@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************ SECURITY TRAINING UPDATE **********************
SANS wireless security classes were again sold out this month. You can still get a seat in "Assessing and Securing Wireless Networks" in San Jose at the end of September. Also in San Jose you will find a special evening program on wireless assessment tools that all San Jose students may attend. The other top rated SANS classes and instructors will be there, too: Securing Windows, Hacker Techniques, SANS Security Essentials Bootcamp, SANS® +S Training Program for the CISSP® Certification Exam and a dozen more. Plus a great exposition of effective security tools. More information: http://www.sans.org/siliconvalley2005/
For a complete list of security training programs see www.sans.org
*************************************************************************
Description: The Cisco IOS firewall feature is designed so that network administrators can apply security policies on a per user basis rather than associating the policies with the user's IP address. The Firewall Authentication Proxy for FTP and Telnet intercepts these protocol packets and allows access only to authenticated clients. The FTP and Telnet Authentication proxy contains a buffer overflow that can be triggered by specially crafted user credentials. The flaw can be exploited by an unauthenticated attacker to cause a vulnerable router to reload. A sustained attack can result in a DoS to the network accessed via the targeted IOS device. It may even be possible to exploit the flaw to execute arbitrary code on the IOS device thereby obtaining a complete control.
Status: Cisco has issued fixed IOS versions. Use the 'show ip auth-proxy conf' command to check if a particular router is running the FTP/Telnet proxy. A workaround is to disable FTP/Telnet proxy authorization and use HTTP/HTTPS proxy authentication instead.
Description: Barracuda Networks Spam Firewall is an appliance designed to protect an email server from spam, virus and phishing attacks. This appliance contains a remote command execution vulnerability in its "img.pl" script. The problem occurs because user input to this script's "f" parameter is not sanitized for "|"(pipe) character. Examples of malicious HTTP requests have been posted.
Status: Upgrade to firewall firmware 3.1.18
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.