Register now for SANS Cyber Defense Initiative 2016 and save $400.

Newsletters: @RISK

@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

March 27, 2013
=============================================================

@RISK: The Consensus Security Vulnerability Alert

Vol. 13, Num. 13

Providing a reliable, weekly summary of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked.

=============================================================

CONTENTS:

NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST POPULAR MALWARE FILES 3/19/2013 - 3/27/2013
============================================================

TOP VULNERABILITY THIS WEEK: CA cross-site scripting vulnerability was discovered in the popular Wordpress Wp-Banners-Lite plugin. Given the popularity of using compromised WordPress installations to host malicious content, and the hundreds of thousands of vulnerable sites seen via Google queries at the time of publication, this vulnerability is likely to be used widely by nefarious actors looking to cover their tracks.

***************** Sponsored By SANS ****************

Attend the SANS 20 Critical Security Control Briefing, Thursday, April 18, 2013 in Washington, DC at the JW Marriott. Tony Sager and John Pescatore will provide an overview of the the 20CC, showcase the 20CC In Action, and also moderate a Vendor Panel. Event is free to Government attendees. For more information go to
http://www.sans.org/info/128262

To register for this event via simulcast, visit
http://www.sans.org/info/128182

============================================================

TRAINING UPDATE

- -- SANS Monterey 2013 Monterey, CA March 22-March 27, 2013
8 courses. Bonus evening presentations include Base64 Can Get You
Pwned!; The 13 Absolute Truths of Security; and Look Ma, No Packets! -
The Recon-ng Framework.
http://www.sans.org/event/monterey-2013

- -- SANS Northern Virginia 2013 Reston, VA April 8-April 13, 2013
7 courses. Bonus evening presentations include Infosec Rock Star: How
to be a More Effective Security Professional; Pentesting Web Apps with
Python; and Practical, Efficient Unix Auditing: With Scripts.
http://www.sans.org/event/northern-virginia-2013

- -- SANS Cyber Guardian 2013 Baltimore, MD April 15-April 20, 2013
9 courses. Bonus evening presentations include Windows Exploratory
Surgery with Process Hacker; Offensive Countermeasures, Active Defenses,
and Internet Tough Guys; and Tactical SecOps: A Guide to Precision
Security Operations.
http://www.sans.org/event/cyber-guardian-2013

- -- SANS Security West 2013 San Diego, CA May 7-May 16, 2013
32 courses. Bonus evening sessions include Gone in 60 Minutes; The
Ancient Art of Falconry; and You Can Panic Now. Host Protection is
(Mostly) Dead.
http://www.sans.org/event/security-west-2013

- -- Critical Security Controls International Summit London, UK April 26-May 2 2013
Including SEC566: Implementing and Auditing the 20 Critical Security
Controls led by Dr. Eric Cole.
http://www.sans.org/event/critical-security-controls-international-summit

- -- SANS Pen Test Berlin 2013 Berlin, Germany June 2-June 8, 2013
Europe's only specialist pen test training and networking event. Five
dedicated pen test training courses led by five SANS world-class
instructors.
http://www.sans.org/event/pentest-berlin-2013

- -- Looking for training in your own community?
http://www.sans.org/community/

- -- Save on On-Demand training (30 full courses) - See samples at
http://www.sans.org/ondemand/specials

Plus Abu Dhabi, New Delhi, Seoul, Bangalore, and Johannesburg, all in
the next 90 days.

For a list of all upcoming events, on-line and live: www.sans.org

>********************* Sponsored Links: *********************

1) Analyst Webcast: NAC Applied to SANS Critical Security Controls Wednesday, April 03, 2013 at 1:00 PM EDT (1700 UTC/GMT)Featuring: G. Mark Hardy and Scott Gordon. http://www.sans.org/info/128187

2) Take the New SANS Survey on the Critical Security Controls and enter to win a new iPad! http://www.sans.org/info/128192

============================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE SOURCEFIRE VULNERABILITY RESEARCH TEAM

Title: Wordpress Wp-Banners-Lite plugin cross-site scripting
Description: A trivially exploitable cross-site scripting vulnerability was discovered this week in the popular Wordpress Wp-Banners-Lite plugin, with details released on the Full-Disclosure mailing list. Administrators of vulnerable systems are urged to patch immediately; however, given the huge numbers of neglected, vulnerable WordPress installations in the wild, and their popularity as launching points for other attacks, system administrators should be more concerned about compromised sites being used to attack their users. In particularly restrictive environments, administrators should consider blocking all WordPress hosted sites.
Reference:
http://seclists.org/fulldisclosure/2013/Mar/209
Snort SID: 26263 ClamAV: N/A

Title: MongoDB command injection vulnerability
Description: A fully functional exploit for a newly discovered MongoDB command injection vulnerability was released this week. The issue - which stems from improper filtering of the "nativeHelper.apply" method originally created by SpiderMonkey, and imported by MongoDB. No patch is currently available; system administrators are urged to filter the command wherever possible.
Reference:
http://cxsecurity.com/issue/WLB-2013030212
Snort SID: 26262 ClamAV: N/A

Title: Massive DDoS against Spamhaus reaches 300Gbps
Description: Following a dispute between Dutch hosting provider Cyberbunker and anti-spam group Spamhous, the latter suffered what initially began as a relatively small - 10 Gbps - DDoS, which escalated over the course of last week to a 300Gbps flood. Anti-DDoS provider CloudFlare noted that the attackers - who have not been conclusively linked to Cyberbunker - were able to generate such huge volumes of traffic by using open DNS resolvers, which can respond to small, spoofed requests with massive floods of data. As a result of this attack - one of the largest ever on the Internet to date - a new project has been announced to locate and fix all of the approximately 27 million such systems on the Internet today.
Reference:
http://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet
http://openresolverproject.org/
Snort SID: Rate-based preprocessor
ClamAV: N/A

============================================================
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK

How your movements create a GPS 'fingerprint':
http://www.cnn.com/2013/03/26/tech/mobile/mobile-gps-privacy-study/index.html

Whois behind South Korean wiper attacks?
http://www.f-secure.com/weblog/archives/00002533.html

Running SSH honeypots with Kippo:
http://blog.macuyiko.com/2011/03/running-ssh-honeypot-with-kippo-lets.html

Bad Java decompliation means erroneous statement in research paper:
http://www.android-decompiler.com/blog/2013/03/21/bad-apk-decompilation-means-partial-erroneous-conclusion-in-research-paper/

Free 101-page PDF / 36-exploit ISO for pen testers:
https://pentesterlab.com/web_for_pentester.html

How Apple's password-reset security breach worked:
http://gizmodo.com/5992117/how-apples-password+reset-security-breach-worked

Input being solicited for new version of ClamAV:
http://lurker.clamav.net/message/20130320.143552.f2d45ad6.en.html

New Sykipot developments:
http://labs.alienvault.com/labs/index.php/2013/new-sykipot-developments/

To understand the command line...
http://geekblog.oneandoneis2.org/index.php/2012/09/30/to-understand-the-command-line

=========================================================
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM.

This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2012-4711
Title: KingView Log File Parsing Buffer Overflow
Vendor: WellinTech
Description: Buffer overflow in kingMess.exe 65.20.2003.10300 in WellinTech KingView 6.52, kingMess.exe 65.20.2003.10400 in KingView 6.53, and kingMess.exe 65.50.2011.18049 in KingView 6.55 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted packet.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2012-3001
Title: Mutiny Remote Command Execution
Vendor: Mutiny Technology
Description: Mutiny Standard before 4.5-1.12 allows remote attackers to execute arbitrary commands via the network-interface menu, related to a "command injection vulnerability."
CVSS v2 Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

ID: CVE-2012-5201
Title: HP Intelligent Management Center Arbitrary File Upload
Vendor: Hewlett Packard
Description: An unspecified vulnerability has been identified in Intelligent Management Center (IMC). The error occurs with "mibFileUpload," which accepts unauthenticated uploads and improperly handles ZIP contents in an insecure manner.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-0108
Title: Honeywell HSC Remote Deployer ActiveX Remote Code Execution
Vendor: Honeywell
Description: An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.
CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)

ID: CVE-2013-1288
Title: Microsoft Internet Explorer CTreeNode Use After Free Vulnerability (MS13-021)
Vendor: Microsoft
Description: Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability."
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1493
Title: Oracle Java SE JVM 2D Subcomponent Remote Code Execution
Vulnerability (Oracle Security Alert for CVE-2013-1493)
Vendor: Oracle
Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

=========================================================
MOST POPULAR MALWARE FILES 3/19/2013 - 3/27/2013:
COMPILED BY SOURCEFIRE

SHA 256: 9ade68f592217900f364742f553b1b177ea2cce8d365e00560230db49e386fcf
MD5: 765197626e862524cd850a49baec7031
VirusTotal: https://www.virustotal.com/file/9ade68f592217900f364742f553b1b177ea2cce8d365e00560230db49e386fcf/analysis/
Typical Filename: jf_cf_frostovip.exe
Claimed Product: JF_CF_MiniZM
Claimed Publisher: www.crazyfrost.com

SHA 256: 636fec0f9f19f56f082ad5558aed5e6c323fb44e573e0f94d0d1a1eb3cea7041
MD5: 07fd6e250058a78bcf4d9fa65dee03ab
VirusTotal: https://www.virustotal.com/file/636fec0f9f19f56f082ad5558aed5e6c323fb44e573e0f94d0d1a1eb3cea7041/analysis/
Typical Filename: jf_1hitcf.exe
Claimed Product: JF_CF_MiniZM
Claimed Publisher: www.crazyfrost.com

SHA 256: bcc6188203e7b42073209f9356aa15598f61151217eb25dbd869db0e5b99b0c9
MD5: efac97460bd2e8fad7f5118bc4020fdc
VirusTotal: https://www.virustotal.com/file/bcc6188203e7b42073209f9356aa15598f61151217eb25dbd869db0e5b99b0c9/analysis/
Typical Filename: D3D Damag CF v11.8.exe
Claimed Product: -
Claimed Publisher: -

SHA 256: fe1e4987cd97c1198da240aa490e94c4def8db61b95815d1379220fd7bed603a
MD5: 595f95f3b1f54d51a179d60804184ceb
VirusTotal: https://www.virustotal.com/file/fe1e4987cd97c1198da240aa490e94c4def8db61b95815d1379220fd7bed603a/analysis/
Typical Filename: jf_1hitcf.exe
Claimed Product: -
Claimed Publisher: www.crazyfrost.com

SHA 256: a316c76591ec14102164ef345cd2bd61a8a455724cfcd1591b1fe1d50543ad25
MD5: 7a402a1cf3be24a2eb97e79973df91e7

VirusTotal: https://www.virustotal.com/file/a316c76591ec14102164ef345cd2bd61a8a455724cfcd1591b1fe1d50543ad25/analysis/
Typical Filename: 9DF.exe
Claimed Product: -
Claimed Publisher: -

=============================================================

(c) 2013. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account