The number of new vulnerabilities found this week exceeded 100 again. Most are in software that is not widely used, but MySQL users had multiple new critical vulnerabilities to concern them.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** Sponsored By Blue Coat Systems, Inc. *******************
SSL VPNs: Lesson Learned
Sponsored by: Blue Coat
Learn how to get the most out of SSL VPNs. Honest, technical, and to-the-point, this eBooklet, by analyst Don Jones, discusses what SSL VPNs promised, how they originally failed to deliver, and why the technology is making comeback. He'll answer your questions, explains the technology, and set you on the path to success. Learn more.
http://www.sans.org/info.php?id=1139
*************************************************************************
*************************************************************************
TRAINING UPDATE SANS FIRE 2006 IN WASHINGTON DC
July 5-13 - Bring your family for the fireworks and stay for SANS largest conference in Washington.
The industry's best security courses - extraordinary faculty; authoritative up-to-the-minute material - shows you how to do the job and gives you the confidence to go back and do it immediately.
"Jacked my paranoia level up around my ears, and then gave me the tools to manage the threat." (Don Geiger, DCPS Division of Technology)
Offers every one of SANS' 17 immersion training courses plus 12 short courses and a big exposition: SANS Security Essentials, Hacker Exploits, System Forensics, Intrusion Detection, Auditing, plus training for CISSP exam and all Technical certification required for DoD 8570 and more. Plus special evening sessions by the global security leaders who staff the Internet Storm Center.
http://www.sans.org/sansfire06/
************************************************************************* ************************ Sponsored Links: *******************************
1) Strata Guard Free Freeware version of StillSecure's award winning intrusion detection/ prevention system (IDS/IPS) Download now. http://www.sans.org/info.php?id=1140
2) SANS@Home - Security 601: Reverse-Engineering Malware - Hands-On with Lenny Zeltser starts June 6. Save $150 by registering before May 17! Live training delivered to your home PC. http://www.sans.org/athome/details.php?id=1418
*************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Nagios is an open-source program that monitors networks, hosts and services. It is a popular network monitoring application used worldwide by many organizations. Nagios CGI scripts are primarily used to access the monitored information. The Nagios software contains a buffer overflow that can be triggered by an HTTP request containing a negative HTTP "Content-Length" header. A remote attacker could exploit this flaw to execute arbitrary code with the privileges of the Nagios user (often root). Note that a typical configuration may not require authentication for all Nagios scripts. Description: MySQL database server suffers from a buffer overflow and information disclosure vulnerabilities. The server contains a buffer overflow that can be triggered by specially crafted "COM_TABLE_DUMP" packets (used to dump database tables). An authenticated MySQL user can exploit this flaw to execute arbitrary code on the database server. Additionally, by sending specially-crafted "login" and "COM_TABLE_DUMP" requests to a MySQL process, an attacker could cause portions of the memory to be returned in the resulting error messages. This information can then be used in constructing exploit code. Proof-of-concept exploit for the "COM_TABLE_DUMP" flaw has been posted. Note that an unauthenticated attacker can exploit the vulnerabilities via any SQL injection flaws in a front-end web application. Description: The libtiff library provides various functions to store and read the Tag Image File Format (TIFF), a popularly used image file format. This library is used on Linux by GNOME and KDE applications, the Mozilla and Mozilla Firefox web browsers, the xv image manipulation program, and other popular applications. The library contains multiple buffer overflows that were discovered by supplying "fuzzed" TIFF images. A malicious image in a webpage or an HTML email may exploit the flaws to potentially execute arbitrary code on a Linux/Unix client. The technical details required to leverage the flaws have been posted. Description: Mozilla Firefox contains a DoS vulnerability that arises from the failure to properly parse certain JavaScript constructs. A specially-crafted web page can inject malicious code into a user's browser session, and potentially execute the code with the privileges of the logged-on user (not confirmed). The vulnerability is triggered when certain deleted objects are re-referenced while the "designMode" property is set. The "designMode" property is used for features such as building rich text editor in a webpage. The proof-of-concept exploit is included in the Mozilla Bugzilla.
Status: Vendor confirmed, patches available. Upgrade to MySQL versions 4.1.19, 5.0.21 and 5.1.10 (when available). Use firewalls to block port 3306/tcp from the Internet. Status: Upgrade to version 3.8.1. Linux vendors like RedHat have also released patched versions. Status: Upgrade to version 1.5.0.3. Ensure that the "autoupdate" feature is enabled in the "Tools->Options->Advanced" configuration section.
Council Site Actions: Only one of the responding council sites is running the affected software, and on a very small number of machines and possibly only one machine running the old Apache version. They will most likely update the software within the next month. Council Site Actions: One site has already updated its non-RedHat systems and is waiting on patches for the RedHat platforms. Another site is treating this as a very low threat since only a small number of important machines are running the affected software; no account can access the daemon over the network, and the total number of accounts is very small. They will most likely update these systems within the next month. Council Site Actions: Two of the reporting council sites are using the affected software. They plan to push out the patches during their next regularly scheduled system update cycle. Council Site Actions: Most of the council sites are using Firefox, but it is not supported by their central IT departments. However, most of the users have Auto Update turned on and expect the users to be updated in due time.
Description: X11, the package deployed on most Linux and BSD installations, contains a buffer overflow vulnerability in its XRender extension (installed and enabled by default on most systems). The XRender extension is used to perform complex graphical compositing and manipulation. This flaw allows authenticated users to execute code with the privileges of the X server user, typically root. Note that it may be possible to execute this vulnerability remotely using remote X display primitives, but this would still require user authentication. The technical details required to leverage the flaw are publicly available. Note that although this is a privilege escalation vulnerability (not typically included in the @RISK); owing to the widespread distribution of the X11 package an exception has been made in this case.
Status: X.Org has published patches. Various Linux vendors are working on releasing their own patches. A workaround is to disable to "XRender" extension by adding the following lines to xorg.conf file: Section "Extensions" Option "RENDER" "disable" EndSection
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5002 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.