telnet client users on Linux, UNIX, Apple Macs and Kerberos should install the updates if you are using telnet extensively.
Also, to attend SANS training with our top instructors in small classes, come to Colorado in May for SANS Rocky Mountain. You get Auditing Wireless Security, Forensics, both basic and advanced Hacker Techniques, plus Forensics and Firewalls and IDS and Security Management and Security Essentials and even training for the ISC2 CISSP exam. See: http://www.sans.org/rockymnt2005/
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored by Shavlik******************************
Now Available! Introducing Shavlik HFNetChkPro(tm) 5, the next generation of security patch management. With over 50 awesome new features including detailed reporting, advanced reboot options, email notification, and distribution servers, staying up to date on patches has never been easier and your network has never been more secure. Keep your world in Chk with Shavlik. Download the trial version today at http://www.sans.org/info.php?id=744
*************************************************************************
************************* SPONSORED LINKS *******************************
These links may point to sites outside of SANS: 1) Learn more about Radware (Booth 921) at the SANS 2005 Conference, San Diego, April 7-8, 2005 Download DefensePro whitepaper http://www.sans.org/info.php?id=745 2) Download your free trial of SecurityEXPERT. Automate the enforcement of policy settings across your network. http://www.sans.org/info.php?id=746 3) SANS is happy to bring you the latest in our complimentary series of Secure Software Webcasts. Database risks explored in depth at https://www.sans.org/webcasts/show.php?webcastid=90568
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Telnet LINEMODE option can be used to let the telnet client-side perform more character processing, which helps to reduce the amount of telnet traffic on a network. A number of telnet client implementations contain a buffer overflow in the way they process a certain telnet LINEMODE sub-option. Specifically, a telnet server can trigger the buffer overflow by sending a large number of "Set Local Character (SLC)" sub-options within the LINEMODE option command. The clients also contain another heap-based buffer overflow in the "env_opt_add()" function. This overflow can be triggered by sending the telnet client a buffer containing a large number of telnet escape characters. These flaws can be exploited to execute arbitrary code on the client system with the privileges of the logged-on user. In order to exploit these overflows, an attacker has to force a victim to connect to his malicious telnet server. This, in turn, can be accomplished in some cases via a specially crafted webpage or an HTML email containing a "telnet://" URL. Proof-of-concept exploits have been posted for the overflows.
Status: Many vendors have confirmed this flaw and have released updates.
Council Site Actions: Most of the council sites are running the affected software on various platforms within their environments. A few sites do not plan to take any action since none of their affected systems are used to establish telnet connections to unknown or untrusted locations. Three sites do plan to distribute the patches during their next regularly scheduled system update process or have already updated their systems through automatic software update features. One of these sites commented that they have a large number of Linux and Solaris systems which are vulnerable. However, as far as they know, very few of them have an installed web browser configured to recognize "telnet://" URLs. Clicking on a "telnet://" link produces an error window stating "telnet is not a registered protocol". Also, it is not common for their users to run the telnet program directly, and thus the chance of encountering a malicious telnet server is small. They plan to update these systems, but at a much slower pace. Another site commented that telnet is banned from their critical application systems, and most of their systems don't allow telnet at all.
Description: Apple's QuickTime media player is reportedly vulnerable to a buffer overflow while processing specially crafted JPEG images. The flaw is triggered by a malformed "Haufmann segment" in a JPEG image. The discoverer reports that the crash results in an "access violation" error (crash). Hence, the flaw may be possibly exploited for code execution purposes (not confirmed). Note that Internet Explorer and other browsers open files associated with QuickTime player without user interaction, which may facilitate easy exploitation.
Status: Apple has not confirmed. The flaw may be related to an older vulnerability in QuickTime that was fixed in October 2004. An upgrade to version 6.5.2 is recommended.
Council Site Actions: Most of the council sites are running the affected software, although not officially supported by their perspective support group. All are awaiting official word from the vendor along with a patch. Several of the sites specified they would install the patches during a normal system update process. One site commented that many of their Windows systems were updated to QuickTime 6.5.2 last year because of the October 2004 vulnerability ( http://www.securityfocus.com/bid/11553/info/), and their Mac OS X systems have been updated to QuickTime 6.5.2 through Software Update.
Description: Smail-3 is a mail transfer agent (MTA) for UNIX systems similar to sendmail. This MTA is reportedly vulnerable to a heap-based buffer overflow that can be triggered by an overlong argument to the "MAIL FROM" SMTP command. A remote attacker, who can connect to the Smail-3 server, can exploit this flaw to possibly execute arbitrary code with root privileges. Exploit code has been publicly posted.
Status: Vendor did not initially acknowledge the flaw as being exploitable. The vendor status after the discoverer posted his exploit code is not known. Unofficial patch has been included in one of the discoverer's postings.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Double Choco Latte is enterprise-class software designed for project management, online documents, call tracking, etc that is being used by a number of organizations. This software contains a remote PHP code execution vulnerability that can be exploited to compromise the server running Double Choco Latte. The technical details can be obtained via examining the fixed and the affected versions of the software.
Status: Vendor confirmed, upgrade to version 0.9.4.4.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4167 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.