TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ----------------------------------------------------------------------------
INTERNET RISK UPDATE for 06-27-2002 ISS X-Force Internet Threat Intelligence Center www.iss.net - Click on the AlertCon logo for more information. ******************************************** ALERTCON 2 Projected: AlertCon 2 ******************************************** ALERTCON 2 - We have decreased the risk level to AlertCon to 2 in the absence of observable exploitation of the Apache and OpenSSH vulnerabilities. Because of the seriousness of these risk elements, we are watching the situation closely and will raise the risk factor if we observe focused attacks. VULNERABILITIES: OpenSSH Remote Challenge Vulnerability Synopsis: ISS X-Force has discovered a serious vulnerability in the default installation of OpenSSH on the OpenBSD operating system. OpenSSH is a free version of the SSH (Secure Shell) communications suite and is used as a secure replacement for protocols such as Telnet, Rlogin, Rsh, and Ftp. OpenSSH employs end-to-end encryption (including all passwords) and is resistant to network monitoring, eavesdropping, and connection hijacking attacks. X-Force is aware of active exploit development for this vulnerability. Impact: OpenBSD, FreeBSD-Current, and other OpenSSH implementations may be vulnerable to a remote, superuser compromise. Affected Versions: OpenBSD 3.0 OpenBSD 3.1 FreeBSD-Current OpenSSH 3.0-3.2.3 OpenSSH version 3.3 implements "privilege separation" which mitigates the risk of a superuser compromise. Prior to the release of this advisory, ISS and OpenBSD encouraged all OpenSSH users to upgrade to version 3.3. Versions of FreeBSD-Current built between March 18, 2002 and June 23, 2002 are vulnerable to remote superuser compromise. Privilege separation was implemented in FreeBSD-Current on June 23, 2002. Note: OpenSSH is included in many operating system distributions, networking equipment, and security appliances. Refer to the following address for information about vendors that implement OpenSSH: http://www.openssh.com/users.html Description: A vulnerability exists within the "challenge-response" authentication mechanism in the OpenSSH daemon (sshd). This mechanism, part of the SSH2 protocol, verifies a user's identity by generating a challenge and forcing the user to supply a number of responses. It is possible for a remote attacker to send a specially-crafted reply that triggers an overflow. This can result in a remote denial of service attack on the OpenSSH daemon or a complete remote compromise. The OpenSSH daemon runs with superuser privilege, so remote attackers can gain superuser access by exploiting this vulnerability. OpenSSH supports the SKEY and BSD_AUTH authentication options. These are compile-time options. At least one of these options must be enabled before the OpenSSH binaries are compiled for the vulnerable condition to be present. OpenBSD 3.0 and later is distributed with BSD_AUTH enabled. The SKEY and BSD_AUTH options are not enabled by default in many distributions. However, if these options are explicitly enabled, that build of OpenSSH may be vulnerable. Apache: X-Force has verified that this issue is exploitable on Apache HTTP Server for Windows (Win32) version 1.3.24 as well as Apache HTTP Server version 1.3.24 for OpenBSD. It has been reported that exploit code has been developed for the following operating systems and platforms: Sun Solaris 6-8 (sparc/x86); FreeBSD 4.3-4.5 (x86); OpenBSD 2.6-3.1 (x86); and Linux (GNU) 2.4 (x86). These vulnerabilities may lead to modified Web content, denial of service, or further compromise. Apache accounts for over 63% of all active Web sites. ******************************************** RECOMMENDATIONS ******************************************** OpenSSH: ISS X-Force recommends that system administrators disable unused OpenSSH authentication mechanisms. For further information on this solution and affected products, please review the advisory. http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20584 Apache: The X-Force has released an advisory with patching instructions for the default setting of the Apache HTTP Server. This advisory requires immediate action on behalf of all system users with Apache HTTP Server. See Apache for additional details. http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20524 http://httpd.apache.org/info/security_bulletin_20020617.txt For a list of current vulnerabilities, please see: https://gtoc.iss.net/vulnerabilities.php For information on the current Virus/Worm of the day, please refer to: <http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=IRC_NOWE.A> Information regarding other viruses and worms please see: https://gtoc.iss.net/viruses.php ******************************************** FACTOID: FBI agents won't have user-friendly, integrated computer programs to manage their investigations until December 2003, FBI Director Robert Mueller said Friday. Mueller said the bureau would have the basic building blocks of a modern technology system in place by the end of this year, when FBI offices throughout the country should have new computers and monitors and can be connected to each other by fast networks. It will take another year to integrate and modernize the 36 software programs that FBI agents use to conduct their investigations-including the automated case support system, which is supposed to be a central system for managing cases but is so hard to use that agents try to avoid it. Technology specialists at the bureau have convinced Mueller that the bureau's modernization project, nicknamed Trilogy, can't move any faster, though they have acknowledged that most people have better computers at home than FBI agents have at work. "I have to be a little more patient than I normally am," Mueller told the House Appropriations Subcommittee on Commerce, Justice and State. ******************************************** BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER ******************************************** Background. We provide this information in the spirit of PDD 63 to help security professionals wage the war against Internet threats more effectively. Information in this update derived primarily from global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research, and professional liaison. Other sources as noted. AlertCon 1 reflects the global, malicious, determined, 24 x 7 attacks experienced by all networks. AlertCon 2 means increased vigilance/action recommended due to a specific threat or concern. AlertCon 3 means increased attacks against specific targets or vulnerabilities on a scale that is unusually high, action required. AlertCon 4 reflects an Internet emergency for a target or group of targets whose business continuity may depend on some sort of immediate, decisive action. All summaries cover 24 hours the previous workday, GMT. Monday summaries may cover some weekend activity. Copyright 2002 Internet Security Systems, Inc. Permission is granted for the redistribution of the Internet Risk electronically. It is not to be sold or edited in any way without express consent of ISS. Refer comments or questions to: [EMAIL PROTECTED] or [EMAIL PROTECTED] Disclaimer: This information is subject to change without notice. Use of this information constitutes acceptance for use in an 'as is' condition. There are no warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. No other use authorized. FOIA Exemption 4.
