Last Chance: MacBook Air, Dell XPS 13 or $600 off with SANS Online Training Ends December 7

Newsletters: @RISK


@RISK provides a reliable weekly summary of (1) newly discovered attack vectors, (2) vulnerabilities with active new exploits, (3) insightful explanations of how recent attacks worked, and other valuable data

A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

May 30, 2013
=============================================================

@RISK: The Consensus Security Vulnerability Alert

Vol. 13, Num. 22

Providing a reliable, weekly summary of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked.

=============================================================

CONTENTS:

NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 5/23/2013 - 5/28/2013
============================================================

TOP VULNERABILITY THIS WEEK: The popular Apache Struts development framework has had a pair of vulnerabilities disclosed that allow for trivial code execution through a web browser. While some reports have stated that the released patch is insufficient protection, administrators should nonetheless apply it immediately, and look for signs of compromise on potentially vulnerable systems, as it is presumed to be exploited in the wild at this point in time.

******************** Sponsored By SANS *********************

Attend the SANS Industrial Controls Systems Security Briefing, Monday, June 10, 2013 in Houston, TX at the Westin Houston Memorial City. Featuring Mike Assante, Eric Cornelius, Lior Frenkel, Bart Pestarino and Jonathan Knudsen. This event is free to Oil & Gas constituents. For more information go to
http://www.sans.org/info/131912
To register for this event via simulcast, visit
http://www.sans.org/info/131917

============================================================

TRAINING UPDATE

- -- Industrial Control System (ICS) Security Training
In-depth, hands-on technical courses taught by top SCADA experts. Gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. Leave the event with solutions that you can immediately put to use in your organization.
--Houston, TX (June 10-June 15)
http://www.sans.org/event/scada-training-houston-2013
--Washington, DC (August 12-August 16)
http://www.sans.org/event/ics-security-training-washington-dc

- -- SANSFIRE 2013 Washington, DC June 14-22, 2013
41 courses. Bonus evening sessions include Avoiding Cyberterrorism Threats Inside Hydraulic Power Generation Plants; and Automated Analysis of Android Malware.
http://www.sans.org/event/sansfire-2013

- -- SANS Rocky Mountain 2013 Denver, CO July 14-20, 2013
10 courses. Bonus evening sessions include OODA - The Secret to Effective Security in Any Environment; and APT: It is Not Time to Pray, It is Time to Act.
http://www.sans.org/event/rocky-mountain-2013

- -- SANS San Francisco 2013 San Francisco, CA July 29-August 3, 2013
7 courses. Bonus evening sessions include Offensive Digital Forensics; and Base64 Can Get You Pwned!
http://www.sans.org/event/san-francisco-2013

- -- SANS Boston 2013 Boston, MA August 5-10, 2013
9 courses. Bonus evening sessions include Cloud R and Forensics; and You Can Panic Now. Host Protection is (Mostly) Dead.
http://www.sans.org/event/boston-2013

- -- SANS Virginia Beach 2013 Virginia Beach, VA August 19-30, 2013
10 courses. Bonus evening presentations include Thanks for Recovering ... Now I Can Hack You!; Everything I Know is Wrong!; and APT: It is Time to Act.
http://www.sans.org/event/virginia-beach-2013

- -- SANS Pen Test Berlin 2013 Berlin, Germany June 2-June 8, 2013
Europe's only specialist pen test training and networking event. Four dedicated pen test training courses led by five SANS world-class instructors.
http://www.sans.org/event/pentest-berlin-2013

- -- SANS London Summer 2013 London, UK July 9-July 16, 2013
5 courses. SANS has added a new London date to the security-training calendar, giving security professionals the opportunity to take one of four of SANS' most popular 6-day courses and the excellent 2 day Securing The Human course.
http://www.sans.org/event/london-summer-2013

- -- Multi-week Live SANS training
http://www.sans.org/mentor/about
Contact mentor@sans.org

- -- Looking for training in your own community?
http://www.sans.org/community/

- --Save on On-Demand training (30 full courses) - See samples at
http://www.sans.org/ondemand/specials

Plus Johannesburg, Abu Dhabi, Seoul, and Bangalore all in the next 90 days. For a list of all upcoming events, on-line and live: www.sans.org

********************** Sponsored Links: ********************

1) SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
http://www.sans.org/info/131922 PDF http://www.sans.org/info/131927

2) Mobile Application Security: New SANS Survey Results Revealed Results to be released during a June 6 webcast held at 1 PM EDT, featuring SANS analyst and mobility expert, Kevin Johnson! Register at www.sans.org/info/124512

3) Leveraging the First Four Critical Security Controls for Holistic Improvements featuring SANS Analyst James Tarala, co-author of the CSCs. http://www.sans.org/info/131932
Wednesday, June 12, 1 PM EDT

============================================================
NOTABLE RECENT SECURITY ISSUES
SELECTED BY THE SOURCEFIRE VULNERABILITY RESEARCH TEAM

Title: Apache Struts bugs allow for trivial remote code execution
Description: A pair of recently released vulnerabilities for the popular Apache Struts framework were released this week, allowing for trivial remote code execution. As the issue can be triggered with a simple web browser-based requests, administrators should assume that exploitation is occurring in the wild already. Patches should be applied as soon as possible, though other counter-measures should be employed where feasible, as some reports have stated that the issue is not properly fixed by the official patch.
Reference:
http://d2sec.com/news/apache_struts_2_rce_not_really_patched.html
http://struts.apache.org/development/2.x/docs/s2-014.html
https://cwiki.apache.org/confluence/display/WW/S2-013
Snort SID: 26772
ClamAV: N/A

Title: Ruby on Rails exploited in the wild
Description: The remote code execution in Ruby on Rails that caused a stir in the security community earlier this year is now being used in a large-scale, in-the-wild exploitation campaign. The vulnerability - for which patches have been available for months - is likely to be hit for the foreseeable future, given the huge installed vulnerable user base. Administrators should check their systems as soon as feasible.
Reference:
http://jarmoc.com/blog/2013/05/28/ror-cve-2013-0156-in-the-wild/
Snort SID: 25287, 25288
ClamAV: N/A

Title: Paypal XSS publicly disclosed after bug bounty turns away 17-year-old
Description: German security researcher Robert Kugler, a 17-year-old student, attempted to warn PayPal of a serious cross-site scripting vulnerability recently through their bug bounty program, but was turned away due to being under 18 years of age. Kugler - who has received payouts from Mozilla bug bounty programs, and who was acknowledged in a recent Microsoft advisory, took to the Full-Disclosure mailing list and provided full details of the attack after being turned away by PayPal. At the time of writing, the vulnerability appears to still be unpatched.
Reference:
http://seclists.org/fulldisclosure/2013/May/163
Snort SID: 7070
ClamAV: N/A

============================================================
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK

Dissecting Blackberry 10: An initial analysis:
http://packetstormsecurity.com/files/121743

Identify backdoors in firmware by using automatic string analysis:
http://blog.ioactive.com/2013/05/identify-back-doors-in-firmware-by.html

Exploiting Samsung Galaxy S4 secure boot:
http://blog.azimuthsecurity.com/2013/05/exploiting-samsung-galaxy-s4-secure-boot.html

A closer look at a recent privilege escalation bug in Linux
(CVE-2013-2094):
http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/

Advanced exploitation of Internet Explorer 10 / Windows 8 overflow
(CVE-2013-2551):

http://www.vupen.com/blog/20130522.Advanced_Exploitation_of_IE10_Windows8_Pwn2Own_2013.php
Interview with a Black Hat: Black market for pwn and profit:
http://blog.whitehatsec.com/interview-with-a-blackhat-part-1/

ATM and Point-of-Sale terminal malware:
http://blog.malwarebytes.org/intelligence/2013/05/atm-and-point-of-sale-terminals-malware-the-bad-guys-just-never-stop/#

- From site compromise to full root access:
http://blog.sucuri.net/2013/05/from-a-site-compromise-to-full-root-access-symlinks-to-root-part-i.html

=========================================================
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM.

This is a list of recent vulnerabilities for which exploits are available. System administrators can use this list to help in prioritization of their remediation activities. The Qualys Vulnerability Research Team compiles this information based on various exploit frameworks, exploit databases, exploit kits and monitoring of internet activity.

ID: CVE-2013-2028
Title: Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
Vendor: nginx.org
Description: Remote exploitation of an integer overflow vulnerability in version 1.4.0 of nginx, as included in various vendors' operating system distributions, could allow attackers to execute arbitrary code on the targeted host.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1347
Title: Microsoft Internet Explorer 8 Use-After-Free Memory Corruption Vulnerability
Vendor: Microsoft
Description: Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.

CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-3336
Title: Adobe ColdFusion Information Disclosure Vulnerability (APSB13-13)
Vendor: Adobe
Description: Unspecified vulnerability in Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to read arbitrary files via unknown vectors.
CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)

ID: CVE-2013-2423
Title: Java Applet Reflection Type Confusion Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)

ID: CVE-2013-0632
Title: Adobe ColdFusion APSB13-03 Remote Exploit
Vendor: Adobe
Description: Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, as exploited in the wild in January 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-1493
Title: Oracle Java SE JVM 2D Subcomponent Remote Code Execution
Vulnerability (Oracle Security Alert for CVE-2013-1493)

Vendor: Oracle
Description: The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

=========================================================
MOST PREVALENT MALWARE FILES 5/23/2013 - 5/28/2013
COMPILED BY SOURCEFIRE

SHA 256: 9D96BE6E7087F402BDB79C3D2EA91D4B922CA28AC20381D8D9864FC6CC6C3875
MD5: cafed638c1b3341c34198edc05fe7a95
VirusTotal: https://www.virustotal.com/file/9D96BE6E7087F402BDB79C3D2EA91D4B922CA28AC20381D8D9864FC6CC6C3875/analysis/

Typical Filename: p18w7.exe
Claimed Product: p18w7.exe
Claimed Publisher: p18w7.exe

SHA 256: C21F13748F168B2E32F9B0DF5A2CA479423C407FA0376A65C3AB3CB4DE9AC9CA
MD5: 64568b7003292fa3a98556f2fcb553df
VirusTotal: https://www.virustotal.com/file/C21F13748F168B2E32F9B0DF5A2CA479423C407FA0376A65C3AB3CB4DE9AC9CA/analysis/

Typical Filename: DivXPlayer.exe
Claimed Product: DivXPlayer.exe
Claimed Publisher: DivXPlayer.exe

SHA 256: 03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E
MD5: b360fa63134a63f9acfe046d2dfe10d9
VirusTotal: https://www.virustotal.com/file/03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E/analysis/

Typical Filename: C__WINDOWS_Temp_nsaxs.exe
Claimed Product: C__WINDOWS_Temp_nsaxs.exe
Claimed Publisher: C__WINDOWS_Temp_nsaxs.exe

SHA 256: E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B
MD5: bf31a8d79f704f488e3dbcb6eea3b3e3
VirusTotal: https://www.virustotal.com/file/E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B/analysis/

Typical Filename: klplmq.sys
Claimed Product: klplmq.sys
Claimed Publisher: klplmq.sys

cSHA 256: AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615
MD5: 3291e1603715c47a23b60a8bf2ca73db
VirusTotal: https://www.virustotal.com/file/AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615/analysis/

Typical Filename: 01.tmp
Claimed Product: 01.tmp
Claimed Publisher: 01.tmp

=============================================================

(c) 2013. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account