Another week, another Firefox vulnerability (#1), another Internet Explorer vulnerability (#2), and another iTunes vulnerability (#3). And for Bakbone NetVault users, a critical vulnerability that must be patched right away (#4).
BTW SANSFire in Atlanta is four weeks away and includes an extraordinary selection of unique security courses for security and audit folks. Details: http://www.sans.org/sansfire2005
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored by St Bernard ****************************
As critical patches continue to be released, staying ahead of the rapid spread of vulnerabilities is more difficult and time-consuming than ever. UpdateEXPERT offers the most accurate and comprehensive patching available, allowing you to easily manage patching across any network topography and eliminate costly downtime. Be confident your business is completely secured. Download a FREE trial of UpdateEXPERT today! http://www.stbernard.com/forms/updateexpert_demo_form.asp?oc=48
*************************************************************************
*********************** Sponsored Links *********************************
These links take you outside SANS:
1) Job wanted in security/IT risk management. Lenny Zeltser is a SANS instructor and book author. GSE, CISSP, MBA credentials.
http://www.sans.org/info.php?id=775
2) Top Layer - 2005 NSS Group "Double Approval" for Rate & Content-based Intrusion Prevention.
Report http://www.sans.org/info.php?id=776
3) Now Available! New versions of WRQ Reflection for Secure IT (formerly F-Secure SSH).
Learn more at http://www.sans.org/info.php?id=777
*************************************************************************
Why Professionals Always Attend SANS Training If They Have A Choice
1) " SANS courses balance the why and the how-to of security. Not only will you learn something, you learn how to do something."
(Greg Kotula, Wall Street On Demand)
2) " SANS never fails to provide top level training that is worth every penny."
(Tyler Hudak, Yellow Roadway Tech)
(3) "SANS training gives me the tools I need to do my job."
(Michael Hiramoto, NCI)
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Mozilla Firefox browser contains two vulnerabilities that can be exploited in tandem to completely compromise a user's system. The problems arise because Mozilla allows execution of javascript URLs in the context of another website stored in its history list, and Mozilla allows its software install function to display icons with javascript URLs. A proof-of-concept exploit has been publicly posted. Since the Mozilla software install function can be invoked in the default browser configuration only from sites within the mozilla.org domain, once Mozilla patched its servers the impact of the exploit was reduced.
Status: Mozilla has released Firefox version 1.0.4 that patches the code execution flaws.
Council Site Actions: Most of the council sites still have limited use of this application. However, they plan to deploy the new version. Some sites are using the automatic update feature to get the updates installed.
Description: Microsoft has confirmed the remote script injection vulnerability discussed in the @RISK newsletter posted on April 21, 2005, and released patch MS05-024 to address the issue. Proof-of-concept exploit for this flaw has already been published; hence, this patch should be applied to the vulnerable Windows 2000 systems. Blocking ports 139/tcp and 445/tcp at the network perimeter will block the most likely attack vector - an attacker enticing users to browse the attacker's malicious shared folder.
Council Site Actions: Most of the council sites plan to deploy the patch during their next regularly scheduled system update process. A few council sites have already installed the patch. Several sites commented that they are blocking ports 139/TCP and 445/TCP at their external perimeter control points.
Description: iTunes, a widely used media player, contains a buffer overflow in processing MPEG4 media files. A malicious webpage hosting a specially crafted MPEG4 file can exploit this flaw to execute arbitrary code with the privileges of the user running iTunes. Systems with iTunes configured as their default media player should apply the patch provided by Apple on a priority basis. The discoverers will likely release the technical information in another 3 months. Note that the flaw is rated "MODERATE" at the current time due to lack of public availability of the technical details.
Status: Apple has confirmed and version 4.8 has been released for Mac OS version 10.2.8 or later, and Windows XP/2000.
Council Site Actions: Only two council sites report they are using the affected software. One site has already updated their systems and the other site is in progress of upgrading to version 4.8.
Description: Bakbone Netvault is a backup solution for environments running UNIX, Linux, Windows NT/2000/2003 or Netware. The software is reportedly being used by AT&T, Los Alamos National Laboratory and many other large enterprises. The implementation of the communication protocol between the Netvault client (the system being backed up) and the server (the system backing up the data) reportedly contains a heap-based buffer overflow. By sending specially crafted packets to the port 20031/tcp, an attacker can execute arbitrary code on the system running this software. Exploit code for leveraging this flaw on Windows platforms is publicly available.
Status: Vendor not confirmed, no updates available. A workaround is to block the ports 20031/tcp and 20031/udp (the Netvault default ports) at the network perimeter. Increased scanning activity has been noticed for the port 20031/tcp.
Description: RSA SecurID Authentication Agent software is designed to control access to corporate networks, web applications and other servers. The authentication agent designed for web servers contains a heap-based overflow. The flaw can be triggered by a specially crafted HTTP request containing data encoded using the "chunked" transfer encoding. For the agent deployed on IIS servers, it is possible to exploit the overflow and execute arbitrary code with "SYSTEM" privileges. Working exploit code has been developed by the discoverers and is planned to be distributed to select audiences.
Status: RSA has confirmed the overflow and provided patches.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: PHP-Nuke and e107 content management systems (CMS) reportedly contain remote file include vulnerabilities. These flaws can be exploited to execute arbitrary PHP code on the web servers running these CMSs. The posted advisories show how to craft HTTP requests to exploit these flaws.
Status: e107 will release version 0.7 shortly. PHP-Nuke 7.7 version may not be vulnerable.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: phpBB is a widely used bulletin board software. phpBB contains a vulnerability in bbcode.php that can be exploited by users to include active script code in their postings. This can potentially lead to installing malicious programs on the other bulletin board users' systems, or administrative access to the bulletin board. Some reports indicate that this flaw is being exploited in the wild.
Status: phpBB version 2.0.14 has been released to fix this issue.
Council Site Actions: Only one site responded to this item. They have a small number of web servers running the affected software. However, because the impact of this vulnerability is not well understood, they are not taking any action at this time. They are monitoring for compromise and will take action if necessary.
Council Site Updates: No new actions based on release of exploit. Some council sites have completed their upgrade of the product.
Council Site Updates: No new actions based on release of exploit.
Description: Microsoft has released SP4 for SQL Server 2000 that fixes multiple DoS, information disclosure and potential code execution issues.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4306 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.