[562] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: ISS Security Alert Summary v1 n10

daemon@ATHENA.MIT.EDU (X-Force)
Wed Jan 28 01:48:41 1998

Old-X-Envelope-From: xforce@arden.iss.net  Fri Jan  9 14:11:40 1998
XDelivering-To: <best-of-security@cyber.com.au>
Delivering-To: <best-of-security@cyber.com.au>
Date: Thu, 8 Jan 1998 17:46:03 -0500 (EST)
From: X-Force <xforce@iss.net>
cc: X-Force <xforce@arden.iss.net>
Old-X-Originally-To: To: best-of-security@cyber.com.au
Old-X-Originated-From: From: X-Force <xforce@iss.net>
Errors-To: best-of-security-request@cyber.com.au
To: best-of-security@cyber.com.au
Resent-From: best-of-security@cyber.com.au


-----BEGIN PGP SIGNED MESSAGE-----

ISS Security Alert Summary
January 7, 1998
Volume 1 Number 10


X-Force Vulnerability and Threat Database: http://www.iss.net/xforce

To receive these Alert Summaries, subscribe to the ISS Alert mailing list
by sending an email to majordomo@iss.net and within the body of the
message type:  'subscribe alert'.

___

Index

3 Reported New Vulnerabilities
 - apache-dos
 - quake2-dos
 - cisco-7xxcrash

2 Updates
 - sun-pentium
 - sgi-statd

Risk Factor Key

___

Date Reported:		12/30/97
Vulnerability:		apache-dos
Platforms Affected:	Apache httpd (1.2.x, 1.3b3)
			
Risk Level:		Medium

A vulnerability exists in Apache httpd servers that allow an attacker to
increase the load average on the machine.  When an attacker sends
excessive http requests with thousands of '/'s inside, the system running
the server slows down effectively denying service.  This problem has a
patch and will be corrected in 1.2.5 release.

Reference:
http://www.netspace.org/cgi-bin/wa?A1=ind9712e&L=bugtraq#2

Patches:
http://www.apache.org/dist/patches/apply_to_1.2.4/no2slash-loop-fix.patch
http://www.apache.org/dist/patches/apply_to_1.3b3/no2slash-loop-fix.patch

___

Date Reported:		12/24/97
Vulnerability:		quake2-dos
Platforms Affected:	Windows Machines running Quake 2 Server
Risk Level:		Low

Quake 2 servers have a vulnerability that allows a remote attacker to shut
down the server.  By sending a couple of spoofed UDP packets with a return
address of 127.0.0.1 or a return address of another Quake 2 server to the
machine running server, the it will then try to start a game with itself,
and crash.

References:
http://www.netspace.org/cgi-bin/wa?A2=ind9712d&L=bugtraq&O=T&P=828

Patch:
ftp://ftp.idsoftware.com/idstuff/quake2/patch_07.zip

___

Date Reported:		12/15/97
Vulnerability:		cisco-7xxcrash
Platforms Affected:	Cisco 7xx routers (IOS 700 4.1(1), 4.1(2),
			or 4.1 interim releases earlier than 4.1(2.1))
Risk Level:		High

Cisco 7xx routers running IOS 700 are vulnerable to a denial of service
attack that reboots the router.  An attacker can telnet to the router, and
enter a very long password string that overflows the data buffer that
is used for passwords.  This forces the router to crash denying service to
legitimate users.

References:
http://www.cisco.com/warp/public/770/pwbuf-pub.shtml
http://www.netspace.org/cgi-bin/wa?A2=ind9712c&L=bugtraq&O=T&P=1126

___

Date:			12/18/97
Update:			sun-pentium
Vendor:			Sun Microsystems, Inc.
Platforms:		Pentium machines running Solaris
			(2.4, 2.5 , 2.5.1, 2.6)

Sun has released patches for its Solaris Intel platforms for the Intel 
Pentium Invalid Operand instruction. On unpatched Pentium, and Pentium MMX
systems, an unprivileged user can deny service to other users by causing
the system to hang.  This vulnerability does not apply to Pentium Pro or
Pentium II processors.

References:
http://sunsolve.sun.com/sunsolve/secbulletins/security-alert-161.txt
http://www.intel.com/support/processors/pentium/ppiie/index.htm

___
   
Date:			12/16/97 (Cert Advisory 97.26)
Update:			sgi-statd
Vendor:			Silicon Graphics Inc.
Platforms:		IRIX (5.0.x, 5.1.x, 5.2, 5.3)

Silicon Graphics Inc. has released a temporary solution and patches for
the statd vulnerability that allows remote and local users to execute
commands with root privileges.

References:
ftp://sgigate.sgi.com/security/19971201-01-P1391
ftp://info.cert.org/pub/cert_advisories/CA-97.26.statd

___

Risk Factor Key:

	High  	any vulnerability that provides an attacker with immediate
		access into a machine, gains superuser access, or bypasses
		a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
		that allows an intruder to execute commands on mail
		server.
	Medium	any vulnerability that provides information that has a
		high potential of giving access to an intruder.  Example: 
		A misconfigured TFTP or vulnerable NIS server that allows
		an intruder to get the password file that possibly can
		contain an account with a guessable password.
	Low	any vulnerability that provides information that
		potentially could lead to a compromise.  Example:  A
		finger that allows an intruder to find out who is online
		and potential accounts to attempt to crack passwords
		via bruteforce.

Internet Security Systems, Inc., (ISS) is the pioneer and world's leading
supplier of network security assessment and intrusion detection tools,
providing comprehensive software that enables organizations to proactively
manage and minimize their network security risks.  For more information,
contact the company at (800) 776-2362 or (770) 395-0150 or visit the ISS
Web site at http://www.iss.net.

________

Copyright (c) 1997 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert Summary
electronically.  It is not to be edited in any way without express consent
of X-Force.  If you wish to reprint the whole or any part of this 
Alert Summary in any other medium excluding electronic medium, please
email xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this 
information constitutes acceptance for use in an AS IS condition. There
are NO warranties with regard to this information. In no event shall the
author be liable for any damages whatsoever arising out of or in connection 
with the use or spread of this information. Any use of this information is
at the user's own risk.

X-Force PGP Key available at:   http://www.iss.net/xforce/sensitive.html
as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to:
X Force <xforce@iss.net> of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNLOv9DRfJiV99eG9AQGsFQQAjTbcfODYVPwaTQpAKOPE5Z/DDh7Bq2ny
IYzbDoIoaqT2NpqZTkLJvDtMd2IwNmspBU3xFwqxqo1ABy7oDCdJo3cECRMm6q/D
jysFqMWDVBQKHFFJ26zzKjfwgPtV0QkXgRTJCGTh9aokcooFZS7Nr0X6MsnxrkrB
rlLithZRudo=
=iHOi
-----END PGP SIGNATURE-----




home help back first fref pref prev next nref lref last post