A light week. HP Openview Radia users and some qmail users should check the applicability of the first two vulnerabilities.
Also see the note about a Google hacking class after the table of contents.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** SPONSORED LINKS *********************************
These links take you outside SANS.ORG
1) Learn more about Radware at SANSFIRE Atlanta, GA, June 14, 2005
Download DefensePro whitepaper
http://www.sans.org/info.php?id=792
2) Solve connectivity and security problems. Free Top 10 Malware
Protection Techniques for Remote Access Connections.
http://www.sans.org/info.php?id=793
3) UpdateEXPERT patch management supports Microsoft, Red Hat Linux,
Solaris and custom patches. FREE 15-day trial available now!
http://www.sans.org/info.php?id=794
*************************************************************************
******************* Google Hacking and SANS DC 2005 ********************
SANS Washington DC (July 28-August 3) has ten immersion tracks for security professionals, sysadmins, auditors, and managers, and five one-to-two day courses ranging from legal issues to worm analysis, plus a vendor expo. Attendees considering DC should also take advantage of the just announced Google Hacking course scheduled for June 23, because it is free if you are attending SANS DC.
Details on Google Hacking Course: http://www.sans.org/ghdc2005*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: HP's Openview Radia Management software can be used to remotely and centrally manage software updates, patches, and configuration on a number of UNIX and/or Windows systems. This software contains a server component, Radia Notify Daemon, which accepts and executes commands. This server component contains two stack-based buffer overflows that can be exploited by an unauthenticated attacker to execute arbitrary code with SYSTEM/root privileges. The discoverer's posting shows how to craft a malicious request. Note that this vulnerability may lead to an enterprise-wide compromise, and hence should be patched on a priority basis.
Status: HP has confirmed the flaws and released the patches. Block the ports associated with Radia management software at the network perimeter to minimize the possibility of attacks originating from the Internet. The port list can be found at: http://forums1.itrc.hp.com/service/forums/questionanswer.do?admit=716493758+1117
758920597+28353475&threadId=846369
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: qmail is the second most popular SMTP server (next to the sendmail) used on the Internet. qmail reportedly contains vulnerability in its handling of overlong command arguments. The flaw arises due to a "signed integer" issue in the commands.c file. The qpopup/qpop3d, the POP3 server, also contains a buffer overflow that can be triggered by an overlong username. The discoverer reports that the flaws can be exploited to execute arbitrary code with "root" privileges. Proof-of-concept scripts have been publicly posted. Note that the rating is "MODERATE" as only qmail installations with a very specific configuration are affected.
Status: qmail has not released any fixes yet.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Hummingbird InetD provides Windows based PCs with services offered by a typical UNIX workstation. This software is bundled with a variety of Hummingbird products but is not installed by default. The InetD FTP server contains a buffer overflow that is triggered by overlong FTP command arguments. The InetD LPD server also contains a buffer overflow that is triggered by a large amount of data. These flaws may be exploited by attackers to execute arbitrary code with SYSTEM privileges on the machines running Hummingbird software, which is used by many enterprises.
Status: Hummingbird has released fixes for both the flaws.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Nortel VPN routers contain a denial-of-service vulnerability that can be triggered by an IKE packet with a malformed ISAKMP protocol header. Internet Key Exchange (IKE) packets are exchanged during setting up a VPN connection for negotiating encryption algorithms and encryption keys. This flaw, when exploited, causes the VPN router to reboot most of the times; in some cases a manual intervention is needed to restart the router. Since the VPN routers are typically Internet facing and IKE uses port 500/udp, an attacker can employ spoofed packets to exploit the flaw. The discoverer has not posted the exact nature of the ISAKMP header that causes a crash.
Status: Nortel has confirmed and released software update version 5.05_200.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4356 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.