TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ----------------------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 INTERNET THREAT UPDATE for 12-14-2001 ISS X-Force Special Operations Group www.iss.net - Click on 'Current Internet Threat' for more information. ****************************************************** ALERTCON 2 Projected AlertCon 3 ****************************************************** - - We remain at AlertCon 2 - heightened awareness - because of the recently publicized System V derived login vulnerability that affects multiple vendor applications. This is a serious vulnerability in the 'login' program present in the affected systems. This program is oftentimes referred to as '/bin/login'. This vulnerability allows malicious hackers to execute commands remotely on a system with superuser privileges. Systems are vulnerable to this issue only if certain types of interactive connections are allowed, such as Telnet or Rlogin. These services are enabled by default on most platforms. - - Because the exploit is in the wild we anticipate exploitations of this vulnerability. When we see this happening we will raise the AlertCon to 3 (active, focused threat). - - We continue to see new worms and viruses popping up several times a week, such as the 'Gokar' Worm. You are urged to continue to update your anti-virus software per your vendor of choice. - ------------------------------------------------------ RECOMMENDATIONS - ------------------------------------------------------ - - There is no simple workaround for the '/bin/login/' issue. Customers can take several precautions to minimize their risk. Disable default terminal communications services, including Telnet and Rlogin. Install and use Secure Shell (SSH) as a secure alternative. SSH implements encrypted terminal connections, and is designed to replace insecure protocols such as Telnet and Rlogin. - - See the X-Force advisory for details, solutions to the SysV derived login vulnerability. http://xforce.iss.net/alerts/advise105.php - - Additional information is available in CERT-CC advisory CA 2001-34 http://www.cert.org/advisories/CA-2001-34.html - - See the Trend Micro site for further information on the Gokar Worm. http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=WORM_GO KAR.A - ------------------------------------------------------ ATTACK SIGNATURE RANKING - global IDS, midnight - midnight, previous day, % of total - ------------------------------------------------------ Unauth Access Attempt 71.64% Protocol Decode 14.25% Pre-Attack Probe 08.50% Denial Of Service 04.56% Suspicious Activity 01.02% Back Door 00.03% - ------------------------------------------------------ TOP TEN ATTACK DESTINATION PORTS - global IDS, midnight - midnight, previous day, % of top ten (ports found at) http://www.networkice.com/Advice/Exploits/Ports/default.htm - ------------------------------------------------------ 80 (http) 70.31% 23 (telnet) 17.97% 22 (ssh) 07.41% 21 (ftp) 01.20% 25 (smtp) 01.17% 69 (tftp) 01.00% 137 (netbios-ns) 00.37% 443 (ssl) 00.21% 161 (snmp) 00.19% 15104 (unassigned) 00.17% - ------------------------------------------------------ BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER - ------------------------------------------------------ Background. We provide this information in the spirit of PDD 63 to help security professionals wage the war against Internet threats more effectively. Information in this update derived primarily from global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research, and professional liaison. Other sources as noted. AlertCon 1 reflects the global, malicious, determined, 24 x 7 attacks experienced by all networks. AlertCon 2 means increased vigilance/action recommended due to a specific threat or concern. AlertCon 3 means increased attacks against specific targets or vulnerabilities on a scale that is unusually high, action required. AlertCon 4 reflects an Internet emergency for a target or group of targets whose business continuity may depend on some sort of immediate, decisive action. All summaries cover 24 hours the previous workday, GMT. Monday summaries may cover some weekend activity. Copyright 2001 Internet Security Systems, Inc. Permission is granted for the redistribution of the Internet Threat Update electronically. It is not to be sold or edited in any way without express consent of ISS. Refer comments or questions to: [EMAIL PROTECTED] or [EMAIL PROTECTED] Disclaimer: This information is subject to change without notice. Use of this information constitutes acceptance for use in an 'as is' condition. There are no warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. No other use authorized. FOIA Exemption 4. Patrick Gray Manager, Internet Threat Intelligence Center X-Force, MSS Special Operations Group Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 Internet Security Systems - The Power to Protect www.iss.net -----BEGIN PGP SIGNATURE----- Version: PGP 7.0 iQA/AwUBPBo6PZG41ROSQPncEQL1TACfcODT+8coAAh0mXOCCw5+PSMAbIgAoJS/ GD6wTEeX+Ls0522saK91sRSp =njhf -----END PGP SIGNATURE-----
