This week, users of SAP face multiple major security threats (#1 and #2). Otherwise it is a pretty quiet week.
Also this week, the 2007 SANS Top20 Internet Security Attack Vectors project has just begun. If you have an interest in it please look at the note at the end of this issue.
And if you want to help ensure applications have fewer security flaws, please recommend that your programmers listen to the free webcast tomorrow (Tuesday) where we will outline the principal programming errors that lead to security problems. The webcast is at 1 PM EDT and the url is: https://www.sans.org/webcasts/show.php?webcastid=91321
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
*********************** Sponsored By Sourcefire, Inc. *******************
Hackers are keeping up with their training. Are you? Whether you're looking to take a Sourcefire® or SNORT® class or gain full certification, Sourcefire offers a wide selection of courses for your convenience. Learn how to get the most from your Snort or Sourcefire system.
Contact Sourcefire Training today at 734.743.6550 or go to http://www.sans.org/info/10576
*************************************************************************
Updated list of security training courses: http://www.sans.org/training/courses.php
*************************************************************************
************************* Sponsored Link: *****************************
1) SANS Ask the Expert webcast, "Reputation-Based Network Security" sponsored by Secure Computing. Register today.
http://www.sans.org/info/10581
************************************************************************
Part I for this issue has been compiled by Rob King and Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Multiple SAP products, including SAP Message Server, SAP DB, and SAP Internet Graphics server, contain multiple vulnerabilities. The SAP Message Server contains a buffer overflow vulnerability in its handling of HTTP URIs, and the SAP DB "wahttp.exe" server contains multiple buffer overflows. Successfully exploiting these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Additionally, the SAP Internet Graphics Server contains a cross-site-scripting vulnerability. Successfully exploiting this vulnerability would allow an attacker to execute arbitrary JavaScript in another user's browser. Full technical details and proofs-of-concept are publicly available for these vulnerabilities.
Status: SAP confirmed, updates available.
Council Site Actions: Only one of the reporting council sites is using the affected software and they plan to patch during their next regularly scheduled system maintenance cycle.
Description: EnjoySAP, a popular graphical interface to the SAP system, contains multiple buffer overflows in bundled ActiveX controls. A specially crafted web page that instantiates one of these controls could trigger one of these buffer overflows. Successfully exploiting one of these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the current user. Note that at least one proof-of-concept is publicly available for these vulnerabilities.
Status: SAP confirmed, updates available. Users can mitigate the impact of these vulnerabilities by disabling the vulnerable controls via Microsoft's "kill bit" mechanism.
Council Site Actions: Only one of the reporting council sites is using the affected software and they plan to patch during their next regularly scheduled system maintenance cycle.
Description: Fujitsu ServerView, an enterprise asset management suite, contains a command execution vulnerability. ServerView's functionality includes the ability to ping servers; the address of the server to ping is supplied by the user and is not sanitized. A specially crafted server address would trigger this vulnerability and allow an attacker to execute arbitrary commands with the privileges of the server process. Full technical details and a proof of concept for this vulnerability are publicly available.
Status: Fujitsu confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
Description: Novell Access Manager, a popular enterprise access management suite, contains multiple content inspection bypass vulnerabilities in its handling of HTTP traffic. A specially encoded HTTP POST request using full- or half-width Unicode characters could bypass inspection in the Linux Access Gateway Product. Additionally, an undisclosed vulnerability in the NetWare Access Gateway could allow malicious HTTP traffic to bypass content inspection. Note that these may be the same vulnerability in two different products. No further technical details are available for these vulnerabilities, but they may be similar to a previous multi-vendor security vulnerabilities discussed in an earlier issue of @RISK.
Status: Novell confirmed, updates available.
Council Site Actions: The affected software and/or configuration are not in production or widespread use, or are not officially supported at any of the responding council sites. They reported that no action was necessary.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5465 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner
===================================== SANS CRITICAL INTERNET THREATS 2007 =====================================
SANS Critical Internet Threats research is undertaken annually and provides the basis for the SANS "Top-20" report. The "Top-20" report describes the most serious internet security threats in detail, and provides the steps to identify and mitigate these threats.
The "Top-20" began its life as a research study undertaken jointly between the SANS Institute and the National Infrastructure Protection Centre (NIPC) at the FBI. Today thousands of organizations from all spheres of industry are using the "Top-20" as a definitive list to prioritize their security efforts.
The 2007 Top-20 will once again create the experts' consensus on threats - - the result of a process that brings together security experts, leaders, researchers and visionaries from the most security-conscious federal agencies in the US, UK and around the world; the leading security software vendors and consulting firms; the university-based security programs; many other user organizations; and the SANS Institute.
For reference a copy of the 2006 paper is available online: http://www.sans.org/top20.htm. *A list of participants may be found in the Appendix.
CALL FOR SECURITY & ASSURANCE EXPERTS ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ If you are an administrator/CSO/vulnerability researcher (or similar roles) and are interested in the Top-20 2007 research please contact the Project Manager, Rohit Dhamankar (dhamankar@sans.org), with the following details:
. Your Name . The Organization you represent and your role . Contact Details (inc. email and phone) . A brief description of your security specialty
==end==
Subscriptions: @RISK is distributed free of charge to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.