Firefox, Netscape and Mozilla browsers have a critical vulnerability this week. (#1)
A question about value: If @RISK is important to the security of your organization, please let us know how you are using it. (apaller@sans.org)
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************* Sponsored by Permeo Technologies ******************
FREE SSL VPN Buyer's Guide
Need help selecting a SSL VPN solution ideal for your environment? Download security analyst Mark Bourchard's latest buyer's guide. You'll get expert advice on how to evaluate SSL VPN technology including a list of features to look for and implementation best practices. Download a copy today!
http://www.permeo.com/info/sans_bestpractices.asp
************************ Sponsored Links: *******************************
1) Don't be found non-compliant! Free white paper details compliance requirements for computer forensic capability. http://www.sans.org/info.php?id=876
*************************************************************************
Part I is compiled by Dinesh Sequeira (dinesh_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process Archives at http://www.sans.org/newsletters/risk
Part I is compiled by Dinesh Sequeira (dinesh_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: International Domain Names' (IDN) are domain names, or web addresses, represented by local language characters, utilizing non-ASCII characters. Browsers like FireFox, Netscape, i.e Gecko (web browser layout engine) based browsers are vulnerable to a heap based buffer overflow when parsing certain IDN encoded URI's. An attacker could entice a user to view an HTML document with a malformed hyperlink, containing a long string of ONLY Unicode "soft hyphens" (U+00AD or hex AD) as the domain name in the URI and thus cause a DoS or execute arbitrary code on the affected system.
Status: Mozilla Foundation has issued a patch and also has a quick fix by manually configuring the browser to disable IDN.
Council Site Actions: The reporting council sites using the affected software plan to distribute the patch during their next regularly scheduled system update process or remove Netscape 7.x from their desktops since they recently implemented an ActiveX filtering solution and no longer need an alternate browser on their desktop.
Description: Oracle Reports, a component of Oracle Application Server and Oracle E-Business Suite, provides an enterprise class reporting tool, and has a feature called "lexical references". A "lexical reference" is a placeholder for text that you embed in a SELECT statement. Generated Oracle Reports are vulnerable against SQL Injection if lexical references are used without input validation. An attacker can add a parameter to the URL used to execute an Oracle Report, which causes a HTML window to appear. It is then possible to replace clauses appearing after SELECT, FROM, WHERE, GROUP BY, ORDER BY, HAVING, CONNECT BY and START WITH. PoC code is available. NOTE: This issue is not a bug in Oracle Reports itself. It is a problem of missing input validation in all generated Oracle Reports.
Status: No patch is available. It is necessary to validate all parameter values in every report before the SQL statement is executed in an After-Parameter-Form-Trigger.
Council Site Actions: This item came in too late to ask for feedback from Council sites.
Description: Cacti is a linux network graphing solution that helps create graphs from database information. Due to improper sanitization of a user supplied input parameter to 'graph_start' in the 'graph_image.php' script, a remote attacker could execute arbitrary commands on the webserver hosting the vulnerable software. The postings have PoC code, and exploits are available.
Status: Download the latest version that is availble at the vendor's website.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: NOD32 AntiVirus System is a Anti-virus program for Windows, Unix/Linux, Novell and mail servers like MS Exchange, and Lotus Domino. A vulnerability exists due to an error in handling ARJ archives containing compressed files with an overly long filename. When a specially crafted ARJ archive is scanned it would cause a heap-based buffer overflow, and could allow arbitrary code execution.
Status: Update to the latest version available online at vendor's website
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: PHP-Nuke is a news automated system specially designed to be used in Intranets and Internet. Multiple SQL injection vulnerabilities are present as input to the "name", "sid", and "pid" parameters in "modules.php" via a POST request are not properly sanitised before being used in a SQL Query. Succesful exploitation could lead to compromise of the application. Poc code is available.
Status: No patch is available
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Cisco CSS 11500 Series Content Services Switch is a modular high end switch for Web infrastructure. A vulnerability exists when client authentication using SSL certificates is enabled AND SSL encryption is performed. The target device may fail to properly renegotiate the SSL session, causing an attacker to bypass client certificate authentication and thus allow access to protected content without authorization.
Status: Patch and a workaround are available at vendor's website.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4499 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.