Question 1: What do CA, Symantec and IBM all have in common? They are all selling security and they each have a critical buffer overflow problem (CA and IBM) or SQL Injection problem (Symantec) in commonly used software: CA ArcServe, IBM Lotus Domino Webserver, and Symantec Altiris Deployment. Question 2: Which of the three companies has tested all or most of their software developers on secure coding skills? If you think they should, put that in your procurement specs. If you don't put programmer skill testing and source/binary code security testing (with results delivered to customers) in your procurements, you cannot really complain when they deliver software that has security flaws. Alan
@RISK is the SANS community's consensus bulletin summarizing the most important vulnerabilities and exploits identified during the past week and providing guidance on appropriate actions to protect your systems (PART I). It also includes a comprehensive list of all new vulnerabilities discovered in the past week (PART II).
************************* Sponsored By SANS *****************************
Come hear how pen testing pioneers are pushing the envelope in developing new tools and techniques to find flaws. Come hear what the current trends are in malicious attacks and how pen testing processes must adapt to them. Come hear real-world testing techniques. All at the Penetration Testing and Ethical Hacking Summit June 2-3 in Las Vegas. http://www.sans.org/info/29223
*************************************************************************
TRAINING UPDATE Where can you find the newest Penetration Testing techniques, Application Pen Testing, Hacker Exploits, Secure Web Application Development, Security Essentials, Forensics, Wireless, Auditing, both new Pen Testing courses, CISSP, and SANS' other top-rated courses plus evening sessions with Internet Storm Center handlers. - - SANSFIRE 2008 in Washington DC (7/22-7/31) SANS' biggest summer program with many bonus sessions and a big exhibition of security products: http://www.sans.org/info/26774 - - London (6/2-6/7) and Amsterdam (6/16-6/21) and Brussels (6/16-6/21) http://www.sans.org/secureeurope08 - - Denver (6/7-6/13) http://www.sans.org/rockymnt2008/ - - Singapore (6/30-7/5) http://www.sans.org/singapore08/ - - Boston (8/9-8/16) http://www.sans.org/boston08/ - - and in 100 other cites and on line any time: www.sans.org
*************************************************************************
Part I for this issue has been compiled by Rohit Dhamankar at TippingPoint, a division of 3Com, as a by-product of that company's continuous effort to ensure that its intrusion prevention products effectively block exploits using known vulnerabilities. TippingPoint's analysis is complemented by input from a council of security managers from twelve large organizations who confidentially share with SANS the specific actions they have taken to protect their systems. A detailed description of the process may be found at http://www.sans.org/newsletters/cva/#process
Description: Computer Associates ARCserve Backup products provide backup services for Windows, NetWare, Linux and UNIX. The products contain a stack-based buffer overflow in the implementation of "xdr_rwsstring()" function. The flaw can be triggered by a specially crafted request to caloggerd/cacommd daemons, and exploited to execute arbitrary code with root/SYSTEM privileges. A second vulnerability in the caloggerd daemon's handling of logging messages allows attackers to append arbitrary data to any system file via directory traversal modifiers. This can result in a complete system compromise as well.
Status: CA has released patches for both vulnerabilities. A workaround is to block requests to port 601/tcp and 6072/tcp from the Internet. CA Backup products have been featured many times in the critical section of the @RISK newsletters since 2005. SANS recommends blocking all the ports that are opened by the software at the network perimeter. A list of the ports to block may be found at: http://en.wikibooks.org/wiki/CA_Unicenter_NSM_Textbook/Unicenter_port_reference http://supportconnectw.ca.com/public/ca_common_docs/brightstorwinxpsp2matrix.asp
Description: Symantec Altiris Deployment Solution software is designed to automate the process of deploying OSs and software for desktops and servers in an enterprise. The Altiris Server service (axengine.exe), which runs on port 402/tcp by default, contains a SQL Injection vulnerability. An unauthenticated attacker can exploit the SQL Injection vulnerability to execute arbitrary commands with SYSTEM privileges. A successful attack could lead to installing malware on all the systems being managed by the Altiris Deployment server.
Status: Symantec has released version 6.9.176 to address the flaw.
Description: IBM Lotus Domino software offers a messaging and collaboration environment for an enterprise. The Lotus Domino web server, not enabled by default, contains a stack-based buffer overflow. The overflow can be triggered by an overlong "Accept-Language" HTTP header, and exploited to execute arbitrary code on the Domino server with SYSTEM privileges. Exploit code has not been publicly posted yet.
Status: IBM has fixed the vulnerability in versions 7.0.3 FP1 and 8.0.1 versions.
Description: Cisco devices are usually managed remotely via SSH protocol. The SSH server on certain Cisco IOS versions contains multiple vulnerabilities. These vulnerabilities can be exploited by an unauthenticated attacker to reload the Cisco devices. Repeated attacks would lead to a denial-of-service to the affected Cisco devices. The details about the vulnerabilities are not publicly posted. Cisco Service Control Engine device used to manage network bandwidth is also affected by multiple vulnerabilities in its SSH server. These vulnerabilities can be exploited to reload the SCE devices.
Status: Cisco has released fixes for the vulnerable IOS and SCE versions. A workaround is to block SSH access from the Internet to the Cisco devices' management interface.
Description: Cisco Unified Communications Manager, which runs on Windows platform, is the main server in a Cisco enterprise VoIP deployment. The Unified Communications Manager is responsible for the call processing and routing functions. It contains multiple denial-of-service vulnerabilities that can be triggered by (a) Sending malformed TCP packets to port 2444/tcp (b) Sending malformed SIP JOIN and INVITE requests (c) Sending malformed UDP packets to port 61441/udp (d) Sending specially crafted packets to port 3804/tcp. The Cisco advisory indicates that the malformed packets can be generated by using the ISIC tool and other protocol fuzzing tools. Note that causing a denial-of-service to Call Manager may result in loss of phone service in an enterprise.
Status: Cisco has released the following versions to fix the vulnerabilities: 4.1.3SR7, 4.2(3)SR4, 4.3(2), 5.1(3), 6.1(1)
This list is compiled by Qualys ( www.qualys.com ) as part of that company's ongoing effort to ensure its vulnerability management web service tests for all known vulnerabilities that can be scanned. As of this week Qualys scans for 5888 unique vulnerabilities. For this special SANS community listing, Qualys also includes vulnerabilities that cannot be scanned remotely.
(c) 2008. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only. In some cases, copyright for material in this newsletter may be held by a party other than Qualys (as indicated herein) and permission to use such material must be requested from the copyright owner.
Subscriptions: @RISK is distributed free of charge by the SANS Institute to people responsible for managing and securing information systems and networks. You may forward this newsletter to others with such responsibility inside or outside your organization.