Although this week's new vulnerabilities are mostly not critical, four new exploits have been posted, some of which exploit older critical vulnerabilities on Windows and cross platform. See ##6 through #9 below.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************* Sponsored by SANS 2005 ***************************
SANS 2005, in San Diego in early April (on the ocean) is SANS' largest security and audit training conference and expo. Wonderful teachers who teach material you can put to work immediately upon returning to work. Extraordinary teachers present the most current tools and techniques. Late registration deadline is today. March 18. Details at http://www.sans.org/sans2005 What attendees say: "SANS is the gold standard in network security training, in terms of relevance of material, knowledgeable instructors, and sheer usefulness." (Steve Keifling, SGI)
*************************************************************************
*********************** SPONSORED LINKS *********************************
This link goes to a site outside SANS: Free Threat Management Software for Home Lab Use: IDP, File Integrity, Service Monitoring and More http://www.sans.org/info.php?id=736
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: A number of Symantec security products include a DNS daemon (DNSd) that can be configured as a DNS caching server or as a primary DNS server. The DNSd is vulnerable to DNS cache poisoning i.e. an attacker can populate the server with fake DNS records. By performing the cache poisoning, an attacker may be able to direct traffic intended for legitimate domains (for instance, windowsupdate.com) to an IP address under the attacker's control. SANS Handler's diary has reported attacks on Symantec products in the wild that resulted in users being re-directed from Google and eBay to malicious sites that installed spyware and adware on users' systems.
Status: Symantec has released hot fixes for all the affected products.
Description: Ipswitch Collaboration Suite (ICS), an email and workgroup collaboration solution reportedly used by over 60 million people world-wide, contains an overflow in its IMail IMAP server. The flaw can be triggered by a specially crafted EXAMINE command with an argument longer than 259 bytes. An authenticated attacker can exploit the flaw to execute arbitrary code with the privileges of the IMAP daemon, possibly SYSTEM. Note that the IMail server is being used by many ISPs. Thus, any subscriber may leverage this flaw to control a vulnerable ISP's mail services.
Status: Ipswitch has released version 8.15 Hotfix 1.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: MySQL database contains vulnerability in "CREATE FUNCTION" procedure that may be exploited to execute arbitrary code with the privileges of the "mysql" user. Another vulnerability in the "udf_init" function allows an authenticated user to load functions from an arbitrary library into the database. In order to exploit these flaws, an attacker needs the credentials to invoke "INSERT" and "DELETE" procedures on the MySQL administrative database (typically available to "root" user). Proof-of-concept exploits have been included in the discoverer's postings. It is worth pointing out that a similar privilege escalation vulnerability was exploited by a worm in January 2005 by targeting the Windows MySQL installations with weak "root" passwords.
Status: MySQL has confirmed the flaws. Version 4.0.24 and 4.1.10a have been released to address the issues. A workaround to prevent attacks originating from the Internet is to choose strong MySQL "root" and other user passwords.
Council Site Actions: Most of the council sites are responding to this item. Some sites have already upgraded to the fixed version and other sites plan to upgrade during their next regularly scheduled system update process. In addition, several sites commented that they have no Internet exposure to this problem. One site is investigating if the 3.x series is vulnerable as well. If so they will install the updated packages produced by Linux vendors, as they become available.
Description: Goodtech Telnet server for Windows NT/2000/XP systems can be administered remotely via HTTP. This administration server that runs on port 2380/tcp by default contains a buffer overflow. The flaw can be triggered by sending over 10040 bytes of data, and exploited to execute arbitrary code on the server with SYSTEM privileges. Exploit code has been publicly posted.
Status: Vendor confirmed. Version 5.0.7 fixes the flaw.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: The following software packages reportedly contain remote PHP file include vulnerabilities: zPanel, WEBInsta Mailing Manager, WEBINsta Limbo. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the web server hosting the vulnerable software package(s). The postings show how to craft the malicious HTTP requests to exploit the flaws.
Status: Vendors have not confirmed.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Service Location Protocol (SLP) allows networking applications to discover the existence, configuration and location of networked services (such as printers) in an enterprise. OpenSLP is an open-source implementation of this protocol. SuSE team, who audited the OpenSLP protocol, has found multiple buffer overflow vulnerabilities. A malformed SLP message may exploit these overflows to possibly execute arbitrary code with the privileges of the slpd daemon. Technical details about the overflows have not been published yet.
Status: SuSE/Novell has released binary packages to fix the flaws. The OpenSLP has been ported to multiple OSs, which may also be affected (not confirmed). A workaround is to block ports 427/tcp and 427/udp to limit attacks from the Internet.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Immunitysec, Inc. has released an exploit for the "CRITICAL" buffer overflow in the Microsoft's License Logging service in its CANVAS product. Further, the researchers at Immunitysec claim that no authentication is required to exploit the buffer overflow on Microsoft Advanced Server 2000 SP3 and SP4 (depending on the way SP4 is installed) platforms. Microsoft does not list these products as critically vulnerable in the MS05-010 advisory.
Description: Hat-Squad team has released an exploit for the "CRITICAL" overflow in the Sentinel License Manager service discussed in the last week's @RISK newsletter.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Ethereal version 0.10.0 fixes multiple buffer overflows and denial-of-service vulnerabilities in various protocol decoders. Exploit code to leverage the flaw in RADIUS authentication has been publicly posted.
Council Site Actions: No change in response due to exploit release. The two sites who are using this program have already updated their affected systems.
Description: Exploit code for one of the Internet Explorer cross-zone scripting vulnerability patched by MS05-014 is now publicly available.
Council Site Actions: Most of the council sites have already patched their affected systems. One site is still investigating and another site commented that browser patching on servers is a lower priority.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4106 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters. To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.