@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************************************************************
Why Do Security Professionals Get More Value From SANS Than from Any
Other Source?
"Years of experience downloaded into your brain in 6 days."
- Chris
Koutras, Titan, Inc.
"The perfect balance of theory and hands on experience."
- James D. Perry
II, University of Tennessee
"SANS courses bring the best of the best to one place to teach cutting-
edge information."
- Jeremy Baca, Sandia National Labs
"SANS has opened my eyes to things I never would have considered based on
my own research."
- Doug Wells, Media General, Inc.
Upcoming programs in Washington, Atlanta, Portland, London, Ottawa,
Madrid or in your home.
Training schedule posted at:
http://www.sans.org
**********************************************************************
*********************** Sponsored Links *********************************
These links take you outside SANS:
1) UpdateEXPERT patch management supports Microsoft, Red Hat Linux,
Solaris and custom patches.
FREE 15-day trial available now!
http://www.sans.org/info.php?id=782
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Computer Associates' and Zone Alarm's Vet Engine library (VetE.dll) is responsible for detecting viruses and other malware. The library can parse and scan OLE objects. (Object Linking and Embedding (OLE) is a standard defined by Microsoft that allows creating compound documents such as embedding an Excel spreadsheet in a Word document.) The Vet Engine contains a heap-based overflow that can be triggered by a malicious OLE document such as Microsoft Word, Powerpoint, Access, etc. An attacker can exploit this flaw by sending a malicious document via mail, web, FTP or a shared server. The discoverer has posted the disassembly of the VetE.dll highlighting the instructions that lead to the overflow. Note that no user interaction is required to exploit this flaw via email.
Status: CA has released updates for various products. CA Antivirus and EZ Armor products may already be up-to-date via the automatic signature updates. ZoneAlarm has made updates available that will get downloaded automatically during the daily update process.
Council Site Actions: Only one council site responded to this item. They have a small deployment of Zone Labs products resulting from personal purchases. They will be relying on Zone Labs daily update functionality to update the affected systems.
Description: This vulnerability in certain TCP implementations can be exploited to cause a denial of service by forcing either ends involved in a TCP connection to drop TCP segments. That will eventually reset the connection. The problem arises due to the way some TCP stacks implement the TCP timestamp option. In order to preserve the TCP performance over high bandwidth, the PAWS and the Timestamp Option were introduced via RFC 1323. PAWS uses the TCP timestamp option to track new TCP segments. The vulnerability arises because some TCP stacks use the TCP timestamp to process further TCP segments without validating the TCP sequence numbers. Hence, an attacker who can guess the IP addresses and port numbers of the ends involved in a TCP connection, can inject TCP packets into the connection with crafted timestamp values. This can lead to resetting the connection or corrupting the data transfer between the two ends. The higher-level protocols that use long-lasting TCP sessions such as the Border Gateway Protocol (BGP) are most affected by this vulnerability. Exploit code has been publicly posted.
Status: Cisco has released an advisory and posted updates. Microsoft patch MS05-019 also fixes this vulnerability. For a detailed status on other vendors, please refer to the CERT advisory below.
Council Site Actions: All council sites have either deployed patches or plan to deploy them once they are available from the vendor. One site is still verifying that PAWS and Timestamps are not in use on any of their servers that are vulnerable to this attack. If any are found, the Timestamp/PAWS feature will be disabled. Another site is actively engaging with vendors that have not released patches but are known to use vulnerable platforms. A final site does plan to install the patches but is treating this as a low urgency event since very few of their machines maintain long-duration TCP sessions and thus very few are likely victims of an attack.
Description: Apple has released an update for Mac OS X 10.4 that fixes a number of vulnerabilities. The most important vulnerability is the automatic downloading of widgets through Safari browser. A malicious website can exploit this flaw to install arbitrary widgets on a Mac client without any user warning. In general, widgets don't have access to system resources without user prompting. However, there is some evidence that certain widgets may be able to access system resources without user prompting. This can lead to further compromise of the client system.
Status: Download the 10.4.1 update for Mac OS. An alternative is to delete suspicious Widgets from ~/Library/Widgets folder.
Council Site Actions: Only one site is running the affect O/S version. The great majority of their affected systems have been updated through the Software Update facility.
Description: Microsoft Word reportedly contains an overflow in handling files with ".mcw" extension. The MCW format is the Microsoft Word format for Macintosh computers. The discoverer's posting indicates that by changing certain fields in an MCW file, an attacker can control the execution flow of the Word program. Hence, a malicious webpage or an HTML email may exploit this flaw to execute arbitrary code on a user's system. A proof-of-concept MCW document has been posted.
Status: Microsoft has not confirmed. The discoverer reports that Word 2002 SP3 is not vulnerable.
Council Site Actions: Most of the council sites plan to deploy the patch once it becomes available. One site said they have had limited success in convincing end users to recognize that Office Update is important in addition to Windows Update. They are hoping that users obtain Word updates more promptly after the Microsoft Update facility becomes available.
Description: Multiple Cisco products including certain VoIP products are vulnerable to a denial of service condition that can be triggered by a specially crafted DNS packet. DNS protocol defines a compression scheme that is used to remove the repetitions of the same host or domain name in a DNS packet. For example, if the query section in a DNS packet contains the name www.google.com, the answer section can use just 2 bytes to point to the same name by using the DNS compressed pointer. A DNS packet with specially crafted DNS compressed pointer causes some Cisco DNS clients to enter an infinite loop, thereby causing a DoS. Since these products don't run a DNS server, in order to exploit this flaw, an attacker would either need to run a malicious DNS server or would need to spoof a DNS response targeted at the affected products.
Status: Cisco confirmed, updates available. Note: NISCC UK, the British agency that reported this vulnerability, has not listed other vendors that may be vulnerable to a similar flaw yet. Depending on the affected vendor component (DNS server/client/IDS or IPS parser), the severity of this vulnerability will vary. The "LOW" rating applies only to Cisco products.
Council Site Actions: Two of the council sites are responding to this item. The first site is still investigating the level of vulnerability on their network. The second believe they have some departments which have purchased Cisco IP Phones, but the numbers are very small. They anticipate that software updates will occur within the next three months. Another site is running affected products, but not in front DNS; thus they are not vulnerable.
Description: IpSwitch IMail is Windows-based mail server that provides SMTP, POP3 and IMAP services. The software is used by many businesses and serves over 60 million users world-wide. The IMail IMAP server contains buffer overflows in the following commands: LOGIN and STATUS. The LOGIN command contains two overflows that may be exploited by unauthenticated attackers to execute arbitrary code on the IMail server with SYSTEM privileges. The STATUS overflow, however, requires user privileges to exploit it. The technical details about both the flaws have been publicly posted.
Status: Vendor has released a hot fix. The hot fix also fixes DoS vulnerabilities in the IMAP LSUB and SELECT commands.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: phpATM software provides file upload and download functions for web severs. This software contains a file include vulnerability. An attacker can pass a PHP file location to the "include_location" parameter, and execute arbitrary PHP code on the webserver running phpATM. This flaw has reportedly been exploited in the wild.
Status: phpATM has released version 1.30 that fixes the issue.
Council Site Actions: The affected software and/or configuration is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: LISTSERV is a popular email management software that can be used to manage email newsletters, discussion groups or announcement lists. The LISTSERV web interface that allows remote web management of the mailing lists contains vulnerabilities in its "wa" script. The flaws may be used to execute arbitrary code on the server running the LISTSERV software. The discoverer will post the complete technical details on August 25, 2005.
Status: L-Soft has released updates. Versions 1.8d and 1.8e are no longer supported by the vendor.
Description: Mozilla has released complete details of the remote code execution vulnerabilities in versions prior to 1.0.4.
Council Site Actions: Responses vary at the council sites. Some sites have advised their users to upgrade to version 1.0.4. Some sites are not taking action because Firefox is not a supported browser. One of these sites said that they would rely on Cisco Security Agent to prevent the code execution. Another site says they don't support Firefox, but do support Netscape which has even bigger problems. They plan is to go to Netscape 8.0.1, but this isn't firm yet.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4339 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.