Anyone using Oracle should already have installed the July updates. Cisco MARS users should upgrade to 4.2.1. And Internet Explorer users may want to set the kill bit for ActiveX UUID because Microsoft hasn't confirmed the existence of the memory corruption flaw posted by HD Moore. Also, there were more problems discovered in wireless routers - this time in D-Link routers.
If you work in process control or power industries, the hackers you're your systems targeted. To fight back, there is new security procurement language you can use to ensure vendors deliver more secure systems. Come to the SCADA/Process Control Security Summit in Las Vegas to learn how to use it. SCADA Summit: http://www.sans.org/scadasummit_fall06/ Network Security 2006 (also in Las Vegas): http://www.sans.org/ns2006/
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored By Blue Coat Systems, Inc. *****************
New security ebook on Information Theft Prevention
In The Definitive Guide to Information Theft Prevention, security author Dan Sullivan provides advice on information protection and privacy regulations; addressing risks from employee home PCs and other unmanaged devices; securing corporate-managed devices; and utilizing new technologies. This guide also discusses risk management, incident responses and emerging best practices for information security. Download the eBook now.
http://www.sans.org/info.php?id=1237
*************************************************************************
Summer Security Training Extravaganza
Over the next two months, you may attend one or more of 50 SANS courses in 20 cities on four continents. And if you cannot make those events, because of travel restrictions, you may attend live SANS courses with the best teachers in the world, without leaving your home. You can even take SANS courses online at your own schedule. Attendance at SANS educational events is experiencing the largest growth spurt in half a decade. Pick your class and register early to get a seat.
*************************************************************************
********************** Sponsored Links: ********************************
1) Free software! Patch & Spyware Management! A complete security solution from Shavlik.
http://www.sans.org/info.php?id=1238
*************************************************************************
Part I is compiled by Rohit Dhamankar and Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Oracle has released a security update for multiple products that patches over 60 vulnerabilities. According to the Oracle advisory a number of these flaws can be easily exploited via HTTP or SQL protocol. One of the discoverers has posted the technical details about four of these vulnerabilities.
Council Site Actions: Most of the reporting council sites are responding to this item and plan to deploy the patches during their next regularly scheduled systems update cycle. One site is currently regression testing the updates.
Description: Internet Explorer contains a memory corruption flaw that is triggered when "SetSlice" method is invoked on "WebViewFolderIcon" ActiveX object. A malicious webpage can exploit the flaw to potentially execute arbitrary code on a user's system. The technical details required to craft an exploit have been publicly posted.
Status: Microsoft has not confirmed, no updates available. Set the killbit for ActiveX UUID "{E5DF9D10-3B52-11D1-83E8-00A0C90DC849}" as a workaround.
Council Site Actions: All reporting council sites are waiting on additional information and a patch from the vendor. They will most likely deploy the patch during a regularly scheduled systems maintenance cycle.
Description: Cisco MARS (Monitoring, Analysis and Response System) product is designed to co-relate network attacks in order to stop the attacks. Cisco MARS uses JBoss application server. Versions prior to 4.2.1 of Cisco MARS ship with an insecure JBoss installation. As a result, an unauthenticated attacker can access JBoss's "jmx-console" via HTTP and execute arbitrary commands resulting in a total compromise of the MARS system. Complete technical details and a proof-of-concept exploit have been publicly posted. Additionally, Cisco MARS ships with Oracle database with default usernames and passwords. This can be exploited to access sensitive information stored in the database such as authentication credentials for network security devices and/or execute some SQL statements against the Oracle server.
Status: Cisco confirmed, upgrade Cisco MARS to version 4.2.1.
Council Site Actions: Only one of the responding council sites is using the affected software and only on one machine (an evaluation copy). They will patch that machine next week.
Description: Wireshark (formerly Ethereal) is a popular open source network sniffer and protocol analyzer for Unix and Windows platforms. The software contains format string, off-by-one or buffer overflow vulnerabilities in parsing the following protocols: ANSI MAP, CheckPoint FW-1, MQ, XML, NCP NMAS, NCP NDPS, NTP and NFS. Many of these flaws can be exploited to execute arbitrary code with the privileges of the ethereal process (typically "root" when ethereal is being used as a sniffer). To exploit these flaws, an attacker has to either inject the malicious packets into the network traffic being sniffed by ethereal, or entice a client to open a specially crafted packet capture file. The technical details can be obtained by examining the fixed code. Note that any network applications based on ethereal protocol decoder modules may also be affected.
Status: Wireshark has confirmed the flaws and released version 0.99.2
Council Site Actions: Ethereal is used minimally at most council sites, but is not supported by their central IT departments. Most sites will advise their users to upgrade. One site has already pushed manual updates to the small number of affected users.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5088 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.