Security Watch

Dreading Patch Tuesday

IT staff are getting overwelmed as companies co-opt Microsoft's day for releasing patches.

Governance
The second Tuesday of each month is rapidly becoming the most dreaded day of the month for IT staffers. More and more companies are using the Microsoft Patch Tuesday as their day to release patches also. Microsoft's original intent was to deliver all of their patches on a single day so IT staffers could better coordinate their efforts with respect to patching their machines. With these additional vendor patches, the day is becoming too full to properly analyze the severity and prioritization of all of the patches. Currently, in addition to Microsoft, Oracle, Apple, Mozilla, Sun and Cisco, among others, use the same day.

Is more government interference in the Internet coming? A report by the U.N.'s Working Group on Internet Governance (WGIG) last month made a number of recommendations relating to the future of Internet governance, including a reduced role for the U.S. Dept. of Commerce and ICANN.

The report proposes four models for how the U.N. or international community could become involved with the management of the Internet. The gist of all four models called for more international input so that one country didn't have complete control of the 'Net.

Question: Since when has the Internet been controlled by a single body, and just what additional control does the U.N. or international community think it can exert over the evolution of the Internet? With the exception of laws and regulations governing content traversing the Internet (as it's exposed to a system in a given country), there's very little additional input required, in my opinion.

A Nigerian woman received two and a half years of prison time for helping steal $242 million from a Brazilian bank. This is a landmark victory for Nigeria's Economic and Financial Crime Commission (EFCC). Most of the stolen money was recovered, and properties in various countries, including the U.K. and U.S., will be sold to replace the rest. The EFCC currently is prosecuting 200 cases against "419" (the relevant section of the Nigerian criminal code) scammers.

Although that translates to roughly $100 million per year of jail time, consideration should be made for just how rough it would be to do time in a Nigerian jail. While it is true that the EFCC has made major progress in cracking down on 419 scammers, more than 200 cases have now been prosecuted by that office; and it isn't strictly a Nigerian problem, either. For example, much of the 419 scam emails originate in Holland where they operate largely unmolested.

Hacking/Denial of Service
Oracle Reports versions 6.0, 6i, 9i and 10g contain multiple vulnerabilities that can allow a remote attacker to access sensitive information, overwrite arbitrary files or conduct cross-site scripting attacks.

Oracle Forms versions 6i through 10g, and Reports versions 6.0 through 10g, contain a vulnerability that could allow a remote attacker to run arbitrary system commands on the affected system.

It's doubtful that there are many production environments where these Oracle features are deployed and exposed directly to the Internet, but there are a couple of scenarios to look out for:

Development or prototype servers. Such servers should never be exposed to the Internet, but developers may request such severs be exposed for third-party testing or troubleshooting.

SQL Injection attacks. Improper or incomplete parsing of input by visitors may lead to attack code being injected via a Web front-end, which is then passed on to the Oracle applications.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Sun Management Console (SunMC) unprivileged local or remote users may be able to execute arbitrary code. The SunMC server software uses the Oracle listener, affected by the multiple Oracle vulnerabilities described in Oracle Security Alert No. 68.

This vulnerability was fixed in Oracle back in August 2004, so it has taken quite some time for Sun to get around discovering and/or fixing SunMC.

Another survey, the CSI/FBI 10th Annual Survey, has indicated that costs due to computer attacks have dropped again. The CSI/FBI survey states that 2004 losses per company surveyed are 61 percent lower than 2003, down to $204,000 from $526,000. While these losses are down, the losses due to "information theft" and "proprietary information theft" are up.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025