Security and backup products (from Trend Micro and Legato, respectively) had multiple, critical vulnerabilities discovered this week. Backup and security products do not actually have more vulnerabilities than other products (although they seem to); rather, they are targeted more by security "researchers" because they are are ubiquitous, run with very high privileges and many organizations fail to run regular update cycles on them - assuming the vendor will do it for them. Also, in backup's case - they store the organizations' crown jewels. Significant break-ins at federal agencies and many other organizations have been found to have been traced to exploits of vulnerabilities in back-up products.
Alan
PS. To ensure you have current knowledge about the newest attack vectors, don't miss Ed Skoudis' Hacker Techniques course ( http://www.sans.org/ns2007/description.php?tid=243) or Josh Wright's Assessing and Securing Wireless Networks course ( http://www.sans.org/ns2007/description.php?tid=343) in Las Vegas next month. Both Ed and Josh are breathtakingly good teachers; their content is even better.
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
********** Sponsored By SANS Network Security and SANS London ***********
Come join us in Las Vegas on September 22-30 for SANS Network Security or in London on 26 Nov to 05 Dec, 2007 (or both) for the biggest SANS training conferences we've ever held in the US and Europe. In Las Vegas, there are more than 40 courses and a big product expo. In London we have 10 classes and the GSSP exam. How good have these event been? Here's what past attendees said:
"You learn something new every day...the experience of the instructor and of the students make the difference." (Gabriel Schmitt, Hoffmann-LaRoche)
"An extraordinary amount of information covered in a week, backed up with excellent documentation for those long winter nights." (Keith Mellism, Canada Life)
"The depth of knowledge is awesome." (Stephen Hall, Barclays)
"This course has valuable information that can be implemented immediately in the work place." (Christopher O'Brien, Booz Allen Hamilton)
"The quality of teachers, speakers, and even attendees is far superior to any other training event I've attended." (Corinne Cook, Jeppesen)
"You will never ever find anything more valuable than SANS superknowledge. Worth the price!!" (Carlos Fragoso, CESCA)
Registration information:
Las Vegas: http://www.sans.org/ns2007
London: http://www.sans.org/info/14431
Also SANS @Home, our most innovative and effective new educational program, announces Security 601: Reverse Engineering Malware starting on September 12, http://www.sans.org/info/12436. You can take complete SANS courses, live with SANS Instructor Lenny Zeltser, and network with fellow students on-line, without leaving your home or office.
*************************************************************************
************************* Sponsored Link *****************************
Purchase SANS Voucher Credit today. One procurement, transcend fiscal years, online usage reports, status updates. Visit online today
http://www.sans.org/info/14741 or Email Vouchers@sans.org.
************************************************************************* ************************* Sponsored Link *****************************
Purchase SANS Voucher Credit today. One procurement, transcend fiscal years, online usage reports, status updates. Visit online today
http://www.sans.org/info/14741 or Email Vouchers@sans.org.
*************************************************************************
Part I for this issue has been compiled by Rob King at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Trend Micro ServerProtect and Trend Micro AntiSpyware, popular antispyware and antivirus solutions, contain multiple vulnerabilities. The ServerProtect product exports multiple Remote Procedure Call (RPC) interfaces via Microsoft's RPC mechanism, each of which contains several functions vulnerable to buffer overflow attacks. Additionally, the AntiSpyware product contains a buffer overflow vulnerability in its handling of long filenames. An attacker who called a vulnerable RPC function or created a file with a long name (via, for example, a specially crafted email attachment or open network share) could trigger one of these vulnerabilities. Successfully exploiting one of these vulnerabilities would allow an attacker to execute arbitrary code with the privileges of the vulnerable process (often SYSTEM). Some technical details for these vulnerabilities are publicly available.
Status: Trend Micro confirmed, updates available. Users can mitigate the impact of the RPC vulnerabilities by blocking TCP ports 5168 and 3628 at the network perimeter, if possible.
Description: EMC Legato Networker, a popular enterprise backup solution, contains multiple buffer overflows in its handling of Sun RPC (also known as ONC-RPC) requests. This product exports multiple procedures via these Remote Procedure Call (RPC) interfaces. A specially crafted call to the service exported by the "NSREXECD.EXE" process could trigger several buffer overflows. Successfully exploiting one of these buffer overflows would allow an attacker to execute arbitrary code with the privileges of the vulnerable process. Some technical details are available for these vulnerabilities.
Status: EMC confirmed, updates available. Note that the affected services run on an arbitrary port. This port number can be retrieved via the standard portmapper service, running on TCP port 111. Blocking access to this port at the network perimeter could mitigate the impact of this vulnerability.
Description: Motorola Timbuktu is a remote desktop access application for multiple operating systems, similar to VNC or Microsoft Remote Desktop. Timbuktu contains multiple vulnerabilities. A directory traversal vulnerability in "send" requests can lead to arbitrary file writes. Additionally, several buffer overflow vulnerabilities exist in the handling of application and login requests. No authentication is required to exploit the buffer overflow vulnerabilities, and the "Guest" account has enough access to exploit the directory traversal vulnerability by default. In all cases, successfully exploiting these vulnerabilities would allow an attacker to execute arbitrary code with SYSTEM/root privileges. Some technical details are available for these vulnerabilities.
Status: Motorola confirmed, updates available.
Description: The Helix DNA Server is an open source streaming media server from Real Networks. It contains a buffer overflow vulnerability in its handling of Real Time Streaming Protocol (RTSP) requests. A specially crafted request containing multiple "Require" headers could trigger this buffer overflow, and allow an attacker to execute arbitrary code with the privileges of the vulnerable process. The Helix DNA Server runs on multiple platforms, and is included in many distributions of Linux. The Helix DNA Server shares some code with other Real Networks products; it is possible that they are also vulnerable. Technical details are available for this vulnerability both in the advisories and via source code analysis.
Status: Real Networks confirmed, updates available.
Description: Clam AntiVirus (ClamAV) is a popular open source antivirus solution. ClamAV can be integrated with the Sendmail mail transport system via Sendmail's "milter" mechanism. Sendmail is the most common mail transport system in the world, and the default system on most Unix and Unix-like systems. When ClamAV is integrated with Sendmail and the ClamAV "black hole" configuration option is enabled, a specially crafted email could cause arbitrary commands to be executed with root privileges. No authentication is necessary; it is sufficient to have an email transiting a vulnerable system to exploit this vulnerability. Technical details are available for this vulnerability, both in the advisory and via source code analysis.
Status: ClamAV confirmed, updates available.
Description: Asterisk is a popular open source telephony platform. Asterisk fails to properly free memory when dealing with Session Initiation Protocol (SIP) requests when configured to use the "chan_sip" subsystem. Sending large numbers of specially crafted requests to this subsystem could allow an attacker to exhaust all memory resources on a vulnerable machine. This would prevent further telephony services, including emergency telephony services. Full technical details for this vulnerability are available via source code analysis, and some details are available via the security advisory
Status: Asterisk confirmed, updates available.
Description: eCentrex is a popular developer of Voice-over-IP (VoIP) solutions. The eCentrex VoIP client ActiveX control, installed by several eCentrex products, contains a buffer overflow vulnerability in its "ReInit" method. A specially crafted web page that instantiates this control could trigger this buffer overflow and execute arbitrary code with the privileges of the current user. Full technical details and a proof-of-concept are publicly available for this vulnerability.
Status: Vendor has not confirmed, no updates available. Users can mitigate the impact of this vulnerability by disabling the vulnerable ActiveX control via Microsoft's "kill bit" mechanism for CLSID "BD80D375-5439-4D80-B128-DDA5FDC3AE6C". Note that this may affect normal functionality.
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5549 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2007. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.