@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************** Sponsored by SANS Washington DC 2005 *********************
Attend one of ten SANS in-depth training courses in Washington DC, July
28 - August 3. Plus you'll find a vendor Expo and five short courses:
Cutting-edge Hacking Techniques, Advanced Worm and Bot Analysis, Legal
Issues and more.
Details: http://www.sans.org/washington2005/caag.php
*************************************************************************
*************************************************************************
Reasons Security Professionals Give for Justifying SANS Training
(1) "I have attended several of SANS rivals and SANS blew them away!"
- Alton Thompson, US Marines
(2) " I have attended many conferences/training sessions, and SANS, by
far, has been the best. The instructors are the top in the industry,
examples are from real life experiences - terrific!"
- Chris Bush, Novartis Pharmaceuticals
(3) It's very dynamic, and I will be able to apply what I learned
directly into my area of work."
- Wagner Nascimento, eBay, Inc.
*************************************************************************
SANS@Home summer program
Choose one of ten specially selected Instructor and Mentor Led sessions that enable you to participate in comprehensive SANS training from your home or office without disrupting your daily work schedule.
For more information and to register for one of our upcoming sessions,
visit http://www.sans.org/athome/
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Novell ZENWorks software suite is designed for managing desktops, laptops, servers, handheld devices, etc. in a large enterprise. ZENWorks management agent is run on systems that are remotely managed. This agent implements an authentication protocol that contains multiple stack and heap-based buffer overflows. An unauthenticated attacker can leverage these overflows to execute arbitrary code on the managed system (reportedly in its default configuration). The discoverer has posted complete technical details of the overflows for the ZENWorks Windows Management Agent - ZenRem32.exe. Note that the flaw can be used to potentially compromise many systems in an enterprise.
Status: Novell confirmed, no updates available currently. A workaround is to block ports used by the management agent. The following references can be used to select the appropriate ports for blocking: http://www.novell.com/coolsolutions/tip/3170.html, http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093159.htm and http://www.novell.com/coolsolutions/trench/3611.html .
Description: Land attack, a denial-of service attack known since 1997, can be launched by directing IP packets with same source and destination IP addresses at the target machine. Windows XP SP2 and Windows 2003 SP1 server are reportedly vulnerable to this attack. By continuously sending a stream of malformed IPv6 (IP Protocol version 6) TCP "SYN" packets to the open ports on a Windows XP/2003 system, it is possible to cause a significant performance degradation thereby rendering the system unusable. Exploit code has been publicly posted.
Status: Microsoft has been informed about the vulnerability. No patches are available yet. Appropriate ingress/egress filtering would also defend against this attack. Another alternative is to use firewalls and router ACLs to block such attacks.
Council Site Actions: Council sites report they have a large number of systems that could potentially be affected by a local IPv6 attack. Nearly all of their affected systems will obtain the update through the public Windows Update site, or through their local SUS server, whenever Microsoft happens to release a patch for this. They are not planning to proactively block the attack, although it is possible that the vulnerability may cause them to temporarily hold off on further expansion of external IPv6 availability.
Description: Nexusway, a networking product from Taiwan, is designed to be a border gateway product to connect multiple networks. The gateway's web administration contains multiple flaws that can be exploited to obtain administrative control over the device, or run arbitrary commands. The posting shows how to craft HTTP requests to exploit these flaws.
Status: Vendor patch is not available yet.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Gaim is a multi-protocol instant messaging client for Linux, BSD, MacOS X and Windows platforms. Gaim contains a stack-based buffer overflow that can be triggered by an IM message containing an overlong URL (over 8192 bytes). An attacker can exploit this flaw via Jabber or SILC protocol messages to execute arbitrary code on a user's system. Exploit code development may be challenging as only certain printable characters can be used for such a purpose.
Status: Vendor confirmed, upgraded to version 1.3.0.
Council Site Actions: Only one of the reporting council sites is running the affected software and mostly on Linux platforms. Most of their systems regularly obtain updates from the Linux vendor through an automated process. They also a substantial collection of Red Hat Enterprise Linux systems for which an administrator must manually trigger updates, and this update (RHSA-2005:429-06) will most likely occur in early June.
Description: The following web-based software packages reportedly contain SQL injection vulnerabilities: MaxWebPortal, Help Center Live, PhotoPost PHP Pro, Sigma ISP Manager and NPDS. These flaws can be exploited to manipulate SQL queries issued against the backend databases, potentially leading to compromise of the affected application. In some cases, it is possible to gain administrative access to the application. The postings show how to craft malicious HTTP requests to exploit these flaws. Status: MaxWebPortal: Vendor confirmed, upgrade to version 1.36 PhotoPost PHP Pro: Unknown NPDS: Vendor confirmed, fix available Help Center Live: The issues are reportedly fixed. Sigma ISP Manager: Unknown
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4331 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.