TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

INTERNET RISK UPDATE for 06-27-2002
ISS X-Force Internet Threat Intelligence Center

www.iss.net - Click on the AlertCon logo for more information.

********************************************
ALERTCON 2
Projected:  AlertCon 2
********************************************

ALERTCON 2 - We have decreased the risk level to AlertCon to 2 
in the absence of observable exploitation of the Apache and 
OpenSSH vulnerabilities. Because of the seriousness of these 
risk elements, we are watching the situation closely and will 
raise the risk factor if we observe focused attacks. 

VULNERABILITIES: 

OpenSSH Remote Challenge Vulnerability

Synopsis:

ISS X-Force has discovered a serious vulnerability in the default
installation of OpenSSH on the OpenBSD operating system. OpenSSH is a
free version of the SSH (Secure Shell) communications suite and is used
as a secure replacement for protocols such as Telnet, Rlogin, Rsh, and
Ftp. OpenSSH employs end-to-end encryption (including all passwords) 
and is resistant to network monitoring, eavesdropping, and connection
hijacking attacks. X-Force is aware of active exploit development for
this vulnerability.

Impact:

OpenBSD, FreeBSD-Current, and other OpenSSH implementations may be
vulnerable to a remote, superuser compromise.

Affected Versions:

OpenBSD 3.0
OpenBSD 3.1
FreeBSD-Current
OpenSSH 3.0-3.2.3

OpenSSH version 3.3 implements "privilege separation" which mitigates
the risk of a superuser compromise. Prior to the release of this
advisory, ISS and OpenBSD encouraged all OpenSSH users to upgrade to
version 3.3. Versions of FreeBSD-Current built between March 18, 2002
and June 23, 2002 are vulnerable to remote superuser compromise.
Privilege separation was implemented in FreeBSD-Current on June 23,
2002.

Note: OpenSSH is included in many operating system distributions,
networking equipment, and security appliances. Refer to the following
address for information about vendors that implement OpenSSH:
http://www.openssh.com/users.html 

Description:

A vulnerability exists within the "challenge-response" authentication
mechanism in the OpenSSH daemon (sshd). This mechanism, part of the 
SSH2 protocol, verifies a user's identity by generating a challenge and
forcing the user to supply a number of responses. It is possible for a
remote attacker to send a specially-crafted reply that triggers an
overflow. This can result in a remote denial of service attack on the
OpenSSH daemon or a complete remote compromise. The OpenSSH daemon runs
with superuser privilege, so remote attackers can gain superuser access
by exploiting this vulnerability.

OpenSSH supports the SKEY and BSD_AUTH authentication options. These are 
compile-time options. At least one of these options must be enabled
before the OpenSSH binaries are compiled for the vulnerable condition to 
be present. OpenBSD 3.0 and later is distributed with BSD_AUTH enabled.  
The SKEY and BSD_AUTH options are not enabled by default in many 
distributions. However, if these options are explicitly enabled, that 
build of OpenSSH may be vulnerable.

Apache: X-Force has verified that this issue is exploitable on Apache HTTP 
Server for Windows (Win32) version 1.3.24 as well as Apache HTTP Server 
version 1.3.24 for OpenBSD. It has been reported that exploit code has been 
developed for the following operating systems and platforms: Sun Solaris 6-8

(sparc/x86); FreeBSD 4.3-4.5 (x86); OpenBSD 2.6-3.1 (x86); and Linux (GNU) 
2.4 (x86). These vulnerabilities may lead to modified Web content, denial of

service, or further compromise. Apache accounts for over 63% of all active 
Web sites.

********************************************
RECOMMENDATIONS
********************************************

OpenSSH: ISS X-Force recommends that system administrators disable unused 
OpenSSH authentication mechanisms. For further information on this solution 
and affected products, please review the advisory.
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20584 

Apache: The X-Force has released an advisory with patching instructions for 
the default setting of the Apache HTTP Server. This advisory requires
immediate 
action on behalf of all system users with Apache HTTP Server. See Apache for

additional details.
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20524 
http://httpd.apache.org/info/security_bulletin_20020617.txt 

For a list of current vulnerabilities, please see:
https://gtoc.iss.net/vulnerabilities.php

For information on the current Virus/Worm of the day, please refer to:   
<http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=IRC_NOWE.A> 

Information regarding other viruses and worms please see:
https://gtoc.iss.net/viruses.php

********************************************

FACTOID:  FBI agents won't have user-friendly, integrated computer programs 
to manage their investigations until December 2003, FBI Director Robert
Mueller 
said Friday. 

Mueller said the bureau would have the basic building blocks of a modern 
technology system in place by the end of this year, when FBI offices
throughout 
the country should have new computers and monitors and can be connected to
each 
other by fast networks. It will take another year to integrate and modernize
the 
36 software programs that FBI agents use to conduct their
investigations-including 
the automated case support system, which is supposed to be a central system
for 
managing cases but is so hard to use that agents try to avoid it. 

Technology specialists at the bureau have convinced Mueller that the
bureau's 
modernization project, nicknamed Trilogy, can't move any faster, though they
have 
acknowledged that most people have better computers at home than FBI agents
have 
at work. "I have to be a little more patient than I normally am," Mueller
told the 
House Appropriations Subcommittee on Commerce, Justice and State. 

********************************************
BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER 
********************************************

Background. We provide this information in the spirit of PDD 63 to
help security professionals wage the war against Internet threats
more effectively. Information in this update derived primarily from
global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research,
and professional liaison. Other sources as noted. AlertCon 1 reflects
the global, malicious, determined, 24 x 7 attacks experienced by all
networks. AlertCon 2 means increased vigilance/action recommended due
to a specific threat or concern. AlertCon 3 means increased attacks
against specific targets or vulnerabilities on a scale that is
unusually high, action required. AlertCon 4 reflects an Internet
emergency for a target or group of targets whose business continuity
may depend on some sort of immediate, decisive action. All summaries
cover 24 hours the previous workday, GMT. Monday summaries may cover
some weekend activity. 

Copyright 2002 Internet Security Systems, Inc. Permission is granted
for the redistribution of the Internet Risk electronically.
It is not to be sold or edited in any way without express consent of
ISS. Refer comments or questions to: [EMAIL PROTECTED] or [EMAIL PROTECTED]

Disclaimer: This information is subject to change without notice. Use
of this information constitutes acceptance for use in an 'as is'
condition. There are no warranties with regard to this information.
In no event shall the author be liable for any damages whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information is at the user's own risk.
No other use authorized. FOIA Exemption 4.



Reply via email to