CERT Summary CS-2003-01

From: CERT Advisory (cert-advisory@cert.org)
Date: 03/21/03

  • Next message: CERT Advisory: "CERT Advisory CA-2003-11 Multiple Vulnerabilities in Lotus Notes and Domino"
    Date: Fri, 21 Mar 2003 15:02:29 -0500
    From: CERT Advisory <cert-advisory@cert.org>
    To: cert-advisory@cert.org
    
    

    -----BEGIN PGP SIGNED MESSAGE-----

    CERT Summary CS-2003-01

       March 21, 2003

       Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT
       Summary to draw attention to the types of attacks reported to our
       incident response team, as well as other noteworthy incident and
       vulnerability information. The summary includes pointers to sources of
       information for dealing with the problems.

       Past CERT summaries are available from:

              CERT Summaries
              http://www.cert.org/summaries/
       ______________________________________________________________________

       Recent Activity

       Since the last regularly scheduled CERT summary, issued in November
       2002 (CS-2002-04), we have seen vulnerabilities in multiple Windows
       operating system components, vulnerabilities in several widely used
       pieces of server software, and a new piece of self-propagating
       malicious code.

       For more current information on activity being reported to the
       CERT/CC, please visit the CERT/CC Current Activity page. The Current
       Activity page is a regularly updated summary of the most frequent,
       high-impact types of security incidents and vulnerabilities being
       reported to the CERT/CC. The information on the Current Activity page
       is reviewed and updated as reporting trends change.

              CERT/CC Current Activity
              http://www.cert.org/current/current_activity.html

        1. Buffer Overflow Vulnerability in Core Windows DLL

           A buffer overflow vulnerability exists in ntdll.dll. This
           vulnerability may allow a remote attacker to execute arbitrary
           code on the victim machine.

           An exploit is publicly available for this vulnerability which
           increases the urgency that system administrators apply a patch.
           The CERT/CC strongly encourages sites Windows to read CERT
           Advisory CA-2003-09, examine their systems for signs of compromise
           and apply the appropriate patch as soon as possible.

              CERT Advisory CA-2003-09:
              Buffer Overflow Vulnerability in Core Windows DLL
              http://www.cert.org/advisories/CA-2003-09.html

        2. Remote Buffer Overflow in Sendmail

           A vulnerability has been discovered in sendmail, the most popular
           mail transfer agent (MTA) in use on the Internet, that may allow
           remote attackers to gain the privileges of the sendmail daemon,
           typically root. This vulnerability is triggered by the contents of
           a specially-crafted email message rather than by lower-level
           network traffic.

           The CERT/CC has received reports of increased scanning for port
           25/tcp (SMTP) and apparent attempts to exploit this vulnerability.
           Sites running sendmail are encouraged to read CERT Advisory
           CA-2003-07 apply the appropriate patch.

           Some other vendors have released patches for their MTA software
           which prevents the MTA from passing potentially malicious messages
           to other systems which may be running sendmail. We encourage sites
           to apply these patches if possible to help protect other servers
           on the Internet.

               CERT Advisory CA-2003-07:
               Remote Buffer Overflow in Sendmail
               http://www.cert.org/advisories/CA-2003-07.html

        3. Increased Activity Targeting Windows Shares

           Over the past few weeks, the CERT/CC has received an increasing
           number of reports of intruder activity involving the exploitation
           of Null (i.e., non-existent) or weak Administrator passwords on
           Server Message Block (SMB) file shares used on systems running
           Windows 2000 or Windows XP. This activity has resulted in the
           successful compromise of thousands of systems, with home broadband
           users' systems being a prime target. More information on this
           activity and the attack tools known to be involved are described
           in CERT Advisory CA-2003-08.

               CERT Advisory CA-2003-08:
               Increased Activity Targeting Windows Shares
               http://www.cert.org/advisories/CA-2003-08.html

        4. Samba Contains Buffer Overflow in SMB/CIFS Packet Fragment
           Reassembly Code

           A buffer overflow vulnerability has been discovered in Samba, a
           popular file and printer sharing tool. By exploiting this
           vulnerability a remote attacker may be able to execute arbitrary
           code with the privileges of the Super User, typically root. An
           updated version of Samba (2.2.8) has been released.

           The CERT/CC has not yet received reports of this vulnerability
           being exploited, but sites are strongly encouraged to examine
           their samba servers and upgrade to the newest version if possible
           to eliminate the potential for exploitation.

               Vulnerability Note VU#298233:
               Samba contains buffer overflow in SMB/CIFS
               packet fragment reassembly code
               http://www.kb.cert.org/vuls/id/298233

        5. MS-SQL Server Worm

           The CERT/CC has received reports of self-propagating malicious
           code that exploits a vulnerability in the Resolution Service of
           Microsoft SQL Server 2000 and Microsoft Desktop Engine (MSDE)
           2000. This worm has been referred to as the SQLSlammer,
           W32.Slammer, and Sapphire worm. The propagation of this malicious
           code has caused varied levels of network degradation across the
           Internet and the compromise of vulnerable machines. In January,
           2003, the CERT/CC issued an advisory describing the SQL Server
           Worm.

               CERT Advisory CA-2003-04:
               MS-SQL Server Worm
               http://www.cert.org/advisories/CA-2003-04.html

           Administrators of all systems running Microsoft SQL Server 2000
           and MSDE 2000 are encouraged to review CA-2002-22 and VU#484891.
           For detailed vendor recommendations regarding installing the patch
           see the following:

            http://www.microsoft.com/technet/security/virus/alerts/slammer.asp

           Six months earlier, the CERT/CC issued an advisory describing
           several serious vulnerabilities in Microsoft SQL Server that allow
           attackers to obtain sensitive information, alter database
           contents, and compromise server hosts.

               CERT Advisory CA-2002-22:
               Multiple Vulnerabilities in Microsoft SQL Server
               http://www.cert.org/advisories/CA-2002-22.html

        6. Multiple Vulnerabilities in Implementations of the Session
           Initiation Protocol (SIP)

           Numerous vulnerabilities have been reported in multiple vendors'
           implementations of the Session Initiation Protocol. These
           vulnerabilities may allow an attacker to gain unauthorized
           privileged access, cause denial-of-service attacks, or cause
           unstable system behavior. If your site uses SIP-enabled products
           in any capacity, the CERT/CC encourages you to read this advisory
           and follow the advice provided in the Solution section below.

               CERT Advisory CA-2003-06:
               Multiple vulnerabilities in implementations of the Session
               Initiation Protocol (SIP)
               http://www.cert.org/advisories/CA-2003-06.html

        7. Multiple Vulnerabilities in SSH Implementations

           Multiple vendors' implementations of the secure shell (SSH)
           transport layer protocol contain vulnerabilities that could allow
           a remote attacker to execute arbitrary code with the privileges of
           the SSH process or cause a denial of service. The vulnerabilities
           affect SSH clients and servers, and they occur before user
           authentication takes place.

               CERT Advisory CA-2002-36:
               Multiple Vulnerabilities in SSH Implementations
               http://www.cert.org/advisories/CA-2002-36.html

               CERT Vulnerability Note VU#389665:
               Multiple vendors' SSH transport layer protocol implementations
               contain vulnerabilities in key exchange and initialization
               http://www.kb.cert.org/vuls/id/389665

        8. Buffer Overflow in Microsoft Windows Shell

           A buffer overflow vulnerability exists in the Microsoft Windows
           Shell. An attacker can exploit this vulnerability by enticing a
           victim to read a malicious email message, visit a malicious web
           page, or browse to a folder containing a malicious .MP3 or .WMA
           file. The attacker can then execute arbitrary code with the
           privileges of the victim.

               CERT Advisory CA-2002-37:
               Buffer Overflow in Microsoft Windows Shell
               http://www.cert.org/advisories/CA-2002-37.html

        9. Double-Free Bug in CVS Server

           A "double-free" vulnerability in the Concurrent Versions System
           (CVS) server could allow an unauthenticated, remote attacker with
           read-only access to execute arbitrary code, alter program
           operation, read sensitive information, or cause a denial of
           service.

               CERT Advisory CA-2003-02:
               Double-Free Bug in CVS Server
               http://www.cert.org/advisories/CA-2003-02.html

       10. Buffer Overflow in Windows Locator Service

           A buffer overflow vulnerability in the Microsoft Windows Locator
           service could allow a remote attacker to execute arbitrary code or
           cause the Windows Locator service to fail. This service is enabled
           and running by default on Windows 2000 domain controllers and
           Windows NT 4.0 domain controllers. On January 23, 2003, the
           CERT/CC issued an advisory describing the vulnerabilities in
           Windows Locator Service and provided patch information.

               CERT Advisory CA-2003-03:
               Buffer Overflow in Windows Locator Service
               http://www.cert.org/advisories/CA-2003-03.html

       ______________________________________________________________________

       A note about CERT Advisories and email filters

       CERT advisories occasionally contain words that may trigger email
       filters. Please check your filters carefully to ensure proper delivery
       of our email notifications. If your service provider conducts
       filtering on your behalf, be aware that you may not receive some of
       our notifications.
       ______________________________________________________________________

       What's New and Updated

       Since the last CERT Summary, we have published new and updated:
         * CERT/CC 2002 Annual Report
           http://www.cert.org/annual_rpts/cert_rpt_02.html
         * Advisories
           http://www.cert.org/advisories/
         * CERT/CC Statistics
           http://www.cert.org/stats/cert_stats.html
         * Incident Notes
           http://www.cert.org/incident_notes
         * Tech Tips
           http://www.cert.org/tech_tips/
       ______________________________________________________________________

       This document is available from:
       http://www.cert.org/summaries/CS-2003-01.html
       ______________________________________________________________________

       CERT/CC Contact Information

       Email: cert@cert.org
              Phone: +1 412-268-7090 (24-hour hotline)
              Fax: +1 412-268-6989
              Postal address:
              CERT Coordination Center
              Software Engineering Institute
              Carnegie Mellon University
              Pittsburgh PA 15213-3890
              U.S.A.

       CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) /
       EDT(GMT-4) Monday through Friday; they are on call for emergencies
       during other hours, on U.S. holidays, and on weekends.

        Using encryption

       We strongly urge you to encrypt sensitive information sent by email.
       Our public PGP key is available from
       http://www.cert.org/CERT_PGP.key

       If you prefer to use DES, please call the CERT hotline for more
       information.

        Getting security information

       CERT publications and other security information are available from
       our web site
       http://www.cert.org/

       To subscribe to the CERT mailing list for advisories and bulletins,
       send email to majordomo@cert.org. Please include in the body of your
       message

       subscribe cert-advisory

       * "CERT" and "CERT Coordination Center" are registered in the U.S.
       Patent and Trademark Office.
       ______________________________________________________________________

       NO WARRANTY
       Any material furnished by Carnegie Mellon University and the Software
       Engineering Institute is furnished on an "as is" basis. Carnegie
       Mellon University makes no warranties of any kind, either expressed or
       implied as to any matter including, but not limited to, warranty of
       fitness for a particular purpose or merchantability, exclusivity or
       results obtained from use of the material. Carnegie Mellon University
       does not make any warranty of any kind with respect to freedom from
       patent, trademark, or copyright infringement.
       ______________________________________________________________________

       Conditions for use, disclaimers, and sponsorship information

       Copyright 2003 Carnegie Mellon University.

    -----BEGIN PGP SIGNATURE-----
    Version: PGP 6.5.8

    iQCVAwUBPntraGjtSoHZUTs5AQGjZQQAmNIHOCpSjWZf5R8is9e9Fx5rdOjeRvOS
    0LwVzWgUPdQiJXhVftWZOtw2EFJsLvSvDqmPVBTULhJrKIbe/d7D0FdY5U2sY3KK
    mBMSl7d2qaMCuznCzQ5/9P4vXy5L4KCinZEbjKUUC237ecmw32VsTLZqEwYUTgv5
    eSCWnGIXVg8=
    =pFoz
    -----END PGP SIGNATURE-----


  • Next message: CERT Advisory: "CERT Advisory CA-2003-11 Multiple Vulnerabilities in Lotus Notes and Domino"

    Relevant Pages

    • CERT Summary CS-2002-01
      ... incident response team, as well as other noteworthy incident and ... Since the last regularly scheduled CERT summary, ... describing multiple vulnerabilities in SNMP. ... we have published 2001 statistics, our annual report, and a white ...
      (Cert)
    • Re: [Full-disclosure] [SE-2012-01] information regarding recently discovered Java 7 atta
      ... we stick to reporting issues to original ... Perhaps its time to update the disclosure policy. ... it seems appropriate to include US Cert ... I was asked to provide funding for the fix even though ...
      (Full-Disclosure)
    • Re: The Register: OpenVMS among most-secure of operating systems
      ... >>In fact its the HP POP server but that is rather ... >>It sould be a VMS CERT because its a VMS specific ... > Okay, so by that definition, an Oracle security vulnerability on OpenVMS ... POP servers etc all of which you are responsible for reporting ...
      (comp.os.vms)
    • Re: can receive mail but not send.
      ... Thanks for reporting back. ... Gary VanderMolen, MS-MVP (Mail) ... I deleted the cert and the accounts were ...
      (microsoft.public.windows.vista.mail)
    • CERT Summary CS-2002-04
      ... incident response team, as well as other noteworthy incident and ... CERT/CC, please visit the CERT/CC Current Activity page. ... high-impact types of security incidents and vulnerabilities being ... is reviewed and updated as reporting trends change. ...
      (Cert)