Copyright 2024 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

-----BEGIN PGP SIGNED MESSAGE-----

- ---------------------------------------------------------------------------
CERT* Summary CS-97.03
May 28, 1997

The CERT Coordination Center periodically issues the CERT Summary to
draw attention to the types of attacks currently being reported to our
Incident Response Team. The summary includes pointers to sources of
information for dealing with the problems. We also list new or updated
files that are available for anonymous FTP from
     ftp://info.cert.org/pub/

Past CERT Summaries are available from
     ftp://info.cert.org/pub/cert_summaries/
- ---------------------------------------------------------------------------

Recent Activity
- ---------------

Since the February CERT Summary, we have seen these continuing trends in
incidents reported to us.

1. Continuing cgi-bin Exploits

The CERT Coordination Center continues to receive daily reports of attempts to
exploit vulnerabilities in cgi-bin scripts. Our original advisory regarding
these vulnerabilities was published in March 1996, and is available from:

    ftp://info.cert.org/pub/cert_advisories/CA-96.06.cgi_example_code

The most frequently reported exploitation attempts use the "phf" program
discussed in the advisory. The "phf" program is installed by default with
several implementations of httpd servers. Intruders continue to use widely
available "phf" exploit scripts to attempt to obtain a copy of the /etc/passwd
file. Fortunately, many of the reported attempts are unsuccessful. We are now
receiving reports that "php" is being exploited as well.

Similar attacks may succeed against other cgi scripts if the scripts are
written without appropriate care regarding security issues. We encourage sites
to evaluate all programs in their cgi-bin directory and remove any scripts
that are not in active use.


2. INND Exploits

In our previous summary (CS-97.02 - SPECIAL EDITION) we reported widespread,
large-scale attacks on NNTP (Network News Transport Protocol)
servers. CS-97.02 is available from

    ftp://info.cert.org/pub/cert_summaries/CS-97.02

We continue to receive reports that INND versions older than 1.5.1 are being
exploited. For more information about the INND vulnerability please see

    ftp://info.cert.org/pub/cert_advisories/CA-97.08.innd

We recommend that you *not* try to exploit your own server to determine if it
is vulnerable. Many of the INND attacks reported were a result of sites
testing their own servers and inadvertently releasing their test on the
Internet. To determine if your version of INND is vulnerable, please consult
the advisory (CA-97.08.innd).

A number of sites have reported that they continue to be vulnerable after
applying the patch for upgrading to INN 1.5.1. If you are upgrading to INN
1.5.1, please be sure to read the README file carefully.


3. Chargen and Echo Services

The CERT/CC continues to receive reports of denial-of-service attacks that
result from an intruder creating a "UDP packet storm" either on a system or
between two systems. An attack on one host causes that host to perform
poorly. An attack between two hosts can cause extreme network congestion in
addition to adversely affecting host performance. For more information about
this problem please see

    ftp://ftp.cert.org/pub/cert_advisories/CA-96.01.UDP_service_denial

We recommend disabling unneeded services on each host, in particular the
chargen and echo services, and filtering these services at the firewall or
Internet gateway. Note that these services cannot be wrapped by TCP wrappers
as they are usually part of inetd itself.


4. Spoofed CERT Summary

The CERT/CC has received a number of questions about fake CERT Summaries. All
documents produced by the CERT Coordination Center are PGP (Pretty Good
Privacy) signed to ensure the integrity of their information and their
authenticity. We encourage you to verify all of our documents using PGP. Our
PGP public key is available from

    ftp://info.cert.org/pub/CERT_PGP.key

This same key can be used to encrypt incident and vulnerability
reports sent to us. For more information about PGP please see

    http://web.mit.edu/network/pgp.html



What's New in the CERT FTP Archive
- ----------------------------------
We have made the following changes since the last CERT Summary (February 26,
1997).

* New Additions

ftp://info.cert.org/pub/cert_advisories/

    CA-97.08.innd                       Describes two vulnerabilities in
                                        INN. One affects versions 1.5 and
                                        earlier; the other affects 1.5.1 and
                                        earlier. Vendor information and
                                        pointers to patches are included.

    CA-97.09.imap_pop                   Reports a vulnerability in some
                                        Internet Message Access Protocol
                                        (IMAP) and Post Office Protocol (POP)
                                        implementations (imapd, ipop2d, and
                                        ipop3d). Vendor and upgrade
                                        information are included.

    CA-97.10.nls                        Reports a buffer overflow condition
                                        that affects some libraries using the
                                        Natural Language Service (NLS). Vendor
                                        vulnerability and patch information
                                        are included.

    CA-97.11.libXt                      Reports a buffer overflow
                                        vulnerability in the Xt library of the
                                        X Windowing System. Vendor
                                        vulnerability and patch information
                                        are included.

    CA-97.12.webdist                    Describes a vulnerability in the
                                        webdist.cgi-bin program, part of the
                                        IRIX Mindshare Out Box package,
                                        available with IRIX 5.x and 6.x. A
                                        workaround is included.

    CA-97.13.xlock                      Reports a buffer overflow problem in
                                        some versions of xlock. Patch
                                        information and a workaround are
                                        included.

ftp://info.cert.org/pub/cert_bulletins/

    VB-97.01.dec                        Information from Digital Equipment
                                        Corporation about a potential
                                        vulnerability in the Division of
                                        Privilege (DoP).

    VB-97.02.sol_guestbook              Information from Selena Sol about a
                                        vulnerability in her Guestbook script
                                        for Web servers using Server Side
                                        Includes (SSI).

ftp://info.cert.org/pub/cert_summaries/

    CS-97.02                            This special edition of the CERT
                                        Summary highlights widespread,
                                        large-scale attacks that are
                                        occurring against news servers.


* Updated Files

ftp://info.cert.org/pub/cert_advisories/

    CA-96.02.bind                       Noted that BIND 8.1 was released in
                                        May 1997. Gave new location of the
                                        BIND archives.

    CA-96.08.pcnfsd                     Corrected a name in acknowledgments.

    CA-96.20.sendmail_vul               Updated vendor information for
                                        Hewlett-Packard Company.

    CA-96.21.tcp_syn_flooding           Updated vendor information for
                                        Hewlett-Packard Company.

    CA-96.24.sendmail.daemon.mode       Updated vendor information for
                                        Hewlett-Packard Company.

    CA-97.02.hp_newgrp                  Noted that the vulnerability described
                                        in this advisory is being exploited.

    CA-97.03.csetup                     Updated the Solution section to
                                        include URL for SGI patch
                                        information.

    CA-97.04.talkd                      Updated vendor information for
                                        Hewlett-Packard Company.

    CA-97.05.sendmail                   Updated NEC Corporation information.

    CA-97.08.innd                       Added information about Topic 2,
                                        ucbmail, including a new patch that
                                        must be applied to many versions of
                                        INN. Replaced pointer to patch 04 with
                                        patch 05 and noted that you must use
                                        patch 05. Added information from
                                        various vendors. Noted that the
                                        vulnerability is being actively
                                        exploited.

    CA-97.09.imap_pop                   Added vendor information from
                                        Microsoft Corporation.

    CA-97.10.nls                        Updated vendor information from
                                        Hewlett-Packard Company.

    CA-97.11.libXt                      Updated vendor information from
                                        Hewlett-Packard Company.

    CA-97.14.metamail                   Added vendor information from Berkeley
                                        Software Design, Inc. (BSDI). Changed
                                        release date of the patch.


ftp://info.cert.org/pub/latest_sw_versions/

    ifstatus                            Added pointer to latest version,
                                        ifstatus 2.0.


- ---------------------------------------------------------------------------
How to Contact the CERT Coordination Center

Email    This email address is being protected from spambots. You need JavaScript enabled to view it.

Phone    +1 412-268-7090 (24-hour hotline)
                CERT personnel answer 8:30-5:00 p.m. EST
                (GMT-5)/EDT(GMT-4), and are on call for
                emergencies during other hours.

Fax      +1 412-268-6989

Postal address
        CERT Coordination Center
        Software Engineering Institute
        Carnegie Mellon University
        Pittsburgh PA 15213-3890
        USA

To be added to our mailing list for CERT advisories and bulletins, send your
email address to
        This email address is being protected from spambots. You need JavaScript enabled to view it.
In the subject line, type
        SUBSCRIBE your-email-address

CERT advisories and bulletins are posted on the USENET news group
         comp.security.announce

CERT publications, information about FIRST representatives, and other
security-related information are available for anonymous FTP from
        http://www.cert.org/
        ftp://info.cert.org/pub/

If you wish to send sensitive incident or vulnerability information to CERT
staff by electronic mail, we strongly advise you to encrypt your message.
We can support a shared DES key or PGP. Contact the CERT staff for more
information.

Location of CERT PGP key
         ftp://info.cert.org/pub/CERT_PGP.key

- ---------------------------------------------------------------------------
Copyright 1997 Carnegie Mellon University
This material may be reproduced and distributed without permission provided
it is used for noncommercial purposes and credit is given to the CERT
Coordination Center.

* Registered U.S. Patent and Trademark Office.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBM4x6mHVP+x0t4w7BAQGQBAP+KHYNhLYQXqXvx2OsglfZsrewW3nJVmlm
rmF6JNWxoWi+wu/jJwcyE1g/dNv0KpdKZq9smT/1llD/g/bVmSMmffI1F/A45lpG
DMzLfJzJVCwAk6hDvfirXDd659JvzXNmXJmw0GxywERbI3QUEKn8egQFCVr03B9K
RmlmOteXYkg=
=OKD7
-----END PGP SIGNATURE-----


Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology