Brought to you by our friends at the SANS Institute.


Here are the main thing of interest in this issure, highlighted in the article.

  • Feds, SANS, and Vendors Announce New Top 20 Vulnerabilities Plus Testing Tools
  • Slapper Variants On the Loose
  • Upgrades Available for Apache Vulnerabilities
  • Microsoft Issues Bulletins for Bevy of Flaws in Windows, SQL (what else is new)
  • Bugbear worm still spreading
  • Virus Masquerades As Microsoft Patch
  • Security Contractor Certification



***********************************************************************
SANS NewsBites October 9, 2002 Vol. 4, Num. 41
***********************************************************************

TOP OF THE NEWS - FOCUSING ON VULNERABILITY REMEDIATION AND THREATS
7 October 2002 Feds, SANS, and Vendors Announce New Top 20
Vulnerabilities Plus Testing Tools

4 October 2002 Slapper Variants On the Loose
4 October 2002 Upgrades Available for Apache Vulnerabilities
3 October 2002 Microsoft Issues Bulletins for Bevy of Flaws in
Windows, SQL

2 & 4 October 2002 Bugbear Worm Spreading
2 October 2002 Bugbear Infection Account

THE REST OF THE WEEK'S NEWS
7 October 2002 IP, DNS and BGP Security
4 & 5 October 2002 Russian Hacker Sentenced
4 October 2002 P2P Security Advice
2 & 4 October 2002 Opaserv Worm
4 October 2002 State Dept. Site Defaced
3 & 4 October 2002 GAO Report Outlines Satellite Vulnerabilities
2 & 3 October 2002 Quantum Cryptography Advances
3 October 2002 CIS Benchmark Tools Available To Federal Agencies
3 October 2002 Hong Kong Online Paper Suffers Redirect Attack
3 October 2002 Man Pleads Guilty to Identity Fraud
3 October 2002 FedCIRC Offers Free Dissemination Patch Service
2 October 2002 N.C. CIO Consolidating Servers
2 October 2002 California State Government Server Breached
2 October 2002 CD-ROMs for UN Inspectors Contained Viruses
2 October 2002 Word Flaw Allows File Stealing
1 & 2 October 2002 DoD Continues Wireless Moratorium
1 October 2002 Klez Tops Lists for September
1 October 2002 What Does a FIPS Encryption Compliance Seal Mean?
30 September 2002 Virus Masquerades As Microsoft Patch
30 September 2002 Security Contractor Certification
12 September 2002 CIO Survey Shows 7-8% of IT Budget Goes to Security

SECURITY TRAINING NEWS
* Network Security 2002 in Washington DC, October 18-25 - Last Chance
to register for SANS largest conference and exposition.
* SANS Cyber Defense Initiative in San Francisco - Dec. 15-20
Featuring 8 hands-on SANS immersion training tracks. San Francisco
is often warmer and less crowded in December than in August.
* Advanced security training in fifteen additional cities, plus Local
Mentor programs in 35 cities.
See: http://www.sans.org for all these programs



TOP OF THE NEWS - FOCUSING ON VULNERABILITY REMEDIATION AND THREATS

--7 October 2002 Feds, SANS Announce New Top 20 Vulnerabilities;
Vendors Release Testing Tools

The US General Services Administration, the FBI's National
Infrastructure Protection Center and SANS announced a new set of
the twenty most commonly exploited vulnerabilities on Windows and
UNIX systems. ISS, Foundstone, and Qualys simultaneously announced
upgrades to their scanning products and services that specifically
test for the Top 20.
The Top 20 list and remediation techniques: http://www.sans.org/top20/
http://www.computerworld.com/securit...,74922,00.html
http://www.eweek.com/article2/0,3959,598783,00.asp
[Editor's note (Paller) on vulnerability remediation: An initiative
is being launched to teach consumers not to share their credit card
information with organizations that have not fixed at least all of the
Top 20 - because their credit card information will be at extreme risk.
Similarly businesses will be encouraged to require B2B partners to
prove that they have, at a minimum eliminated the top 20 on their
systems, because otherwise they will be creating an easy path for
hackers. The tools and services that scan your systems may be found
at http://www.sans.org/top20/tools.pdf]

--4 October 2002 Slapper Variants On the Loose
At least four variants of the Slapper worm are presently circulating
on the Internet, attacking Linux systems using an unpatched version of
OpenSSL in the Apache web server software. A variant called "Mighty"
has infected a number of machines, allowing them to be remotely
controlled through certain IRC channels. The worm could be used
to steal or corrupt data or to launch distributed denial of service
(DDoS) attacks.
http://news.com.com/2100-1001-960887.html
[Editor's Note (Paller): 339 Slapper-infected Linux machines launched a
DDoS attack on a US government agency on Friday and Saturday, flooding
it with more than 1,000,000 packets per second, disabling its web
presence down for more than 24 hours. Many more such attacks and much
larger attacks could be launched at any time. The Internet Storm
Center (ISC) analysis at www.incidents.org will give you a genealogy
of the worm and what to do to protect your systems. Readers who want
fewer technical details will find a page compiled by the folks at
F-Secure to be an excellent resource: http://www.f-secure.com/slapper/]

--4 October 2002 Upgrades Available for Apache Vulnerabilities
Apache users are encouraged to update their software to new versions
(1.3.27 or 2.0.43) that fix a number of security vulnerabilities.
http://www.theregister.co.uk/content/55/27438.html
http://www.eweek.com/article2/0,3959,590304,00.asp

--3 October 2002 Microsoft Issues Bulletins for Bevy of Flaws in
Windows, SQL

A critical security flaw in Microsoft Windows' HTML-based help function
could be exploited in a buffer overflow attack. The flaw could be
exploited by a web site or by HTML e-mail. The flaw affects Windows
98, Me, NT 4.0, 2000 and XP. Users who have installed Outlook E-mail
Security Update are protected, as are users of Outlook Express 6 and
Outlook 2002; users of Internet Explorer 5.01, 5.5 and 6.0 can install
a patch which also addresses two additional Help flaws. Microsoft also
released a cumulative patch for SQL Server and SQL Server 2000 that
addresses four vulnerabilities, including two buffer overflow flaws.
http://www.computerworld.com/securit...,74797,00.html
http://www.infoworld.com/articles/hn...ch.xml?s=IDGNS
http://zdnet.com.com/2100-1105-960642.html
http://www.microsoft.com/technet/sec...n/MS02-055.asp
http://www.microsoft.com/technet/sec...n/MS02-056.asp

--2 & 4 October 2002 Bugbear Worm Spreading
Spreading rapidly, and evading detection by appending multiple
extensions to the attachment that carries the worm, Bugbear shuts down
security software, installs a keystroke logger, mass mails itself
and copies itself onto network shared directories. It also opens a
backdoor on successfully infected machines. Bugbear does not carry
a destructive payload; it appears to be designed to steal credit card
and banking account numbers and other sensitive data.
http://www.computerworld.com/securit...,74793,00.html
http://www.wired.com/news/technology...,55532,00.html
http://www.cnn.com/2002/TECH/interne...ear/index.html
http://www.msnbc.com/news/815117.asp?0dm=T21AT
http://news.com.com/2100-1001-960722.html
[Editor's Note (Paller): This insight comes from Righard
Zwienenberg, Senior Virus Analyst, Norman Data Defense Systems in
the Netherlands. Bugbear is spreading particularly fast in Europe
because it picks a random email subject from the victim's in-box
to use as the subject when it is sent to other people. That means
that the email subject is often in the local language - and not in
English. Europeans appear to be more trusting of emails with subjects
in their own languages.]

--2 October 2002 Bugbear Infection Account
The manager of an Australian business hit by the Bugbear virus says
it arrived in an e-mail that didn't appear to have an attachment.
The company knew something was wrong when the printers began spewing
reams of paper with odd characters and business associates began
calling the company saying they'd received odd e-mail messages
from them.
http://zdnet.com.com/2100-1105-960446.html





THE REST OF THE WEEK'S NEWS

--7 October 2002 IP, DNS and BGP Security
The National Strategy to Secure Cyberspace acknowledges that the
Internet Protocol (IP), Domain Name System (DNS) and Border Gateway
Protocol (BGP) components of the Internet all lack communication
authentication mechanisms. The available fixes are too costly and
complex to install for the majority of ISPs. Some say that even if the
security problems in these components are addressed, the infrastructure
of the Internet still has other vulnerabilities.
http://www.nwfusion.com/news/2002/1007security.html
http://www.nwfusion.com/news/2002/1007doddns.html

--4 & 5 October 2002 Russian Hacker Sentenced
Vasily Gorshkov, one of the Russian hackers who was lured to the US
by the FBI under the pretense of a job offer at a fictional company,
was sentenced to three years in federal prison. He was also ordered
to pay $690,000 in restitution. Gorshkov and his accomplice, Alexey
Ivanov, were convicted of stealing credit card numbers from computers.
The FBI used keystroke logging software to obtain the passwords to
the pairs' computers in Russia that contained incriminating evidence.
http://www.msnbc.com/news/817266.asp?0dm=T22AT
http://www.washingtonpost.com/wp-dyn...-2002Oct5.html
The special agents involved in the case received the FBI Director's
Award for Outstanding Criminal Investigation.
http://www.fbi.gov/page2/seattle.htm

--4 October 2002 P2P Security Advice
Peer-to-peer (P2P) file sharing programs can be the source of serious
security breaches; users searching for available files were able to
access a list of salaries of top executives at a Texas company and
the Aspen, Colorado police department's computer passwords, to name
but two instances. Users of P2P programs would be well advised to
educate themselves about the default settings of the programs and
pay careful attention to which folders they designate available for
sharing. They should also let IT people at their work know if they're
installing this type of program on company computers. Companies should
implement acceptable use policies and install traffic content monitors.
http://zdnet.com.com/2100-1107-960638.html
[Editor's Note (Murray): Enterprises should be using a restrictive,
rather than a permissive, policy. Restrictive policies are proactive
rather than reactive.
(Shpantzer) The IT department of a major East coast university
doing battle with the new version of Kazaa says it is "extremely
adaptive." It is programmed to circumvent bandwidth shaping tools
used by network operations staff. This has resulted in a doubling of
network traffic, and network latency to the nearest ISP has increased
200 times! Aside from the difficult technical issues, there are many
unresolved legal issues associated with the use of these applications
to facilitate the distribution of copyrighted material, not to mention
other illegal material such as child pornography. Civil suits from
the music industry and law enforcement raids on your facility are
not good for productivity or reputation.]

--2 & 4 October 2002 Opaserv Worm
The Opasoft or Opaserv worm spreads through local area networks (LANs).
It is designed to gain remote control of infected machines; it tries
to download information from a website that has now been taken down
by the webmaster.
http://www.infoworld.com/articles/hn...rm.xml?s=IDGNS
http://www.kaspersky.com/news.html?id=961626
[Editors' Note: Unless required, file and printer sharing should be
turned off.]

--4 October 2002 State Dept. Site Defaced
Russian hackers defaced a State Department web site last week,
according to Department officials. www.usinfo.state.gov was down
briefly but was back on line as of Friday afternoon.
http://www.cnn.com/2002/TECH/interne...eut/index.html

--3 & 4 October 2002 GAO Report Outlines Satellite Vulnerabilities
A report from the General Accounting Office (GAO) warns that commercial
satellites, which are used by some federal agencies, may be susceptible
to hackers. On some, tracking and control uplinks are not encrypted.
The new cyber security plan does not address satellite security.
The report recommends changing federal policy regarding satellite
security to cover commercial satellites instead of just government
owned systems.
http://online.securityfocus.com/news/942
http://www.computerworld.com/governm...,74904,00.html
http://www.gao.gov/new.items/d02781.pdf

--2 & 3 October 2002 Quantum Cryptography Advances
Researchers in the UK and Germany have made large strides in
the development of quantum cryptography; they were able to send a
cryptographic key by means of a beam of low intensity light 14 miles
between two mountains in Germany. Unlike electronically sent keys,
if these quantum keys are intercepted, it is readily apparent to the
key's recipient. The technology still needs more work before it is
feasible for use across the globe.
http://rtnews.globetechnology.com/se...hnology/techBN
http://news.zdnet.co.uk/story/0,,t269-s2123292,00.html

--3 October 2002 CIS Benchmark Tools Available To Federal Agencies
Federal agencies are now free to use and distribute the Center for
Internet Security's (CIS) security configuration testing tools,
available at www.cisecurity.org/federalcisusers. The tools measure
system security against benchmarks for Windows, Linux, AIX, Solaris,
Cisco and other operating systems.
http://www.fcw.com/fcw/articles/2002...r-10-03-02.asp

--3 October 2002 Hong Kong Online Paper Suffers Redirect Attack
People in mainland China trying to read Mingpao.com, an independent
Hong Kong-based online newspaper, found themselves redirected to
a site containing information about the Falun Gong movement, which
is banned in China. A Falun Gong spokesman in Hong Kong, where the
practice is not banned, denied responsibility for the cyber attack.
http://www.washingtonpost.com/wp-dyn...-2002Oct3.html

--3 October 2002 Man Pleads Guilty to Identity Fraud
Abraham Abdallah pleaded guilty to attempting to steal the identities
of wealthy Americans and steal money from their bank accounts.
http://www.msnbc.com/news/816797.asp?0dm=C24AT
http://news.com.com/2100-1023-960754.html

--3 October 2002 FedCIRC Offers Free Dissemination Patch Service
Government agencies soon will be able to subscribe to a free patch
dissemination service from the General Services Administration's (GSA)
Federal Computer Incident Response Center (FedCIRC). The service
will also provide information on keeping systems safe from exploits
until patches are developed for known vulnerabilities and will test
patches before they are delivered to subscribers. There is not yet
any provision for agencies to report back that the appropriate patches
have been installed.
http://www.fcw.com/fcw/articles/2002...h-10-03-02.asp


--2 October 2002 N.C. CIO Consolidating Servers
North Carolina's CIO has begun to consolidate government servers by up
to 60% in an effort to improve state cyber security and reduce costs.
http://www.fcw.com/geb/articles/2002...c-10-02-02.asp
[Editor's Note: (Murray): While most enterprises can benefit from some
server consolidation, this strategy has clear limitations. One would
not want to consolidate all of one's services on one server and then
run that server on a vulnerable operating system.
(Paller) Good point, Bill. But the combined imperatives of security
and budget pressure will lead to consolidation, anyway. One possible
solution is for states to buy the consolidation service and systems
only from vendors that can prove they can install and maintain systems
with secure configurations and with strong perimeter protection.]

--2 October 2002 California State Government Server Breached
California state agencies were warned that a state server nicknamed
Godzilla suffered security breaches; officials asked people at the
agencies to check the security of their computer systems. It does
not appear that any data on the machine was stolen.
http://www.sacbee.com/content/news/s...-5649680c.html
[Editor's Note (Schultz) Something like this happened to the state of
California not too long ago, and a spokesperson made it clear that the
state would not accept any responsibility for what happened. I wonder
if the same kind of evasion of responsibility will surface again, or
whether management will accept responsibility and make changes that
will lessen the likelihood of this kind of incident occurring again.]

--2 October 2002 CD-ROMs for UN Inspectors Contained Viruses
UN inspectors in Vienna were given four CD-ROMs of reports from an
Iraqi official; the disks also contained computer viruses. The viruses
were fairly common, leading to speculation that their appearance on
the disks was not intentional, but the result of inadequate antivirus
software. American companies are prohibited from exporting their
products to Iraq under the current US embargo.
http://www.siliconvalley.com/mld/sil...ey/4201505.htm

--2 October 2002 Word Flaw Allows File Stealing
A vulnerability in the field code feature of Microsoft Word could
allow an attacker to steal files from hard drives. All versions of
Word from 97 running on Windows operating systems from Windows 95
onward are vulnerable to the exploit. The attacker needs to know the
names of the files and the full filepath to steal them. An attacker
would sent a target a document containing specially crafted field
code; when the recipient sends the document back to the sender, the
targeted files tag along. The article also includes ways to mitigate
the possibility of getting stung by the exploit; Microsoft plans to
issue patches for Word 2000 and XP but not for earlier versions.
http://www.techweb.com/tech/security/20021002_security

--1 & 2 October 2002 DoD Continues Wireless Moratorium
The Defense Department (DoD) has extended a moratorium on wireless
devices in and around the Pentagon until wireless network security
vulnerabilities are adequately assessed. The DoD has asked the
National Security Agency (NSA) to develop a database to help with
the assessment. In addition, DoD employees are forbidden from using
wireless devices like phones and PDAs to access classified data or
to communicate about mission-critical operations.
http://www.gcn.com/vol1_no1/daily-updates/20147-1.html
http://www.fcw.com/fcw/articles/2002...e-10-01-02.asp
http://zdnet.com.com/2100-1105-960520.html

--1 October 2002 Klez Tops Lists for September
The Klez-H worm was found most frequently on the September virus lists
at both Sophos and MessageLabs. Bugbear is likely to make the top
ten list in October. Klez-E tops September's list at Central Command
and Kaspersky Labs places Klez at the top of its list as well, with
more than 70% of "registered instances."
http://www.silicon.com/public/door?R...EQSTR1=newsnow
http://www.sophos.com/pressoffice/pr...001topten.html
http://www.centralcommand.com/01102002.html
http://www.kaspersky.com/news.html?id=961647

--1 October 2002 What Does a FIPS Encryption Compliance Seal Mean?
Six information technology labs across the country can issue the
governmental FIPS (Federal Information Processing Standard) compliance
seal for encryption products. Companies wishing to sell their products
to the government must hold a FIPS-2 rating. While some experts see
the certification as an assurance that "someone with a moderate degree
of skill has looked over the design" of the products, others view
the seal as nothing more than "a marketing tool." The certification
process can take from four to ten weeks and costs between $20,000
and $40,000.
http://www.businessweek.com/technolo...02101_6896.htm
[Editor's Note (Murray): There is an infinity of ways to implement
cryptography, most of them wrong. Anyone who wants to widely
deploy a crypto product will want it evaluated by a third party.
Keep in mind that the certification speaks to the implementation of
the crypto and gives no assurance that the code does not introduce
other problems. The recent problem with Open-SSL is a case where
a crypto implementation introduces a vulnerability, exploited by the
Slapper worm, that would not have been there without it.]

--30 September 2002 Virus Masquerades As Microsoft Patch
A virus is circulating on the Internet in the guise of a Microsoft
security patch. The virus is in an .exe attachment, which the text
of the e-mail advises users to run.
http://www.nwfusion.com/news/2002/0930msvirus.html
[Editor's Note (Shpantzer): User awareness training should include
knowledge of tactics that coax people into getting infected with
malicious code. Since this is not the first virus that uses this
trick, "Microsoft does not email patches" could be a part of that
training.]

--30 September 2002 Security Contractor Certification
According to the National Strategy to Secure Cyberspace, the Bush
administration is planning to look into the possibility of requiring
computer security contractors to be certified by the government.
Critics of this plan say the cost may keep smaller companies, which
often have the most capable employees, from obtaining certification.
They also point out that certifying a company is meaningless if
its best employees leave; individual certification would be more
meaningful.
http://federaltimes.com/index.php?S=1153154
[Editor's Note (Schultz): I agree with the critics. Certifying
individuals is the only viable plan. Certifying security contractor
organizations would not only prove nebulous, but it would also
deteriorate into an exercise of political gamesmanship.]

--12 September 2002 CIO Survey Shows 7-8% of IT Budget Goes to
Security
According to a CIO magazine survey of 279 IT executives, companies
spend an average of 7 - 8% of their IT budgets on security. Investment
in IT security staff correlated with decreased security breaches and
increased understanding among company officers regarding the need to
spend money on security. Sixty-three percent of the survey respondents
believe they should spend more on security, especially on technology,
education and dedicated security staff.
http://www2.cio.com/research/surveyreport.cfm?id=6