@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored by NetIQ **************************
Discover how NetIQ Security Manager can aid your organization in complying with the log collection and analysis requirements within recent regulations and standards. Download this whitepaper now. http://www.netiq.com/products/sm/whitepapers.asp?origin=SANSNS082405
*************************************************************************
Security Training Update
"SANS is the ultimate security training program. It is the most intensive and informative security training available -- a must have for infosec professionals." (Aaron Despain, TriWest Healthcare)
Scheduled SANS training programs over the next three months in: Boston, New York, Whippany NJ, Baltimore, Virginia Beach, Herndon VA, Orlando, New Orleans, Chicago, Dallas, Los Angeles, San Jose CA, Portland OR; Ottawa, Barcelona, Vancouver, Amsterdam.
Details: http://www.sans.org
*************************************************************************
********************* Sponsored Link ************************************
1) Dicar Networks provides a cost effective vulnerability assessment tool designed by Barbedwire Technologies to prevent and manage network vulnerabilities. Request a Vulnerability Assessment Datasheet at http://www.sans.org/info.php?id=854
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: CA message queuing software provides applications with a "store and forward" messaging framework. This software, a component of many CA products, contains a buffer overflow. The flaw can be exploited to execute arbitrary code on the affected CA product. The software also contains a spoofing flaw that can result in execution of arbitrary commands. Since the affected products include tools that manage high-value resources, like management and backup systems, this flaw should be patched immediately. Further technical details about how to trigger the vulnerabilities are not available at this time.
Status: CA has released patches.
Council Site Actions: Sites running this software report that they plan to address the flaw during their next regularly scheduled system update process.
Description: HP Openview Network Node Manager (NNM) is designed to provide fault management for large networks. The NNM, if configured, can be accessible via HTTP on port 3443/tcp by default. This web server contains remote command execution vulnerabilities in "ConnectedNodes.ovpl", "cdpView.ovpl", "freeIPaddrs.ovpl" and "ecscmg.ovpl" scripts. The flaws can be exploited by passing a "|" character in the parameters to these scripts to execute arbitrary commands on the NNM server.
Status: HP has been contacted, no patches available yet. A workaround is to block the port 3443/tcp at the network perimeter.
Description: HAURI ViRobot family of products is designed for protecting desktops, mail gateways and file servers from various viruses. (a) The anti-virus engine contains a stack-based buffer overflow that can be triggered by a specially crafted ACE archive containing a compressed file that has a filename longer than 272 characters. If the compressed file scanning is enabled, this overflow can be exploited to execute arbitrary code on the system running ViRobot. Note that for exploiting the mail gateways delivering a malicious e-mail message is sufficient i.e. no user interaction is required. (b) The software contains a directory traversal vulnerability that can be exploited to write arbitrary files (for example in the "Startup" folder on Windows) on the system running ViRobot. The problem occurs because, while a compressed archive is scanned, the files are copied to a temporary directory; However, the filenames are not checked for "../" sequences. The flaw can be leveraged only if the option to scan a compressed archive is enabled.
Status: HAURI has released patches. Note that scanning of compressed archives is typically enabled on mail gateways.
Description: elm and mutt are still widely used e-mail readers on UNIX systems. elm contains a buffer overflow in parsing the "Expires" header in an e-mail whereas mutt contains a buffer overflow in the function that handles attachment decoding. A malicious e-mail may exploit these flaws to execute arbitrary code on a user's system when the user opens his mailbox. Exploit code for elm has been posted. A proof of concept code is available for the mutt issue.
Status: elm confirmed, upgrade to version 2.5 PL8. mutt has not confirmed; an unofficial patch has been included in the discoverer's posting.
Council Site Actions: Reporting council sites are using the affected software on only a few systems. The affected users have been advised to obtain and install the appropriate patches and updates.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4484 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.