Trouble this week with multiple browsers, Apple Macs, and DB2, as well as Computer Associates BrightStor.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
***************** This Issue Sponsored by Radware **********************
Radware Intrusion Prevention Switch protects against worms, viruses, malicious intrusions, Denial of Service attacks and Trojans - securing networked applications at 3-Gbps. Learn more about Radware at the SANS Lone Star 2005 Tabletop Vendor Expo, Houston, TX, March 11, 2005. Download DefensePro whitepaper http://www.radware.com/content/products/dp/whtpaper/_download-20040204b/form.asp
******************* Featured Training Program *************************
Join more than 1,200 security technology professionals in San Diego in early April for one of eighteen tracks of wonderful hands-on, immersion security training. Here's an example of what hundreds of students have written, "SANS is hands-down the best IT Security training in the world. The knowledge and experience of the instructors is second to none." That's why serious security professionals come to SANS - because the instructors are active practitioners -- fully up to date -- and they are the best teachers of security in the United States. For security technologists, auditors, and security managers. Early registration deadline on the 25th of February. Details about SANS2005: http://www.sans.org/sans2005 Or for smaller classes, meet in Houston http://www.sans.org/lonestar05
*************************************************************************
************************** SPONSORED LINKS ******************************
Privacy notice: Sponsored links redirect to non-SANS web pages. (1) Top Layer - 2005 NSS Group "Double Approval" for Rate & Content-based Intrusion Prevention. Report: http://www.sans.org/info.php?id=725
************************************************************************
Part I for this issue has been compiled by Dinesh Sequeira (dinesh_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: The Domain Name System (DNS) specification, as described in the RFC 1034, does not permit the use of any non-ASCII characters for constructing a domain name. International Domain Name (IDN) scheme was specifically developed to support domain names in various languages. Multiple browsers such as Mozilla, Firefox, and Safari have implemented the IDN feature. This feature could be exploited by an attacker to conduct phishing attacks. The problem occurs because a URL with a domain name containing Unicode characters is displayed as an all-ASCII URL (by replacing the Unicode characters with the closest resembling ASCII characters). However, when such a URL is clicked, the content is rendered from the correct international domain name possibly under the attacker's control. For instance, the URL "pаypal.com" is displayed as "www.paypal.com" in the browser. Upon clicking this URL, the content is rendered from "www.xn--pypal-4ve.com" domain name. Note that this trick can also be performed for sites that use secure HTTP. The attacker can obtain a valid certificate for the international domain name so that when a victim visits a spoofed secure site, the victim's browser will still display the secure "lock" icon. Thus, a specially crafted webpage or an HTML email may exploit the IDN feature to conduct phishing attacks i.e. gather sensitive personal information from the users.
Status: Vendors have been contacted. Mozilla has provided the steps for disabling the IDN support. An unofficial Safari plug-in has also been posted that will alert the Safari user when an IDN URL is clicked. A general counter measure is to train the users to not enter any personal information on a webpage visited via clicking a link in an email or another webpage.
Council Site Actions: Only three of the reporting council sites are using the affected software. One site has notified their system support group and will allow them to decide the action. The second site does not plan any immediate action. The third site only supports Mozilla on UNIX system and will update the central version in late February.
Description: Apple Filing Protocol (AFP) enables file sharing across networked Mac OS computers. The protocol serves functions similar to SMB, which is the file sharing protocol in Windows environment. An AppleFileServer, which provides AFP services, contains an integer buffer overflow. The overflow can be triggered by a specially crafted "FPLoginExt" (authentication) request that declares a negative length for the "User Authentication Method" string. An unauthenticated attacker can exploit this flaw to crash the AFP server. Code execution (with root privileges) may be possible but has not been confirmed at this time. Note that the AFP service is not enabled by default.
Status: Apple contacted, no patch available. A workaround is to block traffic destined to the AFP ports 548/tcp and 548/udp at the network perimeter.
Council Site Actions: Only two of the reporting council sites are responding to this item. Both sites plan to distribute the patch or make it available via Software Update once that patch has been released.
Description: NGSSoftware has issued an advisory reporting multiple vulnerabilities in the IBM DB2 database. One of the vulnerabilities can be possibly exploited by an unauthenticated attacker to execute remote code on the database server via a specially crafted network message. No further technical details regarding how to trigger the vulnerabilities have been disclosed. The complete details will be published in May 2005.
Status: IBM has released Fixpak 8 for DB2 UDB 8.1 which addresses the flaws.
Council Site Actions: Only two of the reporting council sites are responding to this item. The first site has notified their system support groups and plans to deploy the patch during their next regularly scheduled system update process. The second site plans to deploy the patches during their next regularly scheduled system update process as well.
Description: Computer Associates BrightStor ARCserve/Enterprise Backup products provide backup services for Windows, NetWare, Linux and UNIX systems. The backup operation on a system is performed by the "universal agent" on the system, which listens on ports 6051/tcp and 6051/udp by default. The "universal agent" for UNIX platforms contains a hard coded username "\x20root\x03" and a password "\x02<%j8U]'~+Ri\x03". Using these credentials an attacker can execute arbitrary commands on the system with the privileges of the agent service, typically root.
Status: Vendor confirmed. Patches are available. A workaround to block attacks originating from the Internet is to block the ports 6051/tcp and 6051/udp at the network perimeter.
Council Site Actions: Two of the reporting sites responded to this item. The first site has a very limited use of the affected application and is in the process of decommissioning it. They are evaluating if action needs to be taken before the affected systems are decommissioned. The second site is not 100% sure they don't have any installations so they plan to scan their network to look for active applications running on the affected port (6051).
Description: A buffer overflow vulnerability has been discovered in the BrightStor ARCserve/Enterprise backup server's "discovery" service. The overflow can be triggered by sending a specially crafted packet over 2048 bytes. The flaw can be exploited to execute arbitrary code on the server with administrative privileges. Note that this issue is distinct from the buffer overflow (on port 41524/udp) discussed in the previous issue of the @RISK newsletter.
Status: Vendor confirmed, patches available. A workaround is to block the port 41523/tcp at the network perimeter. SANS incidents.org reports that scanning for port 41523/tcp is on a rise.
Council Site Actions: Three of the reporting council sites are using the affected software. One site plans to address once a patch is available. The second site has a very limited use of the affected application and is in the process of decommissioning it. They are evaluating if action needs to be taken before the affected systems are decommissioned. The third site is investigating whether the Discovery Service is either enabled by default, or was manually enabled on any system.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4068 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.