Not much for you to do this week unless you are using MaxDB (#4 below) in which case you should do an immediate upgrade to version 7.5.00.19. MaxDB is sometimes used in large organizations with SAP installations. Good news on security training. SANS' largest training program (SANS 2005 in San Diego in April) just opened for registration. There's no place better than San Diego in the spring (expect perhaps Orlando in early February, and you are also invited to a big training program there and then). See www.sans.org for information on both programs.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** This Issue Sponsored by WhatWorks **********************
Visit with experienced users, online, to find out what actually works for intrusion prevention, vulnerability management, transaction security, email and spam control, vulnerability remediation, patch management and managed security services. Register for the free What Works in web filtering web cast on Tuesday at 2:00 EST < https://www.sans.org/webcasts/show.php?webcastid=90534> and review all the WhatWorks web casts at < http://www.sans.org/webcasts/archive.php>. All US and Canadian subscribers with up to date surface mail addresses will get the new WhatWorks poster in about two weeks. Update your address at <portal.sans.org>
*************************************************************************
************************** SPONSORED LINKS ****************************** Privacy notice: Sponsored links redirect to non-SANS web pages.
(1) Stop Cyber Attacks Now. FREE White Paper: How to Evaluate Intrusion Prevention Systems http://www.sans.org/info.php?id=681
*************************************************************************
Description: Internet Explorer supports URLs beginning with "ftp://".IE's FTP URL handler decodes hex-encoded characters such as "%0a" and "%20". Hence, it is possible to inject FTP commands in a URL using the hex-encoded newline and space characters. An FTP server may exploit this flaw to download a malicious file to a client system. To exploit the flaw, an attacker has to set up a webpage containing a specially constructed URL that points to an FTP server under the attacker's control. A client, who visits the attacker's webpage, can be made to automatically issue commands against the attacker's FTP server. This can possibly result in the client downloading a malicious file from the attacker's FTP server. However, the attacker would need to leverage another IE flaw to execute the downloaded file on the client's system.The posted advisory shows how to construct a malicious FTP URL.
Status: Microsoft not confirmed, no patches available.
Council Site Actions: All council sites are awaiting confirmation from the vendor and a patch. They plan to patch during the regular system update process.
Description: A vulnerability has been discovered in multiple browsers that could allow an untrusted website to spoof the content and appear as a trusted site. The problem occurs because an untrusted website can inject content into a window opened by a trusted site. An attacker, who can entice a user to browse his site and a trusted site at the same time, may exploit this flaw to steal sensitive information from the user (phishing attacks). Proof-of-concept exploit has been publicly posted.
Status: None of the vendors have issued a patch at this time. Please refer to the council site actions for a suggested workaround.
Council Site Actions: All council sites are awaiting confirmation from the vendor and a patch. They plan to patch during the regular system update process. One site suggested a workaround for their users. They proposed using a separate browser session for entering sensitive data.In other words, the user should exit from their browser program, launch the browser program for use exclusively in visiting an important site (such as a bank), and again exit from their browser program after use of this single site is completed.
Description: W3Who.dll, an Internet Server Application Programming Interface (ISAPI) program, can display information about a client connecting to an IIS webserver such as the client's security context, environmental variables etc. This DLL contains a buffer overflow that can be triggered by passing an overlong parameter (over 519 bytes). The flaw can be possibly exploited to execute arbitrary code with the privileges of the IIS server. The technical details about the flaw have been posted. An exploit is under development and will reportedly be released in the open source Metasploit exploit framework.
Status: Microsoft has removed downloads of this DLL but does not plan to update it. Do not run this DLL on production IIS servers.
Council Site Actions: The affected software is not in production or widespread use, nor is not officially supported at any of the council sites. They reported that no action was necessary.
Description: MaxDB is a SAP-certified open source database that is used by large enterprises such as Intel and Toyota. The database can be configured with the WebDAV service and used as a document repository.The WebDAV server used by the database contains a stack-based buffer overflow. The flaw can be reportedly exploited to execute arbitrary commands on the server with root/SYSTEM privileges. Limited technical details regarding the flaw have been publicly posted.
Status: Vendor confirmed, upgrade to version 7.5.00.19. If the database is used only internally, block the WebDAV port used by MaxDB at the network perimeter.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: imlib is an advanced image manipulation library that can replace libXpm. The library is used by multiple Linux window managers.This library contains buffer overflow vulnerabilities similar to the ones found in libXpm. A malicious image may trigger the overflows, and possibly execute arbitrary code on a client viewing the image via a program linked against imlib. Proof-of-concepts exploits are publicly available for the libXpm flaw.
Status: Various Linux vendors have released an update.
Council Site Actions: Three of the reporting council sites are using the affected software and all of these use the Up2Date software to update their systems. One site said the patch should already be out on their Up2Date server. The other two sites said the patch would go out later this month. One of these sites is still investigating patches from other Linux vendors.
Description: GetRight, a download manager to accelerate internet file downloads, has a few million users. The download manager contains a buffer overflow in its DUNZIP32.DLL, the DLL it uses for unzipping files. A malicious zip file can trigger the overflow, and possibly execute arbitrary code on the client system. An attacker has to entice a user to download the specially crafted zip file to exploit the flaw.Exploit code for the overflow described in MS04-034, which may be similar to this one, is publicly available.
Status: Vendor confirmed, upgrade to version 5.2b.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. All but one site reported that no new action was necessary. The final site has advised their Winamp users to patch their systems.
Council Site Actions: There were on three council sites using the affected software. One site has already distributed the patch. The second site commented that their systems are regularly updated by the Software Update Facility. The third site does not support Mac OS but said the few users who do us it typically update their systems fairly quickly.
(c) 2004. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner. ==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization. To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters. To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2004. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.