A moderately quiet week - though the VOIP vulnerability (#1 below) reminds us of the dark side of moving telephony to the Internet. It's also another big week for cross-sight scripting, SQL injection, and file include vulnerability discoveries - nearly forty this week alone. Alan
PS Save $150 on SANSFIRE (Washington DC, July 5-12) if you get your registration in this Wednesday (June 14)
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
**************** SPONSORED BY SANS SPECIAL COURSES ********************** Like gold hidden in rocks, a number of surprising security assets have been discovered hiding in log data - in logs you might not be keeping. More than a dozen users from banks, hospitals, manufacturers, and government will be sharing their discoveries at the Log Management Summit July 12-14 in Washington, DC. And in the same hotel, you can attend any of 16 SANS immersion training courses, taught by the world's best instructors. You'll also be allowed to attend insider briefings on new developments in malware and other security innovations. That's SANSFIRE 2006, July 5-12.
- -- Log Management Summit information: http://www.sans.org/logmgtsummit06
- -- SANSFIRE 2006 information: http://www.sans.org/sansfire06
- -- Schedule for all SANS courses: www.sans.org *************************************************************************
************************* SPONSORED LINK ********************************
1) Do you know what your privileged users are doing? We do. Learn more at http://www.sans.org/info.php?id=1189
************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Asterisk is an open-source PBX server for UNIX-based systems and is being deployed from small and medium to large enterprises for VoIP services. Asterisk contains a vulnerability in handling IAX2 protocol (Inter Asterisk Exchange protocol) that can be triggered by specially crafted video frames. An attacker can exploit the flaw via specially crafted UDP packets on port 4569/udp to execute arbitrary code on the Asterisk server. The technical details required to craft an exploit have been publicly posted.
Status: Asterisk confirmed, upgrade to version 1.2.9 and 1.0.11.
Description: SpamAssassin, a popular open source spam detection engine contains a remote code execution vulnerability. The flaw can be triggered by sending a specially-crafted e-mail message, and can be exploited to execute arbitrary commands with the privileges of the SpamAssassin daemon (spamd). However, the vulnerability exists only when the spamd daemon has been executed with the "vpopmail (-v)" and "paranoid (-p)" options. The "vpopmail" option is typically used in virtual mail hosting environment to operate the SpamAssassin daemon with individual user preferences. The "paranoid" option is used to validate commands from the SpamAssassin clients; invalid commands cause operational faults in the daemon. Although in common installations neither option is enabled by default, "vpopmail" is generally enabled on large mail hosting sites with many virtual users. Note that when SpamAssassin is configured to run with both these options, no user interaction is required to exploit the flaw.
Status: SpamAssassin has released fixed versions 3.1.3 and 3.0.6.
Council Site Actions: Only one of the reporting council sites is using the affected software. They rely heavily on SpamAssassin for their central and departmental mail systems; however they believe it would be very unlikely for any their installations to have the daemon options needed for exploitation.
Description: The MySQL "Mysql_real_escape" function contains a SQL injection vulnerability. This function is used to ensure that strings are properly escaped in SQL requests. However, in certain multibyte encoding schemes (such as SJIS, BIG5, and GBK), it is still possible to inject SQL commands into requests to a MySQL server via this function. Note that encodings like BIG5 are commonly used in Asian languages.
Status: MySQL has released a fixed version 4.1.20. A possible workaround for vulnerable versions is to set the "NO_BACKSLASH_ESCAPES" server parameter. This will enable strict SQL compatibility mode, which will cause the server to treat backslashes as normal characters. Note that this workaround is acceptable only if backslashes are acceptable in the stored data.
Council Site Actions: Several of the reporting council sites are using the affected software. Two of them plan to distribute the patches during their next regularly scheduled system update cycle. The third site is still assessing whether their deployment is vulnerable to exploitation.
Description: Multiple web browsers contain an implementation flaw in the handling of certain JavaScript constructs. By tricking a user into typing a file name in a form, a specially-crafted webpage can read any file that is accessible to the user. Hence, the vulnerability can be used to steal sensitive information from the user's system. The problem arises due to input-focus-management in the file upload dialog windows. Exploit code has been publicly posted.
Status: Vendors are aware of the flaw, no updates available.
Council Site Actions: All of the reporting council sites are waiting for IE patches from Microsoft. The council sites that are also using Firefox/Mozilla will be updated via the automatic update facility. One site commented that they rated this as a low risk because of the requirement for the end user to enter text.
Description: Qbik WinGate, a popular HTTP proxy server, contains a buffer overflow vulnerability. The overflow can be triggered by specifying an overly-long URL in an HTTP request and exploited to execute arbitrary code. Exploit code for this vulnerability is publicly available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The following software packages reportedly contain PHP remote command execution vulnerabilities: Enterprise Payroll Systems, OpenEMR, DreamAccount, BlueShoes Framework, Claroline, and DokuWiki. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the webserver hosting the vulnerable software packages. The postings show how to craft the malicious HTTP requests to exploit the flaws.
Description: A vulnerability has been discovered in multiple TIBCO products, including the Rendezvous, Runtime Agent, and Hawk products. These products are used for monitoring and reporting network status. A specially-crafted request can allow an attacker to execute arbitrary code with the privileges of the TIBCO administrative user.
Status: Vendor confirmed, updates available. Users are advised to limit access to the TIBCO administrative interface, which is often configured to run on port 80.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5026 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.