Security Watch

Think Microsoft’s Slow? Check Out These Patches

Microsoft is diligent compared to these vendors who release their fixes a year after the fact.

Hacking
wget Symbolic Link Vulnerability: Re-amplified to announce the release of patches by Mandriva.

If anyone thinks to criticize Microsoft for taking some time to release a patch for a given vulnerability, remember this one. The vulnerability being patched here was first announced in May of 2004, and proof-of-concept exploit code was published in that same month. It took more than one year for the first patches to be released (for Ubuntu) and 18 months for Mandriva to get around to it.

zlib Buffer Overflow Vulnerability: Re-amplified to announce the release of patches by Trustix.

And it gets better: Trustix waited more than 2.5 years to patch this one.

Multiple PHP issues:

  • PHP ext/curl and ext/gd Security Restriction Bypass Issues
  • PHP glob Safe Mode Information Disclosure Vulnerability
  • PHP virtual() Function Security Restriction Bypass Issue
  • PHP parse_str Security Configuration Bypass Issue
  • PHP phpinfo Cross-Site Scripting Vulnerability
  • phpMyAdmin Cross-Site Scripting and Local File Inclusion Vulnerabilities
  • phpMyAdmin Cross-Site Scripting Vulnerabilities
  • PHP File Upload GLOBAL Variable Overwrite Vulnerability

By crafting a special upload file, it’s possible to overwrite the global array of PHP allowing attackers to inject different content into PHP global variables. By generating multiple requests to a code that uses parse_str(), attackers can open the register_global to be activated in PHP. A XSS in the phpinfo() function of PHP allows attackers to steal information from users. phpBB lets remote users bypass the global 'deregistration' code, inject SQL commands, execute PHP code and conduct cross-site scripting attacks.

Generally speaking, the biggest threats to PHP come as a result of doing a default installation and leaving it without reducing the privileges it installs with. Far too many development and test systems install everything, including PHP, yet never get secured. As a result, insecure PHP may be all over your environment unbeknownst to you.

PHP is a very common target for Web site defacers and those looking to own systems they can use in phishing attacks.

Cisco IOS Heap-Based Overflow Vulnerability in System Timers: The Cisco Internetwork Operating System (IOS) may permit arbitrary code execution after exploitation of a heap-based buffer overflow vulnerability. Cisco has included additional integrity checks in its software that are intended to reduce the likelihood of arbitrary code execution.

This is another vulnerability found in IOS following the discovery announced at the Black Hat Conference back in July. While it’s not a significant threat, it’s further proof that IOS can be made into a platform for running malicious code.

Jargon watch: USA Today recently ran a story about online trading accounts or online banking accounts being incredibly insecure. In the story, the phrase "hijack Trojan" was used to denote a new piece of malware. The malware lays dormant, waiting for a successful authenticated connection to a trusted (presumably financial) Web site, at which time it then injects a transaction into the session.

We haven’t yet seen such a piece of malware, although it’s not unreasonable to believe that many of today’s bots could do such a thing.

Malicious Code
Oracle "Voyager" worm: This worm, exploiting the default password vulnerability in Oracle servers, has been published. The proof-of-concept worm creates an empty database table. If you have your database directly accessible from the Internet with default passwords, a lot worse could happen.

Sony DRM Rootkit: As you probably heard last week, Sony was discovered to have been installing a rootkit -- software that stealthily hides its existence from the user of the computer -- as part of its CD protection scheme. According to reports, the rootkit itself is fairly benign. However, rootkits are evil pieces of malware, no matter who makes them or for what purpose. They are the same as a good virus -- it doesn’t exist. They should never be contemplated by any company who hopes to have consumers trust them. Any company found installing them without informed consumer consent should, in my opinion, be shunned like a DoS extortionist or a virus writer.

Sony has made a utility available for consumers to uninstall the rootkit. This is the equivalent of an “opt-out” list, in that you must realize you have the rootkit (and that a utility exists to remove it) before you can make the decision to take this unknown piece of software off of your machine). Further, the uninstaller had a vulnerability of its own, allowing malicious Web sites to instruct a control it uses to uninstall anything on a victim’s system.

There is no reason for anti-spyware not to detect it and offer to remove it. Since it is software installed without the consent of the user, it falls squarely in the common definition of spyware … even if it doesn’t actually send any information to anyone.

Human Factors
Several public and private organizations banded together to launch a new anti-Internet fraud initiative for consumers, officials announced Monday. The FBI, Monster Worldwide, the National White Collar Crime Center (NW3C), the U.S. Postal Inspection Service, Target Corp. and the Merchant Risk Council established LooksTooGoodToBeTrue.com, a Web site containing a variety of educational tools to keep consumers safe from fraudsters.

It wouldn't be unrealistic to see fraud attempts using a similar looking domain name in the near future, exploiting the trust the organizers have tried to paste together.

The site is thus far not up, so you are instead redirected to a Network Solutions search page telling you it’s still under construction. Guess they had the chicken before the egg …

Physical Security
The Cybertrust Intelligence group recently considered a simple question, namely: “Is a computer that's off 12 hours a day at 50 percent of the risk of a computer that's on 24x7?”

From the Cybertrust Essential Practice perspective that every layer, regardless how significant, helps improve security … sure, half-off should have some impact on overall risk. The system will not be exposed to as many attacks, and should be attended when attacks do occur … possibly helping to identify infected machines in a more timely fashion. Further, outbreaks in the wee hours of the morning should be less likely, leading to reduce overtime expense and unattended interruptions in systems or your networks.

Some institutions, such as the U.S. Navy, have already implemented such a strategy, although not for security reasons. The Navy does this simply as an energy conservation measure.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Of course if any machines are on, and are vulnerable to an attack that’s present, the infection will still occur. As such, even if most other systems are turned off, they may well get infected the minute they’re powered on. If it were possible to have all systems on a given network segment turned off for the same period of time, then security improvements may well prove significant.

It’s also worth noting that remote administration would not be possible on systems which are turned off. That means patch deployment, for example, would have to wait for the users to turn on the computers. For some corporations that could mean exposing systems to an existing network worm prior to being patched.

The consensus seemed to be that it may improve security some, and would definitely help conserve power. Providing that remote administration or patch management can be handled with systems off, turning systems off is a sensible approach to increased security.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular