A light week for vulnerabilities.
Don't forget that the Friday is the final day for early registration for SANS Network Security 2006, Las Vegas with 20 different immersion tracks. http://www.sans.org/ns2006/caag.php
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
******* Sponsored By Process Control & SCADA Security Summit **********
Don't miss this unique opportunity to hear fresh approaches to improving SCADA and control system security that can be implemented now at the SCADA Security Summit in Las Vegas on September 28 - 30. http://www.sans.org/info.php?id=1330
What previous attendees said about the program:
"It didn't just concentrate on the problems; it focused on finding the solutions." (Tracy Pettit, Nebraska Public Power District)
"Real world, hands-on, hit the ground running focus with instant payback." (Jeff Bryner, Portland General Electric)
"It was refreshing to get away from all the 'chicken little' stuff and take a step closer to reality. It is good to know that not all the myths are true and that there are potential and viable solutions that can and apparently are working." (Kimberly Lee, US Department of Defense)
I am an IT director overseeing many control systems. The Summit helped me understand the challenges that lay ahead and the actions I can take to secure these systems as we link them into our corporate LAN." (Chuck La Fleur, Georgia Tech)
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: SAP-DB/MaxDB is a popular open source enterprise database server. The WebDBM component, used to manage the database via a web interface, contains a remotely-exploitable buffer overflow. By sending a specially-crafted request to the WebDBM ("wahttp") process containing an overlong database name, an unauthenticated attacker could exploit this buffer overflow and execute arbitrary code with the privileges of the database server process. Note that attackers would need to have access to the WebDBM web interface to exploit this vulnerability.
Status: SAP and MySQL confirmed, updates available. A workaround is to block the access to the TCP port used by WebDBM (typically 9999/tcp or 85/tcp).
Council Site Actions: Only two council sites are investigating this issue. One site has sent the information to their SAP engineers and the other site is still in the process of investigating their risk level.
Description: Microsoft Internet Explorer contains a remotely exploitable integer overflow when interacting with the "DirectAnimation.PathControl" ActiveX component. By passing a specially-crafted argument to the "Spline" method of this ActiveX control, an attacker could trigger this integer overflow and create a denial-of-service condition. It is believed that remote code execution may be possible, but this has not been confirmed. Note that technical details for this vulnerability have been publicly posted, and that re-usable exploit code to leverage this flaw is publicly available. Flaws similar to this one have been widely exploited in the past.
Status: Microsoft has not confirmed, no updates available. Note that users may be able to mitigate the impact of this vulnerability by disabling this component via Microsoft's "kill bit" mechanism for CLSID "D7A7D7C3-D47F-11D0-89D3-00A0C90833E6}".
Council Site Actions: All of the reporting council sites are waiting for additional information and a patch from the vendor. One site is in the process of checking whether their configuration has the kill bit set.
Description: Lyris ListManager, a popular application for managing email lists and discussion groups, contains remotely-exploitable privilege-escalation vulnerability. By sending a specially-crafted request to the management interface, an attacker with administrative privileges for one mailing list may add arbitrary users as administrators to other mailing lists. Note that technical details and a simple proof-of-concept for this vulnerability have been publicly posted.
Status: Lyris has not confirmed, no updates available. Web hosting providers that offer this software and have multiple domains hosted on a single machine should upgrade immediately.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The following popular software packages reportedly contain PHP remote file include vulnerabilities: MiniBill, ModuleBased CMS, phpECard, Jupiter CMS, JetBox CMS, and e107. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the web server hosting the vulnerable software packages. The postings show how to craft malicious HTTP requests to exploit these flaws. Note that all of these vulnerabilities require that the PHP "register_globals" option be enabled. The "register_globals" option is disabled by default in PHP version 4.2.0 and later. Users are advised to disable the "register_globals" option if possible, and run the web server under a low-privilege account.
Status: MiniBill has not confirmed, no updates available. ModuleBased CMS has not confirmed, no updates available. phpECard has not confirmed, no updates available. Jupiter CMS has not confirmed, no updates available. JetBox CMS has not confirmed, no updates available. e107 has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The Compression Plus library, a popular library used to handle a variety of data compression schemes, contains a remotely-exploitable buffer overflow. A specially-crafted ZOO archive file could trigger this buffer overflow and execute arbitrary code with the privileges of the application using the library. Note that ZOO is no longer a widely-used compression algorithm. Technical details for this vulnerability have been publicly posted.
Status: Vendor confirmed, updates available. Note that individual applications may continue to use vulnerable versions of the library.
Council Site Actions: Only one of the responding council sites is using the affected software. They are in the process of checking their anti-virus and IPS admins for updated definitions.
Description: The Fuji Xerox Printing Systems print engine contains multiple remotely-exploitable vulnerabilities. The first vulnerability is due to the engine's failure to properly validate FTP PORT commands. Attackers who could access the engine's FTP printing interface could cause the engine to make arbitrary connections to other systems, allowing the attacker to mask the true source of attacks. The second vulnerability is due to the engine's failure to validate permissions on the web administration interface. Attackers with access to this interface could reset the engine's administrative password.
Status: FXPS confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5151 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.