One of Microsoft's patches from last week already has been worked around by hackers, at least on some platforms. See Item 1. The zip-file vulnerability in most anti-virus programs (See Item 2) will probably be corrected automatically in your AV systems if patching is automatic, but this problem gives you another opportunity to remind your users about not downloading and opening a file from email unless they were expecting the specific file. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages. Simple, secure alternative to NIS/NIS+ and LDAP for UNIX/Linux user account and password management. FREE downloads. http://www.sans.org/info.php?id=624
*************************************************************************
Featured Training program of the Week: Washington, DC, December 7-14 ( http://www.sans.org/cdieast04 )"> http://www.sans.org/cdieast04 ) Early registration deadline is on the 26th (but email registration@sans.org if you need a few extra days). Our first "all boot camp" training program will be held in Washington, DC in early December. Boot camp gives you more hands on time, more time with the instructor, more confidence in using what you learned. Thirteen tracks for auditors, managers, beginners and everyone who has hands-on responsibility for security. SANS top instructors will be there: Eric Cole will be teaching the uniquely effective new SANS +S Training Course for CISSP(R) (a registered trademark of ISC2), and the top teachers of SANS Security Essentials, Hacker Exploits, Firewalls, Auditing, Management tracks and several more will all be in Washington, as well. More information at http://www.sans.org/cdieast04
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: A variation of the "drag and drop" vulnerability has beenreported that may be exploited to compromise a Windows client via amalicious web page or an HTML email. The exploitation proceeds asfollows:
(a) A specially crafted HTML "style" sheet is used to access a localfolder on a Windows client.
(b) An IMG element with its "src" set to a filename (without anyextension) is dragged and dropped to the local folder opened in step(a). IE's cumulative patch MS04-038 released last week prevents an IMGelement with its src set to an executable file from being dragged.However, the patch does not prevent the "drag and drop" of an image withthe src attribute set to other file formats such as pdf, xml etc.Further, if no extension is used for the IMG element's src file, IEautomatically creates a file with the file type extension after the dragand drop operation. Thus, an attacker can create a malicious file witha ".htm" extension on the client's local file system.
(c) The malicious HTML file is invoked via the HTML Help ActiveX control(hhctrl.ocx). This leads to execution of arbitrary code on the clientsystem.A proof-of-concept exploit has been publicly posted. The PoC exploitdemonstrates how to use "ADODB.recordset" object to write arbitraryfiles on the client's local system. Although this exploit requires userinteraction, it may be possible to rewrite the exploit such that no userinteraction is required. Note that the Akak Trojan exploited the earliervariation of this vulnerability in the wild.
Status: Microsoft has not confirmed. An unofficial fix has been postedthat sets the kill bit for the "Shell.Explorer" ActiveX control. Thiscontrol is responsible for displaying the folders in IE. Setting thekill bit prevents displaying any folders, and prevents exploitation viathe published attack vector. The fix can be downloaded from: http://www.pivx.com/research/freefixes/neutershellexplorer.reg
Council Site Actions: All reporting council sites are responding to thisvulnerability. Most are waiting for confirmation and a patch from thevendor. One site is evaluating the pros and cons of deploying the fixprovided by pivx (referenced under Status, above).
Description: A number of anti-virus products contain a vulnerabilitythat may be exploited to bypass scanning of certain zip files. Theproblem occurs when scanning specially crafted zip files that have a zipfile header with the "compressed file length" parameter set to zero.Windows, however, unzips these files normally. Hence, an email virus mayexploit this flaw to evade detection by the anti-virus software, andinfect a client machine.
Status: All vendors except RAV have confirmed and have released updates.
Council Site Actions: Most of the reporting council sites have alreadypatched their systems. One site has notified their system support groupand directed them to contact the vendors for the appropriate patch fortheir email AV servers. Another site uses the auto-update feature ofMcAfee and they believe most of their systems have been updated.
Description: Mozilla browser contains a memory corruption vulnerabilitythat can be triggered by specially crafted HTML pages. The problemoccurs when the browser processes web pages with certain HTML tags thatare followed by a "null" character. The memory corruption may beexploited to possibly execute arbitrary code on the client (notconfirmed). The technical details regarding the flaws and proof-of-concept exploits have been posted.
Status: The flaws have reportedly been fixed in Mozilla snapshots.
Council Site Actions: Mozilla is not yet in widespread use at most ofthe council sites. A few of the sites have already installed patches fortheir small user base. Several sites have only a handful of users anddon't plan any action. On site does support Mozilla for UNIX and willprovide an update in early November. However, they do not provide anysupport for their Window or Macintosh users, but believe the users willobtain a new version on their own.
Description: SalesLogix server, a customer relationship managementsolution, reportedly contains multiple vulnerabilities. (a) Bymanipulating cookie variables, it is possible to obtain administrativeaccess to the SalesLogix web server. (b) The web server contains a SQLinjection vulnerability that can be exploited to execute arbitrary SQLcode on the back-end database. (c) It is possible to obtain read andwrite privileges to the backend database by examining responses from theweb server. (d) In addition, the server contains a directory traversalvulnerability that may be exploited to upload arbitrary files. Theposted advisory shows how to exploit these flaws.
Status: Vendor has confirmed, service packs are available.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: Gaim is a multi-protocol instant messaging client forLinux, BSD, MacOS X and Windows platforms. The client contains anoverflow that can be triggered by a sequence of MSN "SLP" protocolmessages. The SLP protocol is similar to the widely used "SIP" protocolin Voice-over-IP communications. The overflow may be exploited topossibly execute arbitrary code. The technical details regarding theflaw can be obtained by examining the fixed code.
Status: Vendor has confirmed, upgrade to version 1.0.2. Updates havebeen provided by RedHat, Mandrake and Fedora Linux distributions.
Council Site Actions: Only one council site is using the affectedsoftware. Most of their systems regularly obtain updates from the Linuxvendor through an automated process. They also have a substantial numberof Red Hat Enterprise Linux systems for which an administrator mustmanually trigger updates, and this update (RHSA-2004:604-05) will mostlikely occur in early November. Another site said that although theydon't use this package, their systems would still be updated by theirRed Hat Up2Date server.
Description: Ability server, a Windows-based Web, SMTP and FTP server,contains a buffer overflow in its FTP server component. An authenticatedattacker can trigger the overflow by supplying an overlong argument tothe "STOR" command. The flaw can be exploited to execute arbitrary codeon the server for which the exploit code has been publicly posted. TheFTP servers configured for anonymous access face the maximum risk fromthis vulnerability.
Status: Unknown.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: Altiris deployment server is designed to manage operatingsystem patches and other software deployment on servers, desktops,notebooks etc. The systems managed by the Altiris Deployment server areinstalled with the Altiris agent software. The agent software does notperform any credential checks on the Deployment server prior toreceiving the updates. In the configuration, when the agents locate theDeployment server via broadcast, it may be possible for an attacker inthe same network to impersonate the Deployment server. The attacker canpossibly obtain administrative privileges over any managed systems.
Status: Vendor has been contacted, no patches are available.
Council Site Actions: Two of the reporting council sites are using theaffected software. One site is waiting for patch from the vendor. Theother site does not use the multicast option; thus, they believe theyare not vulnerable.
Description: Xpdf is an open source viewer for PDF files. The viewercontains multiple integer overflow vulnerabilities. A malicious PDFdocument may exploit the buffer overflow flaws to execute arbitrary codeon a UNIX client. Note that Xpdf may be configured as a helperapplication for web browsers, in which case, the flaw may be triggeredwhen a user clicks a link pointing to a malicious PDF file. Note thatthe Common UNIX printing system (CUPS) uses code from the Xpdf project.Hence, printing the malicious PDF file on a CUPS printer may result inan execution of code on the print server. The technical detailsregarding the flaw have not been posted.
Status: Multiple Linux vendors such as Gentoo, RedHat, Mandrake haveconfirmed the flaws, and released updated packages.
Council Site Actions: Only one of the reporting council sites is usingthe affected software. However, most of the systems execute xpdf froma central installation accessed through a distributed filesystem. Theyplan to update this copy of xpdf soon. They do not have any plans toaddress xpdf downloads made by individuals for their own personalsystems.
Council Site Updates: Most of the reporting council sites have completedtheir patch deployments. One site turned off WebDAV support on all oftheir servers.
Council Site Updates: Most of the reporting council sites have completedtheir patch deployments or will complete them in the near future. No newactions.
Council Site Updates: Most of the reporting council sites have completedtheir patch deployments or will complete them in the near future. No newactions.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3807 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner. ==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters. To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.