This is a very big issue of @RISK reflecting an equally tough week for people responsible for securing Windows systems. Two we rate as Critical and three as High plus a Veritas vulnerability rated as High. If you want additional, in-depth information, including information about several vulnerabilities not covered here in depth, see the Internet Storm Center summary at http://isc.sans.org/presentations/MS04Oct.ppt.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** This Issue Sponsored by Radware **********************
Radware Intrusion Prevention Switch protects against worms, viruses, malicious intrusions, Denial of Service attacks and Trojans - securing networked applications at 3-Gbps. Featuring inline security switching and accelerated, stateful and deep-packet inspection, DefensePro isolates attacks and dynamically moderates bandwidth to stop propagation across the network.
Download DefensePro whitepaper http://www.radware.com/content/products/dp/whtpaper/_download-20040204b/form.asp
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages.
(1) Stop Cyber Attacks Now. FREE White Paper: How to Evaluate Intrusion Prevention Systems http://www.sans.org/info.php?id=617
(2) Simple, secure alternative to NIS/NIS+ and LDAP for UNIX/Linux user account and password management. FREE downloads. http://www.sans.org/info.php?id=618
******************** Security Training Update *************************
Featured Training program of the Week: SANS Cyber Defense Initiative -- CDI South in New Orleans November 1-4 ( http://www.sans.org/cdisouth04 )"> http://www.sans.org/cdisouth04 ) and CDI East in Washington, DC, December 7-14 ( http://www.sans.org/cdieast04 )"> http://www.sans.org/cdieast04 )
New Orleans offers a whole new type of program that many people have asked us to provide: 18 one and two day courses on issues shaping the future of information security, from the newest hacker tools to changes in legal issues surrounding security. Perfect for people who have taken SANS courses and want updates and for people who just don't have time to attend a full class. More information and http://www.sans.org/cdisouth04
Washington DC is SANS most popular venue, so make your reservations early to get space in one of the thirteen tracks. Early registration deadline is on the 26th. CDI East features SANS top instructors: Eric Cole will be teaching the uniquely effective new SANS +S Training Course for CISSP® (a registered trademark of ISC2) and the top teachers of SANS Security Essentials, Hacker Exploits, Firewalls, Auditing, Management tracks and several more will all be in Washington, as well.
More information at http://www.sans.org/cdieast04
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft security advisory MS04-038 contains a fix for a number of Internet Explorer vulnerabilities. Most of these flaws have been discussed in the earlier issues of the @RISK newsletters. All the following flaws could be exploited by a malicious webpage or an HTML email to compromise a client system. (a) An HTML page containing specially crafted STYLE tag such as "<style>;@/* ;)" can trigger a heap memory corruption in IE. The memory corruption may be exploited to execute arbitrary code. (b) IE redirects a script function to another function with a similar name without checking any security context. This flaw can be exploited to bypass IE's zone restrictions, and compromise a client system when a user visits a malicious webpage. No action is required on the user's part. (c) IE does not perform sufficient security checks on specially crafted HTML "style" sheets, which can be exploited to access a local folder on a client system. By coupling this flaw with a drag and drop event that moves an image (specified via image tag with its dynamic source attribute set to an executable file), an attacker can drop a malicious executable onto the client's system. Multiple exploits have been publicly posted. The flaw has been exploited in the wild by the Akak Trojan. (d) The "window.createpopup" and the "show" methods are used to create and display a pop-up window respectively. IE's show method implementation contains a vulnerability that may be exploited to compromise a client system. The problem occurs because the "show" method can be used to move the pop-up window when the user clicks a link in a specially crafted webpage. This emulates the "drag-and-drop" behavior that can be used to create a malicious file on the client system. This vulnerability is being actively exploited in the wild. (e) IE's Active SetUp technology is designed to improve the process of installing software updates. This technology helps speed up the installation process by downloading only the files that are necessary. The Install Engine ActiveX control(inseng.dll), which is part of the Active SetUp technology, contains a buffer overflow. The flaw can be exploited to execute arbitrary code on a client system. The discoverers of the flaw will release the technical details in January 2005.
Status: Apply the patch referenced in the MS04-038 advisory. The patch also fixes other information disclosure vulnerabilities.
Council Site Actions: All but one of the reporting council sites are responding to this vulnerability. Most plan to deploy the patches on an accelerated basis. One site said the majority of their systems have already obtained the patches through the public Windows Update site. There is one site that is having some challenges with deploying the patches. They have an internal software development group that has refused to QA the patches against their web-based applications and upper management does not want to risk deploying a patch that may affect user applications. Until this situation can be resolved, they will rely on their malicious code protection strategy.
Description: The Network News Transfer Protocol (NNTP) is used for distribution, retrieval and posting of news articles. The "XPAT" command, defined in the NNTP Extensions, can be used to retrieve news articles based on pattern matching on articles' headers. Microsoft's NNTP server contains a heap-based buffer overflow vulnerability in its XPAT command implementation. The overflow can be triggered by supplying an overlong (over 1950 bytes) pattern string to the XPAT command. The flaw can be exploited by an unauthenticated attacker to execute arbitrary code with administrative privileges. It is also reported that the "SEARCH" command contains a similar buffer overflow. Proof-of-concept exploit and technical details have been publicly posted.
Status: Microsoft security advisory MS04-036 references a fix for this vulnerability. Note that the vulnerable component is not installed by default along with IIS server on Windows NT/2000/2003. Exchange 2000 and 2003 servers have the component installed but it's enabled by default only on the Exchange 2000 server. Hence, Exchange 2000 servers should be patched first. If the NNTP functionality is not required, either disable the service or block the ports 119/tcp and 563/tcp (NNTP over SSL) at the network perimeter.
Council Site Actions: A few of the council sites have a small number of IIS systems running NNTP. Some of these sites will be deploying the patch on an accelerated basis. One site plans to either patch the systems or disable the NNTP service. They have only internal systems running with the vulnerable configuration.
Description: Windows XP/2003 includes a zip utility suitable for compressing files and folders. It is reported that this utility contains a stack-based overflow in its "dunzip32.dll" component. The overflow can be triggered by a compressed folder containing a filename longer than 32768 bytes. Opening a crafted compressed folder may lead to execution of arbitrary code with the privileges of the currently logged-on user. In order to exploit this flaw, an attacker has to entice a victim to open the malicious compressed folder. An attacker can either send the folder in an email attachment, or host it on a website or a shared folder. The technical details and a proof-of-concept zip file have been posted. Note that eEye advisory claims that dunzip32.dll is affected, whereas another security researcher claims that the DLL affected is zipfldr.dll.
Status: Microsoft security advisory MS04-034 references a fix for this vulnerability. Users should be advised not to open zip files from untrusted sources.
Council Site Actions: Most of the council sites are responding to this vulnerability and will be deploying the patch on different schedules - some on an accelerated basis and some during their next regularly scheduled system update process. One site said the majority of their affected systems have obtained the update through the public Windows Update site or their local SUS server. They are having some challenges with Windows XP SP1 systems since the users are hesitant to update because they are unsure of the process for obtaining any updates while avoiding an installation of SP2.
Description: The Microsoft NetDDE (Network Dynamic Data Exchange) protocol allows applications running on different systems to transparently communicate with each other. The NetDDE service, which is not enabled by default, contains a buffer overflow. The overflow can be exploited by an anonymous user to execute arbitrary code with "SYSTEM" privileges. The discoverers of the flaw have not posted any technical details yet. Since the service uses DCE/RPC protocol, it is likely that the overflow is similar in nature to the buffer overflow vulnerabilities found in other services such as LSASS, Messenger or Workstation.
Status: Apply the patch referenced in the MS04-031 advisory. A workaround is to block ports 135/tcp, 139/tcp and 445/tcp at the network perimeter.
Council Site Actions: All of the reporting council sites are responding to this vulnerability in the same manner as item 3 above. The only exception is a site that is requiring either the systems to be patched or the service to be disabled.
Description: (a) Windows grpconv.exe program is used to convert Windows 3.1 groups to folders while upgrading to Windows 95 or later. This program contains a buffer overflow that can be triggered by an overlong (over 221 bytes) filename with ".grp" extension. The flaw may be exploited via "shell:" URIs to execute arbitrary code on a client system. In order to exploit the flaw, an attacker has to entice a user to click a link in an email or visit a webpage. The technical details regarding the overflow have been publicly posted since July 2004. (b) Windows Explorer and Internet Explorer contain a buffer overflow in handling network share names. The flaw can be triggered when a Windows client connects to a malicious file server that contains a share with a name longer than 259 bytes. The server can leverage the vulnerability to execute arbitrary code on the client. In order to exploit the flaw, the attacker has to entice a client (by way of specially crafted email or web page) to connect to his malicious file server. The technical details and a proof-of-concept exploit have been posted since April 2004.
Status: Apply the fix referenced in the Microsoft MS04-037 advisory.
Council Site Actions: All of the reporting council sites responded to this item in the same manner as item 3 above.
Description: Microsoft Excel contains a stack-based buffer overflow that can be triggered by a specially crafted Excel file. The problem occurs due to the lack of sanitization of one of the length values declared in an Excel file. By setting a certain length value to a large number triggers the overflow, which can be exploited to execute arbitrary code on a client system with the privileges of the currently logged-on user. In order to exploit the flaw, an attacker can send the malicious Excel file in an email, or entice a victim to visit a webpage hosting the file. Note that Internet Explorer automatically opens an Excel document, hence the flaw can be exploited easily via HTTP. The technical details have been posted.
Status: Apply the fix referenced in the Microsoft MS04-033 advisory. Users should be advised not to open untrusted Excel file attachments.
Council Site Actions: All of the reporting council sites are responding to this issue. Most of them plan to deploy the patch on either an accelerated basis or during their next regularly scheduled system update process. One site is not requiring this fix due to the difficulty factor of deploying MS Office updates. They will rely on their anti-virus strategy. A final site will only rely on communication to the users urging them to go to the Office Update site to get the patches. They do provide active support for Microsoft Office updates and they suspect the percentage of users who us the Office Update site is low (less than 20%).
Description: The Microsoft SMTP server contains a buffer overflow that can be triggered by certain DNS responses. The overflow may be exploited to execute arbitrary code with administrative privileges. No technical details regarding how to trigger the overflow have been posted. Microsoft advisory lists blocking port 53/tcp traffic as a workaround. Usually, the DNS lookups use UDP protocol and the TCP DNS look-ups are associated with large DNS responses. Hence, it is likely that an overlong DNS response would trigger the overflow. In order to exploit the flaw, an attacker has to force the SMTP server to query a DNS name that can be resolved by a DNS server under the attacker's control.
Status: Apply the fix contained in the Microsoft MS04-035 advisory. A workaround, as listed above, is to block port 53/tcp at the network perimeter.
Council Site Actions: Most of the reporting council sites are responding to this issue by installing the patch - either on an accelerated basis or during their next regularly schedule system update process. A few sites said they are addressing (or have addressed) Internet-exposed systems first. One site is relying on the public Windows Update site and their local SUS server.
Description: Windows metafiles are used to store graphics in a device independent format. GDI32.dll, the DLL that handles the Windows metafiles, contains a buffer overflow vulnerability. This flaw may be exploited to execute arbitrary code on a client system with the privileges of the user viewing the metafiles. In order to exploit the flaw, an attacker has to host a webpage or a network share containing a malicious metafile, and entice a victim to visit the webpage or the shared folder. Alternatively, an attacker can send an HTML email, or a document containing the malicious metafile to the victim. No technical details regarding the overflow have been posted.
Status: Apply the fix contained in the Microsoft MS04-032 advisory. The patch also fixes other local privilege escalation vulnerabilities.
Council Site Actions: Most of the reporting council sites are responding to this issue and will install the patch during their next regularly scheduled system update process. One site is relying on the public Windows Update site and their local SUS server.
Description: Windows asypict.dll reportedly contains multiple vulnerabilities that can be triggered by specially crafted JPEG files. The flaws can be exploited to cause a DoS to the client machine (a reboot is supposedly required), and possibly execute arbitrary code (not confirmed). The problems arise because the DLL does not sufficiently check the declared width and height fields in a JPEG image. Instances of the DLL failing to check other JPEG image attributes are listed in the advisory. The DLL is used by the Microsoft ActiveX Image control, and hence the flaw can be easily exploited via a webpage or an HTML email. Proof-of-concept exploit is included in the posted advisory.
Status: Microsoft has not confirmed, no updates are available.
Council Site Actions: All council sites are awaiting confirmation and a patch from the vendor. Should the vendor confirm, they will distribute the patch during their next regularly scheduled system update process.
Description: Veritas Cluster Server solution is used for balancing workloads between servers and provide a failover capability. The cluster server contains a vulnerability that may be exploited by a remote unauthenticated attacker to obtain "root" privileges. No technical details have been posted; more details may be possibly obtained by comparing the fixed and the vulnerable versions of the software. Note that the vulnerability has been rated "HIGH" (even though no technical details are available) due to the fact that the cluster server solution is used in mission-critical environments.
Status: Vendor confirmed, patches available.
Council Site Actions: Due to late breaking nature of the issue, we were unable to solicit council site input for this item.
Description: The libtiff library provides various functions to store and read the Tag Image File Format (TIFF), a popularly used image file format. This library is used on Linux by GNOME and KDE web browsers, email clients, and xv image manipulation program. The library contains multiple heap-based buffer overflows. A malicious image in a webpage or an HTML email may exploit the flaws to execute arbitrary code on a Linux/Unix client. The technical details required to leverage the flaws have been posted.
Status: Debian, Fedora, Gentoo, OpenPKG etc. have released an update.
Council Site Actions: Only two of the reporting council sites are responding to this issue. Both sites are waiting for release of a patch from RedHat. One of these sites also has Debian Linux and said that many of their Debian systems have already retrieved the vendor update. Systems that need manual intervention will be updated later in the month.
Description: phpMyAdmin is a PHP-based tool widely used to administer MySQL databases via HTTP. The phpMyAdmin MIME transformation plug-ins are used to display the contents of a SQL column in any chosen format when viewed in the PhpMyAdmin browsing mode. The plug-in contains a vulnerability that may be exploited to execute arbitrary commands on the web server hosting phpMyAdmin, if the PHP safe mode is off (not a typical configuration). The technical details can be obtained via comparing the fixed and the vulnerable software packages.
Status: Vendor reported the issue and has provided an updated version 2.6.0-pl2.
Council Site Actions: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary.
Description: A proof-of-concept Trojan code has been posted that may be reportedly used to bypass any advanced Windows XP SP2 firewall configuration.
Council Site Updates: The affected software is not in production or widespread use at any of the council sites. They reported that no action was necessary. One site stated they were still in the process of testing SP2 prior to its deployment.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3782 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other than listed above, without prior written permission.