Good News 1: A very light week for vulnerabilities (that we can all use after the extreme volume of critical vulnerabilities over the past few weeks.)
Good news 2: The early registration deadline for SANS2005 has been extended to March 7. See details of the nation's largest security training program (San Diego, April 5- 13) at http://www.sans.org/sans2005
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
***************** This Issue Sponsored by Sourcefire ********************
Sourcefire, the creators of Snort, offers a comprehensive training curriculum that provides the Open Source Snort community with vendor neutral training on Building and Operating Snort and Snort Rules. Learn to use Snort effectively - understand the powerful technology and the rules that make it work. Register before March 31st and receive a 10% discount. http://www.snort.org and http://www.sourcefire.com
*************************************************************************
************************* Sponsored Links *******************************
(1) ALERT: Google Hacking/Web Application Worms- Are You Vulnerable?- WebInspect Product Trial http://www.sans.org /info.php?id=727"> http://www.sans.org /info.php?id=727 (2) From SANS: Turbo charge your security technology expertise with a SANS immersion training program. Program scheduled locally in more than 40 cities: See http://www.sans.org for cities and schedule and course list.
*************************************************************************
Part I is compiled by Rohit Dhamankar (rohitd_at_tippingpoint.com) at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Arkeia is a commercial network backup software that runs on a variety of platforms including AIX, FreeBSD, HP-UX, IRIX, Debian, Mandrake, RedHat, SuSE, SCO, MacOS, NetWare, OpenBSD, Solaris, Tru64 Unix, and Windows NT/2000. The backup software is being used by many enterprises around the world in US, Australia, Germany, France, UK etc. The software contains the following vulnerabilities: (a) The Arkeia backup client, which runs on port 617/tcp by default, contains a stack-based buffer overflow in processing request number 77. An unauthenticated attacker can exploit the overflow to execute arbitrary code with "root"/"SYSTEM" privileges. Exploit code has been posted for various platforms including RedHat Linux, Windows 2000/XP/2003 and Mac OS. Note that by exploiting this vulnerability an attacker can potentially compromise all the machines in a network being backed up. (b) In the client's default configuration, any user, who can initiate a connection to the backup client, can read/write arbitrary files. The problem occurs because the default username/password for connecting to the client is "root". Overwriting critical files (such as "/etc/shadow" or "/etc/passwd" on a Unix hosts) can lead to a complete compromise of the system running the Arkeia software. Exploit code for this flaw has been included in the Metasploit project.
Status: Vendor confirmed, patches available. Note that Appendix B in the Arkeia network backup user manual describes the steps to configure restricted access to the client and the server. A workaround is to block access to the port 617/tcp at the network perimeter to prevent attacks originating from the Internet. According to SANS incidents.org, scanning activity has been increasing to locate the vulnerable Arkeia backup systems.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: A large number of Trend Micro anti-virus products contain a heap-based buffer overflow vulnerability. The overflow can be triggered by a malicious ARJ (a compression format) archive. An unauthenticated attacker can compromise any client or server running the vulnerable Trend Micro product by delivering a malicious ARJ archive via email or web. The technical details regarding how to craft a malicious archive file can be found in the vendor's advisory.
Status: Vendor confirmed, upgrade to scan engine VSAPI 7.510 or higher. As an interim measure prior to patching, ARJ scanning can be disabled.
Council Site Actions: Due to the late breaking nature of the problem, we were unable to solicit any council site input.
Description: HP HTTP Server, a component of HP's web-enabled management software for Windows NT/2000/2003, contains a buffer overflow. The flaw can be triggered by a specially crafted input parameter in an HTTP request, and potentially exploited to execute arbitrary code. The technical details regarding how to craft HTTP requests to exploit this overflow are not available yet.
Status: HP has provided a fixed version 5.96. A workaround is to block traffic to the HP's web server (default port 2301/tcp).
Council Site Actions: Only two of the reporting council sites are running the affected software. One is staging the new version on affected severs and still evaluating whether this update should go sooner than the next scheduled system update process. The other believes it has 10 or fewer installations of this software if it is enabled by default on some types of equipment (e.g., PC servers) purchased from HP. They are investigating whether this software was shipped to them, and left enabled by any system administrator at their site.
Description: pMachine, a web hosting software, reportedly contains PHP remote file include vulnerability. The flaw can be triggered by passing arbitrary input to the "pm_path" parameter used by pMachine's "mail_autocheck.php" script. An attacker can exploit this flaw to execute arbitrary PHP code on the web server running pMachine. The posted advisory shows how to construct a malicious HTTP request.
Status: Patch not available yet. A workaround is to turn the PHP "register_globals" directive off.
Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary.
Description: Exploit code has been released for the heap overflow flaw (discovered in August 2004) in the Cfengine's RSA authentication module. Note that an unauthenticated attacker can exploit the flaw to obtain root privileges. A workaround is to block the port 5308/tcp at the network perimeter.
Council Site Actions: The affected software is in use at one Council site. They believe the software was patched months ago.
Description: Apple has released a security update for the security bypass vulnerability reported in Sun J2SE/JRE version 1.4.2 in November 2004. A malicious applet may exploit the flaw to execute arbitrary code on the client system with the privileges of the logged-on user.
Council Site Actions: Five of the reporting council sites provided updates for this item. Three of them will be distributing the patch during their next regularly scheduled system update process. The fourth site does not plan to take action. The fifth believes the Software Update facility already patched the software.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4080 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2005. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.
To subscribe, at no cost, go to https://portal.sans.org where you may also request subscriptions to any of SANS other free newsletters.
To change your subscription, address, or other information, visit http://portal.sans.org
Copyright 2005. All rights reserved. No posting or reuse allowed, other that listed above, without prior written permission.