Security Watch

U.K. Calls for Int'l Privacy Standards

Plus: McAfee's road to safe surfing, and Novell, OpenBSD buffers overflow aplenty.

The U.K. Information Commissioner is suggesting that there needs to be greater "harmonization" of privacy laws around the globe, and in particular between the EU and U.S.

The real question is which country's laws are closer to the harmonized standard being sought, and which has to change its thinking? The SWIFT issue is a perfect example where the EU felt SWIFT should be governed by its rules, and the U.S. felt SWIFT should comply with its needs. In the end, SWIFT agreed with the U.S., which got the EU flustered.

McAfee Maps Safe Surf Locales
Using the same tools McAfee uses for its SiteAdvisor product, the company has performed a study based on top-level domain names to rank the TLD risks. Tokelau (.TK) came up as the No. 1 riskiest TLD, while .gov remains the only TLD without any risky sites.

The study isn't quite fair. The .gov TLD isn't exactly equivalent to all of the other TLDs McAfee tested. No doubt, most countries have domains reserved entirely for their governments, such as .gov.uk in England -- while not a TLD, it is the .gov equivalent. There may be many countries that have entire classifications of domains that are free of "risk" as defined by McAfee, but because of the way McAfee is looking at it, these won't show up as such.

Regardless, the study does show how some countries are possibly not doing enough to determine to whom they grant registrations. For example, e-mail addresses are collected for spamming by some 73 percent of the .info domains tested.

Smart USBs Gone Bad
In case you weren't aware, U3 drives are USB drives that make themselves appear as CDs to Windows. As such, when they are inserted, Windows typically uses its AutoRun feature to load and execute whatever is in the U3 drive's .inf file. This means that a criminal could set up their U3 drive to run tools or malicious code and attack the system they are connecting to.

And if that works, they could've done it with a CD. The difference might be that the U3 drive might store information it discovers on itself. However, with the number of CD-RW drives out there, that may well be true of a CD. In any event, it is a "slurping" issue in that a criminal could plug in their U3 drive, pass some time talking, and then remove the drive with whatever files they had discovered.

Windows XP and Windows Server 2003 allow you to disable the AutoRun feature, and Vista prompts the user whenever anything that attempts to get AutoRun to work is inserted. There are also products available which, at an enterprise level, can disable USBs or make them read-only.

Attack of the Cyber-Toxins
An MIS magazine article made us wonder whether any of the people interviewed in it had been in security for more than five years. The article suggests that there's a revelation in knowing that client applications are being targeted for attack by criminals, and that this somehow meant "the war on hackers has simply moved to a new battleground."

The article makes it sound like people spent all of their time on firewalls until just recently, when they realized they needed to protect the client systems. The article goes on to suggest that firewalls and anti-virus are of little use in protecting client systems, because Word and PowerPoint zero-day exploits have made perimeter protection obsolete.

Of course, anyone who's read Cybertrusts' Anti-Virus Policy Guide knows that client-side protection has been as important as perimeter protection for many years. Anyone who has read our Weekly Risk Briefing Notes will also realize that the application level risk really hasn't changed, despite every attempt by the media and purveyors of security solutions to suggest the risk is enormous.

Every type of attack discussed in the MIS article has affected one to four users, according to available information. Yes, such attacks have occurred, but to suggest that we need to completely rethink what we're doing -- or to say that anti-virus is of no use -- is absurd. The article also makes a seemingly important point that the user is the problem, because the user is being presented the malware and choosing to click on it. How is this news and how is this any different than it ever has been?

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Novell, OpenBSD Buffer Overflow Flaws
NetMail WebAdmin Remote Buffer Overflow Vulnerability
Novell NetMail uses a tool called WebAdmin to process modifications to the NetMail process. WebAdmin can be exploited via a buffer overflow when performing basic authentication. If the user name parameter is longer than 213 characters, the criminal's code may execute. Updates are available.

This is a server component, so exploitation would result in the ability to execute code in the security context of SYSTEM, the highest privilege on the server. The process normally listens on port 89 (HTTP) and 449 (HTTPS), but on Novell Nterprise Linux Services it listens on 8018 (HTTP) and 8020 (HTTPS). None of these ports should be accessible by untrusted systems.

Being only the second remotely exploitable kernel vulnerability in OpenBSD in 10 years, malicious IPv6 ICMP packets can be sent to an OpenBSD machine and cause criminal code to execute with the privileges of the kernel, the highest available on the system (see alerts here and here).

The default installation is vulnerable, and the default installation of the firewall does not filter such packets. That means any OpenBSD system that is exposed to the Internet is potentially vulnerable.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025