******************** Security UPDATE--brought to you by Security Administrator, a print newsletter bringing you practical, how-to articles about securing your Windows .NET, 2000, and NT systems. http://www.secadministrator.com ******************** ~~~~ THIS ISSUE SPONSORED BY ~~~~ Keeping Information Services Afloat http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qyv0Ap Web Filtering Deployment Made Easy http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qyw0Aq (Below IN FOCUS) ~~~~~~~~~~~~~~~~~~~~ ~~~~ SPONSOR: KEEPING INFORMATION SERVICES AFLOAT ~~~~ Wallenius Wilhelmsen Lines is one of the world's largest ocean transportation companies. Needing a reliable backup and disaster recovery product, they chose UltraBac. UltraBac is now responsible for backing up critical Exchange and SQL databases, along with proprietary data generated from applications developed in- house. Network Administrator Kevin Whitney said UltraBac is simple to install, operate and administer. The software also allows them to manage their numerous U.S. offices remotely. Unlike their previous solution, UltraBac offers peace of mind when it comes to monitoring locations without IT staff. UltraBac proves again it is the right choice with rock-solid reliability. Download a free live trial http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qyv0Ap ~~~~~~~~~~~~~~~~~~~~ February 13, 2002--In this issue: 1. IN FOCUS - Security Trends and Analysis 2. SECURITY RISKS - HP AdvanceStack Switch Management Authentication Bypass - Incorrect Remote Registry Access to Microsoft Exchange 2000 - Buffer Overflow in Microsoft Telnet - Remote Compromise Vulnerability in Oracle 8 and 9 - Information Disclosure in Texis CGI Software 3. ANNOUNCEMENTS - If You Like This UPDATE, You'll Love ... WinInfo Daily UPDATE - The Industry's Most Popular Magazines Are Live! 4. SECURITY ROUNDUP - News: Shavlik Technologies Releases HFNetChkPro - News: CrossTec Announces NetOP Remote Control for XP - Opinion: Let's Challenge Linux Security Assumptions - Feature: New Win2K Post-SP2 Security Rollup Dos and Don'ts 5. INSTANT POLL - Results of Previous Poll: Single or Multiple Forests? - Instant Poll: Honeypots 6. HOT RELEASE (ADVERTISEMENT) - Sponsored by VeriSign--The Value of Trust 7. SECURITY TOOLKIT - Virus Center - FAQ: How Can I Secure My Wireless Network Connections? 8. NEW AND IMPROVED - Learn About Web Security, Privacy, and Commerce - Secure VPN and Firewall Solution 9. HOT THREADS - Windows & .NET Magazine Online Forums - Featured Thread: Disabling the Start Button - HowTo Mailing List - Featured Thread: Execute a Batch File on Shutdown 10. CONTACT US See this section for a list of ways to contact us. ~~~~~~~~~~~~~~~~~~~~ 1. ==== IN FOCUS ==== * SECURITY TRENDS AND ANALYSIS Hello everyone, "Riptech Internet Security Threat Report," an analysis report released at the end of January, reflects trends in security threats against Riptech's customers' networks during the last half of 2001. Riptech based the report on information the company collected from more than 300 of its clients in 25 countries. Those clients work in sectors that include business services, high tech, finance, e- commerce, manufacturing, health care, media and entertainment, power and energy, and application service providers (ASPs). According to the report, most attacks originated in the United States, South Korea, China, and Germany. However, when Riptech compared the number of Internet users in a given country with the number of attacks launched from that country, it discovered that Israelis launch twice as many attacks as any other country, followed by Hong Kong, Thailand, and South Korea. The top 10 methods of attack that the report notes include - a URL-encoding problem with Microsoft IIS that lets arbitrary commands execute on the server - attacks that employ IIS to gain access to the cmd.exe program to execute commands on the server - SubSeven Trojan horse insertion, which listens on port 27374 and lets an attacker remotely control a Windows system - intrusion against vulnerable or misconfigured FTP servers, often used to store and propagate illegal material - attacks against vulnerable remote procedure call (RPC) services - attacks against vulnerable versions of Secure Shell (SSH) - against vulnerable print services, include Line Print Daemon (LPD) The report also says that attacks increased 79 percent between July and December 2001. Sixty-one percent of those attacks were attempts by intruders to discover any vulnerability in a given network, while 39 percent of the attacks targeted specific systems or companies. An interesting highlight in the report, especially given the threat of cyberwar, is that power and energy companies suffered twice as many severe attacks as any other category of company in the sampled set of data about attacks that came from Middle Eastern countries. In contrast, high-tech and financial firms experienced 55 percent to 70 percent more attacks of Asian origin than any other category of company in the data sample set. Another interesting highlight is that larger companies (more than 500 employees) suffered at least 50 percent more attacks than smaller companies (fewer than 500 employees). In an even more refined perspective, companies with between 500 and 5000 employees are the most frequent targets of intruders. In addition, public companies are attacked twice as often as private companies. The report is 33 pages and offers information that lends interesting insight into what to expect from intruders in the near future. Be sure to visit Riptech's Web site and download a copy of the report. http://www.riptech.com/securityresources/form9.html On another note, we're conducting a new poll this week to learn how many of you use a honeypot on your network to distract intruders as well as learn their interests and intrusion methods. Please visit our home page and take the poll. http://www.secadministrator.com Until next time, have a great week. Sincerely, Mark Joseph Edwards, News Editor markat_private ~~~~~~~~~~~~~~~~~~~~ ~~~~ SPONSOR: WEB FILTERING DEPLOYMENT MADE EASY ~~~~ Your company's decided it's time for Web filtering. But installing server or client software across a corporate network is yet another headache for IT. With the award-winning iPrism server appliance, software installation, maintenance and interoperability issues vanish. For a reliable solution that helps eliminate the hassles versus adding to them--and for less money than many add-on software solutions--visit us to find out more at: http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qyw0Aq ~~~~~~~~~~~~~~~~~~~~ 2. ==== SECURITY RISKS ==== (contributed by Ken Pfeil, kenat_private) * HP ADVANCESTACK SWITCH MANAGEMENT AUTHENTICATION BYPASS Tamer Sahin reported that an access validation vulnerability in Hewlett-Packard's (HP's) J3210A switching hub can let an unprivileged user change the configuration of the device by connecting to the device's switch management URL at http://somehost/security/web_access.html. HP has been notified but hasn't issued a patch. http://www.secadministrator.com/articles/index.cfm?articleid=24114 * INCORRECT REMOTE REGISTRY ACCESS TO MICROSOFT EXCHANGE 2000 Eitan Caspi reported a vulnerability in Microsoft Exchange 2000 Server that lets an attacker gain remote access to the server configuration information. This vulnerability stems from a flaw in how the Exchange System Attendant sets group privileges, which could give the "Everyone" group inappropriate permissions to the WinReg key. Microsoft has released Security Bulletin MS02-003 to address this vulnerability and recommends that affected users apply the patch provided at Microsoft's Download Center. http://www.secadministrator.com/articles/index.cfm?articleid=24039 * BUFFER OVERFLOW IN MICROSOFT TELNET A buffer-overrun vulnerability in Microsoft Telnet lets an attacker execute arbitrary code on a vulnerable system. This vulnerability stems from an unchecked buffer in the code that processes the Telnet protocol options. Microsoft has released Security Bulletin MS02-004 to address this problem and recommends that affected users apply the appropriate patch provided at Microsoft's Download Center. Users can also find the Windows 2000 fix for this vulnerability in Win2K Security Roll-up Package 1 (SRP1). http://www.secadministrator.com/articles/index.cfm?articleid=24040 * REMOTE COMPROMISE VULNERABILITY IN ORACLE 8 AND 9 David Litchfield discovered a vulnerability in Oracle's Database server versions 8 and 9 for Windows 2000 and Windows NT 4.0. Because the Procedural Language/SQL that runs an external procedure doesn't require authentication, an attacker can connect to the listener/extproc process over TCP and call any function to which the system has access. A more detailed explanation is available in the discoverer's advisory. Oracle is working on a patch to correct this vulnerability. Users can work around this vulnerability by blocking the Transparent Network Substrate (TNS) Listener port (1521) behind a firewall and removing the PLSExtproc functionality, if it's not in use, by removing the entries in the files tnsnames.ora and listener.ora. http://www.secadministrator.com/articles/index.cfm?articleid=24026 * INFORMATION DISCLOSURE IN TEXIS CGI SOFTWARE A person using the alias "phinegeek" reported an information disclosure vulnerability in Thunderstone Software's Texis CGI software. By querying for an invalid path, an attacker can disclose the full path to webroot and, in some cases, reveal information about the host system. Thunderstone has been notified but has not released a response. http://www.secadministrator.com/articles/index.cfm?articleid=24027 3. ==== ANNOUNCEMENTS ==== * IF YOU LIKE THIS UPDATE, YOU'LL LOVE ... WININFO DAILY UPDATE Every day, you can catch up quickly on the latest Windows news (with analysis and commentary from Paul Thurrott) so that you can face your day a little more informed and prepared. It's free, so subscribe today! http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qvJ0A3 * THE INDUSTRY'S MOST POPULAR MAGAZINES ARE LIVE! Industry-leading magazines join to produce Windows & .NET Magazine LIVE! and SQL Server Magazine LIVE!--two events for the price of one. We have more than 100 sessions jam-packed with tips and techniques you need to know to be more successful with your enterprise deployments. Don't miss this chance to interact with tech experts Minasi, Russinovich, Moran, Delaney, and other gurus. Register now before this event sells out! http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0qQl0Az 4. ==== SECURITY ROUNDUP ==== * NEWS: SHAVLIK TECHNOLOGIES RELEASES HFNETCHKPRO Shavlik Technologies has released HFNetChkPro, a tool that checks Microsoft systems for installed and missing hotfixes. The tool is based on Microsoft's Hfnetchk utility, which Shavlik developed, and combines Hfnetchk's GUI with the ability to scan specific machines for the hotfix status of chosen services and software. http://www.secadministrator.com/articles/index.cfm?articleid=24015 * NEWS: CROSSTEC ANNOUNCES NETOP REMOTE CONTROL FOR XP CrossTec announced that NetOP Remote Control 7.01 now provides support for Windows XP. NetOP Remote Control provides cross-platform support so that users can remotely control Windows, OS/2, Linux, and MS-DOS systems from any Windows platform, including Windows CE. http://www.secadministrator.com/articles/index.cfm?articleid=24014 * OPINION: LET'S CHALLENGE LINUX SECURITY ASSUMPTIONS When a reader forwarded the BugTraq link about OS vulnerabilities last week, Paul Thurrott knew it was fascinating information that he had to discuss in some capacity. But because of incomplete BugTraq 2001 data and some curious disclaimers about skewed results, Thurrott decided it was best to mention the information in his irreverent Short Takes. The item made it into the Slashdot forums, which caused hundreds of responses from a bitter Linux crowd. http://www.secadministrator.com/articles/index.cfm?articleid=23985 * FEATURE: NEW WIN2K POST-SP2 SECURITY ROLLUP DOS AND DON'TS Microsoft released a comprehensive security update for Windows 2000 post- Service Pack 2 (SP2) systems on January 30. Security Rollup Package 1 (SRP1), which you can install only on Win2K SP2 systems, includes every security hotfix Microsoft has issued for post-SP2 systems, except the WWW Distributed Authoring and Versioning (WebDAV) script hotfix. Paula Sharick discusses the dos and don'ts for installing the new service pack. http://www.secadministrator.com/articles/index.cfm?articleid=23994 5. ==== INSTANT POLL ==== * RESULTS OF PREVIOUS POLL: SINGLE OR MULTIPLE FORESTS? The voting has closed in Windows & .NET Magazine's Security Administrator Channel nonscientific Instant Poll for the question, "Do you use a single or multiple forest design, and if you use a single design, will you change to multiple?" Here are the results (+/- 2 percent) from the 162 votes: 73% 1) Single forest and we won't change 5% 2) Single forest but changing to multiple 22% 3) Multiple forests * INSTANT POLL: HONEYPOTS The current Instant Poll question is, "Do you use a honeypot on your network?" The choices are 1) Yes, a freeware package, 2) Yes, a commercial package, or 3) No. Go to the Security Administrator Channel home page and submit your vote. http://www.secadministrator.com 6. ==== HOT RELEASE (ADVERTISEMENT) ==== * SPONSORED BY VERISIGN--THE VALUE OF TRUST Is your e-business secure? Learn why it's vital to encrypt business transactions, secure intranets and authenticate your Web site with the strongest encryption available--128-bit SSL. Get VeriSign's FREE Guide, "Securing Your Web Site for Business" now: http://list.winnetmag.com/cgi-bin3/flo?y=eKhf0CJgSH0CBw0p5N0A1 7. ==== SECURITY TOOLKIT ==== * VIRUS CENTER Panda Software and the Windows & .NET Magazine Network have teamed to bring you the Center for Virus Control. Visit the site often to remain informed about the latest threats to your system security. http://www.secadministrator.com/panda * FAQ: HOW CAN I SECURE MY WIRELESS NETWORK CONNECTIONS? ( contributed by Paul Thurrott, http://www.windows2000faq.com ) A. Many wireless networks are automatically set up so that anyone with a wireless card can come by your home or business and use your connection to access your network and the Internet. To ensure that your data is safe and that your network bandwidth isn't compromised from the outside, you can do a couple of simple things. First, make sure your wireless access point isn't broadcasting its Service Set Identifier (SSID), which prevents most cards from even finding your network. Next, harden your network from the outside by hard-coding the media access control (MAC) addresses of your wireless cards into the management software for your access point so that only your machines can use the network. Be sure to use 128-bit encryption, if possible, and if you're using a bridged network with wireless and wired components, keep them separate so that machines on the wireless network can't access resources on the wired one. Also, be sure that you have the latest firmware update for your wireless access point; many companies (e.g., Apple, Linksys) have shipped crucial security updates for their hardware. 8. ==== NEW AND IMPROVED ==== (contributed by Scott Firestone IV, productsat_private) * LEARN ABOUT WEB SECURITY, PRIVACY, AND COMMERCE O'Reilly released "Web Security, Privacy & Commerce," a book by Simson Garfinkel and Gene Spafford that provides a reference about Web security risks and the techniques and technologies that you can use to protect yourself against these risks. Topics include cryptography, passwords, digital signatures, biometrics, cookies, log files, spam, Web logs, Secure Sockets Layer (SSL), digital payments, client-side signatures, pornography filtering, intellectual property, and legal concerns. The 756-page book costs $44.95. Contact O'Reilly at 800-998-9938. http://www.oreilly.com http://www.oreilly.com/catalog/websec2 * SECURE VPN AND FIREWALL SOLUTION InfoExpress announced that it has joined Alcatel's Technology Partner Program to provide a secure, integrated VPN and firewall solution with Alcatel's Secure VPN Clients to safeguard corporate networks. InfoExpress's enterprise personal firewall, CyberArmor, detects when the Alcatel Secure VPN Client is active and dynamically applies the appropriate customized security policy. Alcatel's VPN Client lets remote and mobile users securely access their corporate networks from anywhere. Contact InfoExpress at 650-623-0260. http://www.alcatel.com http://www.infoexpress.com 9. ==== HOT THREADS ==== * WINDOWS & .NET MAGAZINE ONLINE FORUMS http://www.winnetmag.net/forums Featured Thread: Disabling the Start Button (Eight messages in this thread) Gavin knows that he can lockdown many Windows NT functions on the Start button, but he wants to know whether he can totally remove the button. All he needs are some icons on the desktop--nothing more. Can you help at the following URL? http://www.secadministrator.com/forums/thread.cfm?thread_id=56048 * HOWTO MAILING LIST http://www.secadministrator.com/listserv/page_listserv.asp?s=howto Featured Thread: Execute a Batch File on Shutdown (One message in this thread) Scott wants to know how to execute a batch file when a Windows 2000 computer shuts down. Can you help? Read the responses or lend a hand at the following URL: http://22.214.171.124/listserv/page_listserv.asp?a2=ind0202b&l=howto&p=1236 10. ==== CONTACT US ==== Here's how to reach us with your comments and questions: * ABOUT IN FOCUS -- markat_private * ABOUT THE NEWSLETTER IN GENERAL -- mlibbeyat_private (please mention the newsletter name in the subject line) * TECHNICAL QUESTIONS -- http://www.winnetmag.net/forums * PRODUCT NEWS -- productsat_private * QUESTIONS ABOUT YOUR SECURITY UPDATE SUBSCRIPTION? Customer Support -- securityupdateat_private * WANT TO SPONSOR SECURITY UPDATE? emedia_oppsat_private ******************** Receive the latest information about the Windows and .NET topics of your choice. Subscribe to our other FREE email newsletters. http://www.winnetmag.net/email |-+-+-+-+-+-+-+-+-+-| Thank you for reading Security UPDATE. SUBSCRIBE To subscribe, send a blank email to mailto:Security-UPDATE_Subat_private Copyright 2002, Penton Media, Inc. - ISN is currently hosted by Attrition.org To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY of the mail.
This archive was generated by hypermail 2b30 : Thu Feb 14 2002 - 05:11:51 PST