Sophos, Dameware, and Novell Mail users should read this issue. All readers might also want to warn your users about email scams involving the hurricane. http://www.washingtonpost.com/wp-dyn/content/article/2005/08/31/AR2005083102574_
pf.html
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ SECURITY TRAINING UPDATE **********************
Network Security 2005 is definitely still on. It will be moving from New Orleans to one of two cities, and we'll let you know Tuesday which city.
San Jose is filling quickly so if you want to attend the SANS Silicon Valley program, please register in the next week or two.
For a complete list of security training programs see www.sans.org
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Solaris contains a vulnerability in handling DHCP responses. The problem arises due to an error in the "net-svc" script, and the flaw can be exploited by an attacker running a malicious DHCP server to obtain "root" privileges on Solaris systems. Although it is easy to spoof DHCP responses, since the protocol is UDP-based, the attacker would need to be on the same subnet as the vulnerable hosts for a higher probability of success. The technical details required to leverage the vulnerability have not been posted.
Status: Sun confirmed, patches available. Block ports 67/udp and 68/udp at the network perimeter as a workaround.
Description: The technical details of a buffer overflow in Sophos antivirus, PureMessage and MailMonitor products discussed in a previous issue of the @RISK newsletter have been publicly posted. The heap-based overflow exists in the routine that processes Visio files, and can be triggered by setting certain length values in the file headers. Exploiting the mail gateways is easy, as it does not require any user interaction. Users of Sophos products should apply the patches made available earlier last month. The antivirus library is also embedded in products sold by more than 20 vendors, and updates should be applied to any products listed at: http://www.sophos.com/partners/oem/
Status: The vendor has confirmed. Version 4.5.4 contains a fix for this problem for all platforms and Version 3.96.0 on selected platforms contains the fix as well.
Council Site Actions: The reporting council sites that have the affected software in use do so on only a handful of systems. Their support department does not provide support for this software so no action is planned. They assume the users will upgrade to a corrected version on their own.
Description: Dameware is a lightweight program used to remotely manage Windows NT/2000/XP/2003 desktop systems. The Dameware daemon, which listens on port 6129/tcp by default, contains a buffer overflow vulnerability in a section of code responsible for processing username. The flaw can be exploited remotely by unauthenticated attackers to execute arbitrary code with the privileges of the Dameware application. Exploit code has been posted publicly. Note that worms like Agobot/Phatbot have exploited previous overflows in this application.
Status: Upgrade to version 4.9. Block the port 6129/tcp at the perimeter.
Council Site Actions: Council sites using the affected software have notified the users as their only action at this time.
Description: Novell Netmail, an email and calendaring system, contains a heap-based overflow in its IMAP server. An IMAP command argument length can be specified prior to sending the actual command argument. This overflow can be triggered by passing a crafted command argument length. A remote unauthenticated attacker can exploit this flaw to execute arbitrary code with the privileges of the IMAP server.
Status: Novell has confirmed the flaw and released fixes.
Description: HP has supplied workarounds for the Openview Network Node Manager remote command execution vulnerabilities. HP has released patches for the previously discussed Java applet and Java Web Start vulnerabilities as well.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4499 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.