Security Watch

Snort Vulnerability Overstated?

Various factors need to align for serious damage to be done.

Hacking
Snort Back Orifice Preprocessor Buffer Overflow Vulnerability: Snort versions 2.4.0 through 2.4.2 contain a buffer overflow vulnerability in the Back Orifice preprocessor that could allow a remote attacker to execute arbitrary code on an affected system. Updates are available.

The vulnerability involves how Snort handles traffic it would normally associate with Back Orifice, over UDP 31337, that arrives on *any other* port. That is, Back Orifice-like traffic on a port other than that associated with Back Orifice.

Dire predictions of a Snort worm have gotten media attention. There are several questions that define the risk of such a worm:

a) Are there sufficient Snort installations to make a worm propagate?

Arguable. Since the attack involves a single UDP packet, it’s possible to garner sufficient victim systems despite there not being many around (certainly nowhere near as many as Windows boxes, or even SQL Servers). Further, Snort runs on a variety of platforms and it's highly likely that the attack will have to be specific for each platform. So the Snort population is further divided.

b) Can such a worm propagate fast enough to impact prior to detection and removal?

Again, a UDP worm can spread very fast, as we saw with SQL Slammer. If the impact desired is widespread denial of service (DoS), then such a worm could certainly propagate fast enough. If the desire is to 0wn systems, then a fast-spreading high-profile worm is not the attack of choice, as it would be detected quickly within the Snort community. Of course, those who thought to install Snort, but have failed to maintain it, could easily succumb.

Slow-moving detection is going to be significantly more difficult given that all traffic needs to be examined (other than traffic destined for 31337.)

c) Would a worm yield the desired results?

If the desired result is a widespread DoS, yes. Otherwise no, as stated above.

Denial of Service
Cisco Content Services Switch SSL Denial of Service Vulnerability: Cisco 11500 Series Content Services Switches (CSS) running versions 7.1 through 7.5 of the Cisco WebNS operating system contain a vulnerability that could allow a remote attacker to create a DoS condition. The vulnerability exists due to a memory corruption error that occurs when processing malicious client certificates during SSL session negotiation.

While the exploit is fairly difficult and complex, if you’re a target of choice it may be something that gets abused. Extortion DoS comes to mind if you’re a vendor relying upon Client SSL Certificates.

RSA Authentication Agent for Web Buffer Overflow Vulnerability: Exploit released that can cause a stack overflow in the SecurID Web Agent for IIS. Attempts to exploit this flaw will result in the termination and potential restart of the IIS service. Again, Extortion DoS possibilities.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Malicious Code
Fanbot.A (Mytob?): Exploits the Microsoft Windows Plug and Play remote code execution vulnerability described in Microsoft Security Bulletin MS05-039 and Cybertrust Alert 9572. (Sophos has seen five variants, Trend has four variants and 100+ infections since Oct. 16; Symantec has it at two.)

One of the new malware forms is an infector of the RAR file extension. This suggests malware authors may be looking for new fodder, attacking a file type that has not recently been abused. Fortunately, RAR is not a file type that WinZip or Windows XP File Compression resolve by default.

Governance
The banking industry is being called upon to strengthen security for Internet customers. Federal regulators will require banks to augment user names and password authentication mechanisms, but so far details regarding how have not been specified.

Media stories have ranged from "the end of phishing as we know it" to "any bank that doesn’t want to, doesn’t have to implement stronger authentication." The truth will likely be somewhere in between.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025