Java System Web Proxy Server users will have some work to do patching this week.
If any of you have a chance to attend a security training class this fall, definitely try to make it to Washington, DC, the second week of December. Phenomenal teachers and up-to-the-minute, practical material. Details at http://www.sans.org/cdieast04
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********* This Issue Sponsored by Internet Security Systems *************
Keeping Your Organization Ahead of the Threat
All intrusion prevention systems (IPS) are not created equal. Find out the difference between reactive and preemptive IPS appliances. Preemptive IPS solutions shield vulnerabilities AND block threats. Reactive IPS solutions only block attacks. Download the FREE whitepaper, "Defining the Rules of Preemptive Protection: The ISS Intrusion Prevention System," to learn more http://www.iss.net/proof/ipswp/sans/11014
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages.
Radware DefensePro secures networked applications against viruses, malicious intrusions and Denial of Service at 3-Gbps. FREE Whitepaper. http://www.sans.org/info.php?id=642
*************************************************************************
Highlighted Cybersecurity Training: Washington, DC, Dec. 7-13, 2004
SANS best instructors will be in DC teaching great courses for
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Sun Java System Web Proxy Server (formerly Sun ONE WebProxy Server) is designed to cache web content and reduce requests tocontent servers thereby reducing the network traffic and lowering userwait times. The server is used by e-commerce sites, ISPs and largeenterprises. This server contains buffer overflow vulnerabilities thatmay be exploited to execute arbitrary code with typically the privilegesof the "nobody" user. In addition, the administration server for theproxy server also contains buffer overflow vulnerabilities that may beexploited to run arbitrary code on the server with possibly "root" or"SYSTEM" privileges (depending on the platform the server is installed).The flaws in the proxy server can be triggered by a malformed HTTP"CONNECT" request according to the discoverer. The complete technicaldetails have not been publicly posted yet.
Status: Sun has confirmed, upgrade to SP5 or later. A workaround for theadministration server overflow (that may yield maximum privileges to anattacker) is to block access to the port the administration server isrunning on from the Internet. This port number is configured during theinstallation of the proxy server.
Council Site Actions: Only three of the reporting council sites areusing the affected software. One site has already patched their systemssince SP5 came out back in April. Also, access to their Admin server isonly allowed from localhost with SSH tunneling. The second sitenotified their UNIX support group and requested them to plan forpatching the systems. The third site is still investigating whatactions are needed.
Description: The following vulnerabilities in Internet Explorer allowan attacker to craft a malicious hyperlink that appears to point to atrusted site, but in fact points to the attacker's site (phishingattacks). These flaws can be exploited to gather sensitive informationfrom users such as passwords for bank accounts etc. These attacks areon a rise, and hundreds are being reported every week( http://www.antiphishing.org).
(a) If a "table" element that contains a hyperlink is inserted inanother hyperlink, IE's status bar shows the site pointed by the outerhyperlink. However, when a user clicks such a link, IE loads the sitepointed by the hyperlink inside the table tag.
(b) If a "frame or an iframe" element is inserted in a hyperlink, IE'sstatus bar shows the site pointed by the hyperlink. However, when a userclicks such a link, IE loads the website pointed by the frame oriframe's "src" attribute.
(c) If a specially crafted "form" element is inserted in a hyperlink,IE's status bar shows the link pointed by the form's "submit" value.However, when a user clicks such a link, IE loads the website pointedby the form's action attribute.
Status: Microsoft has not confirmed, no patches are available. XP SP2is reportedly not affected by these issues. Safari browser for Mac OShas also been reported to be vulnerable. Users should be advised not toenter sensitive information on websites visited via clicking links inemails or untrusted webpages. Another workaround is to configure Outlookto read email in text format.
Council Site Actions: All reporting council sites are waiting onconfirmation from the vendor and a patch. Several of the sites havenotified their appropriate support groups so they can be prepared oncea patch is released.
Description: It has been confirmed that the Internet Explorer bufferoverflow in processing a malformed "FRAME/IFRAME" element discussed inthe last week's @RISK newsletter can be exploited to execute arbitrarycode. The exploit code has been publicly posted. Note that a Windowsuser faces the risk of getting compromised by merely visiting amalicious webpage.
Council Site Actions: All of the reporting council sites are waitingon official release of the patch. Several of the sites have notifiedtheir appropriate support groups so they can be prepared once a patchis released.
Description: Cisco Secure Access Control Server (ACS) for Windows andthe Cisco Secure ACS Solution Engine are designed to manage user accessfor Cisco VPNs, routers, VoIP services, DSL and dialup services etc.These products contain vulnerability, when configured to use EAP-TLSauthentication protocol. An attacker, who can guess a username, mayprovide any certificate to logon with the guessed username. Thecertificate presented by the attacker needs to have a valid format andcorrect fields; however, the certificate may be expired or issued by anuntrusted authority. Thus, the attacker may obtain an unauthorizedaccess to the entire network protected by ACS.
Status: Cisco has confirmed, version 3.3.2 fixes the flaw. A workaroundis to configure "binary" comparison of user certificates as the onlycomparison method, and store valid user certificates on a LDAP server.
Council Site Actions: Only two of the reporting council sites are usingthis software. One site does not use certificate based authentication,thus no action is required. The second site is still investigating whatactions are needed. They have notified their network support group.
Description: WinRAR is a popularly used compression tool that has beenreportedly downloaded over 20 million times. WinRAR contains avulnerability in its "repair archive" feature, a feature that can beused to repair damaged archives. An attacker or a virus that can tricka user into repairing a compressed archive may exploit this flaw topossibly compromise the user's system. No technical details have beenreleased yet. More details may be obtained by comparing the fixed andthe vulnerable versions of WinRAR.
Status: Vendor has confirmed, upgrade to winRAR 3.41.
Council Site Actions: Only one council site is using the affectedsoftware. However, WinRAR is not supported by their central ITdepartment; thus they do not plan any action.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3838 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.