phpbb and sql errors asp sqlserver odbc sql errors

Today´s Diary

If you have more information or corrections regarding our diary, click here to contact us.

Published: 2009-09-08,
Last Updated: 2009-09-09 11:54:16 UTC
by Guy Bruneau (Version: 3)
4 comment(s) Facebookacebook witter

We have received a report from Tyler that a vulnerability affecting Microsoft SMB2 can be remotely crashed with proof-of-concept code that has been published yesterday and a Metasploit module is out.

We have confirmed  it affects Windows 7/Vista/Server 2008. The exploit needs no authentication, only file sharing enabled with one 1 packet to create a BSOD. We recommend filtering access to port TCP 445 with a firewall.

Windows 2000/XP are NOT affected by this exploit.

We will update this diary with more information as we get it.

Update 1: Theodore, an ISC contributor has sent us a couple links on how to disable SMB version 2.0 on Vista or Server 2008. The first post is by Hameed on AskPerf here an the second post is by Daniel Petri here.

Update 2: Microsoft released an new advisory here that shows only the following OS are affected:

  • Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2
  • Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2

Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org

Keywords: Windows SMB2
4 comment(s) Facebookacebook witter
Published: 2009-09-09,
Last Updated: 2009-09-09 11:45:11 UTC
by Mark Hofman (Version: 2)
7 comment(s) Facebookacebook witter

The group anonymous, who were reported to be responsible for the attack on scientology sites now have the Australian Government in their sights.  In 2008 the Australian Government decided that the internet should be filtered.  They are running trials with a number of ISPs.  There is within Australia a fair amount of resistance to this practice for a number of reasons.  You can read the government position here (http://www.dbcde.gov.au/online_safety_and_security/cybersafety_plan/internet_service_provider_isp_filtering).   This Wikipedia article has more information on the issue as well (http://en.wikipedia.org/wiki/Internet_censorship_in_Australia)

In addition to opposition to this scheme within Australia it looks like the group anonymous has also become involved.  A web site 09-09-2009.org was set up and it looks like activities are coordinated through another web site.  The crux of their demands is for the senator responsible for the filtering scheme to resign and the plans for filtering to be abandoned, or else. 

The or else is a DDOS attack on Australian government sites starting at 9.00 am GMT which is 7.00PM on the east coast.  Fax machines and phone lines may also be targeted.  Some "interesting" activity has been observed on some of the networks, but whether this is related or not is uncertain at this stage. 

In preparation, make sure you have your incident handling processes ready, make sure that servers and other perimeter devices are patched so they are better able to resist attack.  You may want to have your ISP's contact details handy just in case you need them to stem the flow of traffic.  If your infrastructure is outsourced, maybe ask the outsourcer what plans they have in place, should anything happen.   But most importantly decide if switching off the site in the face of an attack is an option for you.

Mark H

UPDATE 1

Well the DDOS Started at 7 pm on the dot and has been going on for about an hour or so.   www.pm.gov.au is being kept busy and over the hour it was unavailable from where I am for a few minutes at best.  The attack seems to be mostly multiple web requests on the site which exhausts the threads on the web server causing it to respond with a 503 error.  Once left alone by a few of the attackers the site is again more than happy.  As far as impact goes the net result seems to be zilch.

UPDATE

The attack is over.  It achieved some publicity and managed to make the pm's website unavailable for a few minutes.  Otherwise there was no impact. - M    

Keywords: DDOS
7 comment(s) Facebookacebook witter
Published: 2009-09-08,
Last Updated: 2009-09-09 11:10:09 UTC
by Guy Bruneau (Version: 1)
1 comment(s) Facebookacebook witter

ISC reader Kurt reported that Cisco has released an advisory affecting TCP State Manipulation which cause a Denial of Service that affect multiple Cisco Products. If an attacker send TCP connections forced into long-lived or indefinite state by preventing new TCP connections from being accepted, it could possibly cause a DoS indefinitely.

Additional information on the Cisco advisory is available here.

The following products are affected:

  • Cisco IOS-XE Software
  • Cisco ASA and Cisco PIX security appliances running versions 7.0, 7.1, 7.2, 8.0, and 8.1 are affected if they are configure with specific features
  • The version of Cisco NX-OS Software that is running on Cisco Nexus 5000 and 7000 series devices
  • Scientific Atlanta customers are instructed to contact Scientific Atlanta's Technical Support for questions regarding the impact, mitigation and remediation of the vulnerabilities
  • Customers with Linksys products should contact Linksys security for questions regarding the impact, mitigation and remediation of the vulnerabilities

Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org

UPDATE

In addition to the Cisco advisory there is some additional information and response to the issue from other vendors here ==> https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html  - M

Keywords: Cisco DoS
1 comment(s) Facebookacebook witter
Published: 2009-09-08,
Last Updated: 2009-09-09 00:31:36 UTC
by Guy Bruneau (Version: 1)
2 comment(s) Facebookacebook witter

Overview of the September 2009 Microsoft patches and their status.

# Affected Contra Indications Known Exploits Microsoft rating ISC rating(*)
clients servers
MS09-045

Request handling vulnerability leads to a remote code execution.
Replaces MS06-023 for MS Windows 2000 SP4

JScript Scripting Engine
CVE-2009-1920
 KB 971961 No known exploits Severity:Critical
Exploitability:1
Critical Critical
 MS09-046 A vulnerability exist in DHTML Editing Component ActiveX Control.
DHTML Editing Component
CVE-2009-2519
KB 956844  No known exploits Severity:Critical
Exploitability:2
Critical Important
MS09-047

This vulnerability could allow remote code execution if a user opened a specially crafted media file.
Replaces MS08-076 for MS Windows Media Services 2008

Windows Media Format
CVE-2009-2499
CVE-2009-2498

KB 970710

No known exploits Severity:Critical
Exploitability:1,1
Critical Critical
MS09-048 Vulnerabilities exist in Transmission Control Protocol/Internet Protocol (TCP/IP) processing.

 Windows TCP/IP
CVE-2008-4609
CVE-2009-1925
CVE-2009-1926 

 KB 967723 No known exploits Severity:Critical
Exploitability:3,2,3
Critical Critical
 MS09-049 A vulnerability in Wireless LAN AutoConfig Service.

 Wireless LAN AutoConfig Service
CVE-2009-1132


 KB 970710 No known exploits. Severity:Important
Exploitability:2
Critical Critical
We will update issues on this page for about a week or so as they evolve.
We appreciate updates
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: Typically we expect the impact if left unpatched to be not that big a deal in the short term. Do not forget them however.
  • The difference between the client and server rating is based on how you use the affected machine. We take into account the typical client and server deployment in the usage of the machine and the common measures people typically have in place already. Measures we presume are simple best practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
  • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threat for affected systems. The rating does not account for the number of affected systems there are. It is for an affected system in a typical worst-case role.
  • Only the organization itself is in a position to do a full risk analysis involving the presence (or lack of) affected systems, the actually implemented measures, the impact on their operation and the value of the assets involved.
  • All patches released by a vendor are important enough to have a close look if you use the affected systems. There is little incentive for vendors to publicize patches that do not have some form of risk to them

(**): If installed.

(***): Critical of ISA servers

 Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org

2 comment(s) Facebookacebook witter

If you have more information or corrections regarding our diary, click here to contact us.

Diary Archive

DateAuthorTitle
2009-09-09Mark Hofman Possible DDOS on gov.au sites starting tonight?
2009-09-08Adrien de Beaupre Microsoft Security Advisory 975191 Revised
2009-09-08Guy Bruneau Microsoft September 2009 Black Tuesday Overview
2009-09-08Guy Bruneau Cisco Security Advisory TCP DoS
2009-09-08Guy Bruneau Bug Fixes in Sun SDK 5 and Java SE 6
2009-09-08Rick Wanner Anybody recognize these packets?
2009-09-08Guy Bruneau Vista/2008/Windows 7 SMB2 BSOD 0Day
2009-09-07Jim Clausing Seclists.org is finally back
2009-09-07Lorna Hutcheson Encrypting Data
2009-09-07Jim Clausing Request for packets
Complete Archive
Search Diaries:

StormCast


last update 10 hrs 54 min ago.

Featured Event

Latest Reading Room Papers

Mac OS X Malware Analysis
USB - Ubiquitous Security Backdoor
Protecting Against Insider Attacks
Tackling ISO 27001: A Project to Build an ISMS
Quantifying Business Value of Information Security

Poll

Trial software and Bloat pre-installed on new PCs...
... I uninstall/remove right away
... gets overwritten anyway when I install Linux or BSD
... gets overwritten anyway with a fresh install of Windows
... I actually like to try out and sometimes buy
... I keep installed but actually never use

Trends

trends more details

World Map

Worldmap