******************** Windows 2000 Magazine Security UPDATE--brought to you by the Windows 2000 Magazine Network **Watching the Watchers** http://www.win2000mag.net/Channels/Security ******************** ~~~~ THIS ISSUE SPONSORED BY ~~~~ Webtrends Firewall Suite -- Download Free Trial! http://go.win2000mag.net/UM/T.asp?A2153.23115.1167.1.532985 ~~~~~~~~~~~~~~~~~~~~ ~~~~ WEBTRENDS FIREWALL SUITE -- DOWNLOAD FREE TRIAL! ~~~~ Experienced IT Managers know security requires insight! With WebTrends Firewall Suite, you'll get in-depth analysis of both incoming and outgoing traffic through your network. Monitor bandwidth usage, measure VPN activity, and receive alerts by email or pager whenever critical security events occur. Firewall Suite 3.1 provides support for 35 leading firewall and proxy servers, including Cisco and Check Point. Currently a featured download on Tech Republic. Click here for your FREE trial, download now: http://go.win2000mag.net/UM/T.asp?A2153.23115.1167.1.532985 ******************** June 27, 2001--In this issue: 1. IN FOCUS - To Disclose or Not to Disclose, That Is the Question 2. SECURITY RISKS - Malformed Word Document Lets Macro Run Automatically - Unchecked Buffer in FrontPage Server Extension Sub-component RAD 3. ANNOUNCEMENTS - Learn to Use Problem-Solving Scripts That Simplify Life - Check Out This Great Email Newsletter Search Engine 4. SECURITY ROUNDUP - News: TRUSTe Launches Icon-Based Privacy Initiative - News: AD Backup Bug: Microsoft Comes Clean - News: Massive Compaq Reorganization to Include Alpha Death - News: Microsoft Hotmail Service in New Privacy Flap - News: Buyer's Guide: 802.11 Wireless Devices 5. SECURITY TOOLKIT - Book Highlight: Cisco Secure Internet Security Solutions - Virus Center - Virus Alert: W32/MSInit.B - Tip: A Licensing Problem - Win2K Security: IP Security Filtering 6. NEW AND IMPROVED - Protect Your Data After Someone Steals Your Mobile Device - Protect Your Information 7. HOT THREADS - Windows 2000 Magazine Online Forums - Featured Thread: Changing the Time Privilege in NT - Win2KsecAdvice Mailing List: - Featured Thread: Warning to McAfee.com VirusScan Online Users 8. CONTACT US See this section for a list of ways to contact us. 1. ==== COMMENTARY ==== Hello everyone, The practice of full disclosure of security risk information is again under attack. According to an article at MSNBC (linked below), Russ Cooper, moderator of the NTBugTraq mailing list, has undertaken a project to create what he calls the "Responsible Disclosure Forum." Cooper thinks such a forum will better govern the release of security risk information to the public because the forum will decide what information to release and when to release it. Cooper didn't say how the forum will entice membership from the worldwide hacker community, but nonetheless, its objective seems clear: Curb the release of risk details in a manner that prevents exploitation. http://www.msnbc.com/news/592066.asp In the article, Cooper said, "It's better for everyone if we keep [this data] to ourselves. Why not keep it among the people who are considered responsible security practitioners? Most attackers aren't smart enough to write exploits themselves, so they rely on other people to release them." Actually, Cooper's statements make sense to me, but such a forum simply won't work. The rogues of the hacker community have already proven that when given only minor details about a bug, they can produce a working exploit in a relatively short amount of time. Also, heated discussions have taken place in past years about full disclosure of security risk details. Those discussions eventually led to several written policies that suggest a proper course of action that hackers should take with any release of security risk information. Russ Cooper has such a policy posted on his Web site (linked at the first URL below); however, a policy known as RFPolicy, authored by a person using the alias "rain forest puppy," is probably the most widely used standard in the hacker community today. http://ntbugtraq.ntadvice.com/policy.asp http://www.wiretrip.net/rfp/policy.html According to either policy, the basic course of action is for the hacker to notify the vendor about the alleged bug, give the vendor a reasonable response time, give the vendor time to produce a patch, and release the bug information in relative unison (not beforehand) with the company suffering from the bug. Both policies seem reasonable, and many hackers adhere to the policies. But now it seems those practices are no longer good enough. Case in point: eEye Digital Security. When eEye recently produced a sample program that demonstrates a security problem with Microsoft IIS, many users frowned on the company for doing so. Even though eEye worked with Microsoft to correct the problem and timed the release of its research with the release of Microsoft's own security bulletin and patch, certain circles still chastised eEye because the company's information included a working example. Certain people prefer that this practice--the open sharing of security-related scientific research and working models--be completely eliminated. Why? Because it's too easy for someone to turn such a model into a weapon. That's a weak argument in my opinion. The problems with network intrusion aren't based on the number of script kiddies using hand-me-down code snagged from a full-disclosure mailing list or Web site. The problems actually seem to be based on only two factors: the quality of the code and the quality of the network administration. With solid code and solid network administration in place, the actions of script kiddies, and even many of the best hackers, become relatively moot. The reality is that if someone intrudes on a computer system and the intrusion is because of a bug for which there is no patch, the code's vendor is at fault because the vendor wrote the code. Certainly, software vendors disclaim legal liability, but such disclaimers don't change where the fault truly lies. A faulty product is a faulty product, so trying to reduce a person's ability to obtain usable exploit code is like placing a Band-Aid on the wounds from a shotgun blast to the head. It only masks a small part of an incredibly serious problem. And that problem is firmly in vendors' hands. It's up to them to stop bug-related intrusion by producing better code before releasing that code into production. Typically, hackers do a lot of research to figure out all the details about a security risk they've discovered. When they hand that research over to a vendor in its entirety, they generally don't receive any compensation other than a simple written thanks from the vendor. These hackers are left to generate a living from their work in some other manner while the vendor freely enjoys the results of the hackers' labor. That's the way the security bug discovery game works today. If vendors want to see an end to full disclosure, they just might get a lot more than they bargained for. What if vendors no longer received full disclosure offerings from bug hunters? What if bug hunters change their policies so that they typically go to a vendor and say, for example, "We've been researching your product XYZ123 for 3 months and have found two dangerous holes in the ABC321 component of that product that grant complete system access to a remote user. We'll release full details of our research to the public in exactly 30 days unless you release a patch first, in which case, we'll release our details to coincide with your own release. Happy hunting!"? How would vendors react to that kind of cessation of full disclosure? If nothing else, it would teach vendors to become better bug hunters, if only after the fact. Instead of creating a "Responsible Disclosure Forum," I think Cooper would better spend his time trying to help vendors develop better debugging practices--especially more extensive beta testing programs. Why don't companies such as Microsoft develop tailored beta programs that seriously entice top-notch bug hunters to find holes in their products before releasing the products? Why can't a beta program remain operational even after a vendor releases a product into production? After all, a large number of security problems are found after vendors release products to the public. Why shouldn't a beta program also compensate bug hunters handsomely for their efforts? Microsoft and other software vendors certainly have the money to do so, and frankly, I think that'd be a fantastic investment on their part--everyone benefits. But will such a program come into existence? Don't hold your breath. Until next time, have a great week. Sincerely, Mark Joseph Edwards, News Editor, markat_private 2. ==== SECURITY RISKS ==== (contributed by Ken Pfeil, kenat_private) * MALFORMED WORD DOCUMENT LETS MACRO RUN AUTOMATICALLY Steve McLeod discovered a vulnerability in Microsoft Word that lets an attacker modify a Word document in a way that prevents the security scanner from recognizing an embedded macro while still letting the macro execute. This vulnerability lets an attacker run a macro automatically when a user opens the document. Such a macro can take any action that the user can take, including disabling the user's Word security settings so that the user can no longer check subsequently opened Word documents for macros. Microsoft has acknowledged this vulnerability and recommends that users immediately apply the applicable patch contained in Security Bulletin MS01-034, which is linked at the URL below. http://www.windowsitsecurity.com/articles/index.cfm?articleID=21580 * UNCHECKED BUFFER IN FRONTPAGE SERVER EXTENSION SUB-COMPONENT RAD Nsfocus discovered that a buffer overflow condition exists in the optional sub-component of the FrontPage server extension called Visual Studio RAD (Remote Application Deployment) Support. This sub-component contains an unchecked buffer in a section that processes input information. An attacker can exploit this vulnerability to execute code on the server by sending a specially malformed packet to this component and can execute this code under the IUSR_machinename security context. Under the right circumstances, the attacker can also run the code under the system's security context, letting the attacker take any desired action on the server, including assuming full control of the server. This optional component of the FrontPage server extensions is not part of the default installation. Microsoft has released security bulletin MS01-035 for this vulnerability and recommends that users of this optional component immediately apply the patch. http://www.windowsitsecurity.com/articles/index.cfm?articleID=21581 3. ==== ANNOUNCEMENTS ==== * LEARN TO USE PROBLEM-SOLVING SCRIPTS THAT SIMPLIFY LIFE OK, so you're not a programmer. But if you read Windows Scripting Solutions, a monthly print newsletter, you don't need to be. Tackle common problems and automate everyday, time-consuming tasks with our simple tools, tricks, and scripts. Subscribe today! http://www.winscriptingsolutions.com/sub.cfm?code=nwei261e1a * TIRED OF THE SAME OLD SALES PITCH? Now there's a better way to find the perfect IT vendor or solution--absolutely free! The IT Buyer's Network (ITBN) lets you search through thousands of vendor solutions. You'll love the ITBN's one-stop shopping approach for hardware, network and systems software, IT services, and much more! Visit the ITBN today! http://www.itbuynet.com 4. ==== SECURITY ROUNDUP ==== * NEWS: TRUSTE LAUNCHES ICON-BASED PRIVACY INITIATIVE To help consumers better understand how Web sites use their personal information, TRUSTe launched a new initiative called the Privacy Symbols and Labels Initiative. TRUSTe also hopes to expand its privacy protection beyond the Internet to other electronic devices, such as cell phones and Personal Digital Assistants (PDAs), that can gather personal information. http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=21542 * NEWS: THE AD BACKUP BUG: MICROSOFT COMES CLEAN (contributed by Sean Daily, Senior Contributing Editor, Windows 2000 Magazine, seanat_private) In my guest article in the June 6 issue of WinInfo Daily UPDATE, I discussed a major bug in the Active Directory (AD) backup and restore API that affects a vast number of Windows 2000-based organizations. The bug, which Aelita Software first discovered, corrupts a high percent--in some cases, as high as 50 percent--of all AD backups. When you restore these corrupt backups to a Win2K domain controller (DC), the directory services won't start, and the system records several errors in the system event log. The problem affects all applications that use these APIs to perform AD backups (including system state backups performed with Win2K's built-in Ntbackup.exe utility and most third-party backup applications). When I wrote that column, Microsoft hadn't documented the issue, either in the Microsoft Product Support Services (PSS) Knowledge Base or elsewhere. Given the problem's severity, I thought the omission was rather peculiar. Even more peculiar was that empirical data seemed to support the fact that Win2K Service Pack 2 (SP2) silently resolved the problem as quickly as it appeared--although Microsoft doesn't mention the problem or that SP2 provides a resolution in the SP2 documentation. On June 13, Microsoft officially acknowledged the problem with a PSS article (Q295932) titled "Windows 2000 Domain Controllers Restored with System State Backups Made Prior to SP2 May Not Boot." The article describes the symptoms I mentioned in my June 6 article and acknowledges that SP2 does provide a fix. The article also sheds light on the underlying reasons for when and why the problem occurs. In the article, Microsoft states that the problem occurs in this situation: When you perform an AD backup on one Win2K DC, enough changes occur to the AD replica (because of local changes or replication) that the backup generates additional transaction logs, which in turn advance the Joint Engine Technology (JET) database checkpoint. Simultaneously, the system performs a second backup on another, relatively inactive DC, during which time the log-file generation and JET-checkpoint advancement don't occur. The second backup completes before the first backup can generate log files and advance the checkpoint. In this situation, the second DC backup is corrupt; if it's restored, the restored DC can't initialize the directory service. As a result, the problem will more likely occur when the first backup is relatively large because a commensurately larger window of time is available for the second backup to complete (and for the JET checkpoint to advance on the first DC). According to Microsoft, the situation is less likely to happen in busy AD network environments because in those situations, the usual, steady advancement of the JET checkpoint creates a lower exposure of risk for the second backup (if there are no additional logs and no advancement of the checkpoint). The end result--and the core of the problem--is that the system writes an outdated record of required transaction log files and checkpoint data to the backup media, then later restores it in the second backup. When the system restores the data, the header in the restored database references logs that aren't required for AD recovery, and some of these log files aren't included in the backup. This explains the appearance of "Log files are missing from system state" log entries. However, this information is misleading because the log files aren't missing; the number of log files referenced in the restored database header is incorrect. You'll find the article that discusses this problem on Microsoft's Web site (see URL below). If you've already updated your Win2K DCs to SP2, you don't need to worry. However, if you aren't planning to upgrade to SP2 immediately, you should seriously consider installing the hotfix Microsoft mentions in the article. (You'll need to contact Microsoft directly to obtain the hotfix, which works with both base-release and SP1 systems). http://support.microsoft.com/support/kb/articles/q295/9/32.asp * NEWS: MASSIVE COMPAQ REORGANIZATION TO INCLUDE ALPHA DEATH Compaq Computer will announce a massive reorganization today, retargeting itself at the service market and specific PC markets. The most controversial part of this plan, however, includes a de-emphasis of Compaq's current focus on hardware. Specifically, the company will announce that it's dropping its Alpha microprocessor in lieu of Intel's 64-bit Itanium, which was announced earlier this month. The move is a disappointment for Alpha fans, who suffered through an acrimonious split with Windows 2000/NT support a few years back, only to be left in a high-end UNIX niche. http://www.wininformant.com/Articles/Index.cfm?ArticleID=21582 * NEWS: MICROSOFT HOTMAIL SERVICE IN NEW PRIVACY FLAP This spring, privacy activists revealed that Microsoft's free email service, Hotmail, sends its subscribers' email address, city, and state information to InfoSpace, an Internet white pages service. InfoSpace then combines this information with the subscribers' telephone numbers and home addresses. The result is a user database that spam advertisers (advertisers that send bulk mailings) can--and do--access. http://www.wininformant.com/Articles/Index.cfm?ArticleID=21135 * NEWS: BUYER'S GUIDE: 802.11 WIRELESS DEVICES Buyer's Guide: 802.11 Wireless Devices consists of products in two general categories: wireless NICs and wireless network infrastructure devices, which are generally known as access points (APs). The APs in this guide cover environments from the home office to the enterprise, but before you choose an 802.11b solution, be sure to assess your performance requirements and expectations. Wall and ceiling composition and other potential obstructions can contribute to interference, which can degrade performance of wireless networks. You should look also at relationships between speed and range and at the environmental factors that can affect these relationships. As with any product purchase, be sure to do your homework ahead of time, and choose the vendor that can satisfy your performance, reliability, and service requirements. http://www.win2000mag.com/Articles/Index.cfm?ArticleID=21146 5. ==== SECURITY TOOLKIT ==== * BOOK HIGHLIGHT: CISCO SECURE INTERNET SECURITY SOLUTIONS By Andrew G. Mason, Mark J. Newcomb Fatbrain Online Price: $55.00 Hardcover; 528 pages Published by Cisco Press, June 2001 ISBN 1587050161 For more information or to purchase this book, go to http://www1.fatbrain.com/asp/bookinfo/bookinfo.asp?theisbn=1587050161 and enter WIN2000MAG as the discount code when you order the book. * VIRUS CENTER Panda Software and the Windows 2000 Magazine Network have teamed to bring you the Center for Virus Control. Visit the site often to remain informed about the latest threats to your system security. http://www.windowsitsecurity.com/panda Virus Alert: W32/Msinit.B W32/MSInit.B is a worm that uses a TCP/IP connection to access other systems. To do this, it searches for IP addresses at random. When it finds an IP address that allows access to a disk where Windows is installed, the worm creates a copy of itself in the Windows\System directory in the form of a file called Wininit.exe. Visit the following URL for complete details about this worm. http://63.88.172.96/Panda/Index.cfm?FuseAction=Virus&VirusID=799 * TIP: A LICENSING PROBLEM ( contributed by David Carroll, dcarrollat_private ) Q. Why do we have license-related issues after upgrading from Windows NT to Windows 2000? Our company upgraded its client machines to Windows 2000 Professional, and we decided to upgrade from NT Server 4.0, Terminal Server Edition (TSE) to Win2K Server Terminal Services at the same time. Now, however, when some users try to access the terminal server from Win2K Pro machines, they can't connect. According to the Event Viewer, the temporary licenses have expired. I didn't think that Win2K Pro clients needed terminal services client access licenses (TSCALs). What am I missing, and how do I fix this problem? A. Win2K Pro clients have built-in TSCALs. Nevertheless, if you don't have a Terminal Services licensing server set up and registered on your network, your Win2K Pro clients might still experience the problems you described. The first time the clients connect, they grab 90-day temporary licenses. The next time they connect, they try to upgrade those temporary licenses to full TSCALs. Consult the Terminal Services licensing tool to see which licenses your terminal server has issued. Get more information about this issue on our Web site. http://www.win2000mag.com/Articles/Index.cfm?ArticleID=21535 * WIN2K SECURITY: IP SECURITY FILTERING One of the lesser-known features of Windows 2000's IP Security (IPSec) is packet filtering based on IP addresses and port filtering. With IPSec filtering, you wrap your servers or workstations with another layer of security that protects them against attackers who try to connect from elsewhere on your internal network or from the Internet. You can use this technology in many ways, but in this article, Randy Franklin Smith shows you how to protect onsite workstations exposed to the Internet, laptops that employees use to dial into an ISP when traveling off site, and computers that employees use to telecommute. http://www.windowsitsecurity.com/Articles/Index.cfm?ArticleID=21546 6. ========== NEW AND IMPROVED ========== (contributed by Scott Firestone, IV, productsat_private) * PROTECT YOUR DATA AFTER SOMEONE STEALS YOUR MOBILE DEVICE Solagent released Solagent Secure, software that lets you protect and manage data on your mobile computing devices after someone steals your device. The software lets you remotely encrypt data and determine whether anyone compromised the data on your laptop or Personal Digital Assistant (PDA) without alerting the unauthorized user. The software is available on a subscription basis and costs $29.95 per year for an individual subscription. Contact Solagent at 800-229-8661. http://www.solagent.com * PROTECT YOUR INFORMATION Auscomp released Auscomp Fort Knox 3.0, software that uses one master password to securely encrypt and protect any private files or information--PINs, passwords, accounts, documents, passports, images, programs, and spreadsheets. The software features network and Internet synchronization capability, password repository, file locker, and an auto-logon feature. Auscomp Fort Knox 3.0 runs on Windows 2000, Windows NT, Windows Me, and Windows 9x systems. The software is available in free, personal, and network licenses. Contact Auscomp at teamat_private http://www.auscomp.com 7. ==== HOT THREADS ==== * WINDOWS 2000 MAGAZINE ONLINE FORUMS http://www.win2000mag.net/forums Featured Thread: Changing the Time Privilege in NT (Ten messages in this thread) This user has problems with other users in a domain not being able to change the system time because they don't have the proper privilege level. The user has set up the users' profiles in User Manager (Policies\user rights\change the system time), but the other users are still unable to change the time. Read the responses of others or lend a helping hand at the following URL: http://www.win2000mag.net/forums/rd.cfm?app=64&id=66697 * WIN2KSECADVICE MAILING LIST http://www.windowsitsecurity.com/go/win2ks-l.asp?A0=WIN2KSECADVICE Featured Thread: Warning to McAfee.com VirusScan Online Users (One message in this thread) This user is experiencing permission problems that prevent McAfee VirusScan Online from starting up. As a result, the user might think that virus protection is active on his or her system when in fact it might not be active. The problems began to happen after a recent upgrade, when the user went to download the most recent virus signature files. Have you experienced a similar condition on your system? Read the responses or lend a hand at the following URL: http://63.88.172.96/go/win2ks-l.asp?A2=IND0106D&L=WIN2KSECADVICE&P=89 8. ==== CONTACT US ==== Here's how to reach us with your comments and questions: * ABOUT THE COMMENTARY -- markat_private * ABOUT THE NEWSLETTER IN GENERAL -- tfaubionat_private; please mention the newsletter name in the subject line. * TECHNICAL QUESTIONS -- http://www.win2000mag.net/forums * PRODUCT NEWS -- productsat_private * QUESTIONS ABOUT YOUR SECURITY UPDATE SUBSCRIPTION? -- Email Customer Support at securityupdateat_private * WANT TO SPONSOR Security UPDATE? emedia_oppsat_private ******************** This weekly email newsletter is brought to you by Windows 2000 Magazine, the leading publication for Windows 2000/NT professionals who want to learn more and perform better. Subscribe today. http://www.win2000mag.com/sub.cfm?code=wswi201x1z Receive the latest information about the Windows 2000 and Windows NT topics of your choice. Subscribe to our other FREE email newsletters. http://www.win2000mag.net/email |-+-+-+-+-+-+-+-+-+-| Thank you for reading Security UPDATE. SUBSCRIBE To subscribe send a blank email to subscribe-Security_UPDATEat_private If you have questions or problems with your UPDATE subscription, please contact securityupdateat_private ISN is hosted by SecurityFocus.com --- To unsubscribe email isn-unsubscribeat_private
This archive was generated by hypermail 2b30 : Thu Jun 28 2001 - 03:05:51 PDT