@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ Sponsored by Q1 Labs ***************************
In the fight against worms, hacking, spyware and data theft, you need a situational threat awareness that covers your network completely and continuously. You must also demonstrate compliance with audit and regulatory requirements. Managing these functions across large networks grows more difficult - unless you have a single, integrated solution that tells you exactly what you need to know:
Attend a FREE online demo. Register today! http://www.q1labs.com/news/monthly.html *************************************************************************
********************* SECURITY TRAINING NEWS ****************************
1) Finally, an online security training program that works and that is interesting and alive. SANS Security Essentials is available now; Hacking Exploits and Incident Handling will be ready soon. You get to hear the instructor teaching SANS exclusive classroom materials, see the visuals, read the course books and text, hands on cookbook and CD and built in assessment and practice exams, so you know you are preparing well for the certification exam. For SANS On-Demand details, email: ondemand@sans.org
2) On-site programs training is the security training available if you have 25 or more people who can participate. The classes are customized; the discussions are uniquely valuable to solving the problems your organization faces, and the instructors are still the best in the world. SANS@WORK details: http://www.sans.org/atwork
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: ClamAV is an open-source antivirus software designed mainly for scanning emails on UNIX mail gateways. The software includes a virus scanning library - libClamAV. This library is used by many third party email, web, FTP scanners as well as mail clients. The library contains three integer overflows that can be triggered by specially crafted TNEF (Microsoft Rich Text), CHM (Microsoft Help) and FSG (Packed Executable Format) files. The attacker can send the malicious files via email, web, FTP or a file share, and exploit the heap-based overflows to execute arbitrary code on the system running the ClamAV library. The technical details can be obtained by comparing the fixed and the affected versions of the software. Note that for compromising the mail/web/FTP gateways no user interaction is required.
Status: The vendor has released ClamAV 0.86.2 to address these issues. Please look for third party updates for the software linked to libClamAV.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Veritas NetBackup and Backup Exec software offer a backup and recovery solution for mid to large size enterprises. The software runs an NDMP service on port 10000/tcp. This service reportedly contains a denial-of-service that can be triggered by a "CONFIG" message with malformed timestamp. According to the discoverer, the flaw may be further exploited to execute malicious code (not confirmed). A proof of concept is expected to be posted soon.
Status: Vendor has not confirmed, no patches are available. Block port 10000/tcp at the network perimeter to protect this service.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The discoverer of a DoS vulnerability in Oracle Database server has reported that the flaw has not been fixed for version 9iR2 in the July 2005 Critical Update. The update fixes the flaw only in version 10g. Oracle is working on back porting the update. Note that database user privileges are required to leverage the DoS flaw.
Council Site Actions: Only one of the reporting council sites is using the affected software. They are relying on their existing network perimeter controls until the vendor releases a patch.
Description: fetchmail is a mail retrieval and forwarding utility for UNIX systems and supports all versions of POP and IMAP protocols. fetchmail's POP3 protocol handling contains a stack-based buffer overflow that can be triggered by an overlong "UIDL" command response. A malicious POP3 server can exploit the flaw to execute arbitrary code with the privileges of the fetchmail process potentially root. Note that in configurations downloading mailboxes of multiple users, fetchmail typically runs with root privileges. An attacker would need to either entice a user to download mail from his malicious POP server, or compromise a POP server to launch a successful attack.
Status: Upgrade to version 6.2.5.2. Don't upgrade to 6.2.5.1 that was originally released to fix this overflow as this version introduces a DoS flaw.
Council Site Actions: Only one of the reporting council sites are using the affected software. They have a very small population of fetchmail users and will ask them to apply the appropriate patches.
Description: Ethereal is a popular open source network sniffer and protocol analyzer for Unix and Windows platforms. The software contains format string or buffer overflow vulnerabilities in parsing multiple network protocols. These flaws can be exploited to execute arbitrary code with the privileges of the ethereal process (typically "root" when ethereal is being used as a sniffer). To exploit these flaws, an attacker has to either inject the malicious packets into the network traffic being sniffed by ethereal, or entice a client to open a specially crafted packet capture file. The technical details can be obtained by examining the fixed code. Note that any network applications based on ethereal protocol decoder modules may also be affected.
Status: Vendor confirmed. Upgrade to version 0.10.12. In addition, this update fixes the zlib buffer overflow vulnerability discussed in a previous @RISK newsletter.
Description: NGSSoftware has posted the details regarding how to craft a packet to exploit the remote command execution vulnerability in HP's Radia Management Portal software. Note that this vulnerability may lead to an enterprise wide compromise as the Radia Management portal is used to centrally manage a large number of systems.
Description: At the 2005 BlackHat Conference (held in Las Vegas) a researcher presented a paper describing how to exploit the heap memory overflows in Cisco IOS to execute arbitrary code. This work extends the research posted in a previous Phrack issue. Note that no new vulnerabilities were disclosed; hence up-to-date patching of Cisco routers is sufficient to protect against such attacks.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4442 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.