home *** CD-ROM | disk | FTP | other *** search
- =====================================================================
- WINDOWS SECURITY DIGEST 1999 SERIES
- Watching the Watchers November 2, 1999
- =====================================================================
- SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY
-
- -- C O N T E N T S --
-
- << IN FOCUS >>
- * Security Training: Where'd You Get That?
-
- << WEB SITE NEWS >>
- * New Resource: Win2K Security Advice
-
- << SECURITY RISKS >>
- * Netscape Messaging Server Subject to Denial of Service
- * Denial of Service Against SERVICES.EXE
- * Avirt Mail Server 3.3a and 3.5 Buffer Overflow Condition
- * Ximtami Web Server Subject to Buffer Overflow
- * CMail 2.4 Might Allow Execution of Arbitrary Code
- * ExpressFS 2.x FTPServer Subject to Buffer Overflow
- * WFTPD v2.34 and 2.40 Subject to Buffer Overflow
- * TCP/IP Sequence Number Randomness
- * Java VM Sandbox Vulnerability
-
- << HOT THREADS>>
- * November, Week 1
- * October, Week 5
-
- << IN THE NEWS >>
- * Ongoing MDAC Attacks Against IIS
- * Winternals Releases NTFSDOS Professional
- * DOJ Says Privacy is Antisocial
- * Britain to Form Cybercrime Force
- * Service Pack 6 for Windows NT !
-
- << FEATURE ARTICLES >>
- * IIS 5.0's New Security Features
- * Want to Tap the Security Job Market?
- * Tools of the Trade
- * Top 10 Cracks of All Time
- * The E-commerce Legal Balancing Act
-
- << REVIEWS >>
- * BO2K - Cracker Util or Hightech Admin Tool?
- * Internet Scanner vs CyberCop
-
- _____________________________________________________________________
- ______________________________ IN FOCUS _____________________________
- SECURITY TRAINING: WHERE'D YOU GET THAT?
-
- Hello Everyone,
-
- As you know, security is a red hot topic and there is absolutely
- no sign that it will cool down one iota anytime in the near future.
- Many network administrators have already added network security
- skills to their list of abilities. And administrators who have not
- done so are flocking to training facilities in droves, and scouring
- the Internet for the tiniest tidbits of useable information.
- With so many people seeking out security training today, many
- existing educational facilities have retooled and new training
- organizations are popping up in an ever increasing frequency to
- offer security-related courses.
- I get a lot of email from administrators asking me who offers
- various types of security training. To help arrive at answers for
- those questions, there is probably no better way than to ask those
- of you who have already taken security training in some form or
- fashion.
- So, if you're among those that have taken some kind of security
- training anytime in the last two years, please take a moment of
- your day to share with me what you trained in, where you received
- that training, and your over all recommendation towards any courses
- taken. I'll pool all the information together to create a list of
- reader-recommended training programs and share that information with
- all of you in an upcoming edition of this newsletter.
- Please send your response to mark@ntsecurity.net (do not click reply
- to this newsletter!) and use a subject of "Sec Training" so that I can
- more easily identify your message. Thanks for any information you can
- share - I look forward to receiving it.
-
- Sincerely,
- Mark Joseph Edwards, News Editor
- mark@ntsecurity.net, http://www.ntsecurity.net
-
-
- ==== SPONSORED BY VERISIGN - THE INTERNET TRUST COMPANY ====
- Start preparing for holiday customers NOW - protect your
- site with 128-bit SSL encryption! Get VeriSign's FREE guide,
- "Securing Your Web Site for Business." You will learn
- everything you need to know about using SSL to encrypt
- your e-commerce transactions for serious online security.
- http://www.verisign.com/cgi-bin/go.cgi?a=n032602130009000
- ============================================================
-
- _____________________________________________________________________
- ___________________________ WEB SITE NEWS ___________________________
-
- *** NEW RESOURCE: WIN2K SECURITY ADVICE
- NTSecurity.net has joined forces with Steve Manzuik to bring the
- security community a brand new and much-requested Windows security
- mailing list. The new moderated mailing list, Win2KSecAdvice, is
- geared towards promoting the open discussion of Windows-related
- security issues.
- With a firm and unwavering commitment towards timely full
- disclosure, this new resource promises to become a great forum for
- open discussion regarding security-related bugs, vulnerabilities,
- potential exploits, virus, worms, Trojans, and more. Win2KSecAdvice
- promotes a strong sense of community and we openly invite all security
- minded individuals, be they white hat, gray hat, or black hat, to join
- the new mailing list.
- While Win2KSecAdvice was named in the spirit of Microsoft's
- impending product line name change, and meant to reflect the list's
- security focus both now and in the long run, it is by no means limited
- to security topics centered around Windows 2000. Any security issues
- thatpertain to Windows-based networking are relevant for discussion,
- including all Windows operating systems, MS Office, MS BackOffice, and
- all related third party applications and hardware. The scope of
- Win2KSecAdvice can be summarized very simply: if it's relevant to
- security, it's relevant to the list.
- The new list (hosted by LSoft on their speedy LISTSERV software) is
- now a permanent part of NTSecurity.net, and Steve Manzuik
- (steve@win2ksecadvice.net) will be your list moderator. NTSecurity.net
- hosts the mailing list's Web-based searchable archives for your
- research endeavors.
- http://www.ntsecurity.net/go/load.asp?id=/security/win2ksecadvice.htm
- http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=171&TB=news
- _____________________________________________________________________
- ___________________________ SECURITY RISKS __________________________
-
- *** NETSCAPE MESSAGING SERVER DOS
- Netscape's Messaging Server 3.6 is susceptible to denial of service
- attacks because of the way it handles incoming mail commands. Using a
- simple scheme, an attacker could make the server consume all available
- memory and CPU cycles, thereby denying any further service to the
- machine's users.
- http://www.ntsecurity.net/go/load.asp?iD=/security/netscp-msg-srv.htm
-
- *** DENIAL OF SERVICE AGAINST SERVICES.EXE
- A person using the handle "rain forrest puppy" discovered a denial of
- service condition in Windows NT, where an intruder can cause the
- Services.Exe to crash. After the process crashes, all named pipe
- activity on the system stops. In addition, user logons, remote system
- access, local server management, and other crucial functions cease to
- work properly.
- Microsoft is aware of the problem but has made no public comments
- regarding the discovery. In the mean time, protect yourself from
- external attacks by blocking all inbound NetBIOS traffic. Protect
- yourself from internal attacks by stopping the Server service. Be
- advised that stopping the Server service might prevent the use of
- management tools such as Server Manager, etc. For more information,
- visit the following URL:
- http://www.ntsecurity.net/go/load.asp?iD=/security/services.htm
-
- *** AVIRT MAIL SERVER 3.3a and 3.5 BUFFER OVERFLOW CONDITION
- Luck Martins reported a buffer overflow condition in Avirt Mail Server
- 3.3a and 3.5. The problem, found in the routine that collects a user's
- name and password, could let arbitrary code execute on the server.
- Avirt has not responded about how it will address this problem.
- http://www.ntsecurity.net/go/load.asp?iD=/security/avirt1.htm
-
- *** XITAMI WEB SERVER SUBJECT TO BUFFER OVERFLOW
- Meliksah Ozoral discovered a problem with Xitami Web Server v2.4c3,
- where sending large amounts of data can cause the service to crash,
- leading to denial of service for the machine. According to the report,
- the problem is due to an Xitami service listening on port 81. Xitami
- has provided no information regarding a fix for this problem.
- http://www.ntsecurity.net/go/load.asp?iD=/security/xitami1.htm
-
- *** CMAIL 2.4 MIGHT ALLOW EXECUTION OF ARBITRARY CODE
- Luck Martin reported a problem in Cmail's 2.4's SMTP service that
- might let arbitrary code execute on the server. Using a buffer
- overflow condition in the CMail code in the MAIL FROM: parsing
- routine, an attacker can inject malicious code into the OS where
- the system would act on it. A similar bug was present in CMail 2.3.
- No fix is presently available for the problem.
- http://www.ntsecurity.net/go/load.asp?iD=/security/cmail1.htm
-
- *** EXPRESSFS 2.x FTPSERVER SUBJECT TO BUFFER OVERFLOW
- Luck Martin reported a buffer overflow condition in ExpressFS 2.x FTP
- Server that can lead to the execution of arbitrary code on the server.
- Playing against faulty code in the user name and password routines, a
- certain-length string parameter can be passed in a particular order,
- which causes the service to crash and execute any arbitrary code that
- was passed in the parameter string. The vendor hasn't released any
- information regarding a fix for this problem.
- http://www.ntsecurity.net/go/load.asp?iD=/security/expressfs1.htm
-
- *** WFTPD v2.34 AND 2.40 SUBJECT TO BUFFER OVERFLOW
- Luck Martin reported a buffer overflow condition in WFTPD 2.34 and 2.40
- that might let arbitrary code execute on the system. By taking advantage
- of poor coding in make-dir (MKD) and change-dir (CWD) commands, an
- intruder can cause a string of exactly 255 characters to pass to the
- server in a certain sequence, which causes the service to crash or to
- execute the code passed in the character string. The problem minimally
- effects WFTPD on Windows NT and Win98 systems. The makers of WFTPD,
- Texas Imperial Software, have made no public comments regarding a fix
- for the problem.
- http://www.ntsecurity.net/go/load.asp?iD=/security/wftpd1.htm
-
- *** TCP/IP SEQUENCE NUMBER RANDOMNESS
- National Bank of Kuwait discovered a problem with Windows NT's TCP/IP
- stack implementation, where the initial sequence numbers (ISN) are
- somewhat predictable. Because of this predictability, there is a
- chance a TCP/IP session could be spoofed or hijacked. The problem
- effects NT 4.0 Workstation, NT 4.0 Server, NT 4.0 Server Enterprise
- Edition and Terminal Server Edition.
- Microsoft issued a patch for and Intel and Alpha platforms that
- improves the randomness of Windows NT 4.0 TCP/IP ISN generation, which
- now provides 15 bits of entropy. The patch contains the same algorithm
- as that found in Windows 2000. Be sure to read Microsoft's FAQ and
- Support Online article Q243835 regarding this matter.
- http://www.microsoft.com/security/bulletins/MS99-046faq.asp
- http://support.microsoft.com/support/kb/articles/q243/8/35.asp
- Intel patch:
- http://download.microsoft.com/download/winntsrv40/patch/
- 4.0.1381.7014/nt4/en-us/q243835.exe
- Alpha patch:
- http://download.microsoft.com/download/winntsrv40/patch/
- 4.0.1381.7014/alpha/en-us/q243835.exe
-
- *** JAVA VM SANDBOX VULNERABILITY
- Microsoft reported a problem with their Java VM sandbox security.
- According to Microsoft's security bulletin, "a web-hosted Java program
- could take unauthorized, potentially malicious actions against visitors
- to the web site. The specific actions that could be taken are limited
- only by the privileges of the user."
- In a nutshell, it is possible for a Java applet to escape the
- security sandbox by using an illegal type conversion, often referred
- to as "casting". The problem could reading, writing, and deleting files,
- reformatting the hard drive, or copy data to/from a web page without
- the user's knowledge. Microsoft has issued a bulletin, patch, FAQ, and
- Support Online article Q244283 regarding this matter.
- http://www.microsoft.com/java/vm/dl_vm32.htm
- http://www.microsoft.com/security/bulletins/MS99-045faq.asp
- http://support.microsoft.com/support/kb/articles/q244/2/83.asp
-
- _____________________________________________________________________
- ____________________________ HOT THREADS ____________________________
-
- *** NOVEMBER, WEEK 1
- Each week we offer a quick recap of some of the highlights from the
- Win2KSecAdvice mailing list (covered in this newsletter.) In the
- spotlight this week is a thread regarding password caching after the
- installation of SP6, and a thread regarding the reported Services.exe
- denial of service attack (also covered in this issue.)
- 1: Caching of Passwords Revealed After Installing SP6, by Richard Noel
- 2: RFP9906 - RFPoison Attack by Luke Leighton, by R.F.P.
-
- FOLLOW THIS LINK TO READ ALL THE THREADS FOR NOV. WEEK 1:
- http://www.ntsecurity.net/go/loadit.asp?id=page_listserv.asp?s=win2ksec
-
- *** OCTOBER, WEEK 5
- Win2KSecAdvice was launched in late October and user's wasted no time
- getting right down to business. Several interesting threads appeared
- from a variety of users. The highlights are as follows:
- 1: IFRAME Vulnerability Still Here, by Steve Manzuik
- 2: IIS Denial of Service?, by M.J.E.
- 3: Netscape "RCPT TO:" Vulnerability, by Steve Manzuik
- 4: Outlook Express Issue Similar to Netscape "RCPT TO:" Vulnerability
- by David Sandor
-
- FOLLOW THIS LINK TO READ ALL THE THREADS FOR OCT. WEEK 5:
- http://www.ntsecurity.net/go/loadit.asp?id=page_listserv.asp?s=win2ksec
-
- _____________________________________________________________________
- ________________________________ NEWS _______________________________
-
- *** ONGOING MDAC ATTACKS AGAINST IIS
- More than 25 Windows NT-based Web servers were defaced over the
- weekend. And while not all of those attacks can be attributed to the
- MDAC problem reported back in April 99, CERT has posted a notice on
- their activity report that shows many recent attacks are due to
- problems with MDAC.
- http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=172&TB=news
-
- *** WINTERNALS RELEASES NTFSDOS PROFESSIONAL
- Winternals Software LP, an Austin-based developer of advanced system
- utilities for Microsoft Windows 9x/NT/2000, released NTFSDOS
- Professional. This latest addition of the product provides full
- read/write access to NTFS drives from a DOS command shell.
- http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=168&TB=news
-
- *** DOJ SAYS PRIVACY IS ANTISOCIAL
- The Internet Engineering Task Force (IETF) has been developing the
- specifications to the IPv6 protocol for some time now, and as you
- know, decisions are being considered to include robust support for
- encryption over the protocol.
- But as you also know, the FBI wants an easily tapable Internet,
- and obviously encryption would confound that effort to a large extent.
- So what does the United States government have to say about this? Ask
- Scott Bradner, veteran IETF area coordinator and Harvard University
- networking guru. When the IETF decided to include wire encryption in
- the new IPv6 protocol, someone from the Department of Justice (DoJ)
- gave Scott a hard slap. "Someone very high up in the US Justice
- Department told me that week that for the IETF to support encryption
- was an 'antisocial act,'" Bradner commented in a Wired Magazine
- interview.
- http://www.ntsecurity.net/go/2c.asp?f=/news.asp?IDF=167&TB=news
-
- *** BRITAIN TO FORM CYBERCRIME FORCE
- Britain is set to establish a national police force chartered to
- fight cybercrime. The new force will include participants from
- universities, the electronics industry, intelligence staff from the
- security services MI6 and MI5, and specialized police officers.
- The new force, tentatively named the "High Tech Crime Unit," is
- taking advice from the American NSA and plans to exchange information
- with the FBI regarding fraud, pornography, pedophile activity,
- spreading race hate, counterfeiting, gambling, hacking and stealing
- information, software piracy, money laundering, and sabotage involving
- computer viruses.
-
- *** SERVICE PACK 6 FOR WINDOWS NT !
- Microsoft released Service Pack 6 (SP6) on October 27th. SP6 for
- Windows NT 4.0 applies to Workstation, Server and Enterprise Editions
- of Windows NT 4.0 - but not Terminal Server Edition. The new service
- pack consolidates patches from SP1 through SP5, but Microsoft says
- that SP6 remains optional. For a list of all items fixed within SP6,
- be sure to review the Support Online articles Q241211 and Q244690.
- http://support.microsoft.com/support/kb/articles/Q241/2/11.ASP
- http://support.microsoft.com/support/kb/articles/Q244/6/90.ASP
-
- _____________________________________________________________________
- ______________________________ FEATURES _____________________________
-
- *** IIS 5.0'S NEW SECURITY FEATURES
- Ken Spencer reviews the latest security features in the new Internet
- Information Server 5.0 for Windows NT Magazine. Ken gives excellent
- coverage of IIS 5.0's authentication, directory security, changes in
- integration with MS Certificate Server, a new script source access
- permission, the permissions wizard, and the support for Kerberos and
- Active Directory.
- http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=135&TB=f
-
- *** WANT TO TAP THE SECURITY JOB MARKET?
- We get mail every day from people asking us how they can get into the
- security job market. And frankly, there is no single blanket answer
- for that question. Many factors come into play - namely knowledge
- and training. To defend against an intruder, you must think like an
- intruder, and they only way we know of to achieve that is to become
- one. Of course, that doesn't imply breaking into systems. More so, we
- mean that people should learn the tools and tactics used by intruders
- by practicing them against your own networks. But even so, that's a
- long road to becoming proficient with security.
- If you're among those seeking to become a security professional, you
- should read what Margot Suydam has to say. In her article for
- Information Security Magazine, Margot writes a revealing story about
- the job market as it stands today. According to the article, the market
- is hot for consultants and senior-level security professionals because
- a lot of companies are beefing up their security teams.
- http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=133&TB=f
-
- *** TOOLS OF THE TRADE
- In his feature for Information Security Magazine, Edward Skoudis
- writes a compelling story that describes what's going on "in the
- wild" regarding crack attempts, and outlines ways of defending your
- organization against these sophisticated tools and techniques.
- http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=132&TB=f
-
- *** TOP 10 CRACKS OF ALL TIME
- CNet has an interesting feature that details the top 10 network
- attacks of all time. The article does a good job of explaining the
- nature of the attacks, as well as some of the history behind their
- occurrences.
- http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=131&TB=f
-
- *** THE E-COMMERCE LEGAL BALANCING ACT
- Are you thinking about using e-commerce to stimulate your business?
- If so, you obviously not alone. But are you aware of the pitfalls
- you may face in doing so? What if your company is sued for damage
- liabilities? Are you certain you're safe from prosecution?
- Joseph Saul adequately points out how in many cases, the courts
- decide to create standards that contradicted industry practice, which
- is obviously jeopardous for anyone practicing e-commerce.
- What if the courts were to suddenly decide that failure to install
- a firewall or IDS as part of your security precautions was, in all
- cases, grounds for liability in the event of penetration?
- http://www.ntsecurity.net/go/2c.asp?f=/features.asp?IDF=134&TB=f
-
- _____________________________________________________________________
- _______________________________ REVIEWS _____________________________
-
- *** BO2K - CRACKER UTIL OR HIGHTECH ADMIN TOOL?
- When BO2K first came out, NTSecurity.net grabbed a copy and
- immediately put it through the wringer. We found it to be a decent
- tool, but lacking in several areas of functionality -- but the lack
- is nothing that can't be fixed with further coding. Read our detailed
- analysis to learn what it can and cannot do, and how this tool may
- impact your network security.
- http://www.ntsecurity.net/go/2c.asp?f=/reviews.asp?IDF=111&TB=r
-
- *** INTERNET SCANNER VS CYBERCOP
- David Ludlow writes a great comparative review between ISS' Internet
- Scanner and NAI's CyberCop. David's test environment consisted of a
- Dell PowerEdge 6300 server running Windows NT 4.0 and Service Pack 4,
- along with Fast Ethernet connections to a variety of machines on
- the LAN. Come read what David discovered
- http://www.ntsecurity.net/go/2c.asp?f=/reviews.asp?IDF=110&TB=r
-
- _____________________________________________________________________
- ______________________________ CONTACTS _____________________________
-
- -- EDITOR: Mark Joseph Edwards, mark@ntsecurity.net
- -- ADVERTISING: ads@ntsecurity.net
- -- WEB SITE: webmaster@ntsecurity.net
-
- Have something to contribute to this newsletter? Send it to us!
- Email: press@ntsecurity.net
-
- List your security products on our Web site for free!
- http://www.ntsecurity.net/go/load.asp?id=/products/start.asp
-
- ______________________________________________________________________
- Copyright (c) 1999 Duke Communications International Inc.
- This newsletter maybe be forwarded or copied so long as the entire
- content, including this notice, remain intact.
-
-