Major new vulnerabilities in Oracle and CA iTechnology. Plus problems in WinAmp and lots of new exploits this week. If there ever was a lull, it is over.
Are you looking for ways to contribute to the overall security of the Internet? And do you serve as a senior security person at an organization with responsibility for at least 10,000 systems, we would love to have your help as a (confidential) member of the Council that advises the 125,000 readers of @RISK about which vulnerabilities need immediate action and which can be put off until the next update cycle. If you are qualified and interested, email info@sans.org with the subject "@RISK Council" with a few words about what you do.
Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*************** SPONSORED BY SANS TRAINING *****************************
World-Class Security Training Opportunities in the Next Four Weeks
SANS 2006 in Orlando (Feb 24- March 4) 36 tracks of extraordinary training - the best instructors in the world, and a great security tools exposition. Lots of people are bringing their families to Orlando to join them at the end of the program. Plus: San Francisco, Phoenix, St. Louis, Brisbane, Tokyo, Ottawa
Or you can take SANS training anytime, anywhere with the new SANS On Demand. Details on these and other programs: www.sans.org
And the SCADA Security Summit is 76% full. If you want to attend, register this week. http://www.sans.org/scadasummit06/ *************************************************************************
Part I is compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Winamp, a popular Windows media player, contains a buffer overflow. The overflow can be triggered by a malformed playlist file (a file with an ".pls" extension) that contains an overlong "computer name". In order to exploit the flaw, an attacker can post the malicious playlist file on a webpage, shared folder or send it in an email. In a web attack scenario, Winamp may automatically open the crafted playlist file. The flaw can be leveraged to execute arbitrary code on the user's system. Exploit code has been publicly posted.
Status: No patch yet available from Winamp. A workaround is to disable Winamp as the default media player.
Description: NGSSoftware has reported that Oracle PL/SQL gateway contains a flaw in processing user-input that can be exploited to gain access to the restricted packages and procedures. This can result in the backend database server compromise via HTTP (a common configuration). The flaw can be triggered by a specially crafted query with an unmatched right parenthesis ")".
Status: Oracle has been informed of this high rated flaw but has still not announced patches. NGSSoftware has published workarounds using "mod_rewrite" Apache module that is a part of the Oracle HTTP server.
Description: Computer Associate's iGateway, a HTTP/HTTPS server that runs on port 5250/tcp, is a component present in a number of CA products including BrightStor, eTrust and UniCenter product lines . This server contains a overflow that can be triggered by declaring a negative value for "content length" in an HTTP request. On Windows platforms, the flaw can be exploited to execute arbitrary code with SYSTEM privileges.
Status: CA has posted fix for the iGateway component. Vulnerable products can be located by checking the version number in the "iGateway.conf" file.
Description: Red Hat Directory (formerly Netscape Directory Server) and Red Hat Certificate server contain a stack-based overflow in their management console. The flaw can be triggered by a specially crafted input to the "help" button on the management console, and possibly exploited to execute arbitrary code. Note that the discoverers claim that under certain circumstances an unauthenticated attacker can exploit the overflow whereas Red Hat advisory states that only local privilege escalation is possible.
Status: Red Hat has fixed these flaws in version 7.1 SP1 for the affected products. Firewall the access to the management console.
Description: SuSE Linux contains a buffer overflow vulnerability in its "rpc.mountd" service that is responsible for mounting file shares. The problem occurs because "realpath()" function does not allocate enough buffer space for processing mountd requests. The overflow can be exploited by a user and potentially an unauthenticated attacker to execute arbitrary code with "root" privileges. Note that the affected package "nfs-server" is obsolete and has been replaced by "nfs-utils" that is not vulnerable.
Status: SuSE has released a fix for nfs-server package. Please upgrade to nfs-utils package whenever possible.
Description: Mercury Mail Transport Systems is a mail server for Windows and Novell platforms. Mercury's Query Server for Directory services, which runs on port 105/tcp, contains a buffer overflow that can be exploited to execute arbitrary code with SYSTEM privileges. Exploit code has been publicly posted.
Status: Vendor has released hotfixes for the product.
Description: Cisco VPN concentrators' HTTP service contains a denial of service that can be triggered by specially crafted HTTP requests. The HTTP service is enabled by default on the concentrators. Hence, repeated malicious requests can cause the VPN device to reload. The technical details required to craft the malicious HTTP requests have not been posted.
Status: Cisco has released a fixed software version 4.7.2B. A workaround is to either block access to the HTTP service or switch to the HTTPS service on the VPN concentrators.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 4841 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2006. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.