Another critical problem with Computer Associates software. An earlier (2005) CA BrightStor backup software flaw is being actively exploited in substantial attacks.
A great quote from this week's SANS Washington security training week. One of the folks in the Securing Wireless class said "This is the first course I have ever been to that, at the end of *every* day. I want to rush back to the office to implement what I learned." That's also the SANS promise - you'll be able to put what you learn to work - in every SANS course - immediately when you return to work. You have two big training week opportunities coming up: New Orleans, San Jose, and smaller ones in New York, Ottawa, Long Beach, Virginia Beach, Tokyo, and Barcelona - all in the next 3 months. See http://www.sans.org for details. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored by SurfControl ***************************
Test your defenses! Can you build a bullet-proof email security system? Try our network simulator and set up our ultra-powerful e-mail appliance, RiskFilter, to fight spam, viruses, spyware and other blended and emerging threats - even protect outgoing email. It's fun. It's challenging. Put your security skill to the test. Logon now. http://www.surfcontrol.com/go/XRFN4
**************************************************************************
*************************** Sponsored Link ******************************
1) Learn how Security + Network = Business Control with QRadar Attend a FREE online demo. Register today! http://www.sans.org/info.php?id=840 **************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Computer Associates BrightStor ARCserve Backup products provide backup services for Windows, NetWare, Linux and UNIX. The backup agent running on Windows that is responsible for backing up MS-SQL, Oracle, SAP and Exchange server data contains a stack-based buffer overflow. The overflow can be triggered by simply sending an overlong string (over 3168 bytes) to port 6070/tcp. The flaw can be exploited to execute arbitrary code with "SYSTEM" privileges. Multiple exploits have been posted and increased scanning for port 6070/tcp has been seen in the wild. Administrators running this product on critical databases should apply the fix immediately.
Status: CA has issued fixes for all the affected products. A workaround is to block the ports 6070/tcp and 6050/tcp at the network perimeter. Port 6050/tcp has been listed as affected in the vendor advisory.
Council Site Actions: Two of the reporting council sites responded to this item. One site is planning to distribute the patches during their next regularly scheduled system update process. The other side is using Brightstor products, but not the affected agent. Thus, no action was necessary on their part. Special Note: CA backup products have been reported to contain multiple vulnerabilities this year. SANS recommends that you block all the ports that are opened by the software, at the network perimeter. A list of the ports to block may be found at: http://www.ca.com/at/local/partner/techtalk_mar05_faq.pdf http://supportconnectw.ca.com/public/ca_common_docs/brightstorwinxpsp2matrix.asp
Description: This vulnerability in the Cisco IOS can be exploited to cause a denial-of-service or potentially execute arbitrary code on a device running a vulnerable version of the IOS. The flaw can be triggered by a malformed IP version 6 packet that must originate from the same subnet as the vulnerable device. In addition, the device must be specifically configured to allow IPv6 traffic. ISS X-Force has claimed that it has verified exploitation using link-local addresses. This implies that the vulnerability is potentially triggered by malformed ICMPv6 packets. No further technical details have been posted.
Status: Cisco has released IOS updates for all the affected versions.
Council Site Actions: Only three of the reporting sites are using IPv6 at this point. One site is still in pre-development evaluation and plans to update patches during the next standard update process. The second site is using IPv6 in lab environments. They are running a scan of their lab space to determine whether any of the lab devices are configured for IPv6. Any IPv6 devices discovered will be updated to the latest version of IOS. The third site updated all their affected devices on August 1st.
Description: Jabber is an open-source protocol mainly used for instant messaging. jabberd, the Jabber server for Unix systems, reportedly contains multiple buffer overflows in processing JID (jabber ID). An attacker can provide an overlong username, hostname or resource to trigger the overflows, and exploit the flaws to possibly execute arbitrary code on the jabber server. An example of a malicious message has been posted by the discoverer.
Status: Vendor confirmed, upgrade to version 2.0s9. If Jabber is used only internally in an organization, block the port 5222/tcp at the network perimeter.
Description: Oracle and HP have made available the July 2005 critical patch update for "Oracle for Openview" customers. The critical patch updates fixes multiple vulnerabilities in the Oracle products.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4453 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.