We found three new sets of vulnerabilities at the last moment, in very widely used systems, and included them in this issue: (1) BIND vulnerabilities, (2) Cisco Multiple DoS Vulnerabilities (including VOIP), and (3) Juniper JunOS DoS.
Some interesting new data on training: the six most popular courses in information security over the past six months:
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** Sponsored by SANS First Wednesday Webcasts **************
What is the future of spam prevention? And how has it changed over the years? Please join us on Wednesday, February 02 at 1:00 PM EST (1800 UTC) as SANS presents: Spam Prevention: Past, Present and Future Featuring: Hal Pomeranz. Hal is one of the nation's most respected security professionals and teachers, and founder and CEO of Deer Run Associates, a systems management and security consulting firm. You may register for this webcast at https://www.sans.org/webcasts/show.php?webcastid=90550
*************************************************************************
Part I is compiled by the security team at TippingPoint (www.tippingpoint.com) as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Sun Java Plug-in technology, a part of the Java Runtime Environment (JRE), enables applets on websites to run in a user's browser. The Java Plug-in contains a vulnerability in handling JavaScript code that may be exploited to bypass an applet's access restrictions. A malicious applet, when loaded into Internet Explorer, can leverage the flaw to read and write files as well as execute applications on the user's system. Note that applets are automatically downloaded and executed in typical Internet Explorer configuration (medium security setting for Internet Zone). Hence, the flaw can be exploited by simply viewing a malicious webpage or an HTML email. The technical details required to construct a malicious applet have not yet been posted.
Status: Sun confirmed. Upgrade to version SDK/JRE 1.4.2_01 or 1.3.1_13. Although the flaw is fixed in 1.4.2_01, it is better to upgrade to 1.4.2_06 that fixes another non-critical vulnerability in the Sun Java SDK/JRE.
Council Site Actions: Most of the reporting council sites are not running the affected software. Of the sites that are running affected versions, several sites have notified their support staff and plan no further action. The remaining few sites are in the process of patching their systems.
Description: (a) Cisco CME and SRST solutions are embedded in Cisco IOS and offer call processing for IP phones. The IP phones can be controlled by the Cisco IOS device using Skinny Call Control Protocol (SCCP). The IOS contains a vulnerability in processing SCCP packets that can be exploited via specially crafted SCCP packets to cause the IOS device to reload. Therefore, the vulnerability can be exploited to disrupt a VoIP network. If the Cisco IOS configuration contains "telephony-service" or "call-manager-feedback", the IOS device is vulnerable. A workaround is to block the port 2000/tcp depending upon the location of IP phones being controlled by the IOS device. (b) Cisco IOS devices configured to process IPv6 packets contains a vulnerability that can be triggered by specially crafted IPv6 packets. The flaw can be exploited to cause the router to reload. If the output of the command "show ipv6 interface" is non-empty, the device is vulnerable. (c) MultiProtocol Label Switching technology enables routers to process packets at higher speeds as the routing decisions are based on smaller labels generated from the packets' IP header. Cisco IOS devices that can support MultiProtocol Label Switching are vulnerable to a denial-of-service attack via the interfaces, which are not configured for MPLS. A specially crafted packet can disable the affected interface for minutes. Note that the attacks can originate only on the router's local network thereby reducing the attack avenues. A workaround for this vulnerability is to enable MPLS globally on the IOS device. Note that technical details showing how to construct malicious packets that can exploit these vulnerabilities have not been publicly posted.
Status: Cisco confirmed, patches available for all the denial-of service flaws.
Council Site Actions: Most of the reporting council sites have at least a few affected systems. One site has already patched their systems and one site does not plan to patch specifically for the Call Processing vulnerability. The remaining sites plan to patch in the near future during a regularly scheduled system update process. One site also commented they implemented a workaround but did not provide details.
Description: Juniper routers running JunOS contain a vulnerability that can be triggered by specially crafted packets. The flaw can be exploited by an unauthenticated remote attacker to severely disrupt a Juniper router's normal functioning. No technical details about the nature of packets that can trigger this flaw are publicly available. Note that according to Juniper, firewall rules cannot be employed to protect against this vulnerability; hence, patching is necessary.
Status: Juniper has released updates. Refer to the Juniper Advisory PSN-2005-01-010 (available only to the registered users.)
Council Site Actions: Due to late breaking nature of this vulnerability, we were unable to solicit council site input for this item.
Description: ISC BIND, a very widely deployed DNS server, contains the following vulnerabilities: (a) Versions 8.4.4 and 8.4.5 contain a buffer overflow in the array that is used to track the nameservers and addresses previously queried. An attacker can potentially overflow the array via crafted DNS packet(s) and crash the nameserver. (b) DNS Security Extensions (dnssec) provide data authentication and integrity for DNS data. Version 9.3.0 configured with dnssec (not a default configuration) contains a vulnerability in the "authvalidated" validator function. An attacker can cause the nameserver daemon to exit (stop) via crafted DNS packets. Note that although no proof-of-concept exploits have been currently posted, it is easy to obtain the technical details to create the PoC exploits by comparing the fixed and the vulnerable source code. Hence, administrators running the vulnerable BIND servers should patch these flaws on a priority basis.
Status: ISC has released patches for both the vulnerabilities.
Council Site Actions: Most of the council sites are not running Bind 8 or the vulnerable configuration of Bind9 (DNSEC validation enabled). Several sites are still investigating if they are vulnerable.
Description: It is reported that the MS05-001 patch for the HTML Help Cross Domain vulnerability (rated "HIGH") does not offer complete protection for Windows XP SP1 and Windows 2000 SP4 systems. The flaw can still be exploited on these systems patched with MS05-001. The researchers have not publicly posted technical details or proof-of-concept code yet. A workaround is to set the kill bit for the HTML Help ActiveX control. The CLSID for the affected ActiveX control: {41B23C28-488E-4E5C-ACE2-BB0BBABE99E8}. Another possibility is upgrading XP systems to XP SP2.
Council Site Actions: All council sites are still waiting for a patch from Microsoft. Several sites commented they do not plan to implement the workaround. One site is investigating the impact if they do implement the workaround.
Description: A gatekeeper in a H.323 VoIP (voice-over-ip) network controls the clients and performs various functions like symbolic name to IP translation, call authorization, call control signaling etc. OpenH323 gatekeeper, based on openH323 code, is being used worldwide (e.g. in Singapore, Germany, and Indonesia) by commercial organizations. This gatekeeper contains a buffer overflow in "socket" handling that may be exploited to cause a denial-of-service and/or possibly execute arbitrary code in certain configurations. The technical details about the flaw have been publicly posted. Taking control of the gatekeeper or causing a denial-of-service to the gatekeeper may result in disrupting an entire VoIP network.
Status: Vendor confirmed, upgrade to version 2.2.1. An alternative is to block port 1720/tcp at the network perimeter.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Ethereal is a very popular open source network sniffer and protocol analyzer for UNIX and Windows platforms. The software contains a buffer overflow vulnerability in parsing the X11 (X windows) protocol. This buffer overflow can be exploited to execute arbitrary code with the privileges of the ethereal process (typically "root" when ethereal is being used as a sniffer). To exploit the flaw, an attacker has to either inject the malicious packets into the network traffic being sniffed by ethereal, or entice a client to open a specially crafted packet capture file. The technical details can be obtained by comparing the fixed and the vulnerable version of the ethereal code. Note that any network applications based on ethereal protocol decoder modules may also be affected.
Status: Vendor confirmed, upgrade to version 0.10.9. This version also fixes other denial-of-service or memory corruption vulnerabilities in parsing COPS, DLSw, Gnutella, DNP and MMSE protocols.
Council Site Actions: Only five of the reporting council sites are responding to this issue. All of these sites said they have either a very limited install base or the software is unsupported. Several sites plan to notify the affected users and recommend a timeframe for them to update. One site has already patched their affected systems. The final site does plan to patch in the future but has not established a concrete time scale.
Description: Tikiwiki, a content management system, contains a remote PHP code execution vulnerability. An authenticated attacker can load arbitrary PHP files in the "$tikiroot/temp" folder, and execute arbitrary code on the PHP server. The flaw has been exploited to take control of at least one web server.
Status: Vendor confirmed, patches available. A workaround is to inhibit the parsing of php files in the "temp" folder.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4036 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.