Note 1: Part II has two weeks of vulnerabilities. Note 2: The big Orlando security training conference has two deadlines: today and next Friday, for discounts. http://www.sans.org/orlando05
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored by SANS Orlando 2005 *************************
The largest security training conference in Orlando starts in just 30 days. Practical, timely, exciting training programs for every security professional. Fourteen immersion tracks for security practitioners, managers and auditors. Those seeking ISC2 CISSP certification will find the nation's top rated prep course at SANS Orlando, too. Plus seven one and two day short courses. And Orlando is comfortable in February! Details: http://www.sans.org/orlando05/ PS. The early registration discounts end today and next Friday.
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Mozilla browser supports NNTP (news) protocol and interprets "news://" URLs. The browser contains a heap-based buffer overflow that can be triggered by an overlong news URL ending in a "\\" (backslash) character. A malicious webpage or an HTML email may possibly exploit the flaw to execute arbitrary code on the system running the browser. Mozilla developers initially reported that the flaw cannot be exploited to execute arbitrary code. However, the discoverer has posted a proof-of-concept exploit that overwrites heap memory with the user-supplied data.
Status: Mozilla confirmed, upgrade to version 1.7.5. The discussion on MozillaZine indicates that Firefox prior to version 1.0 may also be affected. Hence, upgrade Firefox to version 1.0.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary. Several of the sites commented that they block NNTP at their network security perimeter.
Description: NGSSoftware has released complete technical details for the vulnerabilities in IBM DB2 version 8.1 Fixpak 6/7 and prior, and IBM DB2 version 7.x Fixpak 12 and prior. A remote attacker may exploit these flaws to completely compromise a DB2 server. Hence, the DB2 administrators, who have not yet patched their databases, should apply the patches as soon as possible. The Fixpaks 6a and 7a for DB2 version 8.1, and Fixpak 13 for DB version 7.x were released by IBM in October 2004.
Description: The following PHP software contains arbitrary file upload vulnerabilities: PhotoPost Classifieds and ReviewPost PHP Pro. The problem arises because a filename with multiple extensions such a foo.jpg.php.jpg.php is not properly checked for the real file type. As a result, an attacker can upload arbitrary PHP scripts and execute the scripts with the privileges of the webserver. Status: PhotoPost Classifieds: Vendor confirmed, upgrade to version 2.02 ReviewPost PHP Pro: Vendor confirmed, upgrade to version 2.84
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: WHM Autopilot, a web hosting management software, reportedly contains PHP remote file include vulnerabilities. The problems arise because the software does not properly sanitize input to "Server_inc" parameter. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the webserver. The posted advisory shows how to craft the malicious HTTP requests to exploit the flaws. Note that the vulnerabilities can be exploited only if the server's "register_globals" PHP configuration parameter is turned "On". The default setting for this parameter is "Off" for PHP versions 4.2.0 or higher.
Status: Vendor confirmed, upgrade to version 2.5.0.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: The following web-based software packages reportedly contain SQL injection vulnerabilities: PhotoPost Classifieds, PhotoPost PHP Pro, ReviewPost PHP Pro, Owl intranet Engine. These flaws can be exploited to manipulate SQL queries issued against the backend databases, potentially leading to compromise of the affected application. The technical details required for exploitation have been posted. Status: PhotoPost Classifieds: Vendor confirmed, upgrade to version 2.02 ReviewPost PHP Pro: Vendor confirmed, upgrade to version 2.84 PhotoPost PHP Pro: Vendor confirmed, upgrade to version 4.86 Owl Intranet Engine: Vendor confirmed, fixes available in CVS
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Exploit code has been publicly posted for the buffer overflow in the Windows WINS service that has been discussed in the Microsoft security bulletin MS04-045. Note that this overflow can be leveraged to execute arbitrary code with 'SYSTEM' privileges. Any domain controllers running WINS should be patched immediately.
Council Site Actions: Most of the reporting council sites are running the affected software and have already patched their systems or are in the process of patching their systems.
Description: Exploit code has been publicly posted for the buffer overflow vulnerability in the Windows NetDDE service that has been discussed in the Microsoft Security Bulletin MS04-031. The service is not enabled by default. However, if this service is being used, ensure that the systems are properly patched. Note that the overflow can be leveraged to execute arbitrary code with 'SYSTEM' privileges.
Council Site Actions: Most of the reporting council sites are running the affected software and have already patched their systems or are in the process of patching their systems.
Description: The following Symantec Nexland Firewall Appliances with firmware builds prior to 16U use public as the default read/write SNMP community string: Nexland ISB SOHO Firewall Appliance, Nexland Pro100, Pro400 Firewall Appliances, Nexland Pro800, Pro800turbo Firewall Appliances, and Nexland WaveBase Firewall Appliances. An attacker can use the default SNMP community string to make arbitrary changes to the firewall configuration, thereby putting the entire network protected by the firewall at risk. Symantec has released updates for the affected firewalls.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 3969 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.