apply the patch for version 3.0.5. A workaround is to configure "wide link = no" in the smb.conf file.
Council Site Actions: Most of the reporting council sites are responding to this item as well. They plan to distribute the patch during their next regularly schedule system update process.
Description: The Symantec ON Command software offers a centralized management and automated patch roll-out functionality for a large number of PCs, servers and handheld devices in an enterprise network. The ON Command CCM uses Sybase as the default back-end database. This database has well-known default username and passwords. An attacker, who can access the Sybase port on the CCM server, may obtain sensitive information from the back-end database. For example, the attacker may be able to obtain administrator credentials for all the managed PCs and servers from the database. This may result in an enterprise wide compromise.
Status: Symantec confirmed, updates available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Icecast, a streaming media server that runs on multiple platforms, contains a buffer overflow. The flaw can be triggered by HTTP requests that contain more than 31 HTTP headers, and exploited to execute arbitrary code. On Windows platform, writing an exploit is trivial as the shell code can start at the 32nd HTTP header. Exploit code has been publicly posted.
Status: Vendor confirmed, upgrade to version 2.0.2
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: YPOPs! software provides a POP3 access to the Yahoo! email and has reportedly over 120,000 users. The software emulates a POP3 and an SMTP server, both of which contain a stack-based buffer overflow. The overflow in the POP server can be triggered by a username longer than 180 bytes, and the overflow in the SMTP server can be triggered by a command over 504 bytes. The flaws may be exploited to possibly execute arbitrary code with the privileges of the YPOPs! process. Exploit code has been published.
Status: Vendor not confirmed, no updates available.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: Macromedia ColdFusion and JRun servers offer enterprise class web-based applications. Servers such as Apache, IIS or Netscape can be used as front-end servers to the ColdFusion or JRun web server via "web connectors". The Macromedia servers contain a buffer overflow if the "Verbose" web connector logging option is enabled (not a default configuration). The overflow can be triggered by overlong HTTP header fields such as "Content-Type", and possibly exploited to execute arbitrary code. The technical details regarding the flaw have been posted.
Status: Macromedia has confirmed, cumulative patches are available. The cumulative patches also fix other information disclosure and cross-site scripting vulnerabilities.
Council Site Actions: Two of the reporting council sites plan to install the patches during their next regularly scheduled system update process. A third site is in the process of reviewing their configuration settings to see if they are vulnerable.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3744 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.