Whether you are running Windows, Solaris or Linux, you have at least one high priority, critical vulnerability to deal with this week. And this is a short week. Alan PS We've included a bonus for everyone who supports users. The next five weeks will see a huge surge of phishing attacks. Users who don't expect them can be hurt. The December issue of OUCH is a user newsletter that helps them see how to protect themselves. Feel free to distribute it wherever it can be helpful. And if you want to get the monthly updates (all free) add Ouch to your subscriptions at the SANS Portal. http://www.sans.org/newsletters/ouch/
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
Highlighted Cybersecurity Training: Washington, DC, Dec. 7-14, 2004 SANS best instructors will be in DC teaching great courses for
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Winamp, a popular Windows media player, contains a stack-based buffer overflow in its "IN_CCDA.dll" DLL. The overflow can be triggered by a malformed playlist file i.e. a file with an ".m3u"extension. In order to exploit the flaw, an attacker can create a malicious webpage. When a user visits the webpage, Winamp will automatically open the specially crafted playlist file, which will trigger the overflow. The overflow can be leveraged to execute arbitrary code on the user's system. The problem arises because Winamp allocates limited memory for a filename with a ".cda" extension in a playlist file. Exploit code has been publicly posted.
Status: Vendor is aware of the vulnerability and reported that the flaw is fixed in version 5.06. However, the discoverer reported that version5.06 is also vulnerable. A workaround is to dissociate ".cda" and ".m3u"extensions from Winamp.
Council Site Actions: Some council sites plans to remove the application from all systems. The other sites do not plan any action at this time since the software is not supported at their site.
Description: The Sun Java Plugin technology, a part of the Java Runtime Environment (JRE), enables applets on websites to run on a client's browser. The Java Security Manager controls the resources a downloaded applet can access ("sandbox" model). A vulnerability in the Sun Java Virtual Manager can be exploited by a malicious applet to break out of this "sandbox", and access any local resources. The malicious applet may even be able to disable the Java Security Manager. As a result, if a user browses a webpage containing the malicious applet, the applet may be able to execute arbitrary code on the client system with the privileges of the logged-on user. Note that applets are automatically downloaded and executed in typical browser configurations. The problem arises because Javascript code can bypass the applet access restrictions. The technical details about the flaw have been publicly posted.
Status: Sun confirmed, upgrade to Sun J2SE 1.4.2_06.
Council Site Actions: Some council sites hava already upgraded to Sun J2SE 1.4.2_06. Other sites do not plan any action unless the vulnerability is being actively exploited.
Description: Cyrus IMAP server, a popularly used server on Linux and Solaris platforms, contains a stack-based overflow in the implementation of LOGIN and PROXY commands. If the option "imapmagicplus" is turned on (not a default setting), an unauthenticated attacker can trigger the buffer overflow by specifying an overlong username. The flaw can be exploited to execute arbitrary code on the server with the privileges of the imap daemon.
Status: Upgrade to Cyrus IMAP server 2.2.9. This version also fixes other memory corruption vulnerabilities that may be exploited by an authenticated user.
Council Site Actions: Council sites using the affected software report that their servers will be updated to version 2.2.9 within a week.
Description: phpBB, a popular bulletin board package, contains a remote command execution vulnerability. The problem arises because the bulletin board's "viewtopic" script does not properly sanitize the user-supplied value to its "highlight" parameter. As a result, an attacker can pass arbitrary values to this parameter and execute arbitrary code on the server. Exploit code is publicly available.
Status: Vendor confirmed. Upgrade to version 2.0.11 or apply the vendor supplied patch.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: SLMail, a POP3 and SMTP server for Microsoft NT/2000 platform, reportedly contains a stack-based buffer overflow in its POP3 server. The overflow can be triggered by an overlong password, and exploited to execute arbitrary code on the server. Exploit code has been publicly posted.
Status: Vendor has not confirmed, no patches available.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: SecureCRT is a client program for Windows that supports multiple protocols like telnet, SSH etc. The application installs a URI handler; hence the application can be invoked via URLs of the form "telnet://". A specially crafted URL can be used to pass command-line options to the SecureCRT application. By passing a "/f" option, an attacker can control the application's configuration. A malicious webpage or an HTML email may exploit the flaw to execute arbitrary script code on a client system. The posted advisory contains technical details and a proof-of-concept script.
Status: Vendor confirmed, upgrade to version 4.1.9.
Council Site Actions: Sites using the affected software plan to make version 4.1.9 available on their internal distribution server and request that users either upgrade or disable the handler for telnet:// URLs. At some sites SecureCRT sessions almost exclusively use SSH; therefore they have no need to support telnet:// URLs.
Description: ProZilla client software provides accelerated downloads on Linux platforms. This software contains multiple buffer overflow vulnerabilities. An attacker-controlled server can exploit the overflows to execute arbitrary code on a client system. In order to exploit the flaw, an attacker has to entice a user to download content from his server. Exploit code has been posted.
Status: Vendor is aware, no fixes available yet.
Council Site Actions: The affected software is not in production or widespread use or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: WodFTPDLX is a COM/ActiveX component that supports FTP client functions. This component contains a buffer overflow that can be triggered by an FTP response containing an overlong filename. A malicious FTP server can possibly exploit the flaw to execute arbitrary code on the client using the WodFTPDLX component. A proof-of-concept exploit has been publicly posted.
Status: Vendor confirmed. Upgrade any software using the WodFTPDLX component to version 2.3.2.97.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3887 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner. ==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters. To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.