@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** SPONSORED BY SANS SECURITY TRAINING ********************
A few words from SANS students:
"An awesome class! Loaded with practical, in-depth knowledge and focused. Useful and downright scary tools that are pure oxygen. Should be a required baseline for any network or security professional." Brian Viglione, DirecTV
"I've attended SANS on and off since 1998 and it keeps on getting better... Classes stay current and evolve with the industry needs." Joe Dietz, Qwest
"Can't say enough good things about the instructor. Best teacher I have ever had from any teaching facility yet! Great information, great presentation!" Daniel Shafer, Bonfils Blood Center
Schedule of upcoming classes: www.sans.org
************************************************************************
Part I is compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: PHP is a package installed on a large number of web servers and used by multiple content management and bulletin board software packages. If "register_globals" directive is on, an attacker with permissions to upload files to the web server can overwrite PHP "GLOBALS" array. This can lead to execution of arbitrary PHP code. The discoverers have reported that PHP code based on Pear-PHP and vBulletin is vulnerable.
Status: PHP has released version 4.4.1 for PHP4. The new version also fixes a cross site scripting vulnerability. A workaround is to disable the "register_globals" option.
Description: phpBB is a widely-used bulletin board software package. Reports indicate that phpBB security checks that unregister the global variables can be easily bypassed in multiple ways. Additionally, the software contains several improperly initialized variables. These flaws could allow an attacker to execute arbitrary PHP code. Note that the Santy worm targeted similar vulnerabilities in this software last year. The posted advisory includes complete technical details.
Status: phpBB 2.0.18 has been released.
Description: A researcher recently described a heap-based overflow flaw in IOS IPv6 processing that could be exploited to execute arbitrary code on a vulnerable Cisco device. Specifically, the arbitrary code execution was reported to be plausible when the operating system timers executed the instructions in the overwritten heap memory. The Cisco patch enhances the general IOS security by minimizing the probability of arbitrary code execution via OS timers. Hence, this patch should be applied to all IOS devices.
Status: Cisco has made patches available for 12.0 as well as 12.2 IOS trains. Note that no new vulnerability in Cisco IOS has been announced. Cisco has already issued patches for the IPv6 processing flaw.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4622 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.