Unpatched flaws reported in both Internet Explorer and Oracle this week. (#1 and #2 below). There's a workaround for the Oracle flaw; Firefox may be the workaround for the IE flaw. Plus more reason to ensure your Cisco Call Manager is patched (#7). Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Security Training News******************************
1) SANS@HOME: Live courses with SANS best teachers - without leaving your home or office - amazingly effective and satisfying. Hacker Techniques, Auditing, Forensics, SANS Security Essentials, and Firewalls all start within the next week or two. Sign up today at www.sans.org
2) SANS Network Security 2005 in New Orleans (October) just opened for registration http://www.sans.org/ns2005
3) SANS Silicon Valley (September) just opened for registration. 12 tracks and a vendor exposition. http://www.sans.org/siliconvalley2005/
Why Attend SANS Training Instead of Less Effective Courses? "SANS reminds me of 'The Matrix'. You can take the blue pill and go on happily thinking your network is safe, or you can take the red pill and find out what the computer world is really like. This class is the red pill, and if it doesn't drive you insane in the process, you will leave better prepared to handle the real world of security." (Shawn Wenzel, Par Pharmaceutical)
*************************************************************************
************************* SPONSORED LINK ********************************
1) Twelve Intrusion Prevention Systems (IPS) are tested and evaluated. Find out which one is selected as the SC Magazine "Best Buy"? http://www.sans.org/info.php?id=833
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Internet Explorer reportedly contains memory corruption flaws in its JPEG image parser. A security researcher has publicly posted a set of JPEG images that crash IE, when IE attempts to render them. The images were designed via "file fuzzing", a technique that involves substituting JPEG image sections with their malformed counterparts. The researcher further reports that one of the flaws could be exploited to execute arbitrary code (not confirmed).
Status: Microsoft has not confirmed, no updates available.
Council Site Actions: All reporting council sites are waiting on confirmation and a patch from Microsoft. The will most likely deploy the patch during one of their regularly schedule system update processes.
Description: Oracle Reports, a component of Oracle Application Server, provides an enterprise class reporting tool. The Oracle Reports contains following vulnerabilities: (a) an attacker can overwrite any files on the Application server via an HTTP request that contains a specially crafted "desname" parameter. The attack may be carried out by an attacker with limited privileges. (b) An attacker with privileges to upload a reports executable to the Oracle Application Server can execute arbitrary commands on the server, and compromise the server. The Oracle Forms Service, a component of Oracle Application Server, also contains a command execution vulnerability that can be exploited by an attacker with the privileges to upload a Forms executable. The technical details required to exploit these flaws have been posted.
Status: The researcher reports that he contacted Oracle before releasing the 0-day vulnerabilities. Oracle has neither confirmed the flaws nor provided any patches. A workaround to prevent attacks on typical Oracle Application Servers from the Internet is to block the ports 7778/tcp and 7779/tcp at the network perimeter. The discoverer has also posted URL filtering workarounds (links in the references).
Council Site Actions: Most of the reporting council sites are waiting on a confirmation and patch from Oracle. Several sites commented that they are already blocking the vulnerable ports at their network security perimeters. One site also commented that the large number of recent Oracle alerts has created a backlog in their patch evaluation process. They plan to wait until a patch is released for this vulnerability and then bundle them all together for QA.
Description: Remote Desktop Protocol (RDP) helps create a virtual session with a Windows desktop that can be used to access all the data and the applications residing on the desktop. Microsoft's RDP protocol implementation contains a denial-of-service vulnerability that can be triggered by a malformed RDP packet. In addition to Microsoft, eEye researchers have also confirmed that the flaw cannot be exploited to execute arbitrary code. The technical details about how to trigger the DoS are not public; however, SANS has reported an increase in the scanning activity for the port 3389/tcp. Note that RDP service is not enabled by default on Windows systems except on XP Media Center edition.
Status: Microsoft is aware of the issue and has published an advisory. No patches available yet. Block port 3389/tcp at the network perimeter to prevent any attacks from the Internet. Disable RDP service if not required.
Description: Winamp, a popular media player, contains an overflow in processing MP3 files. The overflow can be triggered by an MP3 file containing overlong "ID3v2" tag such as the "ARTIST" or "TITLE", and exploited to execute arbitrary code on the client system. The researcher has reported that although the flaw is difficult to exploit due to an internal check in the program, he has been able to execute code on Windows 2000 SP0 and XP systems. The technical details have been included in the discoverer's posting.
Status: Winamp to release a fixed version soon.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Sybase EAServer is an open application server for running business critical applications. This server contains a stack-based overflow that can be triggered by passing an overlong parameter to the "TreeAction.do" script, and exploited to execute arbitrary code with the privileges of "jagserv" process. The script requires authentication privileges; however, the default installations of EAServer have "jagadmin" userid set to a blank password.
Status: Sybase has confirmed the flaw and released patches. Administrators of this server should change the blank password for jagadmin userid, if they have not done so after the installation.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Exploit code has been publicly posted for the "CRITICAL" rated Microsoft Color Management Module overflow discussed in the last @RISK newsletter.
Council Site Updates: All of the reporting council sites have either already installed the patch or will be during their next regularly scheduled system update process.
Description: The details regarding how to trigger the DoS vulnerability (discussed in the last week's newsletter) in Cisco Call Manager have been posted. The discoverer reports that issuing a series of HTTP requests to port 2000/tcp (used for Skinny protocol) causes the Call Manager to restart. Enterprises using Cisco Call Manager should patch on a priority basis to avoid any VoIP service interruption.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4430 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.