More than 100 new vulnerabilities this week. That's twice the prevailing rate. And the window of time from vulnerability discovery to exploit is shrinking again. An exploit for the MySQL MaxDB vulnerability (#1 below) was circulating within a day of discovery.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******* Why Do Security Professionals Attend SANS Training? ***********
(1) "SANS teaches you things that you can use right away without all the fluff. What an eye opener." (Sean Saxton, EMS)
(2) "The knowledge gained from SANS training has not only empowered me with the confidence of providing top notched computer security services, but it has also reduced the time needed for unbillable hours of research." (Kevin Cohen, Data Triage Technologies)
(3) "Quick, concise, full of content" (Michael Moore, EDS)
Join us at SANSFIRE next month: http://www.sans.org/sansfire2005
*************************************************************************
*********************** SANS Sponsored Links ****************************
1) Join us as SANS presents an authoritative Webcast on Cutting Edge Hacker Techniques on Wednesday, May 04 at 1:00 PM EDT (1700 UTC) This webcast discusses innovative attack techniques and tools released in the last 6 to 8 months and defensive strategies for the evolving threats. https://www.sans.org/webcasts/show.php?webcastid=90530
2) SANS comes to Denver on May 8-14 to host nine immersion tracks plus special one-day classes. http://www.sans.org/rockymnt2005
3) Try SANS@HOME Weekly Webcasts - superb course leaders and material - a great way to learn http://www.sans.org/athome
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: MaxDB is an SAP certified enterprise-class database that is used by many large companies. MaxDB supports multiple web-based tools such as WebSQL, WebDBM etc. via its web server. This web server contains the following stack-based buffer overflows that are triggered by: (a) Overlong "If" and "Lock-Token" HTTP headers in a WebDAV "Unlock" request. (b) An HTTP request containing a "%" character followed by a string of length 4000 bytes or greater. These flaws can be exploited to execute arbitrary code on the MaxDB server with possibly "SYSTEM/root" privileges. Hence, an attacker can completely compromise a MaxDB installation. Exploit code has been publicly posted.
Status: MaxDB confirmed. Upgrade to version 7.5.00.26. A workaround is to block the MaxDB web server port (default 9999/tcp) from the Internet.
Council Site Actions: Two of the reporting council sites are using the affected software/application. One site has notified their system support group and has advised them to patch their systems ASAP. The second site is still tracking down where they have MaxDB in their environment. They have issued an alert just to be safe.
Description: MailEnable, a Windows-based mail server, contains buffer overflows in its webmail server (MEHTTPS.EXE). An unauthenticated attacker can trigger the flaw by sending an overlong string (over 270 bytes) in the "Authorization" HTTP header. The flaw can be exploited to execute arbitrary code with the privileges of the webmail server. Exploit code has been publicly posted.
Status: Vendor has confirmed the buffer overflow and released a hotfix.
Council Site Actions: Only one of the reporting council sites is using the affected software. They have notified their system support group and have advised them to patch their systems ASAP.
Description: Sun has issued an advisory stating that the Sun Java System Web Proxy Server (Sun ONE proxy server) contains a buffer overflow that can be exploited by an attacker to execute arbitrary code with the privileges of the proxy server, typically "nobody". No technical details regarding the nature of the overflow have been posted.
Status: Sun announced the flaw. Upgrade to SP7 or later. Council Sight Actions: Three of the reporting council sites are using the affect software. One site issued a moderate alert to their support groups. The second site has notified their system support group and has advised them to patch their systems ASAP. The third site is phasing out this software in the very near future and has not planned any remediation action.
Description: MPlayer and xine-lib, Linux movie players, contain heap-based buffer overflows in processing RealMedia (RTSP) and Microsoft Media (MMST) streams. The flaws can be triggered by specially crafted movie files. An attacker can exploit these flaws, by enticing a client to visit a webpage, to potentially execute arbitrary code on the client system. The technical details required to leverage the flaws have been posted. Since the flaws are heap-based overflows, exploitation will be challenging.
Status: Vendors have confirmed, patches available.
Council Site Actions: Two of the reporting council sites are using the affected software. One has notified their system support group and has advised them to patch their systems ASAP. The second site, due to resource limitations, does not notify users of problems with individual desktop applications unless they know the problems are being frequently exploited in practice.
Council Site Updates: All council sites reported they have already patched their systems.
Council Site Updates: All council sites have already either patched their systems or will patch during the next regularly scheduled system update process.
Council Site Updates: Only one council site provided an update. They have notified the appropriate groups and advised them to patch.
Council Site Updates: Most of the council sites have responded to this issue and have plans to deploy the patch.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4243 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.