Important vulnerabilities were discovered last week for anti-virus product F-Secure (#1), back-up product EMC Legato (#2), Cisco Call Manager (#4) and AOL's You've Got Pictures Active X control (#3). Overall more than 85 new vulnerabilities were reported, but if all of Oracle's vulnerabilities patched last week (#5) were counted, that number would have nearly doubled. Users of Vertitas Netbackup should verify that the patches were installed, as exploits for VolumeManager daemon (vmd) (#7) have been found, and Internet Storm Center is reporting widespread scanning of the vmd port.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored by SANS Onsite Training ********************
SANS TRAINING! YOUR LOCATION & SCHEDULE! LOWER COST!
For organizations that need to train a large number of students, OnSite Information Security Training can deliver all the SANS courses to any location. You can save your travel budget and reduce your total cost more than 50%! Contact us at onsite@sans.org for more information.
*************************************************************************
*************************** Sponsored Links: ****************************
1) New eBook on Information Theft Prevention provides the latest advice & best practices around information security. Learn more. http://www.sans.org/info.php?id=993
2) Free SANS WhatWorks Webcast "WhatWorks in Penetration Testing: Improving System Health with Care New England" Wednesday, January 25 at 1:00 PM EST (1800 UTC/GMT) http://www.sans.org/info.php?id=994
3) Save Time! SANS WhatWorks case studies and webcasts showcase real user interviews that illustrate effective internet security technologies. http://www.sans.org/info.php?id=995
*************************************************************************
Part I is compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: F-Secure Anti-virus software deployed on client as well as gateway systems contains a buffer overflow in processing specially crafted zip archives. The overflow may be exploited to execute arbitrary code to completely compromise the system running the AV software. In addition, the software also contains a vulnerability in processing zip and rar archives that can be exploited to bypass scanning of these archives containing malware. The technical details required to craft such malicious archives have not been posted yet.
Status: F-Secure has released hotfixes for its entire product line. Gateway systems should be patched on a priority basis.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: EMC Legato Networker backup solutions are designed to deliver centralized data protection and management across heterogeneous environments. Sun StorEdge and Solstice backup products package the EMC Legato Networker software. The Networker software's nsrd.exe and nsrexec.d programs contain a heap-based buffer overflow that can be triggered by specially crafted RPC requests to RPC program number 390109 and 390113 respectively. An attacker can exploit these overflows to execute arbitrary code and compromise a backup client as well as a backup server. Exploit code has not yet been posted.
Status: Networker 7.1.4 and 7.3 are not affected by this issue. EMC has also released hotfixes for customers running version 7.2.1.
Council Site Actions: The responding council site using the affected software reported that they have already patched their systems.
Description: AOL You've Got Pictures service provides sharing, printing, organizing and storing photos for AOL members. The Picture Finder Tool ActiveX control installed by this program contains a buffer overflow that can be exploited by a malicious webpage to execute arbitrary code on an AOL user's system. No technical details regarding how to trigger the overflow have been publicly posted.
Status: Upgrade to AOL 9.0 Optimized or AOL 9.0 Security Edition. AOL has also released a hot fix. AOL automatically patched a number of user systems beginning October 2005, and commented that the vulnerability may not be as widespread at this time.
Council Site Actions: All of the responding council sites are currently blocking AOL traffic at their network perimeters and they also restrict ActiveX controls. Thus they felt no action was necessary.
Description: Cisco Call Manager, which runs on Windows platform, is the main server in a Cisco enterprise VoIP deployment. The Call Manager is responsible for the call processing and routing functions. The Call Manager contains the following vulnerabilities: (a) Opening a large number of TCP connections to the port 2000/tcp causes the Call Manager to consume memory and CPU resources resulting in a DoS condition. (b) Opening a large numbers of TCP connections to ports 2001/tcp, 2002/tcp or 7727/tcp disrupts the Call Manager and Windows Services Manager interaction that results in restarting the Call Manager. Note that these vulnerabilities are easy to exploit and causing a denial-of-service to Call Manager may result in loss of phone service in an enterprise.
Status: Cisco has released fixed versions of Call Manager for all the affected versions that fix the DoS as well as privilege escalation vulnerabilities. Customers using Call Manager should upgrade immediately.
Description: Oracle has released a critical patch update that addresses more than 80 vulnerabilities in various Oracle applications. A number of SQL injection vulnerabilities as well as arbitrary file overwrite vulnerabilities have been patched that are easy to exploit. In certain cases, the discoverers have released complete technical details required for exploitation. Please note that the Oracle Voyager worm code can be modified to include exploits for these flaws. Such a modification has already been done for an older vulnerability.
Status: Patch the Oracle installations on an expedited basis. General Oracle security hardening procedures can be found at: http://www.sans.org/top20/#c4
Council Site Actions: All reporting council sites are responding to this item. They have already either installed the patches or are in the process of QA'ing the patches and doing regression testing and plan to deploy them as soon as possible as QA. Most of the council sites do not have Oracle servers that are directly accessible from the Internet or partner sites, thus the threat is somewhat reduced.
Description: The Stack Group Bidding Protocol (SGBP) is used by Cisco devices participating in Multichassis Multilink PPP (MMP). Enabling SGBP support causes the Cisco device to listen on port 9900/udp. The IOS contains a denial-of-service vulnerability in processing SGBP protocol that can be triggered by a specially crafted UDP packet to the port 9900/udp. Such a packet can lead to a hardware reset of a Cisco device. Further technical details required to craft the UDP packets, which may even be spoofed, have not been posted yet.
Status: Cisco has provided a patch for the affected IOS versions. Internet Storm Center issued reports adding the following: Nokia phones: http://isc.sans.org/diary.php?storyid=1056 Nyxem worm: http://isc.sans.org/diary.php?storyid=1051 http://isc.sans.org/diary.php?storyid=1058 Note the payload erases files on shares (big impact for networks) Vista patches; http://isc.sans.org/diary.php?storyid=1045
Description: TippingPoint IPS contains a vulnerability that can be triggered by a specially crafted HTTP session containing a negative content length header. The flaw results in a high CPU utilization that may result in a denial of service. Note that TippingPoint IPS has been shipping with a filter to block the negative content length HTTP header anomaly in its "Recommended" settings. Hence, only HTTP flows crafted in a certain fashion with negative content length can trigger this flaw.
Status: TippingPoint released a fix for its customers within 5 hrs after the problem was discovered at a few customer locations. Customers including the unaffected ones should upgrade to the fixed releases of the TOS - 2.1.4.6324 and 2.2.1.6506. These versions can be downloaded from the TippingPoint Threat Management Center.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Exploit code has been released for Veritas Netbackup shared library overflow vulnerability that was announced in November 2005. Specifically the exploit code targets the Volume Manager daemon (vmd) that listens on port 13701/tcp. Widespread scanning of that port has been observed by the SANS Internet Security Center. Block the TCP ports used by Veritas backup software as indicated in the previous @RISK newsletter.
Council Site Actions: Only one of the responding council sites is currently using the affected software. They plan to install the patch during their next regularly scheduled system update.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4808 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.