If you are using TWiki (#4 below) you'll want to install the patches now and check all your TWiki systems - the vulnerability is being actively exploited. If you are using SAMBA (#1 below) it makes sense to test the patch and schedule installation. Alan PS. This is the final week for discounts on registration for SANS in Washington DC, December 7-14 ( http://www.sans.org/cdieast04)
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************* This Issue Sponsored by Radware *******************
Radware Intrusion Prevention Switch protects against worms, viruses, malicious intrusions, Denial of Service attacks and Trojans - securing networked applications at 3-Gbps. Featuring inline security switching and accelerated, stateful and deep-packet inspection, DefensePro isolates attacks and dynamically moderates bandwidth to stop propagation across the network. http://www.radware.com/content/products/dp/whtpaper/_download-20040204b/form.asp
*************************************************************************
*************************************************************************
Highlighted Cybersecurity Training: Washington, DC, Dec. 7-14, 2004 SANS best instructors will be in DC teaching great courses for
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Samba is a UNIX-based server that provides file and printservices to the CIFS/SMB clients. The server contains a buffer overflowthat can be triggered when the server responds to a specially crafted"TRANSACT2_QFILEPATHINFO" query. This query is used to obtaininformation about a file such as creation date, last accessed time etc.An attacker can trigger the overflow by specifying a filename, whichcontains unicode characters, in the "TRANSACT2_QFILEPATHINFO" query. Inorder to exploit the flaw, an attacker needs write privileges on thesamba share to create the malicious file. The flaw can be exploited toexecute arbitrary code on the samba server with the privileges of smbd(typically root). The samba shares configured with write privileges toa directory for "anonymous" users face the maximum risk of gettingcompromised. The technical details regarding the flaw have been publiclyposted. The discoverer of the flaw has developed an exploit that is notpublicly available yet.
Status: Samba has fixed the flaw in version 3.0.8. Version 3.0.8 alsofixes another denial-of-service vulnerability, and hence this upgradeis recommended.
Council Site Actions: Five of the reporting council sites are using theaffected software and have notified their system support groups. Severalsites said they only had a few servers and those have already beenupgraded to V3.0.8. Other sites will upgrade during their next regularlyscheduled system update process. Most of the sites are blockingassociated Samba ports at their network security perimeters.
Description: Internet Explorer contains two vulnerabilities that can beexploited to trick users into downloading malicious files.
(a) Windows XP SP2 warns users before opening downloaded files withcertain extensions. However, a specially crafted "Content-Location" HTTPheader can bypass this security warning.
(b) JavaScript "execCommand" function, when used to save a file from awebpage, can be exploited to spoof the file extension. Hence, anattacker can save a malicious executable on a client computer even whenthe "Save HTML Dialog" box displays an HTML document as the file typebeing saved. Note that the flaw can be leveraged when "Hide extensionfor known file types" option (In Tools ->Folder Options -> View) isenabled. Hide extensions is the default Windows setting. A maliciouswebpage or an HTML email can exploit these flaws in tandem to entice auser to download and execute a malicious file. Exploit code has beenpublicly posted. Also note that Finjan security has warned of severaladditional flaws in IE on XP SP2 that may be leveraged to compromise auser's system.
Status: Microsoft has not confirmed the flaws. Microsoft has alsoclaimed that Finjan's report is misleading. No patches are available atthis time. A workaround is to disable "Active Scripting" and "HideExtension for known file types" in IE.
Council Site Actions: All reporting council sites are awaitingconfirmation from Microsoft along with a patch.
Description: X PixMap (XPM) is an ASCII image format popularly used bythe X Windows on UNIX systems. libXpm library provides various functionsto store and read XPM image files. The library contains multiple integeroverflow vulnerabilities that may be exploited by a malicious XPM imageto compromise a client system. In order to exploit the flaws, anattacker has to entice a user (via email or another webpage) to view amalicious XPM file. These flaws were discovered during an extensivesecurity review undertaken after similar vulnerabilities were reportedin September 2004. Proof-of-concept XPM images were posted for theearlier vulnerabilities. The technical details for the newly discoveredvulnerabilities can be obtained by studying the patch.
Status: X.org has provided patches. Multiple Linux vendors such asFedora and SuSE have also provided updates.
Council Site Actions: Most of the council sites are using the affectedsoftware. Some sites will apply patches during their next regularlyscheduled system update process. One site is still awaiting patches fortheir affected O/S.
Description: TWiki, a Perl-based CGI software, allows multiple users tomanage a web site's content through a web browser. TWiki is popularlyused for intranet content management by many companies. The searchfunction included in the software contains a command executionvulnerability. The user input to the search function is not properlysanitized. As a result, by using a "`" (back tick) character in thesearch string, an unauthenticated attacker may execute arbitrary Perlcommands on the web server. The posted advisory shows how to constructthe malicious search string.
Status: TWiki has confirmed and patches are available.
Council Site Actions: Two sites are using the affected software. Oneof these sites has already installed the patches. The other site saidthey are aware of at least two systems at their site that werecompromised by this vulnerability during the past week. The intruderdownloaded a program named /nery/bind from a remote Web site. They arechecking for other TWiki installations at their site and will determineappropriate course of action.
Description: IpSwitch IMail is Windows-based mail server that providesSMTP, POP3 and IMAP services. The software is reportedly being used bymany businesses and serves over 60 million users world-wide. The IMailIMAP server contains a buffer overflow that can be triggered by anoverlong "DELETE" command. An authenticated user can exploit the flawto execute arbitrary code on the IMail server with possibly "SYSTEM"privileges. Exploit code has been publicly posted.
Status: Vendor confirmed, upgrade to version 8.14 and apply Hotfix 1.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: Digital Mapping System (DMS) POP3 server, a mail server forWindows 2000/XP systems, contains a buffer overflow. An unauthenticatedattacker can trigger the overflow by sending an overlong username (over1024 characters), and exploit the flaw to possibly execute arbitrarycode with the privileges of the POP3 server process. A proof-of-conceptexploit has been posted.
Status: Vendor has confirmed, upgrade to version 1.5.4.27
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Description: Skype is a peer-to-peer software for making phone callsover the Internet using VoIP technology. The software has beenreportedly downloaded over 36 million times. When Skype is installed onWindows, it registers the "Callto://" URI handler. This URI handlerallows Skype to be invoked via a web browser. The URI handler containsa buffer overflow that can be triggered by a URL (username) over 4096characters. A malicious webpage or a Skype peer may entice a Skype userto click a specially crafted link, and exploit this flaw to possiblyexecute arbitrary code on the Skype user's system. Note that InternetExplorer does not open links of length 4096 or greater; hence, IE usersface a reduced risk. Exploit code is not currently available, anddeveloping one is believed to be challenging due to limited characterset that may be used for the purpose.
Status: Vendor has confirmed, upgrade to version 1.0.0.100 or above. Theversion also fixes another vulnerability in handling the "quick-call"field.
Council Site Actions: The affected software is not in production orwidespread use at any of the council sites. They reported that no actionwas necessary.
Council Site Updates: All council sites using Oracle reported that theirsystem build/install process either disables these default accounts orchanges the default password. One site plans to check all Oracleinstallations using the following audit tool: http://www.petefinnigan.com/default/default_password_checker.htm
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3875 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner. ==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters. To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.