@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********************** Sponsored by SANS Webcasts ***********************
Please join us for the SANS Tool Talk Webcast, "The Security Pager is Sounding - Can You Respond? How to Build an Effective Incident Management Program" Tuesday, November 29 at 1:00 PM EST (1800 UTC/GMT) https://www.sans.org/webcasts/show.php?webcastid=90665
*************************************************************************
************************** Security Training Update: ********************
"SANS has the answers to real-life problems and can fill in the education gaps that on the job training causes." Carol Templeton, Univ. of Tennessee
SANS 2006 brochures have started arriving in mail boxes. More immersion training tracks than ever before. Plus many new short courses for people who already have mastered their areas of security. A big security tools exposition. And Orlando in February is great.
Details: http://www.sans.org/sans2006/
SANS training at home or at your place of employment or in other cities: www.sans.org
"With SANS training, leading industry professionals share the latest knowledge and practices that work for them - you can not get this information anywhere else!" Douglas K Shamlin, US Navy
"I can not believe how much I learned in 6 days!" Kenny Johnson, US Air Force *************************************************************************
Part I is compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Google sells search appliances that allow customers to apply Google's powerful searching and indexing technologies to their own networks. The web interface module contains a flaw in the processing of the "proxystylesheet" parameter. This parameter is used to specify a custom XSLT stylesheet to apply in the web interface. By specifying a remote URL in the parameter, a user can cause the appliance to read a stylesheet from an untrusted host. A specially-crafted stylesheet can execute arbitrary Java methods on the appliance, including executing trusted system calls and malicious code. It is possible to gain remote administrative access through this flaw, giving complete control of the appliance to the attacker. A Metasploit exploit module has been written for this vulnerability and is widely available.
Status: Vendor confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Internet Explorer contains a flaw in the handling of the Window() JavaScript function. A user visiting a malicious website that calls this function from a <body onLoad> tag is vulnerable to a denial-of-service attack or to remote code execution. This vulnerability has been known for some time, and documented in CVE-2005-1790. It was initially thought that this vulnerability could only result in the denial-of-service condition, and could not be used for remote code execution. However, it was recently discovered that remote code could be inserted, given the right conditions. A proof-of-concept exploit has been released and is widely available.
Status: Vendor confirmed, no patch available.
Council Site Actions: Most of the council sites are awaiting a patch and further information from the vendor. One site noted that Javascript for the Internet zone in IE has been disabled
Description: Novell NetMail is an enterprise-grade groupware server that includes IMAP functionality. The IMAP server component contains a flaw in the processing of certain commands supplied by remote users. By passing extremely long arguments to these commands, an attacker can trigger a buffer overflow in the service, and insert malicious code. An attacker must have valid login credentials to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The Cisco 7920 IP Phone is a wireless phone handset that provides transparent voice access over an IP network. These phones tend to be widely deployed in enterprise campus environments. The IP phones ship with a hardcode SNMP read-write community string. Any user that can access the phone via SNMP can read, alter, or erase the configuration stored on the device. This allows for phone number disclosure, denial-of-service conditions, and can affect emergency service numbers. Additionally, the phone contains an unsecured debugging port on UDP port 17185. Any user that can access the phone on this port can immediately access the phone's internal operating system's debugger. This allows the user to arbitrarily alter the configuration of the phone or create a denial-of-service condition.
Status: Vendor confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: MailEnable is an enterprise-level mail server solution providing email access over a variety of protocols. The IMAP server component of MailEnable is vulnerable to a buffer overflow in a number of commands. By specifying an overly-long "mailbox" parameter to certain commands, the buffer overflow is triggered and an attacker can cause a denial-of-service condition or execute malicious code. Note that the attacker must have valid login credentials to exploit this vulnerability.
Status: Vendor confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4669 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.