Archive of CERT general posting, CERT Summary CS-2003-03

09/09/03, CERT Summary CS-2003-03
From: CERT Advisory <cert-advisory@cert.org>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.
Search

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]


To: cert-advisory@cert.org
Subject: CERT Summary CS-2003-03
From: CERT Advisory <cert-advisory@cert.org>
Date: Mon, 8 Sep 2003 14:50:17 -0400
List-archive: <http://www.cert.org/>
List-help: <http://www.cert.org/>, <mailto:Majordomo@cert.org?body=help>
List-owner: <mailto:cert-advisory-owner@cert.org>
List-post: NO (posting not allowed on this list)
List-subscribe: <mailto:Majordomo@cert.org?body=subscribe%20cert-advisory>
List-unsubscribe: <mailto:Majordomo@cert.org?body=unsubscribe%20cert-advisory>
Mail-from: From cert-advisory-owner@cert.org Tue Sep 9 03:03:04 2003
Organization: CERT(R) Coordination Center - +1 412-268-7090

-----BEGIN PGP SIGNED MESSAGE-----

CERT Summary CS-2003-03

   September 8, 2003

   Each  quarter, the CERT Coordination Center (CERT/CC) issues the CERT
   Summary  to  draw  attention  to  the types of attacks reported to our
   incident  response  team,  as  well  as  other noteworthy incident and
   vulnerability information. The summary includes pointers to sources of
   information for dealing with the problems.

   Past CERT summaries are available from:

          CERT Summaries
          http://www.cert.org/summaries/
   ______________________________________________________________________

Recent Activity

   Since  the  last regularly scheduled CERT summary, issued in June 2003
   (CS-2003-02), we have seen a large volume of reports related to a mass
   mailing  worm,  referred to as W32/Sobig.F, and have issued advisories
   on   the   exploitation   of   vulnerabilities   in   Microsoft's  RPC
   implementation. The culmination of the RPC vulnerabilities resulted in
   the  W32/Blaster  Worm,  which  affected many Microsoft users. We have
   also reported on a vulnerability in the Cisco IOS interface as well as
   on   multiple  vulnerabilities  in  Microsoft  Windows  libraries  and
   Internet Explorer.

   For  more  current  information  on  activity  being  reported  to the
   CERT/CC,  please  visit the CERT/CC Current Activity page. The Current
   Activity  page  is  a  regularly updated summary of the most frequent,
   high-impact  types  of  security  incidents  and vulnerabilities being
   reported  to the CERT/CC. The information on the Current Activity page
   is reviewed and updated as reporting trends change.

          CERT/CC Current Activity
          http://www.cert.org/current/current_activity.html


    1. W32/Sobig.F Worm

       On  August  18,  the  CERT/CC  began  receiving  a large volume of
       reports  of  a  mass  mailing  worm,  referred  to as W32/Sobig.F,
       spreading on the Internet. The W32/Sobig.F worm is an e-mail borne
       malicious  program  with a specially crafted attachment that has a
       .pif  extension.  The  W32/Sobig.F worm requires a user to execute
       the  attachment  either manually or by using an e-mail client that
       will  open  the attachment automatically. The CERT/CC has released
       an Incident Note on the W32/Sobig.F worm.

                CERT Incident Note IN-2003-03
		W32/Sobig.F Worm
                http://www.cert.org/incident_notes/IN-2003-03.html


    2. Exploitation of Vulnerabilities in Microsoft RPC Interface

       In  late  July,  the CERT/CC began receiving reports of widespread
       scanning    and    exploitation   of   two   recently   discovered
       vulnerabilities   in   Microsoft   Remote   Procedure  Call  (RPC)
       Interface.  The  CERT/CC  released an advisory and a Vulnerability
       Note which described these vulnerabilities approximately two weeks
       prior to the reports of exploitation.

                CERT Advisory CA-2003-19
		Exploitation of Vulnerabilities in Microsoft RPC 
		Interface
                http://www.cert.org/advisories/CA-2003-19.html

                CERT Advisory CA-2003-16
		Buffer Overflow in Microsoft RPC
                http://www.cert.org/advisories/CA-2003-16.html

                Vulnerability Note VU#568148 
		Microsoft Windows RPC vulnerable to buffer overflow
                http://www.kb.cert.org/vuls/id/568148

    a. W32/Blaster Worm

       Shortly  after we released multiple documents describing Microsoft
       RPC  vulnerabilities,  we  began  receiving  reports of widespread
       activity  related  to  a  new  piece  of  malicious  code known as
       W32/Blaster.  The W32/Blaster worm exploits a vulnerability in the
       Microsoft  DCOM  RPC interface. On August 11, the CERT/CC released
       an advisory on W32/Blaster. We also released step-by-step recovery
       tips for W32/Blaster.

                CERT Advisory CA-2003-20
		W32/Blaster Worm
                http://www.cert.org/advisories/CA-2003-20.html

                W32/Blaster Recovery tips
                http://www.cert.org/tech_tips/w32_blaster.html

    b. W32/Welchia

       Additionally,  a  worm  was reported that attempted to exploit the
       same vulnerability as W32/Blaster. This worm, known alternately as
       'W32/Welchia',   'W32/Nachi',   or   'WORM_MS_BLAST.D',  has  been
       reported  to  kill and remove the msblast.exe artifact left behind
       by  W32/Blaster,  perform  ICMP  scanning  to  identify systems to
       target for exploitation, apply the patch from Microsoft (described
       in  MS03-026),  and reboot the system. The greatest impact of this
       worm  appears to be the potential for denial-of-service conditions
       within an organization due to high levels of ICMP traffic.

   3. Cisco IOS Interface Blocked by IPv4 Packet

   On  July  16, the CERT/CC reported on a vulnerability in many versions
   of   Cisco   IOS   that   could   allow   an  intruder  to  execute  a
   denial-of-service attack against a vulnerable device. We also released
   a companion Vulnerability Note on the same topic.

          CERT Advisory CA-2003-15
	  Cisco IOS Interface Blocked by IPv4 Packet
          http://www.cert.org/advisories/CA-2003-15.html

          Vulnerability Note VU#411332
	  Cisco IOS Interface Blocked by IPv4 Packet
          http://www.kb.cert.org/vuls/id/411332

   Two  days  later  we  released  an advisory which provided information
   about  the  availability  of  a  public  exploit  for  the  Cisco  IOS
   vulnerability.

          CERT Advisory CA-2003-17
	  Exploit available for the Cisco IOS Interface Blocked 
	  Vulnerabilities
          http://www.cert.org/advisories/CA-2003-17.html

   4. Vulnerabilities in Microsoft Windows Libraries and Internet Explorer

   During  this  quarter, there were a number of vulnerabilities reported
   in  Microsoft Windows Libraries and within Internet Explorer. Below is
   a summary of those vulnerabilities.

    a. Buffer Overflow in Microsoft Windows HTML Conversion Library

       A buffer overflow vulnerability exists in a shared HTML conversion
       library  included  in Microsoft Windows. An attacker could exploit
       this  vulnerability to execute arbitrary code or cause a denial of
       service.  On  July  14,  the CERT/CC issued an advisory describing
       this vulnerability.

                CERT Advisory CA-2003-14
		Buffer Overflow in Microsoft Windows HTML Conversion 
		Library
                http://www.cert.org/advisories/CA-2003-14.html

                Vulnerability Note VU#823260 
		Microsoft  Windows  HTML conversion library vulnerable 
		to buffer overflow
                http://www.kb.cert.org/vuls/id/823260

    b. Integer Overflows in Microsoft Windows DirectX MIDI Library

       A set of integer overflows exists in a DirectX library included in
       Microsoft Windows. An attacker could exploit these vulnerabilities
       to execute arbitrary code or to cause a denial of service. On July
       25,    the   CERT/CC   issued   an   advisory   describing   these
       vulnerabilities.

                CERT  Advisory CA-2003-18
		Integer Overflows in Microsoft Windows DirectX MIDI 
		Library
                http://www.cert.org/advisories/CA-2003-18.html

                Vulnerability Note VU#561284
		Microsoft Windows DirectX MIDI library does not 
		adequately validate Text or Copyright parameters in MIDI
		files
                http://www.kb.cert.org/vuls/id/561284

                Vulnerability Note VU#265232
		Microsoft Windows DirectX MIDI library does not 
		adequately validate MThd track values in MIDI files
                http://www.kb.cert.org/vuls/id/265232

    c. Multiple Vulnerabilities in Microsoft Internet Explorer

       Microsoft     Internet    Explorer    (IE)    contains    multiple
       vulnerabilities,  the  most  serious of which could allow a remote
       attacker to execute arbitrary code with the privileges of the user
       running  Internet  Explorer.  On  August 26, the CERT/CC issued an
       advisory describing these vulnerabilities.

                CERT Advisory CA-2003-22
		Multiple  Vulnerabilities in Microsoft Internet Explorer
                http://www.cert.org/advisories/CA-2003-22.html

                Vulnerability Note VU#205148
		Microsoft Internet Explorer does not properly evaluate 
		Content-Type and Content-Disposition headers
                http://www.kb.cert.org/vuls/id/205148

                Vulnerability Note VU#865940
		Microsoft Internet Explorer does not properly evaluate 
		"application/hta" MIME type referenced by DATA attribute 
		of OBJECT element
                http://www.kb.cert.org/vuls/id/865940

                Vulnerability Note VU#548964
		Microsoft Windows BR549.DLL ActiveX control contains 
		vulnerability
                http://www.kb.cert.org/vuls/id/548964

                Vulnerability Note VU#813208
		Internet Explorer does not properly render an input type
		tag
                http://www.kb.cert.org/vuls/id/813208

                Vulnerability Note VU#334928
		Microsoft Internet Explorer contains buffer overflow in
		Type attribute of OBJECT element on double-byte character
		set systems
                http://www.kb.cert.org/vuls/id/334928

   5. Malicious Code Propagation and Antivirus Software Updates

   Recent reports to the CERT/CC have highlighted that the speed at which
   viruses   are   spreading  is  increasing  and  that  users  who  were
   compromised  may  have been under the incorrect impression that merely
   having  antivirus  software  installed was enough to protect them from
   all malicious code attacks. On July 14, the CERT/CC issued an Incident
   Note describing this trend.

          CERT Incident Note IN-2003-01
	  Malicious Code Propagation and Antivirus Software Updates
          http://www.cert.org/incident_notes/IN-2003-01.html
   ______________________________________________________________________

New CERT Coordination Center (CERT/CC) PGP Key

   On September 5, the CERT/CC issued a new PGP key, which should be used
   when sending sensitive information to the CERT/CC.

          CERT/CC PGP Public Key
          https://www.cert.org/pgp/cert_pgp_key.asc

          Sending Sensitive Information to the CERT/CC
          https://www.cert.org/contact_cert/encryptmail.html
   ______________________________________________________________________

What's New and Updated

   Since the last CERT Summary, we have published new and updated

     * Advisories
       http://www.cert.org/advisories/

     * Vulnerability Notes
       http://www.kb.cert.org/vuls

     * CERT/CC Statistics
       http://www.cert.org/stats/cert_stats.html

     * Congressional Testimony
       http://www.cert.org/congressional_testimony

     * Incident Handling Certification
       http://www.cert.org/certification/

     * Training Schedule
       http:/www.cert.org/training/
   ______________________________________________________________________

   This document is available from:
   http://www.cert.org/summaries/CS-2003-03.html
   ______________________________________________________________________

CERT/CC Contact Information

   Email: cert@cert.org
          Phone: +1 412-268-7090 (24-hour hotline)
          Fax: +1 412-268-6989
          Postal address:
          CERT Coordination Center
          Software Engineering Institute
          Carnegie Mellon University
          Pittsburgh PA 15213-3890
          U.S.A.

   CERT/CC   personnel   answer  the  hotline  08:00-17:00  EST(GMT-5)  /
   EDT(GMT-4)  Monday  through  Friday;  they are on call for emergencies
   during other hours, on U.S. holidays, and on weekends.

    Using encryption

   We  strongly  urge you to encrypt sensitive information sent by email.
   Our public PGP key is available from
   http://www.cert.org/CERT_PGP.key

   If  you  prefer  to  use  DES,  please  call the CERT hotline for more
   information.

    Getting security information

   CERT  publications  and  other security information are available from
   our web site
   http://www.cert.org/

   To  subscribe  to  the CERT mailing list for advisories and bulletins,
   send  email  to majordomo@cert.org. Please include in the body of your
   message

   subscribe cert-advisory

   *  "CERT"  and  "CERT  Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________

   NO WARRANTY
   Any  material furnished by Carnegie Mellon University and the Software
   Engineering  Institute  is  furnished  on  an  "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied  as  to  any matter including, but not limited to, warranty of
   fitness  for  a  particular purpose or merchantability, exclusivity or
   results  obtained from use of the material. Carnegie Mellon University
   does  not  make  any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.
   ______________________________________________________________________

   Conditions for use, disclaimers, and sponsorship information

   Copyright 2003 Carnegie Mellon University.

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8

iQCVAwUBP1zEHzpmH2w9K/0VAQEqXAP9FHdMZvoEMC4aLxZzP+e52RhSh6p9rzZ2
W+p3aBh6VOsf1mqpDnlJSZy2kydOLzTwklMm4ESxeSER81TfdbKUIgr7pfzNANn8
4DhrXxUZwcc1+5TWY6/LejrrCjZ2OpK9UxkjDSJKMEcrLqIhaEUL3Vr24iTvNliR
JKkslK9BDGk=
=w9dI
-----END PGP SIGNATURE-----



Previous message sorted by date: CERT Summary CS-2003-02
Next message sorted by date: CERT Summary CS-2003-04
Previous message sorted by thread: CERT Summary CS-2003-02
Next message by thread: CERT Summary CS-2003-04
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jan 2004