Another quiet week. The pause may give you time to get involved in community projects to help better secure the internet. Here's a great one:
If you are an administrator/CSO/vulnerability researcher (or have a similar role) and are interested contributing to this years the Top-20 Internet Security Vulnerabilities project, contact the project manager, Rohit Dhamankar (dhamankar@sans.org), with your name, the organization you represent, email and phone, and a brief description of your security specialty. At the end of this issue, you'll find a description of the Top20 project.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
****************** Sponsored By Fiberlink Communications ****************
The Hack is Back! In Fiberlink's new on-demand video/companion guide, our ethical hacker demonstrates four advanced hacks using techniques used to target mobile endpoints and the corporate network. Learn about the changing security landscape, current hacking techniques used to exploit vulnerabilities on mobile systems, and fundamental security strategy changes that can protect your mobile enterprise from attack. http://www.sans.org/info.php?id=1339
****************** Highlighted Training Program of the Week ************ THE PROCESS CONTROL & SCADA SECURITY SUMMIT Don't miss this unique opportunity to hear fresh approaches to improving SCADA and control system security that can be implemented now at the SCADA Security Summit in Las Vegas on September 28 - 30. http://www.sans.org/info.php?id=1330
What previous attendees said about the program: "It didn't just concentrate on the problems; it focused on finding the solutions." (Tracy Pettit, Nebraska Public Power District) "Real world, hands-on, hit the ground running focus with instant payback." (Jeff Bryner, Portland General Electric) "It was refreshing to get away from all the 'chicken little' stuff and take a step closer to reality. It is good to know that not all the myths are true and that there are potential and viable solutions that can and apparently are working." (Kimberly Lee, US Department of Defense)
*************************************************************************
************************* Sponsored Links: ******************************
1) Register Today- SANS Internet Storm Center webcast, 9/13 at 1pm-2pm EDT, "Internet Storm Center: The Evolving Malware Landscape" http://www.sans.org/info.php?id=1340
*************************************************************************
Part I is compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: ISC BIND, by far the most popular Domain Name System (DNS) server software on the internet, contains a remotely-exploitable denial-of-service (DoS) condition. By sending a specially-crafted DNS request including SIG or recursive queries, an attacker could cause the server to crash. Depending on configuration, the server may or may not automatically restart. Note that ISC does not believe that the 9.2 branch is vulnerable, but they have issued a patch anyway.
Status: ISC confirmed, updates available.
Council Site Actions: Two of the reporting council sites have responded to this item. One site has updated their systems to 9.3.2-P1. The other site has several dozen affected systems and will likely deploy patches within the next several weeks. Some of their systems load all patches from a Linux distributor and will likely be updated within approximately a week.
Description: Ipswitch IMail, a popular mail server solution for Microsoft Windows, contains a remotely-exploitable buffer overflow. By sending a specially-formatted request to the SMTP server component, an unauthenticated attacker could trigger this buffer overflow and execute arbitrary code with the privileges of the server software - often SYSTEM. Note that technical details for this vulnerability have been publicly posted.
Status: Ipswitch confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: Capi4HylaFax, a module that allows faxing via CAPI and AVM Fritz! cards, contains a remote command execution vulnerability. By sending a specially-crafted fax request to a vulnerable system, an attacker could execute arbitrary code with the privileges of the HylaFax process, often root.
Status: Vendor has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The following popular software packages reportedly contain PHP remote file include vulnerabilities: the Shadow phpBB premod, TikiWiki, and FlashChat. These flaws can be exploited by a remote attacker to run arbitrary PHP code on the webserver hosting the vulnerable software packages. The postings show how to craft the malicious HTTP requests to exploit the flaws. All of these vulnerabilities require that the PHP "register_globals" option be enabled. The "register_globals" option is disabled by default in PHP version 4.2.0 and later. However, many sites enable this option. Users are advised to disable the "register_globals" option if possible, and run web server software under a low-privilege account. Note also that there is a bot searching for FlashChat installations.
Status: phpBB has not confirmed, no updates available. TikiWiki has not confirmed, no updates available. FlashChat has not confirmed, no updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary.
Description: The Retro64 CR64Loader ActiveX component, part of various Retro64 video game products, contains a remotely-exploitable buffer overflow. A specially-crafted web page that instantiates this component could trigger this buffer overflow, and execute arbitrary code with the privileges of the current user. Note that re-usable exploit code to leverage similar flaws is publicly available. Flaws similar to this have been widely exploited in the past.
Status: Vendor has not confirmed, no updates available. Users may be able to mitigate the impact of this vulnerability by disabling the ActiveX component via Microsoft's "kill bit" mechanism for CLSID "{288C5F13-7E52-4ADA-A32E-F5BF9D125F99}".
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the council sites. They reported that no action was necessary. Once council site did comment that it was likely that at least a few systems at their have this ActiveX control, but they have no plans to respond because they have no realistic way to identify the affected user population.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5156 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
SANS CRITICAL INTERNET THREATS 2006 =====================================
SANS Critical Internet Threats research is undertaken annually and provides the basis for the SANS "Top-20" report. The "Top-20" report describes the most serious internet security threats in detail, and provides the steps to identify and mitigate these threats.
The "Top-20" began its life as a research study undertaken jointly between the SANS Institute and the National Infrastructure Protection Centre (NIPC) at the FBI. Today thousands of organizations from all spheres of industry are using the "Top-20" as a definitive list to prioritize their security efforts.
The 2006 Top-20 will once again create the experts' consensus on threats - - the result of a process that brings together security experts, leaders, researchers and visionaries from the most security-conscious federal agencies in the US, UK and around the world; the leading security software vendors and consulting firms; the university-based security programs; many other user organizations; and the SANS Institute.
For reference a copy of the 2005 paper is available online: http://www.sans.org/top20.htm. *A list of participants may be found in the Appendix.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.