Four critical problems in Veritas back up products merit your immediate attention if you use that popular software suite (#1 below). And on both your children's computers and your own, if you use music and video software from Real (#2 below), click on "Tools" or "Help" and choose "Check for Updates" to get fixes to flaws in that software that could allow Trojans to be placed on your computers.
Also, you have two more weeks to get the early registration discount for SANS largest Washington DC Security training program (July 28 - August 3): http://www.sans.org/washington2005
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored by BindView ****************************
Access control challenges?
Have auditors asked who has access to your critical resources, how they got access and for the business owners to sign off? They will. Find out why this information is critical yet difficult to produce. Equally important, find out how you quickly and easily create it. Download the white paper "User and Group Entitlement Reporting"
https://ocp.bindview.com/Surveys/Main/EventMF.cfm?NUM=1412&AD=NS-AtRisLtrUsGrEnR*************************************************************************
************************* Sponsored Links *******************************
1) Hacking Web Applications- FREE White Paper from SPI Dynamics www.sans.org/info/808
2) The deadline is next week for the only opportunity to have SANS
instructors delivering live classes on-line at your workplace and at
home. You can still sign up for SANS exclusive training program for
CISSP, even though it started Wednesday. The others (Forensics,
Auditing, Hacker Techniques, Security Essentials, and more) start in the
next few weeks.
http://www.sans.org (see SANS@Home)
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Veritas Backup Exec is a backup and restore solution for Windows and NetWare server environments. This software contains the following vulnerabilities: (a) The Backup Agent is installed on all the server systems that are backed up. This agent, that listens on port 10000/tcp by default, uses the Network Data Management Protocol (NDMP) for authentication purposes. The implementation of the NDMP Windows client authentication method contains a buffer overflow that can be triggered by an overlong password. The overflow can be exploited to execute arbitrary code with the privileges of the Backup Agent process, typically domain administrator. The discoverers have posted complete technical details for this flaw. (b) The Backup Exec Web Administration Console (BEWAC) allows remote administration of the media server (the server that is connected to the storage devices and is running the Veritas Backup Engine) via HTTP. The BEWAC runs on port 8099/tcp by default. The Windows installation of BEWAC is reported to contain a buffer overflow that can be exploited to execute arbitrary code. The discoverers plan to post the technical details for this flaw in another 3 months. (c) The Admin Plus Pack Option (introduced in version 9.0 for Windows servers) and the Centralized Admin Server Option allow easy management of multiple backup servers. Such configurations contain a heap-based overflow in the Backup Exec server that can be exploited to execute arbitrary code. The discoverers plan to post the technical details for this flaw in another 3 months. They have also reported that the version 10.x is vulnerable even if the Admin Plus Pack Option has not been installed. (d) The Backup Exec on Windows runs a RPC service listening on port 6106/tcp that allows remote registry access. This service, however, does not check for any user credentials. As a result any unauthenticated attacker can bind to this service and change the registry settings with "Administrator" privileges. This can lead to a complete compromise of the system. The details of how to craft a malicious RPC request have been publicly posted. (e) The Backup Agent also contains denial-of-service vulnerabilities that can be triggered by request packets containing "Error Status" values other than 0 or other specially crafted requests.
Status: Veritas has released fixes which should be applied immediately. A workaround is to block the ports associated with the Veritas agent and server services such as 10000/tcp, 8099/tcp, 6106/tcp etc. at the network perimeter. Note that another buffer overflow vulnerability disclosed in the Backup agent in December 2004 was widely exploited.
Council Site Actions: Two of the council sites are already in the process of patching their systems. One site plans to patch during their next regularly scheduled system update process. Three other council sites are still in the process of assessing the risk and developing a remediation plan. They commented that they will most likely treat this as a high risk. One site commented that they are scanning their network on these ports 8099/tcp and 10000/tcp to gather more information about the affected machine population.
Description: RealNetworks' various media players contain the following vulnerabilities that can be exploited by a malicious webpage or an HTML email to compromise a client system. (a) A specially crafted AVI movie file triggers a heap-based overflow that can be exploited to execute arbitrary code. The problem arises when the "stream format chunk (strf)" size in an AVI file is greater than 1064 bytes. (b) A specially crafted RealMedia file with RealText also triggers a heap-based overflow that can be exploited to execute arbitrary code. The problem arises when the size of the RealText data exceeds 256 bytes. (c) A specially crafted MP3 file can overwrite a local file or lead to execution of an ActiveX control on the client system. This can be exploited to install malware on client systems. The technical details required to leverage this flaw have not been posted yet. Note that systems with RealPlayer configured as the default media player are at a greater risk as the malicious media files may be opened without any user prompting.
Status: RealNetworks has released updates for all the vulnerabilities. Users should be advised to upgrade their player by clicking "Tools" or "Help" menu and then choosing "Check For Updates".
Description: This vulnerability in multiple browsers may allow an attacker to steal sensitive information from users and conduct phishing attacks. The problem arises because a dialogue box opened by using javascript code does not display the original website it belongs to. As a result, an attacker can craft a webpage that opens a trusted webpage and a dialogue box (posting content to the attacker's site), and ask the user to enter his information in the dialogue box. Secunia has posted proof of concept code.
Status: Users should be advised to enter information only in the forms supplied by the original site and not any dialogue boxes.
Council Site Actions: All of the reporting council sites are waiting on confirmation and patches from the vendors. They will most like deploy the patch during one of their regularly scheduled system update processes.
Description: The following software packages reportedly contain PHP remote file include vulnerabilities: Cacti and Bitrix Site Manager. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the webserver hosting the vulnerable software packages. The postings show how to craft the malicious HTTP requests to exploit the flaws. Status: Cacti - Upgrade to version 0.8.6e Bitix Site Manager - Upgrade to version 4.0.9
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4389 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.