Many smaller organizations relied on Novell for security through obscurity (STO) - hoping no one would find the flaws. Now the millions of users of Novell eDirectory iMonitor have learned that STO doesn't work for ever. The risk from this programming error is an enterprise-wide compromise and loss of all unencrypted data. (#1)
Also a critical vulnerability was discovered in another back-up product - - EMC Legato and Sun StorEde that uses Legato. The full contents of your back ups are at rsik. (#2).
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******************** Sponsored by SurfControl ***************************
Test your defenses! Can you build a bullet-proof email security system? Try our network simulator and set up our ultra-powerful e- mail appliance, RiskFilter, to fight spam, viruses, spyware and other blended and emerging threats - even protect outgoing email. It's fun. It's challenging. Put your security skill to the test. Logon now. http://www.surfcontrol.com/go/XRFN4
*************************************************************************
Security Training Update "SANS is the ultimate security training program. It is the most intensive and informative security training available -- a must have for infosec professionals." (Aaron Despain, TriWest Healthcare)
Scheduled SANS training programs over the next three months in: Boston, New York, Whippany NJ, Baltimore, Virginia Beach, Herndon VA, Orlando, New Orleans, Chicago, Dallas, Los Angeles, San Jose CA, Portland OR; Ottawa, Tokyo, Barcelona, Vancouver, Amsterdam. Details: http://www.sans.org
*************************************************************************
************************ Sponsored Links ********************************
1) Learn how Security + Network = Business Control with QRadar Attend a FREE online demo. Register today! http://www.sans.org/info.php?id=847
2) Solve remote connectivity and security problems. FREE Top 10 Malware Protection Techniques for Remote Access Connections. http://www.sans.org/info.php?id=848
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Novell iMonitor provides monitoring and diagnostic capability for Novell eDirectory, a multi-platform directory service with millions of installations worldwide, via HTTP. iMonitor server, that listens on port 8008/tcp by default, is automatically started along with the eDirectory services on Windows platforms. This server contains a stack-based buffer overflow that can be triggered by an overlong URL. The flaw can be exploited by an unauthenticated attacker to execute code on the eDirectory server with "SYSTEM" privileges. Exploit code has been included in the Metasploit exploit tool.
Status: Novell has confirmed the flaw; fixes are available. A workaround is to block the port 8008/tcp at the network perimeter. The flaw should be patched on a priority basis as compromising an eDirectory server can lead to enterprise-wide compromise.
Description: EMC Legato Networker backup solutions are designed to deliver centralized data protection and management across heterogeneous environments. Sun StorEdge and Solstice backup products package the EMC Legato Networker software. These products use "AUTH_UNIX" authentication mechanism for RPC calls. This mechanism is known to be weak, and an attacker can easily spoof the RPC messages such that they appear to have been sent by a privileged user. Hence, the flaw can be exploited by the attacker to modify the configurations of the backup servers, execute arbitrary code on the backup clients or view the contents of the backed up files. In addition, an unauthenticated attacker can execute arbitrary commands on the backup servers with "root" privileges by modifying the access tokens for the software's underlying database.
Status: Sun and EMC have issued patches that should be applied on a priority basis. Firewalling high TCP/UDP ports in the range 7937-9936 is a workaround which may not be practical.
Description: Internet Explorer contains a heap memory corruption flaw while loading "msdds.dll" as an ActiveX object. This vulnerability is similar to the earlier reported ones involving many DLLs for which patches MS05-037 and MS05-038 were issued. A malicious webpage can exploit the flaw to execute arbitrary code on a client system with the privileges of the logged-on user. The vulnerable DLL is not installed by default on all Windows systems; SANS has identified a list of software that can potentially install this DLL - Visual Studio .NET 2002/2003, Microsoft Office, Project, Access and Visio. Note that even if MSDDS.DLL is not installed on a user's machine, an attacker can force its download via the "codebase" attribute while instantiating the ActiveX object. However, the download would require user interaction. Exploit code has been publicly posted.
Status: Microsoft has issued an advisory with various workarounds. One way to resolve the issue is to set the kill bit for the MSDDS.DLL. The CLSID of this DLL is EC444CB6-3E7E-4865-B1C3-0DE72EF39B3F. Instructions for setting kill bit for an ActiveX control are available at: http://support.microsoft.com/kb/q240797/ . Alternatively, download the kill bit utility provided by Intelguardians at http://isc.sans.org/msddskillbit.php.
Council Site Actions: All reporting council sites are waiting for official word and a patch from Microsoft. One site will consider setting the kill bit if fix is not in the August patch bundle or if this starts being exploited on a wide-scale basis.
Description: Apple released a cumulative security update for Mac OS that fixes over 33 vulnerabilities. The important vulnerabilities fixed include buffer overflows in the Directory Service, processing rich text/Microsoft Word file formats, Kerberos service, MySQL, OpenSSL, servermgrd, X11 and zlib. The update also fixes vulnerabilities in Safari browser that can lead to execution of arbitrary code on users' systems. The discoverers have not posted the technical details about many of the flaws.
Status: Apply the Apple Cumulative Update (version 1.1) to both server and client systems. Version 1.0 of this update breaks 64-bit applications.
Council Site Actions: One site has already scheduled the push of the update and another site is currently testing Update 2005-007 version 1.1 which fixes the 64-bit code break problem.
Description: PHP XML-RPC library is designed for writing clients and servers in PHP that can make remote procedure calls via XML using HTTP as the transport protocol. The PHPXMLRPC and Pear XML_RPC libraries are used by a number of projects including TikiWiki, Drupal, b2evolution, phpmyfaq, PostNuke, phpgroupware, phpAdsNew, phpPgAds, Nucleus, eGroupware, phpGroupware, phpWiki and BLOG: CMS. The libraries contain a vulnerability that leads to arbitrary PHP code execution on the web server. The flaw arises due to mishandling of nested XML tags. No technical details that could lead to exploit code development have been posted yet.
Status: PHPXMLRPC and Pear XML_RPC have released updated libraries.
Description: Adobe Acrobat and Reader contain a buffer overflow in one of the default plug-ins. A malicious PDF file may exploit the overflow to execute arbitrary code on a users' system. The flaw may be exploited without any user interaction as browsers like Internet Explorer, Mozilla and Firefox can open PDF documents automatically. No technical details that could lead to exploit code development have been posted yet.
Status: Adobe found the flaw and has released updates. Adobe offers an automatic update facility for certain versions which should be enabled.
Council Site Actions: One site is currently in the process of updating their systems. Two other sites will address it during their next regularly scheduled system update process.
Description: Exploit code has been posted for the buffer overflow in Novell ZENWorks software suite used for managing desktops, laptops, servers, handheld devices, etc. in a large enterprise.
Council Site Updates: No response from council sites on this item.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4475 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.