@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************** Sponsored By Sourcefire *****************************
Sourcefire, the creator of Snort®, is offering the Open Source Snort community two comprehensive courses: "Snort: Building and Operating" and "Snort Rules."
Purchase both Snort courses either as an instructor-led or 60-day online training bundle and receive a FREE Snort Certified Professional exam (save $395).
For more information: http://www.sans.org/info.php?id=1129
Contact Sourcefire Training at 800.501.6008 or at: http://www.sans.org/info.php?id=1130
********************************************************************************
July 5-13 - Bring your family for the fireworks and stay for SANS largest conference in Washington.
The industry's best security courses - extraordinary faculty; authoritative up-to-the-minute material - shows you how to do the job and gives you the confidence to go back and do it immediately.
"Jacked my paranoia level up around my ears, and then gave me the tools to manage the threat." (Don Geiger, DCPS Division of Technology)
Offers every one of SANS' 17 immersion training courses plus 12 short courses and a big exposition: SANS Security Essentials, Hacker Exploits, System Forensics, Intrusion Detection, Auditing, plus training for CISSP exam and all Technical certification required for DoD 8570 and more. Plus special evening sessions by the global security leaders who staff the Internet Storm Center.
http://www.sans.org/sansfire06/
*************************************************************************
**************************** Sponsored Link: ***********************************
1) Free SANS First Wednesday Webcast this week - "Web Application Security" Wednesday, May 03 at 1:00 PM EDT (1700 UTC/GMT) http://www.sans.org/info.php?id=1131
********************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Firefox reportedly contains a buffer overflow in handling the "iframe.contentWindow.focus()" JavaScript function. A specially crafted webpage can exploit this flaw to execute arbitrary code on a user's system. Proof-of-concept exploit code, which crashes Firefox, has been publicly posted.
Status: Vendor has not confirmed, no patches available yet.
Description: The Domain Name Service (DNS) protocol is one of the fundamental protocols supporting the Internet and a client implementation is virtually found on all networked systems. The DNS server is typically in the DMZ zone for most organizations and is exposed to the Internet. Multiple vulnerabilities have been reported in the DNS protocol implementation of many vendors. The flaws were discovered using the DNS PROTOS test suite that stresses a vendor's client or server DNS implementation by sending malformed DNS requests and responses. Successful exploitation of these flaws may cause a denial-of-service or result in arbitrary code execution on the system/device supporting the DNS protocol. The test suite is not publicly available yet.
Status: Many vendors such as Juniper, MyDNS, pdnsd, Delegate and Axis have confirmed the vulnerabilities and released patches. Other vendors are still testing their products.
Description: A security researcher has reported a flaw in Internet Explorer that can be exploited to install arbitrary programs such as keystroke loggers, adware or spyware on a user's system with minimal user interaction. The problem arises because Internet Explorer contains a race condition in handling "modal dialogs". These dialogs are used to request user input for a security related action such as downloading a program. By exploiting this vulnerability, a maliciously crafted webpage can influence the modal dialog decision and compromise a client system. Exploit code has not been publicly posted.
Status: Microsoft has fixed a particular attack vector for this vulnerability in MS05-054. However, according to the researcher, this patch does not fully address the vulnerability. Microsoft is aware of the flaw. No updates are available yet. A workaround is to set the security settings in Internet Explorer to either "enable" or "disable" rather than prompt. This will prevent opening of modal dialog boxes. A general workaround to prevent Internet Explorer from installing programs is to run Internet Explorer with limited privileges. Microsoft "DropMyRights" tool can be used for such purposes.
Description: PHP is a package installed on a large number of web servers and used by multiple content management and bulletin board software packages. The PHP "wordwrap()" function, which wraps a string to given number of characters using a string break character, reportedly contains a buffer overflow. Any PHP scripts that use this function and pass user-input to it are vulnerable. The flaw can be exploited to execute arbitrary code on the webserver hosting such scripts. Note that hosting sites should upgrade the PHP packages as soon as a fix is available.
Status: Vendor not confirmed, no updates available.
Description: Secunia Research has verified that a variation of the publicly reported 0-day IE vulnerability can be exploited to execute arbitrary code on a fully patched Windows XP SP2 system. The technical details of this attack vector have not been publicly posted. Microsoft is reportedly working on a fix.
Description: NGSSoftware researchers have confirmed that one of the exploits for Oracle publicly released last week is for a vulnerability that yet remains unpatched.
Description: SSL-VPN is an access technology designed for secure remote access. Accessing non-web applications remotely in this fashion requires that the clients have an ActiveX control installed on their systems. Juniper SSL-VPN client ActiveX control, JuniperSetup.ocx, contains a stack-based buffer overflow in its "JuniperSetupDLL.dll" module. Passing an overlong "ProductName" to this module triggers the overflow that can be exploited to execute arbitrary code on a Juniper SSL-VPN client software user. The technical details required to craft an exploit have been publicly posted.
Status: Juniper confirmed, patch available.
Description: Ethereal is a very popular open source network sniffer and protocol analyzer for Unix and Windows platforms. The software contains one or more buffer overflow vulnerabilities in parsing COPS and ALCAP protocols as well as handling Network Instruments and NetXRay/Windows sniffer file. These buffer overflows can be exploited to execute arbitrary code with the privileges of the ethereal process (typically "root" when ethereal is being used as a sniffer). To exploit these flaws, an attacker has to either inject the malicious packets into the network traffic being sniffed by ethereal, or entice a client to open a specially crafted packet capture file. Note that any network applications based on ethereal protocol decoder modules may also be affected.
Status: Vendor confirmed, upgrade to version 0.99.0, which also fixes a number of DoS vulnerabilities in parsing other protocols.
Description: Asterisk is an open-source PBX server for UNIX-based systems and is being deployed from small and medium to large enterprises for VoIP services. Passing a large JPEG image to the PBX server triggers an integer overflow that can be exploited to execute arbitrary code on the server. A potential attack vector would be to use the Asterisk "Sendimage" command.
Status: Asterisk has released version 1.2.7 to fix this issue.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4995 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.