One hundred and thirty nine more vulnerabilities found this week. Someone wrote asking whether the big numbers reflect worse programming or more people looking for them. Both, probably. But the main people who should feel bad are the department chairs of computer science departments who believe that secure programming isn't worth putting into the core curriculum.
Security vendors Symantec and TrendMicro had particularly bad vulnerabilities this week.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************** SPONSORED BY THE SCADA SECURITY SUMMIT *******************
Registration just opened: http://www.sans.org/scadasummit06/ Every utility and process manufacturing organization should have a team at the Summit. Teams are coming from several countries. One large manufacturer is sending a team of 20 engineers and security people. Sessions on new technologies that are just being proven, measuring SCADA security, the actual threat, and the future of process control security.
http://www.sans.org/scadasummit06/
*************************************************************************
*************************** SPONSORED LINKS *****************************
1) Come to SANS 2006 (Orlando in February) 16 major tracks, 12 special courses, a large exposition. And great networking opportunities: http://www.sans.org /sans2006"> http://www.sans.org /sans2006
2) Earn your Master of Science in Information Security Engineering at SANS.EDU - preparing the Top Guns to fight the next phase of cyber crime. http://www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Symantec anti-virus products contain multiple heap-based buffer overflows in the "Dec2Rar.DLL" library that is responsible for scanning RAR archives to detect viruses. The overflows can be triggered by RAR archives with specially crafted "sub-block" headers, and exploited to execute arbitrary code. The technical details including a disassembler output has been publicly posted. Note that for compromising gateway and server products sending a malicious email is sufficient i.e. no user-interaction is required.
Status: Symantec is working on getting the patches ready. A workaround, in the meanwhile, is to disable RAR processing on the anti-virus products. Such a configuration, however, will also let RAR-compressed viruses go undetected.
Council Site Actions: All reporting council sites are awaiting confirmation from the vendor. Some sites have notified their system support group of the issue. One site commented that if a patch is not release before an exploit, they will disable RAR scanning.
Description: TrendMicro ServerProtect products are designed to provide real-time protection from viruses, Trojans and other malware for Microsoft, Linux or Novell-based servers. The Management Console, which allows a remote web-based administration of these products, contains multiple buffer overflows. These flaws can be triggered by "chunk-encoded" HTTP POST request to "isaNVWRequest.DLL" and "relay.DLL" scripts, and exploited to execute arbitrary code with possibly "SYSTEM" privileges. Additionally, a flaw exists in the ServerProtect EarthAgent daemon that can be exploited to cause a denial-of-service. By sending a TCP packet containing the magic string "\x21\x43\x65\x87" to port 5005, an attacker can cause the ServerProtect process to consume 100% of the CPU time. The technical details have been publicly posted.
Status: Vendor has acknowledged all vulnerabilities. No patch available for the buffer overflows. A hotfix is available for the DoS issue. Workarounds are to prevent access to the ServerProtect Management Server as well as to the port 5005/tcp from the Internet.
Council Site Actions: Only one of the reporting council sites is using the affected software. They have notified their system support group and are awaiting patches from the vendor.
Description: Eudora Qualcomm's WorldMail is an enterprise-grade email and messaging server solution. This server contains buffer overflows in handling IMAP commands such as "AUTHENTICATE" and "LIST". An unauthenticated attacker can trigger these flaws by sending overlong command arguments ending with a string of "}" characters. The overflows can be leveraged to execute arbitrary code on the server with "SYSTEM" privileges. Exploit code has been publicly posted.
Status: Vendor has not confirmed, no patches available.
Council Site Actions: Only one of the reporting council sites is using the affected software. They have notified their system support group and are awaiting patches from the vendor.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4741 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.