News February 1999


Most of the links lead to the corresponding files at CERT or other organisations. So changes take place immediately, especially which patches should be installed or which changes in the configuration should be made to avoid this vulnerability. Most of the files are transferred by ftp.
By the way: If we're not publishing well-known risks inheritant in any widely used platform or program that doesn't mean this particular platform or program is safe to use!


SLMail version 3.1 and 3.2 By-pass NTFS permissions on machines running SLMail: mnemonix, NTshop
The Remote Administration Service in SLMail allows changes to mail services to be performed using the HTTP protocol over TCP port 180, by default. NTLM authentication can be enabled so that only users with an account and corresponding password may access this service. Once authenticated however, they do not need to be an Administrator to make changes to the mail services and user account information. This happens because the service does not impersonate the logged on user and every change made is performed under the SYSTEM account.
Because of this Remote Administration should be DISABLED. If this is not viable then the only way to prevent an unauthorized users (those with accounts) is to remove the "Access this computer from the Network" user right from the "Everybody" group and give this privilege to Administrators only.
Internet Information Server 4.0 IIS allows password attacks over NetBIOS: mnemonix, NTshop
Internet Information Server 4.0 has a feature that can allow a remote attacker to attack user accounts local to the Web Server as well as other machines across the Internet.
By default every install of IIS 4 creates a virtual directory "/IISADMPWD". This directory contains a number of .htr files. Anonymous users are allowed access to this files, they are not restricted to the loopback address (127.0.0.1). The files in the mentioned directory are variants of the same file and allow a user to change their password via the Web. If an IP address followed by a backslash precedes the account name then the IIS server will contact the remote machine, over the NetBIOS session port, and attempt to change the user's password. (IPADDRESS\ACNAME). This may lead to a compromise of this account.
If this service is not required, it's recommended to remove the /IISADMPWD virtual directory or to limit NetBIOS based traffic over TCP port 139.
Computer Associates Vulnerability in ArcServeIT: NTshop
ARCserve passes account information (usernames and passwords) in almost-clear text (they're simply XOR'd) when performing backups over a TCP/IP network. Under many circumstances, these accounts are granted Administrator rights. A detailed description of the problem is pointed out in the advisory. Similar risks may exist on IPX/SPX and NetBEUI networks -- this was only tested with TCP/IP.
It's recommended to download the patch released by CA.
Red Hat Linux Vulnerability in lsof: ESB-1999.022
As reported before (HERT-02), some Unix show a buffer overflow that will lead to direct root compromise. Unix Red Hat Linux 5.2 is shipping with a vulnerable version of lsof. It's recommended to install the concerning patch:
Red Hat Linux 5.2:
alpha:
rpm -Uvh ftp://updates.redhat.com/5.2/alpha/lsof-4.40-1.alpha.rpm
i386:
rpm -Uvh ftp://updates.redhat.com/5.2/i386/lsof-4.40-1.i386.rpm
sparc:
rpm -Uvh ftp://updates.redhat.com/5.2/sparc/lsof-4.40-1.sparc.rpm
Source rpm:
rpm -Uvh ftp://updates.redhat.com/5.2/SRPMS/lsof-4.40-1.src.rpm
all New CERT-Summary: CS-99.01, ESB-1999.027, S-99-09, ERS-1999.031
Since the last CERT summary, issued in December 1998 (CS-98.08), CERT has seen these trends in incidents:
1. Widespread Scans: CERT continues to receive numerous daily reports of intruders using tools to scan networks for multiple vulnerabilities. Intruder scanning tools continue to become more sophisticated.
2. Back Orifice and NetBus: Daily reports of incidents involving Windows-based "remote administration" programs such as Back Orifice and NetBus are received.
3. Trojan Horse Programs: Over the past few months, CERT has seen an increase in the number of incident reports related to Trojan horse programs affecting both Windows and UNIX platforms.
4. FTP Buffer Overflows: Very recently, they have received a few reports of intruders scanning for and exploiting a remote buffer overflow vulnerability in various FTP servers.
Microsoft Windows 98 and Back Office Resource Kit Taskpads Scripting Vulnerability: MS99-007, ESB-1999.026, ERS-1999.030, NTshop
Taskpads is a feature provided by several Microsoft Windows Resource Kit products. It is part of the Resource Kits' Tools Management Console Snap-in, and allows users to view and run Resource Kit Tools via an HTML page rather than through the standardLarge Icon, Small, Icon, List, and Detailed Views. A vulnerability exists because certain methods provided by Taskpads are incorrectly marked as "safe for scripting" and can be misused by a web site operator to invoke executables on a visiting user's workstation without their knowledge or permission.
It's recommended to install the concerning patch:
- Windows 98 Resource Kit, Windows 98 Resource Kit Sampler, and BackOffice, second Edition for Windows 95 and 98
- Microsoft BackOffice Resource Kit, second edition for Windows NT: x86 version, Alpha version
These patches remove the Taskpad feature.
Debian Linux Vulnerabilities in wget and lsof: Debian0220, Debian0220a
When lsof is setuid-root or setgid kmem, it is vulnerable to a buffer overflow that could lead to direct root compromise or root compromise through live kernel patching. lsof 4.37-3 will be available shortly.
The version of wget in slink (2.1 Beta) and potato incorrectly attempts to chmod symlinks when invoked with the -N option. The version in hamm (Debian 2.0) is not affected. Only the wget package in the unreleased Debian versions is affected, a fixed wget_1.5.3, which will be released shortly.
Windows Windows Backdoors Update II: ISS-020, ERS-1999.028, J-032, ESB-1999.030
ISS has published their quarterly update on backdoors for the Windows 9x and Windows NT. A detailed description of NetBus 2.0 Pro is given (it can be downloaded here). Another backdoor is opened with the WM97/Caligula virus, a Microsoft Word macro virus that steals your Pretty Good Privacy (PGP) secret key ring and uploads it to a Codebreakers FTP site. The Picture.exe trojan horse program has been circulating around the Internet via an E-Mail attachment. If run, this executable will send information about your Windows NT or 95/98 system to any of several e-mail addresses in China. The file has also been seen with the name Manager.exe.
All backdoors are described and contermeasurements recommended in the advisory.
IRIX Vulnerability in ToolTalk RPC Service: SGI-19981101, ERS-1999.027, ESB-1999.023, I-091
As reported before (SGI-9981101 and CA-98.11) some IRIX are vulnerable against a Stack Overflow in the ToolTalk RPC Service. Now Silicon Graphics has published some patches, pointed out in the advisory.
Windows NT up to v4.0 with SP4 File Mapping Objects Cache ("KnownDLLs List") Vulnerability: L0pht, NTshop, MS99-006, ERS-1999.029, ESB-1999.024
In Windows NT, core operating system DLLs are kept in virtual memory and shared between the programs running on the system. This is done to avoid having redundant copies of the DLLs in memory, and improves memory usage and system performance. When a program calls a function provided by one of these DLLs, the operating system references a data structure called the KnownDLLs list to determine the location of the DLL in virtual memory. The Windows NT security architecture protects in-memory DLLs against modification, but by default it allows all users to read from and write to the KnownDLLs list.
A user can load into memory a malicious DLL that has the same name as a system DLL, then change the entry in the KnownDLLs list to point to the malicious copy. From that point forward, programs that request the system DLL will instead be directed to the malicious copy. When called by a program with sufficiently high privileges, it could take any desired action, such as adding the malicious user to the Local Administrators group. For an exploit a local account is necessary.
To enable stronger protection on system base objects such as the KnownDLLs list, add the following value to the registry key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager:
Name: ProtectionMode
Type: REG_DWORD
Value: 1
A hotfix will be published soon.
Debian Linux Root Exploit in eterm: Debian0218
Version 0.8.8 in the unreleased debian "potato" distribution was vulnerable. The earlier version 0.7 and 0.8.7 are not vulnerable. This hole is fixed in the currently available potato (eterm_0.8.8-5 or higher).
many Linux Buffer Overflow in lsof: HERT-02
Lsof lists information about files opened by processes for most UNIX dialects. When lsof is setuid-root or setgid kmem, it is vulnerable to a buffer overflow that will lead to direct root compromise or root compromise through live kernel patching. It's recommended to remove the setuid-root by
chmod 0755 lsof
Unix, NFR Vulnerability in NFR Web Server: ERS-1999.024, ERS-1999.025
The Network Flight Recorder (NFR) custom web server is used to present an HTTP front-end to the NFR system. By default, the web server is called "webd", and is bound to TCP port 2001. In the absence of external network access control, arbitrary remote attackers can conduct transactions with the NFR web server.
Due to an implementation fault in "webd", it is possible for a remote attacker to formulate an HTTP transaction that will cause the web server to overflow an automatic variable on the stack. By overwriting activation records stored on the stack, it is possible to force a transfer of control into arbitrary instructions provided by the attacker in the HTTP transaction, and thus gain total control of the web server process.
It's strongly recommended to install patch No. 2.0-p3 for NFR Version 2.0.2 Research. How to install it is pointed out in the advisory.
Unix Vulnerability in mSQL (Mini SQL) 2.0.6 and below: KSRT#10
mSQL is a database engine (available from http://www.hughes.com.au) that supports a subset of the ANSI SQL query specifications. If remote access is enabled (as of 2.0.4.1 remote access is disabled by default) a remote user can retrieve sensitive information:
1. The connection table
2. The server version
3. The current and maximum number of connections
4. The user name and user id of the msqld process
These information may enable an attacker to gain unauthorized to the database. A fix will be included in the latest version of mSQL (2.0.7).
Debian Linux Security problems in cfengine: Debian0215
The maintainer of Debian GNU/Linux cfengine package found a error in the way cfengine handles temporary files when it runs the tidy action on homedirectories, which makes it susceptible to a symlink attack.
It's recommended to install a fixed version pointed out in the advisory.
Debian Linux Buffer Overflow in "Super" package: Debian0215a, ISS-019, J-031, ERS-1999.026, ESB-1999.025, S-99-07
Super is a utility that allows authorized users to execute commands with root privileges. It is intended to be an alternate to setuid scripts, which are inherently dangerous. A buffer overflow exists in Super that may allow attackers to take advantage of its setuid configuration to gain root access.
Version 3.11.7 should be installed immediately. Administrators should take care to disable setuid root utilities that are not used by regular users. To disable Super permanently, execute the following command as root to disable the setuid bit:
# chmod 755 /usr/bin/super
BackOffice Server 4.0 BackOffice Server 4.0 doesn't delete Installation Setup File: MS99-005, ERS-1999.023, J-030, ESB-1999.021, S-99-08
When a user chooses to install SQL Server, Exchange Server or Microsoft Transaction Server as part of a BackOffice 4.0 installation under Windows NT, the BackOffice installer program requests the name and password for the accounts associated with these services. Specifically, it asks for the account name and password for the SQL Executive Logon account, the Exchange Services Account, and the MTS Remote Administration Account. These values are stored in
<systemdrive>\Program Files\Microsoft Backoffice\Reboot.ini
and used to install the associated services. BackOffice Server does not erase this file when the installation process is completed. The fix for this problem is to delete the file.
many Unix Vulnerabilties in many ftpd: CA-99.03, ERS-1999.022, J-029, S-99-02, ESB-1999.020
Software that implements FTP is called an "ftp server", "ftp daemon", or "ftpd". On most vulnerable systems, the ftpd software is enabled and installed by default.
There is a general class of vulnerability that exists in several popular ftp servers. Due to insufficient bounds checking, it is possible to subvert an ftp server by corrupting its internal stack space. By supplying carefully designed commands to the ftp server, intruders can force the the server to execute arbitrary commands with root privilege.
Any server running the latest version of ProFTPD (1.2.0pre1) or the latest version of Wuarchive ftpd (2.4.2-academ[BETA-18]). wu-ftpd is installed and enabled by default on most Linux variants such as RedHat, Debian, and Slackware Linux.
Further vendor specific information can be found in the advisory.
DIGITAL UNIX V4.0x Vulnerabilities in at and inc: J-027, ERS-1999.021, ESB-1999.019
A potential potential security vulnerability has been discovered with the "at" and "inc" for Compaq's Tru64/DIGITAL UNIX software, where under certain circumstances, an user may gain unauthorized privileges.
It's recommended to install a patch published by Digital.
Solaris with CDE Vulnerabilities in the Common Desktop Environment (CDE): SUN Security Bulletin #00185, ERS-1999.020, J-028, S-99-05, ESB-1999.018
As reported before (CA-98.02), several vulnerabilities in the Common Desktop Environment (CDE) may be be exploited to gain root access and remove arbitrary files. Sun recommends that you install the respective patches immediately on affected systems (Solaris 7 is not affected).
CDE Version Patch ID
1.2 106112-03
105837-02
1.2_x86 106113-03
105838-02
1.0.2 104661-07
104498-05
103882-09
1.0.2_x86 104663-08
104500-05
103886-08
1.0.1 104660-04
104497-05
103884-07
1.0.1_x86 104662-05
104499-05
103885-07
Solaris 2.3 - 7 (SPARC and x86), SunOS 4.1.4 and 4.1.3_U1 Vulnerability in man/catman: SUN Security Bulletin #00184, ERS-1999.019, J-028, S-99-06, ESB-1999.017
The man command displays information from the reference manuals. The catman utility creates preformatted versions of the on-line manuals. Vulnerabilities have been discovered with these commands that may be exploited to overwrite arbitrary files when man or catman is executed by root.
Sun recommends to install the respective patches immediately on affected systems.
Operating System Patch ID
Solaris 7 107038-01
Solaris 7_x86 107039-01
Solaris 2.6 106123-04
Solaris 2.6_x86 106124-04
Solaris 2.5.1 106905-01
Solaris 2.5.1_x86 106906-01
Solaris 2.5 106907-01
Solaris 2.5_x86 106908-01
Solaris 2.4 106912-01
Solaris 2.4_x86 106962-01
Solaris 2.3 106911-01
SunOS 4.1.4 107157-01
107144-01
SunOS 4.1.3_U1 107156-01
107143-01
Solaris with CDE Vulnerability in sdtcm_convert: SUN Security Bulletin #00183, ERS-1999.018, J-028, S-99-04, ESB-1999.016
sdtcm_convert is a setuid-root calendar data conversion utility which converts version 3 (OpenWindows) calendar data format to version 4 (extensible calendar data format), and vice versa. A buffer overflow has been discovered which may be exploited to gain root access.
Sun recommends that you install the respective patches immediately on affected systems.
CDE Version Patch ID
1.3 107022-01
1.3_x86 107023-01
1.2 105566-06
1.2_x86 105567-07
1.0.2 103670-06
1.0.2_x86 103717-06
1.0.1 103671-06
1.0.1_x86 103718-06
NetBSD Security problem with netstat: NetBSD, ERS-1999.017, ESB-1999.015
In some versions of netstat a security hole exists which will allow non-root users to examine any kernel memory location.
It's recommended to install a patch or to disable netstat for non-root users by
chmod 555 /usr/bin/netstat
Windows NT 4.0 SP4 Authentication Processing Error in Windows NT 4.0 Service Pack 4: MS99-04, ESB-1999.014, ERS-1999.016, NTshop
There is a logic error in Service Pack 4 for Windows NT 4.0 that could, under certain conditions, allow a user to log on interactively and connect to network shares using a blank password. The vulnerability primarily, but not exclusively, affects Windows NT servers that serve as domain controllers in environments with DOS, Windows 3.1, Windows for Workgroups, OS/2 or Macintosh clients. Windows NT, Windows 95 and Windows 98 client workstations are not affected.
It's recommended to install the patch for x86 or Alpha.
HP-UX Security Vulnerability with rpc.pcnfsd: HP Security Bulletin #00091, ESB-1999.013, ERS-1999.015, J-026, S-99-03
rpc.pcnfsd is a remote procedure call used by NFS clients which is a service providing username and password authentication for system which have NFS client software installed. If exploited, this defect allows the main printer spool directory used by rpc.pcnfsd to be made world writeable.
It's recommended to install a patch:
HP-UX 10.01: PHNE_17248
HP-UX 10.10: PHNE_17248
HP-UX 10.20: PHNE_17098
HP-UX 11.00: PHNE_16470

This problem is fixed fully in HP-UX release 11.01.
The following sets of patches will need to be installed to resolve all the documented patch dependencies. The dependencies will be satisfied by the patches listed, or any patch that supersedes them:

s700 10.01: PHNE_17248, PHKL_7059, PHCO_14253
s800 10.01: PHNE_17248, PHKL_7060, PHCO_14253
s700 10.10: PHNE_17248, PHKL_8292, PHCO_14254
s800 10.10: PHNE_17248, PHKL_8293, PHCO_14254
s700 10.20: PHNE_17098, PHKL_9155, PHKL_16750, PHCO_13777,
PHCO_12922, PHCO_17389, PHNE_16237, PHKL_16959,
PHKL_17012, PHKL_17253, PHKL_12007
s800 10.20: PHNE_17098, PHKL_9156, PHKL_16751, PHCO_13777,
PHCO_12922, PHCO_17389, PHNE_17097, PHKL_16957,
PHKL_17013, PHKL_17254, PHKL_12008
s700 11.00: PHNE_16470, PHCO_16629, PHKL_15689, PHCO_14625
s800 11.00: PHNE_16470, PHCO_16629, PHKL_15689, PHCO_14625
Microsoft IIS 3.0 and 4.0 Vulnerability in Internet Information Server (IIS) FTP service: MS99-003, ESB-1999.009, ERS-1999.012
The FTP service in IIS has an unchecked buffer in a component that processes "list" commands. This results in a vulnerability that poses two threats to safe operation. The first is a denial of service threat; a malformed "list" request could overflow the buffer causing the server to crash. The second is more esoteric and would be far more difficult to exploit. A carefully-constructed "list" request could cause arbitrary code to execute on the server via a classic buffer overrun technique. Neither variant could be exploited accidentally.
Users need an account (at least a guest-account) to exploit these holes.
It's recommended to install one of the following patches (which require NT 4.0 SP4): x86 IIS 3.0, Alpha IIS 3.0, x86 IIS 4.0, Alpha IIS 4.0
Red Hat Linux Patches for minicom packages: ESB-1999.011
Current minicom packages have permissions set to allow all users to access a modem on a system. This update fixes this problem limiting users to those listed in the minicom configuration file. It's recommended to install a patch:
Red Hat Linux 5.1 and 5.2:
alpha:
rpm -Uvh ftp://updates.redhat.com/5.2/alpha/minicom-1.82-3.alpha.rpm
i386:
rpm -Uvh ftp://updates.redhat.com/5.2/i386/minicom-1.82-3.i386.rpm
sparc:
rpm -Uvh ftp://updates.redhat.com/5.2/sparc/minicom-1.82-3.sparc.rpm
Source rpm:
rpm -Uvh ftp://updates.redhat.com/5.2/SRPMS/minicom-1.82-3.src.rpm
Red Hat Linux 5.0:
alpha:
rpm -Uvh ftp://updates.redhat.com/5.0/alpha/minicom-1.82-0.alpha.rpm
i386:
rpm -Uvh ftp://updates.redhat.com/5.0/i386/minicom-1.82-0.i386.rpm
Source rpm:
rpm -Uvh ftp://updates.redhat.com/5.0/SRPMS/minicom-1.82-0.src.rpm
Red Hat Linux 4.2:
alpha:
rpm -Uvh ftp://updates.redhat.com/4.2/alpha/minicom-1.81-2.alpha.rpm
i386:
rpm -Uvh ftp://updates.redhat.com/4.2/i386/minicom-1.81-2.i386.rpm
sparc:
rpm -Uvh ftp://updates.redhat.com/4.2/sparc/minicom-1.81-2.sparc.rpm
Source rpm:
rpm -Uvh ftp://updates.redhat.com/4.2/SRPMS/minicom-1.81-2.src.rpm
all Information about Trojan Horses: CA-99.02, ESB-1999.012, ERS-1999.014
Over the past few weeks, we have received an increase in the number of incident reports related to Trojan horses. In the advisory the dangers combined in Trojan Horses are as well described as some recent incidents:
False Upgrade to Internet Explorer
Trojan Horse Version of TCP Wrappers
Trojan Horse Version of util-linux
IRIX 6.5 Security Features of IRIX 6.5: SGI-19990201, ESB-1999.008, ERS-1999.011
There has been some confusion on what security features are available in the IRIX 6.5 operating system. Silicon Graphics point out additions and changes in the base set of IRIX 6.5:
1) Access Control Lists (ACLs), /sbin/chacl
2) Least-Privilege Capabilities, /etc/capability and /etc/irix.cap
3) System Manager, /usr/sysadm/bin/sysmgr
4) Trusted IRIX (TRIX or TIRIX) Compartmented Mode Workstation (CMW) 6.5
all Detection the worm Happy99.exe: CIAC-C
A computer worm called Happy99.exe has been discovered in the wild in Europe. Most of the major anti-virus vendors now have updates that will allow their software to detect the malicious code. See the advisory for the corresponding links.
all Testing Mailservers against Spam: Under http://maps.vix.com/tsi/ar-test.html you can test if your Mailserver is protected against Mail-Spamming.
Microsoft Word 97 v8 New Macro Virus detected: J-025, ESB-1999.010, ERS-1999.013
The W97M.Footprint Word macro virus has been seen within the DOE complex. This macro virus attaches to Word objects in Word 97 in much the same way as W97M.Class. Because of this method of infection, this virus will not infect older versions of Microsoft Word. Finding the two footprint files
C:\footprint.$$$
C:\footprint.$$1

on the C: drive is strong evidence that the system is infected.
This virus is known since January '99, first categorized as W97M/CAP.GL, now in W97M/Footer. Some, but not all Anti-Virus products recognize this Macro-Virus. Use an updated antivirus product when one is available. Until then, password the normal.dot file, turn on macro virus detection in Word, and take care when opening files containing macros.

Back to the News

© 1999 Dr. Matthias Leu, EDV Beratung fuer Internet/Intranet, last Update: 1999-03-11, 23:21 +0000