A very light week, but be prepared to update Windows and Office tomorrow (Tuesday).
If your security policy denies users access to Peercast and other multi-media software (that are being targeted more and more often by hackers), you'll get better compliance if you use an IPS to enforce your policy. Also LISTSERVE users should update their software to 14.5 well before June. When vulnerability discovers promise to delay publishing details, criminals work hard to find and exploit the vulnerability before the patch comes out.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored Links: ******************************
1) Blue Coat Systems (formerly Permeo Technologies) 10-minutes to endpoint security. In this 10 minute webcast analyst Mark Bouchard, CISSP, discuss tips for protecting information on the endpoint. http://www.sans.org/info.php?id=1065
2) SANS OnSite InfoSec Training Your Location! Your Schedule! Lower Cost! http://www.sans.org/info.php?id=1066
3) Prepare for the June 10, 2006 CISA® Certification examination! The SANS® +S Training for the CISA® Certification Exam course has been specifically written to help prepare for and to pass the CISA® exam while ensuring that the information presented is practical and applicable in daily life.
New SANS@Home session led by James Tarala starts March 23.
See http://www.sans.org/info.php?id=1067
*************************************************************************
Part I for this issue has been compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Peercast is a streaming media server that can run on Windows, Linux and Mac OS X platforms. The server reportedly contains a stack-based buffer overflow that can be triggered by an HTTP request containing overlong parameters. Specifically, passing a string longer than 800 character after the "?" character in a URL causes the overflow, which can be exploited to execute arbitrary code. Exploit code has been publicly posted.
Status: Vendor has released version 0.1217 that fixes the problem. Use IDS/IPS system to block overlong parameters being in an HTTP request to port 7441/tcp (default port).
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. All but one reported that no action was necessary. One site has applied IPS blocking filters for users that are in violation of their policy on these types of servers.
Description: LISTSERV is a popular email management software that can be used to manage email newsletters, discussion groups or announcement lists. The LISTSERV web interface that allows remote web management of the mailing lists contains flaws that may be exploited to execute arbitrary code on the server running the LISTSERV software. The discoverers will post the complete technical details on June 3, 2006.
Status: L-Soft has released version 14.5 to fix the flaws.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Microsoft Visual Studio, a development tool for Windows applications, reportedly contains a stack-based overflow. The overflow can be triggered by a ".dbp" (database project) or ".sln" (visual studio solution) file containing a long "DataProject" name. A malicious webpage, email or a file share can exploit this flaw to execute arbitrary code on a developer's system. Exploit code has been publicly posted. Note that ".dbp" and ".sln" files are not opened automatically.
Status: Microsoft is aware of the issue, no patches available yet. Developers should be cautioned not to open ".dbp" or ".sln" files delivered via web or HTTP from untrusted sources.
Description: Netcool/Neusecure is a security management platform that stores security events and data for an organization. The HTTP interface for the management server stores the back-end database credentials in clear text (can be accessed by viewing the page source). As a result, any unauthenticated attacker can access the back-end MySQL database and compromise the stored security information. The information in the database may also be used to obtain the network topology to launch further attacks.
Status: Vendor notified, no patches available. Restrict access to the back-end MySQL database through the database configuration.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. Most of the council sites reported that no action was necessary. One site will distribute patches to their small number of affected hosts during their next regularly scheduled system update process.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4928 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.