Re: Multiple Vulnerabilties Sambar Webserver

From: Steven M. Christey (coleyat_private)
Date: Wed Apr 03 2002 - 08:57:10 PST

  • Next message: Neeko Oni: "Icecast temp patch (OR: Patches? We DO need stinkin' patches!!@$!)"

    Tamer Sahin <tsat_private> said:
    
    >This vulnerability already discovered in January of this year.
    >
    >http://www.securityoffice.net/articles/sambar/
    >http://www.securityfocus.com/bid/3885
    
    According to the vendor's security page
    (http://www.sambar.com/security.htm), this is a different issue.
    
    The most recent paragraph says:
    
      All releases prior to the 5.1 production release are subject to [the
      various issues reported by NISR].  These bugs were reported by Mark
      Litchfield of NGS Software (many thanks!).
    
    A later paragraph says:
    
      All versions of the Sambar WWW Server prior to the 5.1 Beta 4
      release are vulnerable to a reported DoS attack against the
      /cgi-win/cgitest.exe sample application. (Reported by Tamer Sahin at
      www.securityoffice.net).
    
    So while the type of problem may be similar, the issues are clearly
    different enough that the vendor had to make a change.  Perhaps the
    initial patch was incomplete, or maybe the NISR exploit exposed an
    entirely different problem.  Regardless, an administrator who fixed
    the "Sahin problem" would still be vulnerable to the "Litchfield
    issue."
    
    I run into this sort of confusion on a regular basis, though it rarely
    sees the light of day.  When there are insufficient details, it can
    cause headaches for vulnerability databases (and CVE) when trying to
    determine if 2 vulnerability reports are really the same or not.  I
    assume that it causes similar problems for any security administrator
    who has to worry about the particular software on their own systems.
    
    In this case, the Sambar vendor included several important pieces of
    information that helps to determine that the issue is different:
    
    1) The vendor's description includes some details of the
       vulnerabilities, instead of a vague statement such as "fixed
       security problem" (which shows up in many change logs), which can
       make it difficult to know *which* problem was fixed by the vendor
    
    2) Credit was given to the vulnerability reporters (which in some
       cases is still insufficient for distinguishing between multiple
       vulnerabilities found by the same reporter)
    
    3) The vendor publicly acknowledged the problems in the first place,
       on a page dedicated to security issues (unfortunately, vendor
       security pages are rare indeed, and only 50% of all reported
       vulnerabilities have any clear vendor acknowledgement)
    
    4) The affected software has different version numbers for each
       vulnerability
    
    This type of information does not always appear in vendor advisories,
    however.
    
    When the vulnerability reporter and the vendor do not coordinate on a
    solution and establish the proper facts (for whatever reasons why this
    breakdown occurs), the result is that it can be difficult or
    impossible for vulnerability information "consumers" - which includes
    intermediate information sources like CVE - to tell whether 2 reports
    are really describing the same problem or not.  The situation gets
    worse when a vendor does not publicly acknowledge the reported
    vulnerability at all.
    
    When vendors write advisories without cross-references and/or credits
    to the original reporters, or without sufficient details of the
    particular vulnerability being fixed, this contributes to the
    difficulty of distinguishing between multiple vulnerability reports.
    For example, just yesterday I was reading a vaguely-written vendor
    security advisory that included no cross-references, which *might*
    have been related to a security issue that had been posted to Bugtraq
    a month earlier, or maybe it was addressing an even earlier issue.  I
    had to manually inspect the vendor's patch to sufficiently prove that
    the vendor was really fixing the problem that had been posted a month
    previous.  (thank goodness the source code was available and I knew
    the programming language, but it still took a half-hour for me to do
    all the detective work when a single cross-reference would have
    instantaneously linked the 2 reports).  In some cases, the advisories
    are so vague that it is impossible to know which of several problems
    have been fixed by the vendor.
    
    When an advisory doesn't explicitly state that the vulnerability is
    different than previously reported bugs, that can also contribute to
    the confusion, not to mention the effort required by the information
    consumers to figure out what's really going on in the first place.
    
    - Steve
    



    This archive was generated by hypermail 2b30 : Wed Apr 03 2002 - 16:34:24 PST