This was such a huge week for critical new vulnerabilities (thanks mainly to Microsoft) that it took an extra day to gather all the data on what to do about the vulnerabilities.
And these are not new types of vulnerabilities. Here's an example from number 6 (MS05-048): "This issue is due to a failure of the library to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer."
The security community has an enormous responsibility to help persuade the application development community to learn to write safer code. Most of them really want to know how to write secure code but have never had the opportunity to learn how to do that. If you haven't let your application developers know about the Writing Secure Web Applications course for Developers, please do. The course outline is posted at http://www.sans.org/webapp_baltimore
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************************** Sponsored Links: ****************************
1) Learn from security analyst Mark Bouchard how to leverage SSL VPN to achieve the fastest and most secure remote access. Download his latest whitepaper today. http://www.sans.org/info.php?id=893
2) Don't be found non-compliant! Free white paper details compliance requirements for computer forensic capability. http://www.sans.org/info.php?id=894
*************************************************************************
Part I is compiled by Dinesh Sequeira at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Microsoft DirectShow is an architecture for streaming media on the Microsoft Windows platform and provides for capture and playback of multimedia streams. It supports a wide variety of formats, including MPEG, AVI, MP3 and Wav. DirectShow is integrated with DirectX technologies. A buffer overflow vulnerability exists in Microsoft Windows DirectX component when processing AVI (Audio Visual Interleave) media files. An AVI file contains multiple streams of different types of data - audio/video streams. Due to lack of validation a malformed streamname chunk 'strn' with a specifically chosen length field causes a memory modification. This could be exposed through applications that employ DirectShow to process avi files. Successful exploitation will permit execution of arbitrary code in the context of the user who opens the malicious avi file.
Status: Vendor has released patches.
Council Site Actions: All reporting council sites are responding to this item; however, their patch deployment schedules vary. Some sites have already started to update their systems or will in the next 24 hours. Other sites are still in the Q&A phase and will deploy on an expedited schedule as soon as testing is complete.
Description: The Microsoft Distributed Transaction Controller (MSDTC) provides a method for disparate processes to complete atomic transactions. The Transaction Internet Protocol (TIP) is a two-phase commit protocol to enable heterogeneous Transaction Managers to agree on the outcome of a distributed transaction. TIP is one the ways that the MSDTC service can be accessed. The MSDTC service is part of a standard installation on all Windows platforms. This Microsoft bulletin contains 4 vulnerabilities: (a) MSDTC Vulnerability: The MSDTC service is an RPC interface. It suffers from a buffer overflow vulnerability that can be exploited and cause remote code execution. The MIDL_user_allocate function always allocates a page of memory, but an input string larger than that size will cause a buffer overflow. MSDTC listens on port tcp/3372 and a high dynamic port and is enabled by default on Windows 2000. This issue has the potential to turn into a worm on windows 2000 systems. It has been reported that a proof of concept is available for this issue. (b) COM+ Vulnerability: COM+ is a next step after COM and MTS (Microsoft Transaction Server) and handles resource management tasks, such as thread allocation and security. A vulnerability exists in the process used to create and use memory structures. On windows 2000 an anonymous attacker could try to exploit this vulnerability. (c) MSDTC TIP DoS Vulnerability: A DoS exists because of a flaw in processing responses from foreign servers. A certain command sequence can be sent to the DTC service that causes the DTC service to throw an exception and crash, resulting in a DoS attack. (d) MSDTC Packet Relay DoS Vulnerability: A DDoS vulnerability specifically exists because the TIP protocol accepts a remote IP address and port number for a connection. The attack can be performed by connecting to the MSDTC server and providing an identifier that contains the IP address and port number to flood. The attacker can force an error after a specific sequence of commands and cause the MSDTC service to connect to the target IP and port. The MSDTC service will continue to make connections to that host and port and stall resulting in a DDoS.
Status: Patches are available. As a workaround, you can block port tcp/3372 at the perimeter.
Council Site Actions: All reporting council sites are responding to this item; however, their patch deployment schedule varies. Some sites have already started to update their system or will begin in the next 24 hours. Other sites are still in the Q&A phase and will deploy on an expedited schedule as soon as testing is complete. One council site said they were contacted by their MS sales account manager to be sure they new about the problem.
Description: Internet Explorer contains a heap-based overflow when certain DLLs are instantiated as ActiveX controls. This update sets the "kill bit" for 40 similar ActiveX controls associated with DLLs. This update also includes a kill bit for the ADODB.Stream object. Multiple exploits targeting the "ADODBStream" and msdds.dll have been publicly posted.
Status: Vendor has released patches. As a workaround, "kill bit" can be set in the registry.
Council Site Actions: All reporting council sites are responding to this item; however, their patch deployment schedules vary. Some sites have already started to update their systems or will in the next 24 hours. Other sites are still in the Q&A phase and will deploy on an expedited schedule as soon as testing is complete. One site commented that much Q&A is needed before the development teams will accept a new version if IE. This site plans to implement filters for ActiveX controls.
Description: Windows Plug and Play service is designed to provide device management and notification. This service is started by default on all Windows 2000/XP/2003 systems, and is reachable remotely via "ntsvcs" named pipe on ports 139/tcp or 445/tcp. This service contains a stack-based buffer overflow that can be triggered by malformed RPC messages to certain functions, resulting in arbitrary code execution with "SYSTEM" privileges. Windows 2000 systems are critically affected as any anonymous user can connect remotely to this service and trigger the overflow. Windows XP and 2003 systems require user authentication before the overflow can be leveraged.
Status: Apply the patch referenced in the Microsoft Security Bulletin MS05-047. A workaround is to block ports 139/tcp and 445/tcp at the network perimeter. Note that the Zotob worm exploited a similar vulnerability in the PnP service in August 2005. Systems that are patched with MS05-039 cannot be exploited remotely by anonymous users.
Council Site Actions: All council sites are responding to this item and plan to deploy the patch during their next regularly scheduled system update process. A few sites have already pushed this patch. A few sites have already installed the Zotob patch on their systems as protection against the exploit.
Description: This bulletin covers three vulnerabilities. Two of them are in .lnk files and the third in Web View. (a & b) Windows Shell is prone to a remote code execution vulnerability when handling a malicious shortcut (.lnk) file. An .lnk file points to another file providing a "shortcut" to that program. These files contain properties that are passed on to the target program. The vulnerability is due to the way Windows handles certain properties associated with .lnk files. An attacker can exploit this issue by crafting a malicious .lnk file and placing it on a Web site or sending it to a user through email followed by enticing them to open or preview the file. (c) The third vulnerability is an "Web View script injection vulnerability". WebView gives the user the look-and-feel of a web-browser when viewing file and folder information. A vulnerability exists in the process used by Windows Explorer to validate HTML characters in certain document fields when in WebView.
Status: Vendor Patches are available
Council Site Actions: All council sites are responding to this item and plan to deploy the patch during their next regularly scheduled system update process. A few sites have already pushed this patch.
Description: Microsoft CDO is susceptible to a remote buffer overflow vulnerability. This issue is due to a failure of the library to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue presents itself when an attacker sends a specifically crafted email message to an email server utilizing the affected library. This issue allows remote attackers to execute arbitrary machine code in the context of the application utilizing the library.
Status: Vendor patches are available.
Council Site Actions: All council sites are responding to this item and plan to deploy the patch during their next regularly scheduled system update process. A few sites have already pushed this patch.
Description: Client Services for Netware (CSNW) or Gateway Service for Netware provides a Windows workstation with basic file, printer and directory services to Netware. There is a buffer overflow on the RPC interface of certain functions. A remote attacker can exploit this vulnerability to execute arbitrary code and completely compromise the computer.
Status: Vendor Patches are available. CSNW is not enabled by default. Status: Apply the patch referenced in the Microsoft Security Bulletin MS05-039. A workaround is to block ports 139/tcp and 445/tcp at the network perimeter. Note that last year's Sasser worm exploited a similar vulnerability in the LSASS service.
Council Site Actions: All reporting council sites are responding to this item. Some are deploying the patches at the same time as the other MS update. Other sites will deploy this patch during their next regularly scheduled system update process. One site said they would be uninstalling from whatever systems this might still be hanging around on.
Description: Microsoft Windows FTP client is reportedly prone to a directory traversal vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied input. A remote attacker may place files in an arbitrary location on a vulnerable computer.
Status: Vendor has released patches.
Council Site Actions: All reporting council sites are responding to this item; however, their patch deployment schedules vary. Some sites have already started to update their systems. Other sites are still in the Q&A phase and will deploy during their next regularly schedule system update process.
Description: Kaspersky Anti-Virus Engine is a virus scanning engine for Windows and Linux that is incorporated into vendor's mail gateways and host-based anti-virus products. Scanning a malformed CHM files causes a heap overflow due to a vulnerability in the CHM file parser within the KAV engine. On Linux platforms this disables anti-virus functionality and could lead to infected hosts and remote code execution. On Microsoft platforms, the anti-virus will fail to scan any files, allowing infected files to get through but remote code execution is not possible.
Status: Vendor has released a patch.
Council Site Actions: Only one of the reporting council sites is using the affected software and only then on a small number of systems. They are not attempting to identify the affected systems, but will assist the system users in converting to their supported anti-virus software if they wish. Their users are also able to obtain the Kaspersky update and install it on their own.
Description: Peter Winter-Smith of NGSSoftware has discovered high risk vulnerability in Sun Directory Server. This flaw can permit an unauthenticated attacker to remotely compromise the Directory server. Details will only be released by NGSSoftware after 3 months.
Status: Vendor has a patched version available.
Council Site Actions: Only one of the reporting council sites is responding to this item. They will address in an extended schedule due to the need for extensive Q&A.
Description: phpWebSite is a web site content management system. It is prone to a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. Proof of concept code and an exploit have been posted.
Status: Vendor patch is available. Port 13722/TCP can be blocked as a workaround.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: VERITAS NetBackup software, allows organizations to rapidly recover data via a broad range of backup and snapshot technologies and centrally manage all aspects of backup and recovery operations to provide consistent data protection policies across the enterprise. A remote format string vulnerability exits in the Java user-interface authentication service, bpjava-msvc, running on Veritas NetBackup servers and agents. The format string flaw is within the bpjava-msvc daemon's 'COMMAND_LOGON_TO_MSERVER command Remote attackers could compromise the server and execute arbitrary code by crafting a malformed request that contains format specifiers. No exploit or proof of concept is available.
Status: Patch is available from the vendor.
Council Site Actions: Two of the reporting council sites are using the affected software. One site plans to deploy the patch during their next regularly scheduled system update process. The second site is currently assessing whether they have the bpjava-msvc service enabled and accessible from un-trusted locations.
Description: PHP-Fusion is a lightweight Content Management System (CMS) written in PHP. It is easily extensible via plug-ins (fusions) which makes it a flexible and versatile Web Application. Vulnerabilities exist due to improper sanitization of user supplied input to the "activate" and "cat_id" parameters in "register.php" and "faq.php" respectively. The software is vulnerable to a SQL Injection attack that may allow attackers to create, delete, insert and modify database records or execute system commands on behalf of the database user. Successful exploitation requires that "magic_quotes_gpc" is disabled.
Status: Patched in version 6.00.110
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: University of Washington's IMAP Server (UW-IMAP) is a popular free IMAP/POP service for Linux and UNIX systems and is distributed with various Linux distributions. A buffer overflow vulnerability exists due to improper bounds checking on user-supplied data while parsing IMAP mailbox names. Mailbox names are copied to memory when a '"' character is encountered and continue till another '"' character is found. If only one '"' character is supplied the function will continue to copy bytes, overflowing the stack buffer. Networks that restrict IMAP access to authenticated users are at low risk, but IMAP servers used for free webmail systems could be compromised and result in remote code execution.
Status: Vendor patch is available.
Council Site Actions: Only one of the reporting council sites is using the affected software and then only on a limited number of Linux systems. Their systems will receive updates as packaged by the Linux vendor.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4517 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.