WebSphere from IBM has a substantial vulnerability (See #1) that could cause numerous web servers to be compromised. Also, any site that has not installed the patch in Microsoft's MS04-007 (from last year) is probably being hit by the new worm described in #5 below.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************* This Issue Sponsored by hold NetIQ ************************
Sarbanes-Oxley Compliance Whitepaper
Get the best practices you require to maintain proper internal control frameworks as you strive to meet Sarbanes-Oxley requirements with NetIQ's free whitepaper, "Meeting Sarbanes-Oxley IT Control Requirements with NetIQ." You'll learn how to dramatically reduce your time and effort spent auditing, reporting on, and controlling essential areas such as policies, file access rights, provisioning and change control.
Download this FREE whitepaper now.
http://www.netiq.com/f/form/form.asp?id=2529&origin=NS_SANS_061005
*********************************************************************
Extraordinary New Security Training Programs: www.sans.org
*********************************************************************
*************************** Sponsored Links **************************
1) AirWave's RAPIDS software automatically detects unauthorized rogue wireless access points anywhere on your network. Sign up for a live demo and free evaluation copy! http://www.sans.org/info.php?id=800
2) WebInspect Product Trial: Test For 5,100 Web Application Vulnerabilities http://www.sans.org/info.php?id=801
3) SANS is happy to bring you the latest in our complimentary series
of ISC Threat Update Webcasts. Join us on Thursday, June 16 at 1:00
PM as SANS presents: http://www.sans.org/info.php?id=802
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: IBM WebSphere Application Server is popularly used by large e-businesses to create dynamic websites. The administrative console is a web-based graphical tool that can manage a single or a cluster of WebSphere application servers. This console contains a buffer overflow that can be triggered by a specially crafted HTTP authentication request containing unicode characters. The flaw can be exploited by an unauthenticated attacker to execute arbitrary code on the server. Note that the compromise may lead to further compromise of other application servers.
Status: IBM has confirmed and released WebSphere Application Server 5.0.2 Cumulative Fix 11. A workaround is to block the ports 9080/tcp, 9090/tcp and 9043/tcp at the network perimeter. Another workaround is to disable the "global security" option as the flaw exists only when this option is enabled (not a default setting).
Council Site Actions: Three of the council sites are still assessing the level of exposure/threat and determining their timeframe and options for remediation. One council site is only running the affected software on internal systems and plans to deploy the patch during their next regularly scheduled system update process.
Description: A new attack technique named "HTTP Request Smuggling" has been reported to affect configurations that involve one or more web entities (i.e. a web proxy server, a web cache server or a web application firewall) between a user and a web server. The attack can be carried out by crafting back-to-back HTTP requests that are interpreted differently by the web entities. For example, if an HTTP request is crafted with two distinct HTTP "Content-Length" headers, the two web entities may process the same request by honoring either the first or the last "Content-Length" header. The discoverers have shown how an attacker can exploit such behaviors by crafting HTTP requests that may result in web cache poisoning, bypassing the web firewall, cross-site scripting (requiring no user interaction) or session hijacking. The vulnerable example configurations listed in the discoverers' posting include Sun ONE proxy server, Sun ONE webserver, CheckPoint Firewall, Microsoft IIS server, Microsoft ISA server, Apache, Jakarta Tomcat server, IBM WebSphere, BEA WebLogic, Oracle9iAS, Squid, Delegate and Oracle WebCache.
Status: Squid and CheckPoint have distributed patches. The status regarding other vendors is not currently known.
Council Site Actions: Two council sites are still evaluating if they are vulnerable. One site has already patched their system.
Description: Apple has released a security update 2005-006 for Mac OS X client and server systems that fixes a number of vulnerabilities. The major flaws that can be remotely exploited to compromise Mac OS systems and have been fixed in this update are: (a) Multiple vulnerabilities in PHP prior to version 4.3.11 that can be exploited to cause a DoS or execute arbitrary code on a webserver running PHP. (b) A buffer overflow in the implementation of the Apple File Server (AFP) protocol that can be exploited to execute arbitrary code.
Status: Apply the Apple Security Update 2005-006.
Description: An old vulnerability has been rediscovered in the Mozilla and Firefox browsers. This vulnerability permits a malicious website to inject a "frame" into the browser window of another website. For example, the content from http://www.malicious.com can be loaded into another window displaying the content from http://www.mybank.com. The flaw can be exploited by a malicious webpage to spoof its identity as a trusted site. This may lead to stealing sensitive user information such as passwords, or further compromise of the user system. Proof-of-concept browser test tools have been publicly posted.
Status: Mozilla has not confirmed, no patches available.
Description: The discoverers have released the complete technical details for the phpBB vulnerability discussed in a previous @RISK newsletter. The posting shows how a certain URL, for example, can be used to modify registry settings of a phpBB user, who has been enticed to click the crafted URL. The flaw can be exploited to install malware on the unsuspecting phpBB users' systems. Since there are reports that the flaw is being exploited in the wild, phpBB administrators should apply the fix on a priority basis. Please ensure that phpBB files as well as the phpBB database have been updated.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: A variant of RBOT worm is now targeting the buffer overflow in the Microsoft's ASN.1 parser that was patched in MS04-007. The worm is based on the exploit code posted for this overflow in the Metasploit tool. The worm is targeting IIS servers, and downloads an executable via TFTP upon a successful attack. Note that the Metasploit code can also be used to attack Windows installation over SMB (ports 139/tcp and 445/tcp).
Council Site Actions: All reporting council sites patched their systems a long time ago from this vulnerability. One site, in addition, said they are making sure no systems were or are rebuilt without this (old) patch. Their vulnerability management solution makes it easy to search for information like this and their critical systems are scanned once a week.
Description: Exploit code has been released for the buffer overflow in the IpSwitch IMail product's IMAP server. Note that the overflow can be exploited by unauthenticated attackers to execute code with SYSTEM privileges. IMail administrators should apply the hotfix provided by the vendor on an expedited basis.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4372 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end== Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.