NewsBone.com - Barebones News
Tech - Linux/BSD - Apache - Security - Hardware - Gaming - Autos - World - Entertainment - About
+ Janes/IHS ~ CurrentActivityCERT ~ CERT ~ WiredSecurity +

MDA, Lockheed Martin seek ‘final transition' of LRDR
The Pentagon's Missile Defense Agency (MDA) and its industry counterparts at Lockheed Martin are preparing for the ‘final transition' of the long-awaited Long Range...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

US Coast Guard Airbus MH-65s retire from Arctic mission
The last US Coast Guard (USCG) Airbus MH-65 Dolphin in Alaska retired from Air Station Kodiak on 23 April, ending the type's 36-year employment in the service's Alaska...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

HMS Diamond shoots down Houthi missile in Red Sea
The UK Royal Navy's (RN's) Daring (Type 45)-class destroyer HMS Diamond (D 34) has successfully engaged an anti-ship ballistic missile (ASBM) launched by Yemen-based...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Rafale enters Croatian service
Croatia has inducted into service the Dassault Rafale combat aircraft it recently received from France.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

UK explores new radar and IR tech to enhance SDA
The UK's Defence Science and Technology Laboratory (Dstl) is conducting three technology demonstrator programmes to explore the utility of novel space domain awareness...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Italy to enhance SSA with new ground-based sensors
The Italian National Armaments Directorate (NAD) is procuring three ground-based sensors to enhance the country's space situational awareness (SSA), Janes learnt at the...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Update: BAE Systems outlines Type 26 frigate progress amid steelworker shortage
BAE Systems Naval Ships in Glasgow is outsourcing steel work and introducing a new automated panel line as part of efforts to mitigate the impact of a steelworker...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Airbus flies RACER high-speed helicopter
Airbus Helicopters has flown its Rapid and Cost-Efficient Rotorcraft (RACER) concept for the first time, the company announced on 25 April.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

QinetiQ demonstrates jet-to-jet MUM-T for first time in the UK
QinetiQ has for the first time in the UK demonstrated manned-unmanned teaming (MUM-T) between jet aircraft.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Netherlands, Poland approved for AARGM-ER SEAD/DEAD missiles
The US government has approved the sale of the Northrop Grumman AGM-88G Advanced Anti-Radiation Guided Missile – Extended Range (AARGM-ER) to the Netherlands and Poland.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Initial flight trials demonstrate Excalibur FTA ‘fit for purpose‘, says Leonardo
Initial flight trials of the 757 airframe that is to be converted to the Excalibur Flight Test Aircraft (FTA) project to de-risk the Tempest future fighter have shown it...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

UAE inaugurates GlobalEye early warning aircraft
The Ministry of Defence (MoD) of the United Arab Emirates (UAE) announced on 24 April that a reception ceremony for an early warning aircraft had been held at Al-Dhafra...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

India's GalaxEye developing satellite with multiple sensors for Earth observation
Bangalore-based GalaxEye Space is developing a satellite that can carry multiple sensors for Earth observation to support the requirements of the Indian Armed Forces.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Special Report: Australia to accentuate maritime capabilities amid China's coercion
The Australian government has released two more policy documents that outline its defence development intentions over the next few years. The two documents – National...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Vietnam issues diplomatic note to Malaysia after South China Sea collision
Hanoi has issued a diplomatic note to Putrajaya after a Malaysia Maritime Enforcement Agency (MMEA) vessel collided into a Vietnamese fishing boat in disputed waters of...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazilian Army seeks 12 UH-60M Black Hawk helicopters
The Brazilian Army is to acquire 12 Sikorsky UH-60M Black Hawk utility helicopters to replace its eight HM-3 Cougar and four HM-2 Black Hawk helicopters, said Army...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazil to update A-29 Super Tucano aircraft fleet
Embraer Defense and Security is to carry out the mid-life upgrade (MLU) of 68 of the EMB 314 (locally designated A-29) Super Tucano training and light attack aircraft of...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Brazil to buy additional VBMT-LSR Guaicurus 44 vehicles
The Manufacturing Directorate of the Brazilian Army plans to acquire up to 420 new Iveco Defence Vehicles (IDV) Light Multirole Vehicles (LMVs).
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Spain upgrades and acquires more NASAMS systems
The Spanish government has announced the EUR410 million (USD438 million) modernisation and acquisition of additional National Advanced Surface-to-Air Missile Systems...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Iraqi Army Aviation Command identifies itself as CH-5 UAV operator
Iraqi Army Aviation Command (IAAC) has confirmed it has ordered, if not already received, Chinese-made CH-5 unmanned aerial vehicles (UAVs).
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

General Atomics tests podded guns on Mojave UAV
General Atomics Aeronautical Systems, Inc (GA-ASI) has tested a podded gun on its Mojave short take-off and landing (STOL) unmanned aerial vehicle (UAV), the company...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Lockheed Martin secures contract to deliver JABMS to Australia
Lockheed Martin has secured a contract worth AUD500 million (USD323 million) from the Australian Department of Defence (DoD) to build a Joint Air Battle Management...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

New aerial vehicle seen on Chinese H-6 bomber
A Chinese Xi'an Aircraft Company (XAC) H-6MW bomber has been photographed in flight while carrying a new type of air-launched vehicle.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Vietnam outlines intent to procure K9 howitzer
Vietnam's Ministry of Defence (MoD) has indicated that it is planning to procure the K9 self-propelled howitzer (SPH) – developed and produced by South Korea's Hanwha...
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

Austal completes sea trials for Australia's autonomous patrol boat project
Australian shipbuilder Austal has completed the sea acceptance trials phase for the country's Patrol Boat Autonomy Trial (PBAT), the company announced on 23 April.
Janes news RSS ~Created Sat Apr 27 19:15:01 2024

NewsBone.com
Suggest a feed to syndicate here, or check out what I'm doing over at freshtao.
~Created Sat Apr 27 19:15:01 2024


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026


Alerts ~Created Tue Feb 3 01:24:38 2026

MyDoom.B Virus

Systems Affected

 
Any system running Microsoft Windows (Windows 95 and newer) that are used for reading email or accessing peer-to-peer file sharing services.
 

Overview

 
A new variant of the previously discovered MyDoom virus, MyDoom.B, has been identified. In addition to the common traits of email-borne viruses, this virus may prevent your computer from updating anti-virus and other software.
 

Description

 

 

Quick Links
Protect | Identify | Recover


Protect Your Systems

To protect your systems from infection by this virus, we recommend that you take the following steps. In addition to these steps, US-CERT encourages home users to review the "Home Network Security" and "Home Computer Security" documents.

Avoid opening attachments from suspicious email messages

Emails sent out by Mydoom.B are generated randomly. The From address may also be spoofed to appear as though the message is from a different address.

The subject of the message will include one of the following:

Delivery Error hello
  • Error
  • Mail Delivery System
  • Mail Transaction Failed
    • Returned mail
    • Server Report
    • Status
    • Unable to deliver the message

    Not all email messages with these subject lines carry the MyDoom.B virus, some may be legitimate status messages.

    The message body will include one of the following:

    • RANDOMIZED CHARACTERS
    • test
    • The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
    • sendmail daemon reported: Error #804 occured during SMTP session. Partial message has been received.
    • The message contains Unicode characters and has been sent as a binary attachment.
    • The message contains MIME-encoded graphics and has been sent as a binary attachment.
    • Mail transaction failed. Partial message is available.

    The attachment will have one of the following filenames:

    • body
    • doc
    • text
    • document
    • data
    • file
    • readme
    • message

    The filename also contains an extension (.exe, .bat, .scr, .cmd, or .pif). When the attachment is opened, the MyDoom.B virus is launched and the system is infected.

    • Run and maintain an antivirus product

    It is important that you use antivirus software and keep it up to date. Most antivirus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many antivirus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.

    You may wish to read CERT Incident Note IN-2003-01 for more information on anti-virus software and security issues.

    • Do not run programs of unknown origin

    Do not download, install, or run a program unless it was written by a person or company that you trust.

    Email users should be wary of unexpected attachments. Be sure you know the source of an attachment before opening it. Also remember that it is not enough that the mail originated from an email address you recognize. The Melissa virus spread precisely because it originated from a familiar email address.

    In addition, MyDoom.B attempts to spread through file-sharing services like KaZaA. Peer-to-peer file sharing users should be particularly careful of running software sent to them by other users. This is a commonly used method among intruders attempting to build networks of distributed denial-of-service (DDoS) agents.

    • Use a personal firewall

    A personal firewall will not necessarily protect your system from an email-borne virus, but a properly configured personal firewall may prevent the virus from downloading additional components or launching attacks against other systems.

    How to Identify a MyDoom.B Infection

    To confirm that your system has been infected with the MyDoom.B virus, perform the following steps.

    • Check the 'hosts' file

    MyDoom.B overwrites the Windows 'hosts' file. The file it replaces it with will probably prevent your system from accessing your antivirus vendor's web site as well as some other web sites. You can check your hosts file by following these steps:

    Windows NT/2000/XP Systems

    1. Click on the Start menu and select Run
    2. In the dialog box that appears, type cmd and hit OK (a DOS window should appear)
    3. At the prompt in the DOS window type type %windir%\system32\drivers\etc\hosts
    4. If you see multiple lines starting with 0.0.0.0, your system is probably infected


    Windows 95/98/Me Systems

    1. Click on the Start menu and select Run
    2. In the dialog box that appears, type command and hit OK (a DOS window should appear)
    3. At the prompt in the DOS window type type %windir%\hosts
    4. If you see multiple lines starting with 0.0.0.0, your system is probably infected
    • Check for files left by the virus

    MyDoom.B drops several files on an infected computer. The existence of these files is a good indication of infection. Be aware that thereare legitimate Windows files with names similar to those left by the virus. Only files with these names and in these specific directories indicate an infection.

    Windows NT/2000/XP Systems

    1. Click on the Start menu, select Search and then select For Files and Folders
    2. In the search box type explorer.exe
    3. The existence of explorer.exe in the System32 directory (typically C:\Windows\System32) is an indication of infection
    4. In the search box type ctfmon.dll
    5. The existence of ctfmon.dll in the System32 directory (typically C:\Windows\System32) is another indication of infection


    Windows 95/98/Me Systems

    1. Click on the Start menu, select Search
    2. In the search box type explorer.exe
    3. The existence of explorer.exe in the System directory (typically C:\Windows\System) is an indication of infection
    4. In the search box type ctfmon.dll
    5. The existence of ctfmon.dll in the System directory (typically C:\Windows\System) is another indication of infection
    • Examine the Windows Registry

    The MyDoom.B virus also makes some changes to the Windows registry. Users who are unfamiliar with the registry should probably skip this step because it may cause serious damage to the operating system if accidental changes are made.

    Windows 95/98/Me/NT/2000/XP Systems

    1. At a DOS command prompt, type regedit.exe (the registry editor should appear)
    2. Search the Registry for the value Explorer=C:\WINDOWS\system32\explorer.exe in the key HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    3. The existence of this value is an indication of MyDoom.B infection

    If Your System is Infected

    If your system is infected, you will probably be unable to access your antivirus vendor's web site for assistance due to some changes the virus has made to your system. If this is the case, follow these steps to delete a file installed by the virus (do not do this unless you are infected; it may affect the normal operation of your system):

    Windows NT/2000/XP Systems

    1. Click on the Start menu and select Run
    2. In the dialog box that appears, type del %windir%\system32\drivers\etc\hosts


    Windows 95/98/Me Systems

    1. Click on the Start menu and select Run
    2. In the dialog box that appears, type del %windir%\hosts

    After deleting this file, you should be able to access your antivirus vendor's web site, obtain the updates to your antivirus software and perform a full scan of your system. Some antivirus vendors may produce a Removal Tool and make it available on their web site. If your vendor provides such a tool, you may want to use it first.

    If you are still unsuccessful at removing the virus, contact your antivirus vendor to obtain further assistance with removal and recovery.

    Additional Information

    For additional technical details about this virus, please see US-CERT Technical Alert TA04-028A.html

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • January 28, 2004: Initial release
      January 30, 2004: Added formatting, revised content

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Microsoft Internet Explorer

    Systems Affected

     
    Microsoft Windows systems running Internet Explorer 5.01 Internet Explorer 5.50 Internet Explorer 6 Previous versions that are no longer supported may also be affected.  
     

    Overview

     

    Microsoft Internet Explorer (IE) contains multiple vulnerabilities, the most serious of which could allow attackers in any location to run programs of their choice on your computer using the same privileges as you have.

    Quick Links

    Patch Information | Problem Description | References 

     

    Description

     

    Microsoft's Home User Security Bulletin for February 2004 describes three vulnerabilities in Internet Explorer (IE).

    Note that in addition to IE, any applications that use IE to interpret HTML documents, such as email programs, may present additional ways for these vulnerabilities to be used. 

    These vulnerabilities have different impacts, ranging from disguising the true location of a URL to executing computer commands or code, essentially taking over control of your computer and any data on it. The attacker could exploit this vulnerability by convincing you, the victim, to access a specially crafted HTML document such as a web page or HTML email message. Your computer can be compromised simply by viewing the attacker's HTML document with Internet Explorer. 

     

    A technical description of these vulnerabilities is available from US-CERT in TA04-033A and from Microsoft in MS04-004.

    Resolution

    Apply a patch

    Microsoft has released a home user bulletin describing how to determine what patches you will need and how to get them. Follow the procedures outlined in Microsoft's Home User Security Bulletin for February 2004.

    For additional information, and to receive updates on this alert, go to http://www.us-cert.gov.

    References

  • US-CERT Technical Alert TA04-033A - <http://www.us-cert.gov/cas/techalerts/TA04-033A.html>
  • Microsoft's Home User Security Bulletin for February 2004 - <http://www.microsoft.com/security/security_bulletins/20040202_windows.asp>
  • Microsoft Security Bulletin MS04-004 - <http://www.microsoft.com/technet/security/bulletin/MS04-004.asp>
  • This document is available from <http://www.us-cert.gov/cas/alerts/SA04-033A.html>

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • February 02, 2004: Initial release

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    HTTP Parsing Vulnerabilities in Check Point Firewall-1

    Systems Affected

     
    Check Point Firewall-1 NG FCS Check Point Firewall-1 NG FP1 Check Point Firewall-1 NG FP2
  • Check Point Firewall-1 NG FP3, HF2
  • Check Point Firewall-1 NG with Application Intelligence R54
  • Check Point Firewall-1 NG with Application Intelligence R55

  •  
     

    Overview

     
    Several versions of Check Point Firewall-1 contain a vulnerability that allows remote attackers to execute arbitrary code with administrative privileges. This allows the attacker to take control of the firewall and the server it runs on.
     
     

    Description

     

    The Application Intelligence (AI) component of Check Point Firewall-1 is an application proxy that scans traffic for application layer attacks once it has passed through the firewall at the network level. Earlier versions of Firewall-1 include the HTTP Security Server, which provides similar functionality.

    Both the AI and HTTP Security Server features contain an HTTP parsing vulnerability that is triggered by sending an invalid HTTP request through the firewall. When Firewall-1 generates an error message in response to the invalid request, a portion of the input supplied by the attacker is included in the format string for a call to sprintf().

    Researchers at Internet Security Systems have determined that it is possible to exploit this format string vulnerability to execute commands on the firewall. The researchers have also determined that this vulnerability can be exploited as a heap overflow, which would allow an attacker to execute arbitrary code. In either case, the commands or code executed by the attacker would run with administrative privileges, typically "SYSTEM" or "root". For more information, please see the ISS advisory at:

    http://xforce.iss.net/xforce/alerts/id/162

    The CERT/CC is tracking this issue as VU#790771. This reference number corresponds to CVE candidate CAN-2004-0039.


    Impact

    This vulnerability allows remote attackers to execute arbitrary code on affected firewalls with administrative privileges, typically "SYSTEM" or "root".


    Solution

    Apply the patch from Check Point

    Check Point has published a "Firewall-1 HTTP Security Server Update" that modifies the error return strings used when an invalid HTTP request is detected. For more information, please see the Check Point bulletin at:

    http://www.checkpoint.com/techsupport/alerts/security_server.html

    Disable the affected components

    Check Point has reported that their products are only affected by this vulnerability if the HTTP Security Servers feature is enabled. Therefore, affected sites may be able to limit their exposure to this vulnerability by disabling HTTP Security Servers or the Application Intelligence component, as appropriate.


    This vulnerability was discovered and researched by Mark Dowd of ISS X-Force.


    This document was written by Jeffrey P. Lanza.


    This document is available from http://www.us-cert.gov/cas/techalerts/TA04-036A.html


    Revision History

  • 02/05/2004: Initial release
    02/06/2004: Updated Solution section
    02/06/2004: Updated Overview and Impact sections
     

    Last updated 


  • Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Microsoft Windows

    Systems Affected

     
    Systems running Microsoft Windows
     

    Overview

     
    Microsoft Windows contains multiple vulnerabilities, the most serious of which could allow attackers to take control of your computer.
     

    Description

     
    Microsoft's updated Home User Security Bulletin for February 2004 describes more vulnerabilities in the Microsoft Windows operating system. Microsoft is tracking these issues as Security Update 828028.

    It is unclear at this time how many different ways your computer can be compromised using these vulnerabilities, so we recommend you apply the updates below as soon as possible. A technical description of these vulnerabilities is available from US-CERT in TA04-041A and from Microsoft in MS04-007.

    Resolution

    Apply a patch

    Microsoft has released a home user bulletin describing how to determine what patches you will need and how to get them. Follow the procedures outlined in Microsoft's updated Home User Security Bulletin for February 2004.

    For additional information, and to receive updates on this alert, go to http://www.us-cert.gov/cas/alerts/SA04-041A.html

    References

    US-CERT Technical Alert TA04-041A - <http://www.us-cert.gov/cas/techalerts/TA04-041A.html> Microsoft's Updated Home User Security Bulletin for February 2004 - <http://www.microsoft.com/security/security_bulletins/20040210_windows.asp> Microsoft Security Bulletin MS04-007 - <http://www.microsoft.com/technet/security/bulletin/MS04-007.asp>
  • Microsoft Knowledge Base Article 828028: An ASN.1 vulnerability could allow code execution - <http://support.microsoft.com/?kbid=828028>
  • This document is available from <http://www.us-cert.gov/cas/alerts/SA04-041A.html>

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

  • February 10, 2004: Initial release

    Last updated 


  • Alerts ~Created Tue Feb 3 01:24:38 2026

    Vulnerability in Microsoft Outlook 2002

    Systems Affected

     
    Systems running Microsoft Office XP and Outlook 2002
     

    Overview

     
    There is a vulnerability in Outlook 2002 that could allow attackers to take control of your computer.
     

    Description

     
    By taking advantage of the way Outlook interprets email links, an attacker may be able to gain control of your computer.

    A technical description of these vulnerabilities is available from US-CERT in TA04-070A and from Microsoft in MS04-009.

    Resolution

    Apply a patch

    Microsoft's Office Security Update for March 2004 links to the necessary patches.

    References

    US-CERT Technical Alert TA04-070A - <http://www.us-cert.gov/cas/techalerts/TA04-070A.html> Microsoft's Office Security Update for March 2004 - <http://www.microsoft.com/security/security_bulletins/20040309_office.asp> Microsoft Security Bulletin MS04-009 - <http://www.microsoft.com/technet/security/bulletin/ms04-009.mspx>

    This document is available from <http://www.us-cert.gov/cas/alerts/SA04-070A.html>

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

  • March 10, 2004: Initial release

    Last updated 


  • Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in OpenSSL

    Systems Affected

     
    Applications and systems that use the OpenSSL SSL/TLS library
     

    Overview

     
    Several vulnerabilities in the OpenSSL SSL/TLS library could allow an unauthenticated, remote attacker to cause a denial of service.
     

    Description

     
    OpenSSL implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols and includes a general purpose cryptographic library. SSL and TLS are commonly used to provide authentication, encryption, integrity, and non-repudiation services to network applications including HTTP, IMAP, POP3, SMTP, and LDAP. OpenSSL is widely deployed across a variety of platforms and systems. In particular, many routers and other types of networking equipment use OpenSSL. The U.K. National Infrastructure Security Co-ordination Centre (NISCC) and the OpenSSL Project have reported three vulnerabilities in the OpenSSL SSL/TLS library (libssl). Any application or system that uses this library may be affected.

    VU#288574 - OpenSSL contains null-pointer assignment in do_change_cipher_spec() function

    Versions of OpenSSL from 0.9.6c to 0.9.6k inclusive and 0.9.7a to 0.9.7c inclusive contain a null-pointer assignment in the do_change_cipher_spec() function. By performing a specially crafted SSL/TLS handshake, an attacker could cause OpenSSL to crash, which may result in a denial of service in the target application.
    (Other resources: OpenSSL Security Advisory (1.), CAN-2004-0079, NISCC/224012/OpenSSL/1)

    VU#484726 - OpenSSL does not adequately validate length of Kerberos tickets during SSL/TLS handshake

    Versions 0.9.7a, 0.9.7b, and 0.9.7c of OpenSSL do not adequately validate the length of Kerberos tickets (RFC 2712) during an SSL/TLS handshake. OpenSSL is not configured to use Kerberos by default. By performing a specially crafted SSL/TLS handshake with an OpenSSL system configured to use Kerberos, an attacker could cause OpenSSL to crash, which may result in a denial of service in the target application. OpenSSL 0.9.6 is not affected.
    (Other resources: OpenSSL Security Advisory (2.), CAN-2004-0112, NISCC/224012/OpenSSL/2)

    VU#465542 - OpenSSL does not properly handle unknown message types

    OpenSSL prior to version 0.9.6d does not properly handle unknown SSL/TLS message types. An attacker could cause the application using OpenSSL to enter an infinite loop, which may result in a denial of service in the target application. OpenSSL 0.9.7 is not affected.
    (Other resources: CAN-2004-0081, NISCC/224012/OpenSSL/3)

    Impact

    An unauthenticated, remote attacker could cause a denial of service in any application or system that uses a vulnerable OpenSSL SSL/TLS library.

    Solution

    Upgrade or Apply a patch from your vendor

    Upgrade to OpenSSL 0.9.6m or 0.9.7d. Alternatively, upgrade or apply a patch as specified by your vendor. Note that it is necessary to recompile any applications that are statically linked to the OpenSSL SSL/TLS library.

    Appendix A. Vendor Information

    Multiple vendors are affected by different combinations of these vulnerabilities. For updated information, please see the Systems Affected sections of VU#288574, VU#484726, and VU#465542.


     

    Appendix B. References

    US-CERT Technical Cyber Security Alert TA04-078A - <http://www.us-cert.gov/cas/techalerts/TA04-078A.html> Vulnerability Note VU#288574 - <http://www.kb.cert.org/vuls/id/288574>
  • Vulnerability Note VU#484726 - <http://www.kb.cert.org/vuls/id/484726>
  • Vulnerability Note VU#465542 - <http://www.kb.cert.org/vuls/id/465542>
  • OpenSSL Security Advisory [17 March 2004] - <http://www.openssl.org/news/secadv_20040317.txt>
  • NISCC Vulnerability Advisory 224012 - <http://www.uniras.gov.uk/vuls/2004/224012/index.htm>
  • CAN-2004-0079 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079>
  • CAN-2004-0112 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112>
  • CAN-2004-0081 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0081>
  • RFC 2712 Addition of Kerberos Cipher Suites to Transport Layer Security (TLS) - <http://www.ietf.org/rfc/rfc2712.txt>

  •  


    These vulnerabilities were researched and reported by the OpenSSL Project and the U.K. National Infrastructure Security Co-ordination Centre (NISCC).


    Feedback can be directed to the authors: Art Manion and Damon Morda.


    Revision History

    • March 18, 2004: Initial release
      March 19, 2004: Added CVE CAN references VU# links
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Continuing Threats to Home Users

    Systems Affected

     
    Continuing Threats to Home Users
    View Previous Alerts
    Alert (SA04-079A)

    Continuing Threats to Home Users

    Original Release date: March 19, 2004 | Last revised: --

    Overview

     

    There are a number of pieces of malicious code spreading on the Internet through email attachments, peer-to-peer file sharing networks and known software vulnerabilities.

    Intruders target home users who have cable modem and DSL connections because many home users do not keep their machines up to date with security patches and workarounds, do not run current anti-virus software, and do not exercise caution when handling email attachments. Everyone should take precautions, patch vulnerabilities, and recover if you have been compromised.

    Current Threats

    US-CERT is currently tracking the incident activity related to several pieces of malicious code - Phatbot, W32/Beagle, W32/Netsky and W32/MyDoom.

    Phatbot Trojan Horse

    The Phatbot Trojan Horse is a piece of malicious code that allows a remote attacker to control a large number of systems. Phatbot attempts to propagate by exploiting vulnerabilities in the Microsoft Windows operating system for which users have not applied the available patches. If your computer is infected a remote attacker will have access to your files and programs.

    W32/Beagle Virus

    The W32/Beagle virus is a mass-mailing virus that arrives as an attachment to an email message. To be infected, a user must open the attachment. There are many variants of this virus. Some may require a password which is included in the email message.

    W32/Netsky Virus

    The Netsky.B virus, described in IN-2004-02, is a mass-mailing virus that attempts to propagate either as an attachment to an email message or by copying itself to Windows network shares.

  • W32/MyDoom Virus

    The MyDoom virus, described in TA04-028A, is a mass-mailing virus that attempts to propagate as an attachment to an email message.

  • Protective Measures

    There are steps you can take to better protect your system from these attacks:

    1. Apply Patches

      Many viruses spread by exploiting known vulnerabilities in unpatched systems. It is very important for users to apply security-related patches to their operating systems and applications.

    2. Install and Maintain Anti-Virus Software

      US-CERT strongly recommends using anti-virus software. Most current anti-virus software products detect and alert the user of viruses. It is important to keep them up to date with current virus and attack signatures supplied by the software vendor. Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.

    3. Deploy a Firewall

      US-CERT also recommends using a firewall product. In some situations, these products may be able to alert users to the fact that their machine has been compromised. Furthermore, they have the ability to block intruders from accessing backdoors over the network. However, no firewall can detect or stop all attacks, so it is important to continue to follow safe computing practices.

    4. Follow Best Practices

      The technical measures listed above do not provide a complete solution for securing a system. There are some best practices you can follow:

    5. Do not download, install, or run a program unless you know it was written by a person or company that you trust.
    6. Email users should be wary of unexpected attachments. Be sure you know the source of an attachment before opening it. Also remember that it is not enough that the mail originated from an email address you recognize. Many viruses spread precisely because they originate from a familiar email address.
    7. Users should also be wary of URLs in email or instant messages. URLs can link to malicious content that in some cases may be executed without user intervention. A common social engineering technique known as "phishing" uses misleading URLs to entice users to visit malicious web sites. These sites spoof legitimate web sites to solicit sensitive information such as passwords or account numbers.
    8. In addition, users of Internet Relay Chat (IRC), Instant Messaging (IM), and file-sharing services should be particularly careful of following links or running software sent to them by other users. These are commonly used methods among intruders attempting to build networks of distributed denial-of-service (DDoS) agents.
    9. For additional information about securing home systems and networks, please see the references below.

    Recovery

    If the protective measures above, or other indicators, reveal that a system has already been compromised, more drastic steps need to be taken to recover. In general, the only way to ensure that a compromised computer is free from backdoors and intruder modifications is to re-install t

     

    Description

     

    Continuing Threats to Home Users

    View Previous Alerts

    Alert (SA04-079A)

    Continuing Threats to Home Users

    Original Release date: March 19, 2004 

    Overview

    There are a number of pieces of malicious code spreading on the Internet through email attachments, peer-to-peer file sharing networks and known software vulnerabilities.

    Intruders target home users who have cable modem and DSL connections because many home users do not keep their machines up to date with security patches and workarounds, do not run current anti-virus software, and do not exercise caution when handling email attachments. Everyone should take precautions, patch vulnerabilities, and recover if you have been compromised.

    Current Threats

    US-CERT is currently tracking the incident activity related to several pieces of malicious code - Phatbot, W32/Beagle, W32/Netsky and W32/MyDoom.

    • Phatbot Trojan Horse

      The Phatbot Trojan Horse is a piece of malicious code that allows a remote attacker to control a large number of systems. Phatbot attempts to propagate by exploiting vulnerabilities in the Microsoft Windows operating system for which users have not applied the available patches. If your computer is infected a remote attacker will have access to your files and programs.

    • W32/Beagle Virus

      The W32/Beagle virus is a mass-mailing virus that arrives as an attachment to an email message. To be infected, a user must open the attachment. There are many variants of this virus. Some may require a password which is included in the email message.

    • W32/Netsky Virus

      The Netsky.B virus, described in IN-2004-02, is a mass-mailing virus that attempts to propagate either as an attachment to an email message or by copying itself to Windows network shares.

    • W32/MyDoom Virus

      The MyDoom virus, described in TA04-028A, is a mass-mailing virus that attempts to propagate as an attachment to an email message.

    Protective Measures

    There are steps you can take to better protect your system from these attacks:

    1. Apply Patches

      Many viruses spread by exploiting known vulnerabilities in unpatched systems. It is very important for users to apply security-related patches to their operating systems and applications.

    2. Install and Maintain Anti-Virus Software

      US-CERT strongly recommends using anti-virus software. Most current anti-virus software products detect and alert the user of viruses. It is important to keep them up to date with current virus and attack signatures supplied by the software vendor. Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.

    3. Deploy a Firewall

      US-CERT also recommends using a firewall product. In some situations, these products may be able to alert users to the fact that their machine has been compromised. Furthermore, they have the ability to block intruders from accessing backdoors over the network. However, no firewall can detect or stop all attacks, so it is important to continue to follow safe computing practices.

    4. Follow Best Practices

      The technical measures listed above do not provide a complete solution for securing a system. There are some best practices you can follow:

      • Do not download, install, or run a program unless you know it was written by a person or company that you trust.
      • Email users should be wary of unexpected attachments. Be sure you know the source of an attachment before opening it. Also remember that it is not enough that the mail originated from an email address you recognize. Many viruses spread precisely because they originate from a familiar email address.
      • Users should also be wary of URLs in email or instant messages. URLs can link to malicious content that in some cases may be executed without user intervention. A common social engineering technique known as "phishing" uses misleading URLs to entice users to visit malicious web sites. These sites spoof legitimate web sites to solicit sensitive information such as passwords or account numbers.
      • In addition, users of Internet Relay Chat (IRC), Instant Messaging (IM), and file-sharing services should be particularly careful of following links or running software sent to them by other users. These are commonly used methods among intruders attempting to build networks of distributed denial-of-service (DDoS) agents.

      For additional information about securing home systems and networks, please see the references below.

    Recovery

    If the protective measures above, or other indicators, reveal that a system has already been compromised, more drastic steps need to be taken to recover. In general, the only way to ensure that a compromised computer is free from backdoors and intruder modifications is to re-install the operating system and install patches before connecting back to the network. Sometimes using an anti-virus software package to "clean" the system may not be enough.

    References

    • Before You Connect a New Computer to the Internet - http://www.us-cert.gov/reading_room/before_you_plug_in.html
    • Home Network Security - http://www.us-cert.gov/reading_room/home-network-security/
    • Home Computer Security - http://www.us-cert.gov/reading_room/HomeComputerSecurity/
    • Understanding Firewalls - http://www.us-cert.gov/cas/tips/ST04-004.html
    • Good Security Habits - http://www.us-cert.gov/cas/tips/ST04-003.html
    • Choosing and Protecting Passwords - http://www.us-cert.gov/cas/tips/ST04-002.html

    Authors: Brian B. King, Damon Morda

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • March 19, 2004: Initial release
       

    Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Cross-Domain Vulnerability in Outlook Express MHTML Protocol Handler

    Systems Affected

     
    Microsoft Windows systems
     

    Overview

     
    A cross-domain vulnerability in the Outlook Express MIME Encapsulation of Aggregate HTML Documents (MHTML) protocol handler could allow an attacker to execute arbitrary code with the privileges of the user invoking the handler. The attacker may also be able to read and manipulate data on web sites in other domains or zones.
     

    Description

     
    There is a cross-domain vulnerability in the way the Outlook Express MHTML protocol handler (mhtml:) determines the security domain of data referenced by a URL that specifies an alternate location. When the MHTML handler references an inaccessible or non-existent file, the handler can access a file from an alternate location. The MHTML handler incorrectly treats the file from the alternate location as if it were in the same domain as the unavailable file. The MHTML protocol handler is considered to be part of Outlook Express and is installed by default on all current Windows systems. The MHTML protocol handler is effectively a shared Windows component. Any program that exposes an MHTML protocol reference to the operating system will invoke the handler, typically using Internet Explorer (IE).

    Programs that use the WebBrowser ActiveX control or the IE HTML rendering engine (MSHTML) may be affected by this vulnerability. Internet Explorer, Outlook, and Outlook Express are all examples of such programs.

     

    US-CERT is tracking this issue as VU#323070. This reference number corresponds to CVE candidate CAN-2004-0380.

    Impact

    By convincing a victim to view an HTML document such as a web page or HTML email message, an attacker could access data or execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user invoking the MHTML handler. The attacker may also be able to read or modify data in other web sites (including reading cookies or content and modifying or creating content).

    Publicly available exploit code exists for this vulnerability. US-CERT has monitored incident reports that indicate that this vulnerability is being exploited. The Ibiza trojan, variants of W32/Bugbear, and BloodHound.Exploit.6 are some examples of malicious code that exploit this vulnerability. Any arbitrary payload could be delivered via this vulnerability, and different anti-virus vendors may identify malicious code with different names.

    Most of the observed exploit code uses InfoTech Storage (ITS) protocol handlers and Compiled HTML Help (CHM) files to parse an HTML file in the Local Machine Zone. CHM files use the InfoTech Storage (ITS) format to store components such as HTML files, graphic files, and ActiveX objects, and Windows provides several protocol handlers that can access ITS files and individual CHM components: its:, ms-its:, ms-itss:, and mk:@MSITStore:.

    When referencing an inaccessible or non-existent MHTML file using the ITS and mhtml: protocols, IE can access a CHM file from an alternate location. Because of the vulnerability in the MHTML handler, IE incorrectly treats the CHM file as if it were in the same domain as the unavailable MHTML file. Using a specially crafted URL, an attacker can cause arbitrary script in a CHM file to be executed in a different domain, violating the cross-domain security model.

    Any programs, including other web browsers, that use the Windows protocol handlers (URL monikers) for ITS or MHTML protocols could function as attack vectors. Also, due to the way that IE determines MIME types, HTML and CHM files may not have the expected file name extensions (.htm/.html and .chm respectively).

     

    A malicious web site or email message may contain HTML similar to the following:

    ms-_its:_mhtml:_file://C:\nosuchfile.mht!_http://www.example.com//exploit._chm::exploit.html 
    (This URL is intentionally modified to avoid detection by anti-virus software.)

    In this example, HTML and script in exploit.html will be executed in the security context of the Local Machine Zone. It is common practice for exploit.html to either contain or download an executable payload such as a backdoor, trojan horse, virus, bot, or other malicious code.

    Note that it is possible to encode a URL in an attempt to bypass HTTP content inspection or anti-virus software.

     

    Solution

    Install a patch

    Install the appropriate cumulative patch for Outlook Express according to Microsoft Security Bulletin MS04-013.

    Disable ITS and MHTML protocol handlers

    Disabling the ITS and MHTML protocol handlers appears to prevent exploitation of this vulnerability. Delete or rename the following registry keys:

    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\{ms-its,ms-itss,its,mk,mhtml}

    Disabling these protocol handlers will significantly reduce the functionality of the Windows Help system and may have other unintended consequences. Plan to undo these changes after patches have been tested and installed.

     

    Follow good Internet security practices

    These recommended security practices will help to reduce exposure to attacks and mitigate the impact of cross-domain vulnerabilities. Additional recommendations can be found under Mitigating factors and Workarounds in the Vulnerability Details section of MS04-013.

    Disable Active scripting and ActiveX controls

    NOTE: Disabling Active scripting and ActiveX controls will not prevent the exploitation of this vulnerability.

    Disabling Active scripting and ActiveX controls in the Internet and Local Machine Zones may stop certain types of attacks and will prevent exploitation of different cross-domain vulnerabilities. Disable Active scripting and ActiveX controls in any zones used to read HTML email.

    Disabling Active scripting and ActiveX controls in the Local Machine Zone will prevent malicious code that requires Active scripting and ActiveX controls from running. Changing these settings may reduce the functionality of scripts, applets, Windows components, or other applications. See Microsoft Knowledge Base Article 833633 for detailed information about security settings for the Local Machine Zone. Note that Service Pack 2 for Windows XP includes these changes.

     

    Do not follow unsolicited links

    Do not click on unsolicited URLs received in email, instant messages, web forums, or Internet relay chat (IRC) channels.

  • Maintain updated anti-virus software

    Anti-virus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely solely on anti-virus software to defend against this vulnerability. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.

  • Appendix A. Vendor Information

    Microsoft Corporation

    Please see Microsoft Security Bulletin MS04-013.


     

    Appendix B. References

    • Vulnerability Note VU#323070 - <http://www.kb.cert.org/vuls/id/323070>
    • US-CERT Computer Virus Resources - <http://www.us-cert.gov//reading_room/virus.html>
    • CVE CAN-2004-0380 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0380>
    • Microsoft Security Bulletin MS04-013 - <http://www.microsoft.com/technet/security/bulletin/ms04-013.mspx>
    • Introduction to URL Security Zones - <http://msdn.microsoft.com/workshop/security/szone/overview/overview.asp>
    • About Cross-Frame Scripting and Security - <http://msdn.microsoft.com/workshop/author/om/xframe_scripting_security.asp>
    • MIME Type Determination in Internet Explorer - <http://msdn.microsoft.com/workshop/networking/moniker/overview/appendix_a.asp>
    • URL Monikers - <http://msdn.microsoft.com/workshop/networking/moniker/monikers.asp>
    • Asynchronous Pluggable Protocols - <http://msdn.microsoft.com/workshop/networking/pluggable/pluggable.asp>
    • Microsoft HTML Help 1.4 SDK - <http://msdn.microsoft.com/library/en-us/htmlhelp/html/vsconHH1Start.asp>
    • Microsoft Knowledge Base Article 182569 - <http://support.microsoft.com/default.aspx?scid=182569>
    • Microsoft Knowledge Base Article 174360 - <http://support.microsoft.com/default.aspx?scid=174360>
    • Microsoft Knowledge Base Article 833633 - <http://support.microsoft.com/default.aspx?scid=833633>
    • Windows XP Service Pack 2 Technical Preview - <http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx>
    • AusCERT Update AU-2004.007 - <http://www.auscert.org.au/3990>


     


    This vulnerability was reported by Liu Die Yu. Thanks to http-equiv for additional research and collaboration.


    Feedback can be directed to the author: Art Manion.


    Revision History

    • April 8, 2004: Initial release
      April 13, 2004: Added patch and vendor information (MS04-013), credited Liu Die Yu, updated vulnerability, impact, and workaround information about MHTML
      April 23. 2004: Thanked http-equiv April 26, 2004: Further modified sample exploit URL to minimize AV detection

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Summary of Windows Security Updates for April 2004

    Systems Affected

     
    Systems running Microsoft Windows
     

    Overview

     
    There are multiple vulnerabilities in Microsoft Windows that could allow attackers to take control of your computer.
     

    Description

     
    Microsoft has released Windows Security Updates for April 2004, which addresses multiple vulnerabilities in the Microsoft Windows operating system. Three of the four updates are considered critical, so users should apply the updates as soon as possible.

    A technical description of these vulnerabilities is available from US-CERT in TA04-104A and from Microsoft in MS04-011, MS04-012, MS04-013, and MS04-014.

    Resolution

    Apply a patch

    Follow the procedures outlined in Microsoft's Windows Security Updates for April 2004.

    References

    US-CERT Technical Alert TA04-104A: Multiple Vulnerabilities in Microsoft Products - <http://www.us-cert.gov/cas/techalerts/TA04-104A.html> Microsoft's Windows Security Update for April 2004 - <http://www.microsoft.com/security/security_bulletins/200404_windows.asp> Microsoft Security Bulletin MS04-011 - <MS04-011>
  • Microsoft Security Bulletin MS04-012 - < MS04-012>
  • Microsoft Security Bulletin MS04-013 - <MS04-013>
  • Microsoft Security Bulletin MS04-014 - <MS04-014>
  • Feedback about this alert should be sent to the author, Mindi McDowell, at "US-CERT Security Alerts" at <mailto:cert@cert.org>. Please include the Subject line "SA04-104A Feedback VU#667571".

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

  • April 13, 2004: Initial release

    Last updated 


  • Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Microsoft Products

    Systems Affected

     
    Microsoft Windows Operating Systems Microsoft Windows Remote Procedure Call (RPC) and Distributed Component Object Model (DCOM) subsystems Microsoft Windows MHTML Protocol Handler
  • Microsoft Jet Database Engine
  •  

    Overview

     
    Microsoft Corporation has released a series of security bulletins affecting most users of the Microsoft Windows operating system. Users of systems running Microsoft Windows are strongly encouraged to visit the Windows Security Updates for April 2004 and take actions appropriate to their system configurations.
     

    Description

     
    Microsoft has released four security bulletins listing a number of vulnerabilities which affect a variety of Microsoft Windows software packages. The following section summarizes the issues identified in their bulletins.

    Summary of Microsoft Bulletins for April 2004

    Security Bulletin MS04-011: Security Update for Microsoft Windows (835732)

    This bulletin addresses 14 vulnerabilities affecting the systems listed below. There are several new vulnerabilities address by this bulletin, and several updates to previously reported vulnerabilities.

    Impact

    Remote attackers could execute arbitrary code on vulnerable systems.

     

    Systems affected

  • Windows NT Workstation 4.0
  • Windows NT Server 4.0
  • Windows NT Server 4.0, Terminal Server Edition
  • Windows 2000
  • Windows XP
  • Windows Server 2003
  •  

    Vulnerability identifiers 

    The following table outlines these issues and is based on Microsoft's Security Bulletin:

     

    Vulnerability Title US-CERT ID CVE ID Impact of Vulnerability
    LSASS Vulnerability VU#753212

    CAN-2003-0533

     

    Remote Code Execution
    LDAP Vulnerability VU#639428

    CAN-2003-0663

     

    Denial of Service
    PCT Vulnerability VU#586540

    CAN-2003-0719

     

    Remote Code Execution
    Winlogon Vulnerability VU#471260

    CAN-2003-0806

     

    Remote Code Execution
    Metafile Vulnerability VU#547028

    CAN-2003-0906

     

    Remote Code Execution
    Help and Support Center Vulnerability VU#260588

    CAN-2003-0907

     

    Remote Code Execution
    Utility Manager Vulnerability VU#526084

    CAN-2003-0908

     

    Privilege Elevation
    Windows Management Vulnerability VU#206468

    CAN-2003-0909

     

    Privilege Elevation
    Local Descriptor Table Vulnerability VU#122076

    CAN-2003-0910

     

    Privilege Elevation
    H.323 Vulnerability VU#353956

    CAN-2004-0117

     

    Remote Code Execution
    Virtual DOS Machine Vulnerability VU#783748

    CAN-2004-0118

     

    Privilege Elevation
    Negotiate SSP Vulnerability VU#638548

    CAN-2004-0119

     

    Remote Code Execution
    SSL Vulnerability VU#150236

    CAN-2004-0120

     

    Denial of Service
    ASN.1 "Double Free" Vulnerability VU#255924

    CAN-2004-0123

     

    Remote Code Execution
     

     

    Security Bulletin MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741)

    This bulletin addresses several new vulnerabilities affecting the systems listed below. These vulnerabilities are in Microsoft Windows Remote Procedure Call (RPC) and Distributed Component Object Model (DCOM).

    Impact

    Remote attackers could execute arbitrary code on vulnerable systems.

     

    Systems affected

    • Windows NT Workstation 4.0
    • Windows NT Server 4.0
    • Windows NT Server 4.0, Terminal Server Edition
    • Windows 2000
    • Windows XP
    • Windows Server 2003

     

    Vulnerability identifiers 

    The following table outlines these issues and is based on Microsoft's Security Bulletin:

     

    Vulnerability Title US-CERT ID CVE ID Impact of Vulnerability
    RPC Runtime Library Vulnerability VU#547820

    CAN-2003-0813

     

    Remote Code Execution
    RPCSS Service Vulnerability VU#417052

    CAN-2004-0116

     

    Denial of Service
    COM Internet Services (CIS) -- RPC over HTTP Vulnerability VU#698564

    CAN-2003-0807

     

    Denial of Service
    Object Identity Vulnerability VU#212892

    CAN-2004-0124

     

    Information Disclosure
     

    Security Bulletin MS04-013:Cumulative Security Update for Outlook Express (837009)

    This bulletin addresses a vulnerability affecting the systems listed below. The vulnerability affects the Microsoft Windows MHTML Protocol handler and any applications that use it, including Microsoft Outlook and Internet Explorer. This vulnerability has been assigned VU#323070 and CAN-2004-0380

    Note: MS04-013 includes patches remediating the vulnerability described in TA04-099A.
     

    Impact

    Remote attackers could execute arbitrary code on vulnerable systems.

     

    Systems affected

    • Windows NT Workstation 4.0
    • Windows NT Server 4.0
    • Windows NT Server 4.0, Terminal Server Edition
    • Windows 2000
    • Windows XP
    • Windows Server 2003
    • Windows 98
    • Windows 98 Second Edition (SE)
    • Windows Millennium Edition (Windows Me)

     

    Note: This issue affects systems with Outlook Express installed. Outlook Express is installed by default on most (if not all) current versions of Microsoft Windows.

    Security Bulletin MS04-014: Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution (837001)

    This bulletin addresses a vulnerability affecting the systems listed below. There is a buffer overflow vulnerability in Microsoft's Jet Database Engine (Jet). An attacker could take control of a vulnerable system, including installing programs; viewing, changing, or deleting data; or creating new accounts that have full privileges. This vulnerability has been assigned VU#740716 and CAN-2004-0197.

    Impact

    Remote attackers could execute arbitrary code on vulnerable systems.

     

    Systems affected

    • Windows NT Workstation 4.0
    • Windows NT Server 4.0
    • Windows NT Server 4.0, Terminal Server Edition
    • Windows 2000
    • Windows XP
    • Windows Server 2003


     

     

    Update to TA04-099A

    Microsoft has released a patch that addresses the cross-domain vulnerability discussed in TA04-099A: Vulnerability in Internet Explorer ITS Protocol Handler. US-CERT is tracking this issue as VU#323070. This reference number corresponds to CVE candidate CAN-2004-0380.

    The patches and further information about the vulnerability are available in Microsoft Security Bulletin MS04-013. MS04-013 is titled Cumulative Security Update for Outlook Express. Since most (if not all) current Windows systems have Outlook Express installed by default, and the MHTML protocol handler is part of the Outlook Express software package, most (if not all) Windows systems should be considered vulnerable.

    TA04-099A and VU#323070 focused on the ITS protocol handlers; however, the latent vulnerability appears to be in the MHTML handler shipped as part of Outlook Express. These documents have been updated.

    Impact

    Several of the issues identified by Microsoft have been described as Critical in nature. Each bulletin contains at least one vulnerability which may allow remote attackers to execute arbitrary code on affected systems. The privileges gained would depend on the security context of the software and vulnerability exploited.

    Solution

    Apply an appropriate set of updates from Microsoft

    Please see the following site for more information about appropriate remediation.

    Windows Security Updates for April 2004

    Appendix A. Vendor Information

    This appendix contains information provided by vendors for this technical alert. As vendors report new information to US-CERT, we will update this section and note the changes in our revision history. If a particular vendor is not listed below, we have not received their comments.

    Microsoft Corporation

    Windows Security Updates for April 2004
    Microsoft Security Bulletin MS04-011 - Security Update for Microsoft Windows (835732)
    Microsoft Security Bulletin MS04-012 - Cumulative Update for Microsoft RPC/DCOM (828741)
    Microsoft Security Bulletin MS04-013 - Cumulative Security Update for Outlook Express (837009)
    Microsoft Security Bulletin MS04-014 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution (837001)


     

    Appendix B. References

    • Technical Cyber Security Alert TA04-099A: Cross-Domain Vulnerability in Outlook Express MHTML Protocol Handler - http://www.us-cert.gov/cas/techalerts/TA04-099A.html
    • US-CERT Cyber Security Alert SA04-104A: Summary of Windows Security Updates for April 2004 - http://www.us-cert.gov/cas/alerts/SA04-104A.html
    • Windows Security Updates for April 2004 - http://www.microsoft.com/security/security_bulletins/200404_windows.asp
    • Microsoft Security Bulletin MS04-011 - Security Update for Microsoft Windows (835732) - http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
    • Microsoft Security Bulletin MS04-012 - Cumulative Update for Microsoft RPC/DCOM (828741) - http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx
    • Microsoft Security Bulletin MS04-013 - Cumulative Security Update for Outlook Express (837009) - http://www.microsoft.com/technet/security/bulletin/MS04-013.mspx
    • Microsoft Security Bulletin MS04-014 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code Execution (837001) - http://www.microsoft.com/technet/security/bulletin/MS04-014.mspx
    • Microsoft Security Response Center Security Bulletin Severity Rating System (Revised, November 2002) - http://www.microsoft.com/technet/security/bulletin/rating.mspx
    • Vulnerability Note VU#323070: Outlook Express MHTML protocol handler does not properly validate location of alternate data - http://www.kb.cert.org/vuls/id/323070
    • Vulnerability Note VU#547820: Microsoft Windows DCOM/RPC vulnerability - http://www.kb.cert.org/vuls/id/547820
    • Vulnerability Note VU#740716: Microsoft Jet Database Engine database request handling buffer overflow - http://www.kb.cert.org/vuls/id/740716


     


    Feedback: US-CERT Technical Alerts


    Revision History

    • April 13, 2004: Initial release
      April 14, 2004: Updated Vulnerability Note links
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Cisco IOS SNMP Message Handling Vulnerability

    Systems Affected

    Cisco routers and switches running vulnerable versions of IOS.

    Vulnerable IOS versions known to be affected include: 12.0(23)S4, 12.0(23)S5 12.0(24)S4, 12.0(24)S5
  • 12.0(26)S1
  • 12.0(27)S
  • 12.0(27)SV, 12.0(27)SV1
  • 12.1(20)E, 12.1(20)E1, 12.1(20)E2
  • 12.1(20)EA1
  • 12.1(20)EW, 12.1(20)EW1
  • 12.1(20)EC, 12.1(20)EC1
  • 12.2(12g), 12.2(12h)
  • 12.2(20)S, 12.2(20)S1
  • 12.2(21), 12.2(21a)
  • 12.2(23)
  • 12.3(2)XC1, 12.3(2)XC2
  • 12.3(5), 12.3(5a), 12.3(5b)
  • 12.3(6)
  • 12.3(4)T, 12.3(4)T1, 12.3(4)T2, 12.3(4)T3
  • 12.3(5a)B
  • 12.3(4)XD, 12.3(4)XD1
  • Overview

    There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS). This vulnerability is distinct from the vulnerability described in US-CERT Technical Alert TA04-111A issued earlier today. Cisco has published an advisory about this distinct SNMP issue at the following location:

    Description

    The Simple Network Management Protocol (SNMP) is a widely deployed protocol that is commonly used to monitor and manage network devices. There are several types of SNMP messages that are used to request information or configuration changes, respond to requests, enumerate SNMP objects, and send both solicited and unsolicited alerts. These messages use UDP to communicate network information between SNMP agents and managers.

    There is a vulnerability in Cisco's IOS SNMP service in which attempts to process specific SNMP messages are handled incorrectly. This may potentially cause the device to reload.

    Typically, ports 161/udp and 162/udp are used during SNMP operations to communicate. In addition to these well-known ports, Cisco IOS uses a randomly selected UDP port in the range from 49152/udp to 59152/udp (and potentially up to 65535) to listen for other types of SNMP messages. While SNMPv1 and SNMPv2c formatted messages can trigger this vulnerability, the greatest risk is exposed when any SNMPv3 solicited operation is sent to a vulnerable port.

    Cisco notes in their advisory:

      SNMPv1 and SNMPv2c solicited operations to the vulnerable ports will perform an authentication check against the SNMP community string, which may be used to mitigate attacks. Through best practices of hard to guess community strings and community string ACLs, this vulnerability may be mitigated for both SNMPv1 and SNMPv2c. However, any SNMPv3 solicited operation to the vulnerable ports will reset the device. If configured for SNMP, all affected versions will process SNMP version 1, 2c and 3 operations.

    Cisco is tracking this issue as CSCed68575. US-CERT is tracking this issue as VU#162451.

    Impact

    A remote, unauthenticated attacker could cause the vulnerable device to reload. Repeated exploitation of this vulnerability could lead to a sustained denial of service condition.

    Solution

    Upgrade to fixed versions of IOS

    Cisco has published detailed information about upgrading affected Cisco IOS software to correct this vulnerability. System managers are encouraged to upgrade to one of the non-vulnerable releases. For additional information regarding availability of repaired releases, please refer to the "Software Versions and Fixes" section of the Cisco Security Advisory.

    Workarounds

    Cisco recommends a number of workarounds, including disabling SNMP processing on affected devices. For a complete list of workarounds, see the Cisco Security Advisory.

    Appendix A. Vendor Information

    This appendix contains information provided by vendors for this
    advisory. As vendors report new information to US-CERT, we will update
    this section and note the changes in our revision history. If a
    particular vendor is not listed below, we have not received their
    comments.

    Cisco Systems

    Please refer to Cisco Security Advisory: "Vulnerabilities in SNMP Message Processing".
    Cisco has published their advisory at the following location:



    US-CERT thanks Cisco Systems for notifying us about
    this problem.


    Feedback can be directed to the authors: Jeff Havrilla, Shawn Hernan, Damon Morda


    The latest version of this document can be found at: http://www.us-cert.gov/cas/techalerts/TA04-111B.html


    Copyright 2004 Carnegie Mellon University. Terms of use: http://www.us-cert.gov/legal.html

    Revision History

    • April 20, 2004: Initial release

    Last updated

    Vulnerabilities in TCP

    Systems Affected

    Systems that rely on persistent TCP connections, for example
    routers supporting BGP

    Overview

    Most implementations of the Border Gateway Protocol (BGP) rely on the
    Transmission Control Protocol (TCP) to maintain persistent
    unauthenticated network sessions. There is a vulnerability in TCP
    which allows remote attackers to terminate network sessions. Sustained
    exploitation of this vulnerability could lead to a denial of service
    condition; in the case of BGP systems, portions of the Internet
    community may be affected. Routing operations would recover quickly
    after such attacks ended.

    Description

    In 2001, the CERT Coordination Center released CA-2001-09,
    describing statistical weaknesses in various TCP/IP Initial Sequence
    generators. In that document, it was noted by Tim Newsham:
    [I]f a sequence number within the receive window is known,
    an attacker can inject data into the session stream or terminate the
    connection. If the ISN value is known and the number of bytes sent
    already sent is known, an attacker can send a simple packet to inject
    data or kill the session. If these values are not known exactly, but
    an attacker can guess a suitable range of values, he can send out a
    number of packets with different sequence numbers in the range until
    one is accepted. The attacker need not send a packet for every
    sequence number, but can send packets with sequence numbers a
    window-size apart. If the appropriate range of sequence numbers is
    covered, one of these packets will be accepted. The total number of
    packets that needs to be sent is then given by the range to be
    covered divided by the fraction of the window size that is used as an
    increment.

    Paul Watson has performed the statistical analysis of this attack when the
    ISN is not known and has pointed out that such an attack could be viable
    when specifically taking into account the TCP Window size. He has also
    created a proof-of-concept tool demonstrating the practicality of the
    attack. The National Infrastructure Security Co-Ordination Centre (NISCC)
    has published an advisory summarizing Paul Watson's analysis in NISCC Vulnerability Analysis 236929.

    Since TCP is an insecure protocol, it is possible to inject
    transport-layer packets into sessions between hosts given the right
    preconditions. The TCP/IP Initial Sequence
    Number vulnerability (VU#498440)
    referenced in CA-2001-09 is one
    example of how an attacker could inject TCP packets into a session. If
    an attacker were to send a Reset (RST) packet for example, they would
    cause the TCP session between two endpoints to terminate without any
    further communication.

    The Border Gateway Protocol (BGP) is used to exchange routing
    information for the Internet and is primarily used by Internet Service
    Providers (ISPs). For detailed information about BGP and some tips for
    securing it, please see Cisco
    System's documentation
    or Team
    Cymru
    . A vulnerable situation arises due to the fact that BGP relies on
    long-lived persistent TCP sessions with larger window sizes to
    function. When a BGP session is disrupted, the BGP application
    restarts and attempts to re-establish a connection to its peers. This
    may result in a brief loss of service until the fresh routing tables
    are created.

    In a TCP session, the endpoints can negotiate a TCP Window size. When
    this is taken into account, instead of attempting to send a spoofed
    packet with all potential sequence numbers, the attacker would only
    need to calculate a valid sequence number that falls within the next
    expected ISN plus or minus half the window size. Therefore, the larger
    the TCP Window size, the the larger the range of sequence numbers that
    will be accepted in the TCP stream. According to Paul Watson's report,
    with a typical xDSL data connection (80 Kbps, upstream) capable of
    sending of 250 packets per second (pps) to a session with a TCP Window
    size of 65,535 bytes, it would be possible to inject a TCP packet
    approximately every 5 minutes. It would take approximately 15 seconds
    with a T-1 (1.544 Mbps) connection. These numbers are significant when
    large numbers of compromised machines (often called "botnets" or
    "zombies") can be used to generate large amounts of packets that can
    be directed at a particular host.

    To protect against such injections, RFC 2385 provides a method of
    using MD5 signatures on the TCP Headers. If this form of verification
    is supported and enabled between two peers, then an attacker would
    have to obtain the key used to transmit the packet in order to
    successfully inject a packet into the TCP session. Another alternative
    would be to tunnel BGP over IPSec. Again, this would provide a form of
    authentication between the BGP peers and the data that they transmit.
    The lack of authentication when using TCP for BGP makes this type of
    attack more viable.

    US-CERT is tracking this issue as VU#415294. This
    reference number corresponds to CVE candidate CAN-2004-0230.

    NISCC is tracking this issue as Vulnerability Advisory 236929.

    Impact

    Sustained exploitation of the TCP injection vulnerability with regard to
    the BGP vulnerability could lead to a denial-of-service condition that
    could affect a large segment of the Internet community. Normal operations
    would most likely resume shortly after the attack stopped.

    Since the TCP/IP Initial
    Sequence Number vulnerability (VU#498440)
    has been proven more viable
    of an attack, any services or sites that rely on persistent TCP sessions
    could also be affected by this vulnerability. Impacts could range from
    data corruption or session hijacking to a denial-of-service condition.

    Solution

    Apply a patch from your vendor

    Please see your vendor's statement regarding the availability of
    patches, updates and mitigation strategies.

    Workaround

    Deploy and Use Cryptographically Secure Protocols

    TCP initial sequence numbers were not designed to provide proof against
    TCP connection attacks. The lack of cryptographically-strong security
    options for the TCP header itself is a deficiency that technologies like
    IPSec try to address. It must be
    noted that in the final analysis that if an attacker has the ability to
    see unencrypted TCP traffic generated from a site, that site is vulnerable
    to various TCP attacks - not just those mentioned here. A stronger measure
    that would aid in protecting against such TCP attacks is end-to-end
    cryptographic solutions like those outlined in various IPSec documents.

    The key idea with an
    end-to-end cryptographic solution is that there is some secure
    verification that a given packet belongs in a particular stream.
    However, the communications layer at which this cryptography is
    implemented will determine its effectiveness in repelling ISN based
    attacks. Solutions that operate above the Transport Layer (OSI Layer 4),
    such as SSL/TLS and SSH1/SSH2, only prevent arbitrary packets from being
    inserted into a session. They are unable to prevent a connection reset
    (denial of service) since the connection handling will be done by a lower
    level protocol (i.e., TCP). On the other hand, Network Layer (OSI Layer
    3) cryptographic solutions such as IPSec prevent both arbitrary packets
    entering a transport-layer stream and connection resets because connection
    management is directly integrated into the secure Network Layer security
    model.

    The solutions presented above have the desirable attribute of not
    requiring any changes to the TCP protocol or implementations to be made.
    Some sites may want to investigate hardening the TCP transport layer
    itself. RFC2385 ("Protection of
    BGP Sessions via the TCP MD5 Signature Option") and other technologies
    provide options for adding cryptographic protection within the TCP header
    at the cost of some potential denial of service, interoperability, and
    performance issues.

    Ingress filtering

    Ingress filtering manages
    the flow of traffic as it enters a network under your administrative
    control.

    You can configure your BGP routers to only accept packets on a specific
    network connection.

    Servers are typically the only machines that need to accept inbound
    connections from the public Internet.

    In the network usage policy of many sites, there are few reasons for
    external hosts to initiate inbound connections to machines that provide no
    public services.

    Thus, ingress filtering should be performed at the border to prohibit
    externally initiated inbound connections to non-authorized services.

    In this fashion, the effectiveness of many intruder scanning techniques
    can be dramatically reduced.

    Network Isolation

    Complex networks can benefit by separating data channels and control
    channels, such as BGP, into different logical or physical
    networks. Technologies such as VLANs, VPNs, leased links, and NAT may all
    be able to contribute to separating the tranmission of control
    information from the transmission of the data stream.

    Egress filtering

    Egress filtering manages the flow of traffic as it leaves a network
    under your administrative control.

    There is typically limited need for machines providing public services to
    initiate outbound connections to the Internet.

    In the case of BGP, only your BGP routers should be establishing
    connections to your peers. Other BGP traffic generated on your network
    could be a sign of an attempted attack.

    Appendix A. Vendor Information

    For vendor information, please see NISCC Vulnerability Advisory 236929
    or US-CERT Vulnerability Note VU#415294. As
    vendors report new information to US-CERT, we will update the
    vulnerability note. If a particular vendor is not listed in either
    the NISCC advisory, or the vulnerability, we recommend that you
    contact them for their comments.


    US-CERT thanks Paul Watson, Cisco Systems and NISCC for notifying us
    about this problem and for helping us to construct this advisory.


    Feedback can be directed to the US-CERT
    Technical Staff
    .


    Revision History

    April 20, 2004: Initial release

    September 9, 2005: Updated NISCC references

    Last updated

    CVS Heap Overflow Vulnerability

    Systems Affected

     
    Concurrent Versions System (CVS) versions prior to 1.11.16 CVS Features versions prior to 1.12.8
     

    Overview

     
    A heap overflow vulnerability in the Concurrent Versions System (CVS) could allow a remote attacker to execute arbitrary code on a vulnerable system.
     

    Description

     
    CVS is a source code maintenance system that is widely used by open-source software development projects. There is a heap memory overflow vulnerability in the way CVS handles the insertion of modified and unchanged flags within entry lines. When processing an entry line, an additional byte of memory is allocated to flag the entry as modified or unchanged. There is a failure to check if a byte has been previously allocated for the flag, which creates an off-by-one buffer overflow. By calling a vulnerable function several times and inserting specific characters into the entry lines, a remote attacker could overwrite multiple blocks of memory. In some environments, the CVS server process is started by the Internet services daemon (inetd) and may run with root privileges. An authenticated client could exploit this vulnerability to execute arbitrary code, execute commands, modify sensitive information, or cause a denial of service. Note that if a CVS server is configured to permit anonymous read-only access, then this provides sufficient access to exploit a vulnerable server, as anonymous users are authenticated through the cvspserver process.

    US-CERT is tracking this issue as VU#192038. This reference number corresponds to CVE candidate CAN-2004-0396.

    Impact

    An authenticated client could exploit this vulnerability to execute arbitrary code on the vulnerable system with the privileges of the CVS server process. It is possible for an anonymous user with read-only access to exploit a vulnerable server as they are authenticated through the cvspserver process.

    In addition to compromising the system running CVS, there is a significant secondary impact in that source code maintained in CVS repositories could be modified to include Trojan horses, backdoors, or other malicious code.

    Solution

    Apply Patch or Upgrade

    Apply the appropriate patch or upgrade as specified by your vendor. For vendor specific responses, please see your vendor's website or Vulnerability Note VU#192038.

     

    This issue has been resolved in Stable CVS Version 1.11.16 and CVS Feature Version 1.12.8.

    Disable CVS Server
     

    Until a patch or upgrade can be applied, consider disabling the CVS server.
     

     

    Block or Restrict Access
     

    Block or restrict access to the CVS server from untrusted hosts and networks. The CVS server typically listens on 2401/tcp, but may use another port or protocol.

    Limit CVS Server Privileges

    Configure CVS server to run in a restricted (chroot) environment.
  • Run CVS servers with the minimum set of privileges required on the host file system.
  • Provide separate systems for development (write) and public/anonymous (read-only) CVS access.
  • Host public/anonymous CVS servers on single-purpose, secured systems.
  • Note that some of these workarounds will only limit the scope and impact of possible attacks. Note also that anonymous (read-only) access is sufficent to exploit this vulnerability.

     


     

    Appendix B. References

    • http://security.e-matters.de/advisories/072004.html
       
    • http://secunia.com/advisories/11641/
       
    • http://www.securitytracker.com/alerts/2004/May/1010208.html
       
    • http://www.netsys.com/library/papers/chrooted-ssh-cvs-server.txt


     


    US-CERT thanks Stefan Esser of e-matters for reporting this problem and for information used to construct this advisory.


    Feedback can be directed to the authors: Jason A. Rafail and Damon Morda


    Revision History

    • May 26, 2004: Initial release
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    SQL Injection Vulnerabilities in Oracle E-Business Suite

    Systems Affected

    Oracle Applications 11.0 (all releases) Oracle E-Business Suite 11i, 11.5.1 through 11.5.8

    Overview

    A vulnerability in the Oracle's E-Business Suite allows a remote
    attacker to execute arbitrary script on a vulnerable database system.
    Exploitation may lead to compromise of the database application, data
    integrity, or underlying operating system.

    Description

    Oracle E-Business Suite is a set of applications and modules that
    enables an organization to manage customer interactions, deliver services,
    manufacture products, ship orders, collect payments, and other tasks using
    a single database model. According to the Oracle
    Security Alert 67
    , Oracle Applications 11.0 (all releases) and Oracle
    E-Business Suite Release 11i, 11.5.1 through 11.5.8 are vulnerable to SQL
    injection vulnerabilities. Oracle E-Business Suite Release 11.5.9 and
    later are not vulnerable. This vulnerability is not platform specific.
    Integrigy Corporation has also released an alert
    about these vulnerabilities.

    Note that no authentication mechanisms of Oracle E-Business Suite will
    mitigate exploitation of the attack.

    US-CERT is tracking this issue as VU#961579.

    Impact

    An unauthenticated attacker could exploit this vulnerability to execute
    arbitrary SQL statements on the vulnerable system with the privileges of
    the Oracle server process. In addition to compromising the integrity of
    the database information, this may lead to the compromise of the database
    application and the underlying operating system.

    Solution

    Apply Patch or Upgrade

    According to the Oracle Security
    Alert 67
    , patches and related information are available from:

    http://metalink.oracle.com/metalink/plsql/ml2_documents.showDocument?p_database_id=NOT&p_id=274375.1

    Note that the above link requires registration to Oracle Metalink. To
    register for support, please visit:

    http://metalink.oracle.com/register/pls/registration.step_1


    Appendix B. References

    http://otn.oracle.com/deploy/security/pdf/2004alert67.pdf
  • http://www.integrigy.com/alerts/OraAppsSQLInjection.htm
  • http://www.kb.cert.org/vuls/id/961579


  • US-CERT thanks Stephen Kost of Integrigy Corporation for reporting this
    problem and for information used to construct this advisory.


    Feedback can be directed to the author: Jason
    A. Rafail


    Revision History

    • June 8, 2004: Initial release

      June 9, 2004: Added Oracle support registration link

    Last updated

    Cross-Domain Redirect Vulnerability in Internet Explorer

    Systems Affected

     
    Microsoft Windows systems
     

    Overview

     
    A cross-domain vulnerability in Internet Explorer (IE) could allow an attacker to execute arbitrary code with the privileges of the user running IE.
     

    Description

     
    There is a cross-domain vulnerability in the way IE determines the security zone of a browser frame that is opened in one domain then redirected by a web server to a different domain. A complex set of conditions is involved, including a delayed HTTP response (3xx status code) to change the content of the frame to the new domain. Vulnerability Note VU#713878 describes this vulnerability in more technical detail and will be updated as further information becomes available. Other programs that host the WebBrowser ActiveX control or use the MSHTML rendering engine, such as Outlook and Outlook Express, may also be affected.

    This issue has been assigned CVE CAN-2004-0549.

    Impact

    By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.

    Publicly available exploit code exists for this vulnerability, and US-CERT has monitored incident reports that indicate that this vulnerability is being actively exploited.


    Solution

    Apply a patch

     

    Microsoft has released a cumulative patch (867801) in Security Bulletin MS04-025 which addresses this issue.

    Workarounds

    Disable Active scripting and ActiveX controls

    Disabling Active scripting and ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Disabling Active scripting and ActiveX controls in the Local Machine Zone will prevent widely used payload delivery techniques from functioning. Instructions for disabling Active scripting in the Internet Zone can be found in the Malicious Web Scripts FAQ. See Microsoft Knowledge Base Article 833633 for information about securing the Local Machine Zone. Also, Service Pack 2 for Windows XP (currently at RC1) includes these and other security enhancements for IE.
     

    Do not follow unsolicited links

    Do not click on unsolicited URLs received in email, instant messages, web forums, or internet relay chat (IRC) channels. While this is generally good security practice, following this behavior will not prevent exploitation of this vulnerability in all cases.

    Maintain updated anti-virus software

    Anti-virus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely solely on anti-virus software to defend against this vulnerability. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.


     

    Appendix B. References

    Microsoft Security Bulletin MS04-025 - <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx> Vulnerability Note VU#713878 - <http://www.kb.cert.org/vuls/id/713878>
  • US-CERT Technical Cyber Security Alert TA04-212A - <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
  • Malicious Web Scripts FAQ - <http://www.cert.org/tech_tips/malicious_code_FAQ.html#steps>
  • Computer Virus Resources - <http://www.us-cert.gov/reading_room/virus.html>
  • CVE CAN-2004-0549 - <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0549>
  • Microsoft Knowledge Base Article 833633 - <http://support.microsoft.com/default.aspx?scid=833633>
  • Windows XP Service Pack 2 RC1 - <http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx>
  • Increase Your Browsing and E-Mail Safety - <http://www.microsoft.com/security/incident/settings.mspx>
  • Working with Internet Explorer 6 Security Settings - <http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx>

  •  


    Public incidents related to this vulnerability were reported by Rafel Ivgi. Thanks to Jelmer for further research and analysis.


    Feedback can be directed to the author: Art Manion.


    Revision History

    • June 11, 2004: Initial release
      July 30, 2004: Added links to MS04-025
      December 3, 2004: Added reference to TA04-212A
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Cross-Domain Vulnerability in Internet Explorer

    Systems Affected

     
    Microsoft Windows systems
     

    Overview

     
    Microsoft Internet Explorer (IE) contains a flaw that could allow attackers to run programs of their choice on your computer.
     

    Description

     
    Microsoft IE uses a cross-domain security model to separate content from different sources. A flaw in the model makes IE vulnerable to a cross-domain violation. Attackers could exploit this flaw to execute programs on your computer.

    Resolution

    Apply a patch

    Micrososft has released a patch to resolve this issue. It is available from Microsoft Windows Update or Microsoft Security Bulletin MS04-025.

    Disable Active scripting and ActiveX controls

    Instructions for disabling Active scripting and ActiveX controls in the Internet Zone can be found in the Malicious Web Scripts FAQ.

    Do not follow unsolicited links

    Do not click on unsolicited URLs received in email, instant messages, web forums, or internet relay chat (IRC) channels.

    Run and maintain an antivirus product

    It is important that you use antivirus software and keep it up to date. Most antivirus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many antivirus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.

    References

    US-CERT Technical Alert TA04-163A - <http://www.us-cert.gov/cas/techalerts/TA04-163A.html> Vulnerability Note VU#713878 - <http://www.kb.cert.org/vuls/id/713878>
  • Microsoft Windows Update - <http://windowsupdate.microsoft.com/>
  • Microsoft Security Bulletin MS04-025 - <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
  • Malicious Web Scripts FAQ - <http://www.cert.org/tech_tips/malicious_code_FAQ.html>
  • Protect Your PC - <http://www.microsoft.com/security/protect/default.asp>
  • Increase Your Browsing and E-Mail Safety - <http://www.microsoft.com/security/incident/settings.mspx>
  • Author: Michael Durkota

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • June 11, 2004: Initial release
      July 30, 2004: Added patch information and links to MS04-025
       

    Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in ISC DHCP 3

    Systems Affected

    ISC DHCP versions 3.0.1rc12 and 3.0.1rc13

    Overview

    Two vulnerabilities in the ISC DHCP allow a remote attacker to cause a
    denial of the DHCP service on a vulnerable system. It may be possible to
    exploit these vulnerabilities to execute arbitrary code on the system.

    Description

    As described in RFC
    2131
    , "the Dynamic Host Configuration Protocol (DHCP) provides a
    framework for passing configuration information to hosts on a TCP/IP
    network." The Internet Systems Consortium's (ISC) Dynamic Host
    Configuration Protocol (DHCP) 3 application contains two vulnerabilities
    that present several potential buffer overflow conditions. VU#317350 discusses
    a buffer overflow vulnerability in the temporary storage of log lines.
    In transactions, ISC DHCPD logs every DHCP packet along with several
    pieces of descriptive information. The client's DISCOVER and the
    resulting OFFER, REQUEST, ACK, and NAKs are all logged. In all of these
    messages, if the client supplied a hostname, then it is also included
    in the logged line. As part of the DHCP datagram format, a client may
    specify multiple hostname options, up to 255 bytes per option. These
    options are concatenated by the server. If the hostname and options
    contain only ASCII characters, then the string will pass non-ASCII
    character filters and be temporarily stored in 1024 byte fixed-length
    buffers on the stack. If a client supplies enough hostname options, it
    is possible to overflow the fixed-length buffer.

    VU#654390 discusses C
    include files for systems that do not support the bounds checking
    vsnprintf() function. These files define the bounds checking vsnprintf()
    to the non-bounds checking vsprintf() function. Since vsprintf() is a
    function that does not check bounds, the size is discarded, creating the
    potential for a buffer overflow when client data is supplied. Note that
    the vsnprintf() statements are defined after the vulnerable code that is
    discussed in VU#317350. Since the preconditions for this vulnerability
    are similar to those required to exploit VU#317350, these buffer overflow
    conditions occur sequentially in the code after the buffer overflow
    vulnerability discussed in VU#317350, and these issues were discovered and
    resolved at the same time, there is no known exploit path to exploit these
    buffer overflow conditions caused by VU#654390. Note that VU#654390 was
    discovered and exploitable once VU#317350 was resolved.

    For both of the vulnerabilities, only ISC DHCP 3.0.1rc12 and ISC DHCP
    3.0.1rc13 are believed to be vulnerable. VU#317350 is exploitable for all
    operating systems and configurations. VU#654390 is only defined for the
    following operating systems: AIX AlphaOS

  • Cygwin32
  • HP-UX
  • Irix
  • Linux
  • NextStep
  • SCO
  • SunOS 4
  • SunOS 5.5
  • Ultrix
  • All versions of ISC DCHP 3, including all snapshots, betas, and release
    candidates, contain the flawed code. However, versions other than ISC DHCP
    3.0.1rc12 and ISC DHCP 3.0.1rc13 discard all but the last hostname option
    provided by the client, so it is not believed that these versions are
    exploitable.

    US-CERT is tracking these issues as VU#317350, which has been
    assigned CVE CAN-2004-0460,
    and VU#654390, which
    has been assigned CVE CAN-2004-0461.

    Impact

    Exploitation of these vulnerabilities may cause a denial-of-service
    condition to the DHCP daemon (DHCPD) and may permit a remote attacker to
    execute arbitrary code on the system with the privileges of the DHCPD
    process, typically root.

    Solution

    Apply patches or upgrade

    These issues have been resolved in ISC DHCP 3.0.1rc14.
    Your vendor may provide specific patches or updates. For vendor-specific
    information, please see your vendor's site, or look for your
    vendor infomation in VU#317350 and VU#654390. As
    vendors report new information to US-CERT, we will update the
    vulnerability notes.


    Appendix A. References



    US-CERT thanks Gregory Duchemin and Solar Designer for
    discovering, reporting, and resolving this vulnerability. Thanks also to
    David Hankins of ISC for notifying us of this vulnerability and the
    technical information provided to create this document.


    Feedback can be directed to the author: Jason
    A. Rafail


    Revision History

    • June 22, 2004: Initial release

    Last updated

    Important Internet Explorer Update Available

    Systems Affected

     
    Systems running Internet Explorer and Microsoft Windows
     

    Overview

     
    Microsoft has released an important security update for Internet Explorer (IE). This update greatly reduces the impact of attacks against several vulnerabilities in IE.
     

    Description

     
    Several vulnerabilities in IE could allow a malicious web site or HTML email message to install software on your computer. This software could be used to steal sensitive financial information or perform other actions. Recent incident activity has been referred to as Download.Ject, JS.Scob.Trojan, Scob, and JS.Toofeer.

    Microsoft has released a security update for IE that provides increased protection against this type of attack. Note that this update may not prevent attacks in all cases.

    Resolution

    Install Critical Update

    US-CERT recommends that users install the update from the Microsoft Download Center (KB870669) or the Windows Update web site.

    Increase IE Security Settings

    In addition, US-CERT strongly recommends that users modify IE security settings according to the instructions in the Malicious Web Scripts FAQ.

    Further information is available from Microsoft in What You Should Know About Download.Ject.

    References

    US-CERT Technical Alert TA04-184A - <http://www.us-cert.gov/cas/techalerts/TA04-184A.html> US-CERT Technical Alert TA04-163A - <http://www.us-cert.gov/cas/techalerts/TA04-163A.html> US-CERT Vulnerability Note VU#713878 - <http://www.kb.cert.org/vuls/id/713878>
  • Malicious Web Scripts FAQ - <http://www.cert.org/tech_tips/malicious_code_FAQ.html>
  • What You Should Know About Download.Ject - <http://www.microsoft.com/security/incident/download_ject.mspx>
  • Increase Your Browsing and E-Mail Safety - <http://www.microsoft.com/security/incident/settings.mspx>
  • Working with Internet Explorer 6 Security Settings - <http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx>
  • Author: Art Manion

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

  • July 2, 2004: Initial release
     
  • Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Internet Explorer Update to Disable ADODB.Stream ActiveX Control

    Systems Affected

     
    Microsoft Windows systems
     

    Overview

     
    Microsoft has released a security update for Internet Explorer (IE) that disables the ADODB.Stream ActiveX control. This update reduces the impact of attacks against cross-domain vulnerabilities in IE.
     

    Description

     
    A class of vulnerabilities in IE allows malicious script from one domain to execute in a different domain which may also be in a different IE security zone. Attackers typically seek to execute script in the security context of the Local Machine Zone (LMZ). One such vulnerability (VU#713878) is described in US-CERT Technical Alert TA04-163A. Other cross-domain vulnerabilities have similar impacts. After obtaining access to the LMZ through one or more of the vulnerabilities noted above, attackers typically attempt to download and run an executable file. Writing the executable to disk can be accomplished using the ADODB.Stream ActiveX control. In order to defeat this technique, Microsoft has released an update that disables the ADODB.Stream control. From Microsoft Knowledge Base Article 870669:

    An ADO stream object contains methods for reading and writing binary files and text files. When an ADO stream object is combined with known security vulnerabilities in Internet Explorer, a Web site could execute scripts from the Local Machine zone. To help protect your computer from this kind of attack, you can manually modify your registry. 

     

    It is important to note that there may be other ways for an attacker to write arbitrary data or to execute commands without relying on the ADODB.Stream control.

    Further information is available from Microsoft in What You Should Know About Download.Ject. Instructions for securing IE and other web browsers against malicious web scripts are available in the Malicious Web Scripts FAQ.

    Impact

    By convincing a victim to view an HTML document (web page, HTML email), an attacker could execute script in a different security domain than the one containing the attacker's document. By causing script to be run in the Local Machine Zone, the attacker could execute arbitrary code with the privileges of the user running IE.

    Recent incident activity known as Download.Ject (also JS.Scob.Trojan, Scob, JS.Toofeer) uses cross-domain vulnerabilities and the ADODB.Stream control to install software that steals sensitive financial information.

    Solution

    Until a complete solution is available from Microsoft, consider the following workarounds.

    Disable Active scripting and ActiveX controls

    Disabling Active scripting and ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Disabling Active scripting and ActiveX controls in the Local Machine Zone will prevent widely used payload delivery techniques from functioning. Instructions for disabling Active scripting in the Internet Zone can be found in the Malicious Web Scripts FAQ. See Microsoft Knowledge Base Article 833633 for information about securing the Local Machine Zone. Also, Service Pack 2 for Windows XP (currently at RC2) includes these and other security enhancements for IE.
     

    Do not follow unsolicited links

    Do not click on unsolicited URLs received in email, instant messages, web forums, or Internet relay chat (IRC) channels. While this is generally good security practice, following this behavior will not prevent exploitation of this vulnerability in all cases. For example, a trusted web site could be compromised and modified to deliver exploit script to unsuspecting clients.

    Disable ADODB.Stream ActiveX control

    One way to disable the ADODB.Stream control is to apply the update from the Microsoft Download Center (KB870669) or the Windows Update web site.

    The ADODB.Stream control can also be disabled by modifying the Windows registry as described in Microsoft Knowledge Base Article 870669.

    Both of these methods disable ADODB.Stream by setting the kill bit for the control in the Windows registry.

    Note that disabling the ADODB.Stream control does not directly address any cross-domain vulnerabilities, nor does it prevent attacks. This workaround prevents a well-known and widely used technique for writing arbitrary data to disk after a cross-domain vulnerability has been exploited. There may be other ways for an attacker to write arbitrary data or execute commands.

    Maintain updated anti-virus software

    Anti-virus software with updated virus definitions may identify and prevent some exploit attempts. Variations of exploits or attack vectors may not be detected. Do not rely solely on anti-virus software to defend against this vulnerability. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.

    Appendix A. Vendor Information

    Microsoft Corporation

    Please see What You Should Know About Download.Ject and Microsoft Knowledge Base Article 870669.


     

    Appendix B. References

    US-CERT Technical Alert TA04-163A - http://www.us-cert.gov/cas/techalerts/TA04-163A.html US-CERT Vulnerability Note VU#713878 - http://www.kb.cert.org/vuls/id/713878
  • Malicious Web Scripts FAQ - http://www.cert.org/tech_tips/malicious_code_FAQ.html
  • Results of the Security in ActiveX Workshop (PDF) http://www.cert.org/reports/activeX_report.pdf
  • What You Should Know About Download.Ject - http://www.microsoft.com/security/incident/download_ject.mspx
  • Increase Your Browsing and E-Mail Safety - http://www.microsoft.com/security/incident/settings.mspx
  • Working with Internet Explorer 6 Security Settings - http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx
  • Microsoft Knowledge Base Article 870669 - http://support.microsoft.com/default.aspx?kbid=870669
  • Microsoft Knowledge Base Article 833633 - http://support.microsoft.com/default.aspx?kbid=833633
  • Microsoft Knowledge Base Article 182569 - http://support.microsoft.com/default.aspx?kbid=182569
  • Microsoft Knowledge Base Article 240797 - http://support.microsoft.com/default.aspx?kbid=240797
  • Windows XP Service Pack 2 Release Candidate 2 Preview - http://www.microsoft.com/technet/prodtechnol/winxppro/sp2preview.mspx

  •  

    Feedback can be directed to the author: Art Manion


    Revision History

    • July 2, 2004: Initial release
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express

    Systems Affected

     
    Microsoft Windows Systems
     

    Overview

     
    Microsoft has released a Security Bulletin Summary for July, 2004. There are several security bulletins released in this summary.
     
     

    Description

     

    I. Description

    Microsoft's Security Bulletin Summary for July, 2004 includes summaries of several bulletins that address vulnerabilities in various Windows applications and components. For more technical information, see US-CERT Technical Alert TA04-196A.

    II. Impact

    An attacker may be able to control your computer if these vulnerabilities are exploited.

    III. Solution

    Apply a patch

    Microsoft has provided the patches for these vulnerabilities in the Security Bulletins and on Windows Update.

    Do not follow unsolicited links

    Do not click on unsolicited links received in email, instant messages, web forums, or chat rooms. While this is generally a good security practice, following this behavior will not prevent the exploitation of these vulnerabilities in all cases.

    Maintain updated anti-virus software

    Anti-virus software with updated virus definitions may identify and prevent some exploit attempts. Update your anti-virus software. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.

    Appendix A. Vendor Information

    Specific information about the Security bulletins are available in the Security Bulletin Summary for July, 2004 and the US-CERT Vulnerability Notes for these issues. 
     

    Appendix B. References

    Microsoft's Security Bulletin Summary for July, 2004 - <http://www.microsoft.com/security/bulletins/200407_windows.mspx> US-CERT Technical Cyber Security Alert TA04-196A - <http://www.us-cert.gov/cas/techalerts/TA04-196A.html>
  • US-CERT Vulnerability Note VU#106324 - <http://www.kb.cert.org/vuls/id/106324>
  • US-CERT Vulnerability Note VU#187196 - <http://www.kb.cert.org/vuls/id/187196>
  • US-CERT Vulnerability Note VU#920060 - <http://www.kb.cert.org/vuls/id/920060>
  • US-CERT Vulnerability Note VU#228028 - <http://www.kb.cert.org/vuls/id/228028>
  • US-CERT Vulnerability Note VU#717748 - <http://www.kb.cert.org/vuls/id/717748>
  • US-CERT Vulnerability Note VU#647436 - <http://www.kb.cert.org/vuls/id/647436>
  • US-CERT Vulnerability Note VU#868580 - <http://www.kb.cert.org/vuls/id/868580>
  • US-CERT Vulnerability Note VU#869640 - <http://www.kb.cert.org/vuls/id/869640>
  • Increase Your Browsing and E-Mail Safety - <http://www.microsoft.com/security/incident/settings.mspx>
  • Working with Internet Explorer 6 Security Settings - <http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx>

  •  

    This alert was created by Jason A. Rafail. Feedback can be directed to the Vulnerability Note authors: Jason A. Rafail, Jeffrey P. Lanza, Chad R. Dougherty, Damon G. Morda, and Art Manion.

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • July 14, 2004: Initial release
       

    Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Microsoft Windows Components and Outlook Express

    Systems Affected

     
    Microsoft Windows Systems
     

    Overview

     
    Microsoft has released a Security Bulletin Summary for July, 2004. This summary includes several bulletins that address vulnerabilities in various Windows applications and components. Exploitation of some vulnerabilities can result in the remote execution of arbitrary code by a remote attacker. Details of the vulnerabilities and their impacts are provided below.
     
     

    Description

     
    The table below provides a reference between Microsoft's Security Bulletins and the related US-CERT Vulnerability Notes. More information related to the vulnerabilities is available in these documents.
    Microsoft Security Bulletin Related US-CERT Vulnerability Note(s)
    MS04-024: Vulnerability in Windows Shell Could Allow Remote Code Execution (839645) VU#106324 Microsoft Windows contains a vulnerability in the way the Windows Shell launches applications
    MS04-023: Vulnerability in HTML Help Could Allow Code Execution (840315) VU#187196 Microsoft Windows fails to properly process showHelp URLs 
    VU#920060 Microsoft Windows HTML Help component fails to properly validate input data
    MS04-022: Vulnerability in Task Scheduler Could Allow Code Execution (841873) VU#228028 Microsoft Windows Task Scheduler Buffer Overflow
    MS04-021: Security Update for IIS 4.0 (841373) VU#717748 Microsoft Internet Information Server (IIS) 4.0 contains a buffer overflow in the redirect function
    MS04-020: Vulnerability in POSIX Could Allow Code Execution (841872) VU#647436 Microsoft Windows contains a buffer overflow in the POSIX subsystem
    MS04-019: Vulnerability in Utility Manager Could Allow Code Execution (842526) VU#868580 Microsoft Windows Utility Manager launches applications with system privileges
    MS04-018: Cumulative Security Update for Outlook Express (823353) VU#869640 Microsoft Outlook Express fails to properly validate malformed e-mail headers

    Impact

    A remote, unauthenticated attacker may exploit VU#717748 to execute arbitrary code on an IIS 4.0 system.

    Exploitation of VU#106324, VU#187196, VU#920060, and VU#228028, would permit a remote attacker to execute arbitrary code with the privileges of the current user. The attacker would have to convince a victim to view an HTML document (web page, HTML email) or click on a crafted URI link.

    Vulnerabilities described in VU#647436 and VU#868580 permit a local user to gain elevated privileges on the local system.

    Exploitation of VU#869640 can lead to a denial-of-service condition against Outlook Express.

    Solution

    Apply a patch

    Microsoft has provided the patches for these vulnerabilities in the Security Bulletins and on Windows Update.

    Do not follow unsolicited links

    It is generally a good practice not to click on unsolicited URLs received in email, instant messages, web forums, or Internet relay chat (IRC) channels. However, this practice does not always prevent exploitation of these types vulnerabilities. For example, a trusted web site could be compromised and modified to deliver exploit script to unsuspecting clients.

    Maintain updated anti-virus software

    Anti-virus software with updated virus definitions may identify and prevent some exploit attempts, but variations of exploits or attack vectors may not be detected. Do not rely solely on anti-virus software to defend against these vulnerabilities. More information about viruses and anti-virus vendors is available on the US-CERT Computer Virus Resources page.


    Appendix A. Vendor Information

    Specific information about these issue are available in the Security Bulletin Summary for July, 2004 and the US-CERT Vulnerability Notes. 
     

    Appendix B. References

    Microsoft's Security Bulletin Summary for July, 2004 - http://www.microsoft.com/technet/security/bulletin/ms04-jul.mspx US-CERT Vulnerability Note VU#106324 - http://www.kb.cert.org/vuls/id/106324
  • US-CERT Vulnerability Note VU#187196 - http://www.kb.cert.org/vuls/id/187196
  • US-CERT Vulnerability Note VU#920060 - http://www.kb.cert.org/vuls/id/920060
  • US-CERT Vulnerability Note VU#228028 - http://www.kb.cert.org/vuls/id/228028
  • US-CERT Vulnerability Note VU#717748 - http://www.kb.cert.org/vuls/id/717748
  • US-CERT Vulnerability Note VU#647436 - http://www.kb.cert.org/vuls/id/647436
  • US-CERT Vulnerability Note VU#868580 - http://www.kb.cert.org/vuls/id/868580
  • US-CERT Vulnerability Note VU#869640 - http://www.kb.cert.org/vuls/id/869640
  • Increase Your Browsing and E-Mail Safety - http://www.microsoft.com/security/incident/settings.mspx
  • Working with Internet Explorer 6 Security Settings - http://www.microsoft.com/windows/ie/using/howto/security/settings.mspx

  •  


    This alert was created by Jason A. Rafail. Feedback can be directed to the Vulnerability Note authors: Jason A. Rafail, Jeffrey P. Lanza, Chad R. Dougherty, Damon G. Morda, and Art Manion.


    Revision History

    • July 14, 2004: Initial release
       

      Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    New Variant of MyDoom Virus

    Systems Affected

     
    Microsoft Windows Systems
     

    Overview

     
    A new variant of the MyDoom virus is spreading through email. In addition to infecting your computer and emailing itself to other machines, the virus may open a backdoor that could make your machine vulnerable to future attacks.

    Solution

    Avoid opening email attachments

    Be sure you know the source of an attachment before opening it. Also remember that it is not enough that the mail originated from an email address you recognize. Many viruses spread precisely because they originate from a familiar email address.

    Maintain updated anti-virus software

    It is important that you use antivirus software and keep it up to date. Most antivirus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many antivirus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.

     

    Description

     

    This variant of MyDoom (known as MyDoom.M or MyDoom.O) is significant because it seems to be conducting searches on addresses it harvests from infected computers. Therefore, not only is email activity affected, response times in many popular search engines may be dramatically slower.


     

    References

    MyDoom.B Virus - <http://www.us-cert.gov/cas/alerts/SA04-028A.html> US-CERT Computer Virus Resources - <http://www.us-cert.gov/other_sources/viruses.html>
  • Understanding Anti-Virus Software - <http://www.us-cert.gov/cas/tips/ST04-005.html>
  • Using Caution with Email Attachments - <http://www.us-cert.gov/cas/tips/ST04-010.html>
  • Home Network Security - <http://www.cert.org/tech_tips/home_networks.html>
  • Home Computer Security - <http://www.cert.org/homeusers/HomeComputerSecurity/

  •  

    Author: Mindi McDowell. Feedback can be directed to US-CERT -->.

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • July 26, 2004: Initial release
       

    Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Multiple Vulnerabilities in Systems Running Microsoft Windows

    Systems Affected

     
    Microsoft Windows systems; specifically, some versions of the following programs: Microsoft Windows NT Microsoft Windows 2000
  • Microsoft Windows XP
  • Microsoft Windows Server 2003
  • Microsoft Windows 98
  • Microsoft Windows Millennium Edition
  • Microsoft Internet Explorer 5
  • Microsoft Internet Explorer 6
  •  

    Overview

     
    Microsoft has reported two vulnerabilities in the way Internet Explorer processes certain types of images. Attackers may be able to gain control of your machine if you view a malicious image, visit a web page, or open an email message that contains these images. Microsoft has also published an update to address the cross-domain vulnerability discussed in SA04-163A. This vulnerability may allow an attacker to alter a web site to point to a different location. If the attacker can convince you to visit the site, they may be able to gain control of your machine.

    Solution

    Apply a patch

    Microsoft has issued updates that resolve this problem. Obtain the appropriate update from Windows Update

    Use caution with email attachments

    Never open unexpected email attachments. Before opening an attachment, save it to a disk and scan it with anti-virus software. Make sure to turn off the option to automatically download attachments.

    View email messages in plain text

    Email programs like Outlook and Outlook Express interpret HTML code the same way that Internet Explorer does. Attackers may be able to take advantage of that by sending malicious HTML-formatted email messages.

    Maintain updated anti-virus software

    It is important that you use anti-virus software and keep it up to date. Most anti-virus software vendors frequently release updated information, tools, or virus databases to help detect and recover from virus infections. Many anti-virus packages support automatic updates of virus definitions. US-CERT recommends using these automatic updates when possible.

     

    Description

     

    In Microsoft Security Bulletin MS04-025, Microsoft describes a critical vulnerability in the way Internet Explorer processes .GIF and .BMP images. An attacker can use malicious images on a web page or in HTML-formatted email messages. If the attacker can convince a user to visit the web page, open the message, or otherwise view the image, the attacker may be able to gain control of the user's machine.

    There is also a vulnerability in the way Internet Explorer processes scripts. An attacker may be able to take advantage of frames to redirect users to a malicious web site.

    More technical information about this issue is available in TA04-212A and Microsoft Security Bulletin MS04-025.


     

    References

    • Windows Security Updates for July 2004 - <http://www.microsoft.com/security/bulletins/200407_windows.mspx>
    • Multiple Remote Code Execution Vulnerabilities in Microsoft Internet Explorer - <http://www.us-cert.gov/cas/techalerts/TA04-212A.html>
    • Microsoft Security Bulletin MS04-025 - <http://www.microsoft.com/technet/security/bulletin/MS04-025.mspx>
    • US-CERT Computer Virus Resources - <http://www.us-cert.gov/other_sources/viruses.html>
    • Understanding Anti-Virus Software - <http://www.us-cert.gov/cas/tips/ST04-005.html>
    • Using Caution with Email Attachments - <http://www.us-cert.gov/cas/tips/ST04-010.html>
    • Home Network Security - <http://www.cert.org/tech_tips/home_networks.html>
    • Home Computer Security - <http://www.cert.org/homeusers/HomeComputerSecurity/


     

    Author: Mindi McDowell. Feedback can be directed to the US-CERT Technical Staff.

    Copyright 2004 Carnegie Mellon University. Terms of use

    Revision History

    • July 30, 2004: Initial release
       

    Last updated 


    Alerts ~Created Tue Feb 3 01:24:38 2026

    Critical Vulnerabilities in Microsoft Windows

    Systems Affected

    These vulnerabilities affect the following versions of Microsoft
    Internet Explorer: Microsoft Internet Explorer 5.01 Service Pack 2 Microsoft Internet Explorer 5.01 Service Pack 3 Microsoft Internet Explorer 5.01 Service Pack 4
  • Microsoft Internet Explorer 5.5 Service Pack 2
  • Microsoft Internet Explorer 6
  • Microsoft Internet Explorer 6 Service Pack 1
  • Microsoft Internet Explorer 6 Service Pack 1 (64-Bit Edition)
  • Microsoft Internet Explorer 6 for Windows Server 2003
  • Microsoft Internet Explorer 6 for Windows Server 2003 (64-Bit Edition)
  • These vulnerabilities affect the following versions of the
    Microsoft Windows operating system:
  • Microsoft Windows NT Workstation 4.0 Service Pack 6a
  • Microsoft Windows NT Server 4.0 Service Pack 6a
  • Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
  • Microsoft Windows 2000 Service Pack 2, Microsoft Windows 2000 Service Pack 3, Microsoft Windows 2000 Service Pack 4
  • Microsoft Windows XP and Microsoft Windows XP Service Pack 1
  • Microsoft Windows XP 64-Bit Edition Service Pack 1
  • Microsoft Windows XP 64-Bit Edition Version 2003
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2003 64-Bit Edition
  • Microsoft Windows 98, Microsoft Windows 98 Second Edition (SE), and Microsoft Windows Millennium Edition (Me)
  • Please note that these vulnerabilities my affect any software that
    uses the Microsoft Windows operating system to render HTML or
    graphics.

    Overview

    Microsoft Internet Explorer contains three vulnerabilities that may
    allow arbitrary code to be executed. The privileges gained by a remote
    attacker depend on the software component being attacked. For example,
    a user browsing to an unsafe web page using Internet Explorer could
    have code executed with the same privilege as the user. These
    vulnerabilities have been reported to be relatively straightforward to
    exploit; even vigilant users visiting a malicious website, viewing a
    malformed image, or reading an HTML-rendered email message may be
    affected.

    Description

    Microsoft Security Bulletin MS04-025
    describes three vulnerabilities in Internet Explorer; more detailed
    information is available in the individual vulnerability
    notes
    . Note that in addition to Internet Explorer, any applications
    that use the Internet Explorer HTML rendering engine to interpret HTML
    documents may present additional attack vectors for these
    vulnerabilities.

    VU#266926 -
    Microsoft Internet Explorer contains an integer overflow in the processing
    of bitmap files

    An integer overflow vulnerability has been discovered in the way that
    Internet Explorer processes bitmap image files. This vulnerability could
    allow a remote attacker to execute arbitrary code on a vulnerable system
    by introducing a specially crafted bitmap file.

    (Other resources: CAN-2004-0566)

    VU#685364 -
    Microsoft Internet Explorer contains a double-free vulnerability in the
    processing of GIF files

    A double-free vulnerability has been discovered in the way that
    Internet Explorer processes GIF image files. When processing GIF image
    files, the routine responsible for freeing memory may attempt to free the
    same memory reference more than once. Deallocating the already freed
    memory can lead to memory corruption, which could cause a
    denial-of-service condition or potentially be leveraged by an attacker to
    execute arbitrary code.

    (Other resources: CAN-2003-1048)

    VU#713878 -
    Microsoft Internet Explorer does not properly validate source of
    redirected frame Microsoft Internet Explorer does not properly display
    URLs

    As previously discussed in TA-163A,
    Microsoft Internet Explorer does not adequately validate the security
    context of a frame that has been redirected by a web server. An
    attacker could exploit this vulnerability to evaluate script in
    different security domains. By causing script to be evaluated in the
    Local Machine Zone, the attacker could execute arbitrary code with the
    privileges of the user running Internet Explorer. For a detailed
    technical analysis of this vulnerability, please see VU#713878.

    (Other resources: CAN-2004-0549)


    Impact

    Remote attackers exploiting the vulnerabilities described above may
    execute arbitrary code with the privileges of the user running the
    software components being attacked (e.g., Internet
    Explorer). Attackers can exploit these vulnerabilities by convincing a
    victim user to visit a malicious website, view a malformed image, or
    read an HTML-rendered email message. No user intervention is required
    beyond viewing an attacker-supplied HTML document or image. For
    further details, please see the individual vulnerability
    notes
    .

    Solution

    Apply a patch from Microsoft

    Apply the appropriate patch as specified by Microsoft Security
    Bulletin MS04-025.
    Please note that this bulletin provides a cumulative update that
    replaces all previously released updates for Internet Explorer,
    including those provided in MS04-004. However,
    users who have applied hotfixes released after MS04-004
    will need to install MS04-025. Please
    see the FAQ section of Microsoft's advisory for more details.

    Follow Microsoft recommendations for workarounds

    Microsoft provides several workarounds for each of these vulnerabilities.
    Please consult the appropriate section(s) of Microsoft Security Bulletin
    MS04-025.

    Appendix A. Vendor Information

    This appendix contains information provided by vendors for this
    advisory. As vendors report new information to US-CERT, we will update
    this section and note the changes in our revision history. If a
    particular vendor is not listed below, we have not received their
    comments.

    Microsoft

    Please see Microsoft Security Bulletin MS04-025.

    Appendix B. References



    Feedback can be directed to the US-CERT
    Technical Staff
    .


    Revision History

    • Jul 30, 2004: Initial release

    Last updated

    Multiple Vulnerabilities in libpng

    Systems Affected

    Applications and systems that use the libpng library.

    Overview

    Several vulnerabilities exist in the libpng library, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.

    Description

    The Portable Network Graphics (PNG) image format is used as an alternative to other image formats such as the Graphics Interchange Format (GIF). The libpng is a popular reference library available for application developers to support the PNG image format.

    Several vulnerabilities have been reported in the libpng library. Any application or system that uses this library may be affected. More detailed information is available in the individual vulnerability notes:

    VU#388984 - libpng fails to properly check length of transparency chunk (tRNS) data

    A buffer overflow vulnerability has been discovered in the way that libpng processes PNG images. This vulnerability could allow a remote attacker to execute arbitrary code on a vulnerable system by introducing a specially crafted PNG image.

    (Other references: CAN-2004-0597)

    VU#236656 - libpng png_handle_iCCP() NULL pointer dereference

    Under some circumstances, a null pointer may be dereferenced during a memory allocation in the png_handle_iCCP() function. As a result, a PNG image with particular characteristics could cause the affected application to crash. Similar errors are reported to exist in other locations within libpng.

    (Other references: CAN-2004-0598)

    VU#160448 - libpng integer overflow in image height processing

    An integer overflow error exists in the handling of PNG image height within the png_read_png() function. As a result, a PNG image with excessive height may cause an integer overflow during a memory allocation operation, which could cause the affected application to crash.

    (Other references: CAN-2004-0599)

    VU#477512 - libpng png_handle_sPLT() integer overflow

    A potential integer overflow error exists during a memory allocation operation within the png_handle_sPLT() function. It is unclear what practical impact this error might have on applications using libpng.

    (Other references: CAN-2004-0599)

    VU#817368 - libpng png_handle_sBIT() performs insufficient bounds checking

    A potentially insufficient bounds check exists within the png_handle_sBIT() function. A similar error exists in the png_handle_hIST() function. While the code that contains these errors could potentially permit a buffer overflow to occur during a subsequent png_crc_read() operation, it is unclear what practical vulnerabilities it might present in applications using libpng.

    (Other references: CAN-2004-0597)

    VU#286464 - libpng contains integer overflows in progressive display image reading

    The libpng library provides the ability to display interlaced, or progressive display, PNG images. A number of potential integer overflow errors exist in libpng's handling of such progressive display images. While the code that contains these errors introduces dangerous conditions, it is unclear what practical vulnerabilities it might present in applications using libpng.

    (Other references: CAN-2004-0599)

    Impact

    In the case of VU#388984, an attacker with the ability to introduce a malformed PNG image to a vulnerable application could cause the application to crash or could potentially execute arbitrary code with the privileges of the user running the affected application.

    In the case of VU#236656 and VU#160448, an attacker with the ability to introduce a malformed PNG image to a vulnerable application could cause the application to crash.

    The impacts of the other vulnerabilities described above are unclear.

    A remote attacker could cause an application to crash or potentially execute arbitrary code by convincing a victim user to visit a malicious web site or view an email message containing a malformed image.

    Solution

    Apply a patch or upgrade

    Apply the appropriate patch or upgrade as specified by your vendor. For
    vendor-specific responses, please see your vendor's web site or the individual vulnerability
    notes
    .

    For individuals who rely on the original source of libpng, these issues
    have been resolved in libpng version 1.2.6rc1 (release
    candidate 1).

    Appendix A. References

    Chris Evans Security Advisory 2004.1 - http://scary.beasts.org/security/CESA-2004-001.txt libpng Homepage - http://libpng.sourceforge.net Portable Network Graphics (PNG) Homepage - http://www.libpng.org/pub/png
  • US-CERT Vulnerability Note VU#388984 - http://www.kb.cert.org/vuls/id/388984
  • US-CERT Vulnerability Note VU#817368 - http://www.kb.cert.org/vuls/id/817368
  • US-CERT Vulnerability Note VU#286464 - http://www.kb.cert.org/vuls/id/286484
  • US-CERT Vulnerability Note VU#477512 - http://www.kb.cert.org/vuls/id/477512
  • US-CERT Vulnerability Note VU#160448 - http://www.kb.cert.org/vuls/id/160448
  • US-CERT Vulnerability Note VU#236656 - http://www.kb.cert.org/vuls/id/236656
  • CVE CAN-2004-0597 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0597
  • CVE CAN-2004-0598 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0598
  • CVE CAN-2004-0599 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0599


  • US-CERT thanks Chris Evans for researching and reporting these vulnerabilities.


    Feedback can be directed to the US-CERT Technical Staff.


    Revision History

  • Aug 4, 2004: Initial release

  • Last updated

    Security Improvements in Windows XP Service Pack 2

    Systems Affected

    Microsoft Windows XP

    Overview

    Microsoft Windows XP Service Pack 2 (SP2) significantly improves your computer's defenses against attacks and vulnerabilities.

    Recommendation
    To help protect your Windows XP computer from attacks and vulnerabilities, install Service Pack 2 using Windows Update or Automatic Updates.

    Note: Service Pack 2 makes significant changes to improve the security of Windows XP, and these changes may have negative effects on some programs and Windows functionality. Before you install Service Pack 2, back up your important data and consult your computer manufacturer's web site for information about Service Pack 2.

    Description

    Windows XP Service Pack 2 is a major operating system update that contains a number of new security updates and features. Like other Microsoft Service Packs, Windows XP Service Pack 2 also includes previously released security fixes and other operating system updates. Following is a summary of the new security updates and features in Service Pack 2: Windows Firewall

    Windows Firewall is enabled in almost all configurations, blocking network traffic coming into your computer. Blocking this traffic helps to protect you from worms and other malicious code that spread via the Internet.


    Internet Explorer Local Machine Zone Lockdown

    New settings for Internet Explorer disable the execution of ActiveX controls and Active scripting in the Local Machine Zone. This protects you from attacks and vulnerabilties such as Download.Ject.


  • Additional Internet Explorer Security Changes

    Internet Explorer now includes a pop-up blocker, additional window restrictions, and changes in MIME type handling that better defend against social engineering and "phishing" attacks. A browser add-on management interface provides a way to identify and disable programs that run as part of Internet Explorer. Enhanced protection against security zone elevation and object caching vulnerabilities helps defend against malicious web scripts.

  • Email Handling Technologies

    Outlook Express now supports the ability to read and compose messages in plain text and to block external HTML content such as "web bugs." Security checks are now performed in a more consistent way to help prevent the execution of malicious attachments.

  • Security Center

    The Security Center "...provides a central location for changing security settings, learning more about security, and ensuring that [your] computer is up to date, with the essential security settings that are recommended by Microsoft."

  • Automatic Updates

    The update services and automatic update feature of Windows XP have been improved. US-CERT highly recommends that you enable Automatic Updates.

  • Data Execution Prevention

    Memory protection helps prevent attackers from executing code on your computer.
  • References


    Authors: Art Manion and Mindi McDowell. Feedback can be directed to the US-CERT Technical Staff

    .

    Copyright 2004 Carnegie Mellon University.
    Terms of use

    Revision History

    • August 30, 2004: Initial release

      January 10, 2005: Updated IE links

    Last updated

    Multiple Vulnerabilities in Oracle Products

    Systems Affected

    The following Oracle applications are affected:


    Oracle Database 10g Release 1, version 10.1.0.2 Oracle9i Database Server Release 2, versions 9.2.0.4 and 9.2.0.5 Oracle9i Database Server Release 1, versions 9.0.1.4, 9.0.1.5 and 9.0.4
  • Oracle8i Database Server Release 3, version 8.1.7.4
  • Oracle Enterprise Manager Grid Control 10g, version 10.1.0.2
  • Oracle Enterprise Manager Database Control 10g, version 10.1.0.2
  • Oracle Application Server 10g (9.0.4), versions 9.0.4.0 and 9.0.4.1
  • Oracle9i Application Server Release 2, versions 9.0.2.3 and 9.0.3.1
  • Oracle9i Application Server Release 1, version 1.0.2.2



  • Oracle's Collaboration Suite and E-Business Suite 11i contain some of the
    vulnerable components and are also affected. According to Oracle, the following product releases and versions, and
    all future releases and versions are not affected:
  • Oracle Database 10g Release 1, version 10.1.0.3
  • Oracle Enterprise Manager Grid Control 10g, version 10.1.0.3 (not yet
    available)
  • Oracle Application Server 10g (9.0.4), version 9.0.4.2 (not yet
    available)
  • Overview

    Several vulnerabilities exist in the Oracle Database Server, Application
    Server, and Enterprise Manager software. The most serious vulnerabilities
    could allow a remote attacker to execute arbitrary code on an affected
    system. Oracle's Collaboration Suite and E-Business Suite 11i contain the
    vulnerable software and are affected as well.

    Description

    Several vulnerabilities have been reported in Oracle's Database Server,
    Application Server, and Enterprise Manager software. According to reports,
    several buffer overflow, format string, SQL injection and other types of
    vulnerabilities were discovered and reported to Oracle.

    Oracle has released Oracle
    Security Alert #68 (pdf)
    to address these vulnerabilities.

    We are tracking them as follows:

    VU#170830 -
    Oracle Enterprise Manager contains several vulnerabilities

    VU#316206 -
    Oracle Database Server contains several vulnerabilities

    VU#435974 -
    Oracle Application Server contains several vulnerabilities

    As more information becomes available, we will update these
    vulnerability notes as appropriate.

    Impact

    The impacts of the vulnerabilities described above are unclear.

    According to credible reports, the impacts of these vulnerabilities
    range from the remote, unauthenticated execution of arbitrary code to data
    corruption or leakage.

    Solution

    Apply a patch or upgrade

    Apply the appropriate patch or upgrade as specified in the Oracle
    Security Alert #68 (pdf)
    .

    Organizations that use Oracle's Collaboration Suite or E-Business Suite
    11i should see Oracle
    Security Alert #68 (pdf)
    for remediation instructions.

    Appendix A. References



    US-CERT thanks all the parties involved in researching and reporting these
    vulnerabilities. Specifically, Oracle credits the people for discovering
    these issues: Cesar Cerrudo, Pete Finnigan, Jonathan Gennick, Alexander
    Kornbrust of Red Database Security, Stephen Kost of Integrigy, David
    Litchfield of NGSS Limited, Matt Moore of PenTest Limited, Aaron Newman of
    Application Security Inc., Andy Rees of QinetiQ, Christian Schaller of
    Siemens CERT.


    Feedback can be directed to the author:
    Jason
    A. Rafail
    .


    Revision History

    • Sep 1, 2004: Initial release

      Sep 3, 2004: Updated Credits

    Last updated

    Vulnerabilities in MIT Kerberos 5

    Systems Affected

    MIT Kerberos 5 versions prior to krb5-1.3.5 Applications that use versions of MIT Kerberos 5 libraries prior to krb5-1.3.5 Applications that contain code derived from MIT Kerberos 5 Updated vendor information is available in the systems affected section of the individual vulnerability notes.

    Overview

    The MIT Kerberos 5 implementation contains several vulnerabilities, the most severe of which could allow an unauthenticated, remote attacker to execute arbitrary code on a Kerberos Distribution Center (KDC). This could result in the compromise of an entire Kerberos realm.

    Description

    There are several vulnerabilities in the MIT implementation of the Kerberos 5 protocol. With one exception (VU#550464), all of the vulnerabilities involve insecure deallocation of heap memory (double-free vulnerabilities) during error handling and Abstract Syntax Notation One (ASN.1) decoding. For further details, please see the following vulnerability notes:

    VU#795632 - MIT Kerberos 5 ASN.1 decoding functions insecurely deallocate memory (double-free)

    The MIT Kerberos 5 library does not securely deallocate heap memory when decoding ASN.1 structures, resulting in double-free vulnerabilities. An unauthenticated, remote attacker could execute arbitrary code on a KDC server, which could compromise an entire Kerberos realm. An attacker may also be able to execute arbitrary code on Kerberos clients, or cause a denial of service on KDCs or clients.


    (Other resources: MITKRB5-SA-2004-002, CAN-2004-0642)

    VU#866472 - MIT Kerberos 5 ASN.1 decoding function krb5_rd_cred() insecurely deallocates memory (double-free)

    The krb5_rd_cred() function in the MIT Kerberos 5 library does not securely deallocate heap memory when decoding ASN.1 structures, resulting in a double-free vulnerability. A remote, authenticated attacker could execute arbitrary code or cause a denial of service on any system running an application that calls krb5_rd_cred(). This includes Kerberos application servers and other applications that process Kerberos authentication via the MIT Kerberos 5 library, Generic Security Services Application Programming Interface (GSSAPI), and other libraries.


    (Other resources: MITKRB5-SA-2004-002, CAN-2004-0643)

    VU#350792 - MIT Kerberos krb524d insecurely deallocates memory (double-free)

    The MIT Kerberos krb524d daemon does not securely deallocate heap memory when handling an error condition, resulting in a double-free vulnerability. An unauthenticated, remote attacker could execute arbitrary code on a system running krb524d, which in many cases is also a KDC. The compromise of a KDC system can lead to the compromise of an entire Kerberos realm. An attacker may also be able to cause a denial of service on a system running krb524d.


    (Other resources: MITKRB5-SA-2004-002, CAN-2004-0772)

    VU#550464 - MIT Kerberos 5 ASN.1 decoding function asn1buf_skiptail() does not properly terminate loop

    The asn1buf_skiptail() function in the MIT Kerberos 5 library does not properly terminate a loop, allowing an unauthenticated, remote attacker to cause a denial of service in a KDC, application server, or Kerberos client.


    (Other resources: MITKRB5-SA-2004-003, CAN-2004-0644)

    Impact

    The impacts of these vulnerabilities vary, but an attacker may be able to execute arbitrary code on KDCs, systems running krb524d (typically also KDCs), application servers, applications that use Kerberos libraries directly or via GSSAPI, and Kerberos clients. An attacker could also cause a denial of service on any of these systems.

    The most severe vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on a KDC system. This could result in the compromise of both the KDC and an entire Kerberos realm.

    Solution

    Apply a patch or upgrade

    Check with your vendor(s) for patches or updates. For information about a specific vendor, please see the systems affected sections in the individual vulnerability notes or contact your vendor directly.

    Alternatively, apply the appropriate source code patch(es) referenced in MITKRB5-SA-2004-002 and MITKRB5-SA-2004-003 and recompile.

    These vulnerabilities will be addressed in krb5-1.3.5.


    Appendix A. References

  • Vulnerability Note VU#795632 - http://www.kb.cert.org/vuls/id/795632
  • Vulnerability Note VU#866472 - http://www.kb.cert.org/vuls/id/866472
  • Vulnerability Note VU#350792 - http://www.kb.cert.org/vuls/id/350792
  • Vulnerability Note VU#550464 - http://www.kb.cert.org/vuls/id/550464
  • MIT krb5 Security Advisory 2004-002 - http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt
  • MIT krb5 Security Advisory 2004-003 - http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-003-asn1.txt
  • Kerberos: The Network Authentication Protocol - http://web.mit.edu/kerberos/www/


  • Thanks to Tom Yu and the MIT Kerberos Development team for addressing these vulnerabilities and coordinating with vendors. MIT credits the following people: Will Fiveash, Joseph Galbraith, John Hawkinson, Marc Horowitz, and Nico Williams.

    Revision History

    • September 3, 2004: Initial release

    Last updated

    Vulnerability in Microsoft Image Processing Component

    Systems Affected

    Applications that process JPEG images on Microsoft Windows, including
    but not limited to Internet Explorer Microsoft Office
  • Microsoft Visual Studio
  • Picture It!
  • Applications from other vendors besides Microsoft
  • Overview

    An attacker may be able to gain control of your computer by taking
    advantage of the way some programs process the JPEG image format.

    Solution

    Apply a patch

    Microsoft has issued updates to address the problem. Obtain the
    appropriate update from Windows Update and from Office Update.

    Note: You may need to install multiple patches depending what
    software you have on your computer.

    Use caution with email attachments

    Never open unexpected email attachments. Before opening an attachment,
    save it to a disk and scan it with anti-virus software. Make sure to
    turn off the option to automatically download attachments.

    View email messages in plain text

    Email programs like Outlook and Outlook Express interpret HTML code
    the same way that Internet Explorer does. Attackers may be able to
    take advantage of that by sending malicious HTML-formatted email
    messages.

    Maintain updated anti-virus software

    It is important that you use anti-virus software and keep it up to
    date. Most anti-virus software vendors frequently release updated
    information, tools, or virus databases to help detect and recover from
    virus infections. Many anti-virus packages support automatic updates
    of virus definitions. US-CERT recommends using these automatic updates
    when possible.

    Description

    Microsoft Windows Graphics Device Interface (GDI+) is used to display information on screens
    and printers, including JPEG image files. An attacker could execute arbitrary code on a vulnerable system if the user opens a malicious JPEG file via applications such as a web browser, email program, internet chat program, or
    via email attachment. Any application that uses GDI+ to process JPEG image files is vulnerable to this type of attack. This vulnerability also affects products from
    companies
    other than Microsoft.


    References


    Author: Mindi McDowell. Feedback
    can be directed to US-CERT -->.

    Copyright 2004 Carnegie Mellon University.
    Terms of use

    Revision History

    • September 14, 2004: Initial release

    Last updated

    Microsoft Windows JPEG component buffer overflow

    Systems Affected

    This vulnerability affects the following
    Microsoft Windows operating systems by default: Microsoft Windows XP and Microsoft Windows XP Service Pack 1 Microsoft Windows XP 64-Bit Edition Service Pack 1 Microsoft Windows XP 64-Bit Edition Version 2003
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2003 64-Bit Edition
  • Other Microsoft Windows operating systems, including systems running
    Microsoft Windows XP Service Pack 2, are not affected by default. However,
    this vulnerability may affect all versions of the Microsoft Windows
    operating systems if an application or update installs a vulnerable
    version of the gdiplus.dll file onto the system. Please note that this vulnerability affects any software that uses the
    Microsoft Windows operating system or Microsoft's GDI+ library to render
    JPEG graphics. Please see the Systems Affected
    section
    of the vulnerability note to determine if third-party software
    is affected. A list of affected Microsoft products is available in Appendix B, or for the complete list of affected and
    non-affected Microsoft products, please see Microsoft Security
    Bulletin MS04-028.

    Overview

    Microsoft's Graphic Device Interface Plus (GDI+) contains a
    vulnerability in the processing of JPEG images. This vulnerability may
    allow attackers to remotely execute arbitrary code on the affected
    system. Exploitation may occur as the result of viewing a malicious web
    site, reading an HTML-rendered email message, or opening a crafted JPEG
    image in any vulnerable application. The privileges gained by a remote
    attacker depend on the software component being attacked.

    Description

    Microsoft Security Bulletin MS04-028
    describes a remotely exploitable buffer overflow vulnerability in
    Microsoft's Graphic Device Interface Plus (GDI+) JPEG processing
    component. Attackers can exploit this vulnerability by convincing a victim user to
    visit a malicious web site, read an HTML-rendered email message, or
    otherwise view a crafted JPEG image with a vulnerable application. No user
    intervention is required beyond viewing an attacker-supplied JPEG
    image.

    Any applications (Microsoft or third-party) that use the GDI+ library
    to render JPEG images may present additional attack vectors for this
    vulnerability. While some applications use the Windows operating system
    version of the GDI+ library, other applications may install and use
    another version, which may also be vulnerable. Microsoft has created a
    GDI+ Detection Tool to help detect products that may contain a vulnerable
    version of the JPEG parsing component. Microsoft Knowledge Base
    Article 873374
    provides instructions on how to download and use this
    tool.

    In addition to running Microsoft's detection utility, we recommend
    searching your system for "gdiplus.dll" to help determine what
    third-party applications may be affected by this vulnerability. Also note
    that applications may re-install a vulnerable version of the
    GDI+ library if re-installed after a patch has been applied.

    We are tracking this vulnerability in Vulnerability
    Note VU#297462
    . This reference number corresponds to CVE candidate CAN-2004-0200.

    Impact

    Remote attackers exploiting the vulnerability described above may
    execute arbitrary code with the privileges of the user running the
    software components being attacked.

    Solution

    Apply patches from Microsoft

    Apply the appropriate patches as specified in Microsoft Security
    Bulletin MS04-028.
    Please note that this bulletin provides several updates to the operating
    system and various applications that rely on GDI+ to render JPEG images.
    Depending on your system's configuration, you may need to install multiple
    patches.

    In addition to releasing some patches on Windows Update, Microsoft
    has released some patches on Office Update, and
    developer tool patches are available from MS04-028.

    Apply patches from third-party vendors

    Third-party software that relies on GDI+ to render JPEG images may
    also need to be updated. Apply the appropriate patches specified by
    your vendor. Please see your vendor's site and the Systems Affected
    section
    of the vulnerability note for more information. Depending on
    your system's configuration, you may need to install multiple patches.

    Follow Microsoft recommendations for workarounds

    Microsoft provides several workarounds for this vulnerability.
    Note that these workarounds do not remove the vulnerability from the
    system, and they will limit functionality. Please consult the "Workarounds
    for JPEG Vulnerability - CAN-2004-0200" section of Microsoft Security
    Bulletin MS04-028.

    Appendix A. References

  • Microsoft Security Bulletin MS04-028 - http://microsoft.com/technet/security/bulletin/MS04-028.asp
  • Microsoft End User Security Bulletin for MS04-028 - http://www.microsoft.com/security/bulletins/200409_jpeg.mspx
  • US-CERT Vulnerability Note VU#297462 - http://www.kb.cert.org/vuls/id/297462
  • Microsoft KB Article 873374 - http://support.microsoft.com/?id=873374
  • CVE CAN-2004-0200 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0200
  • Appendix B. Affected Microsoft Products

    The following Microsoft Products are affected:

    • Microsoft Office XP Service Pack 3
    • Microsoft Office XP Service Pack 2
    • Microsoft Office XP Software:
      • Outlook 2002
      • Word 2002
      • Excel 2002
      • PowerPoint 2002
      • FrontPage 2002
      • Publisher 2002
    • Microsoft Office 2003
    • Microsoft Office 2003 Software:
      • Outlook 2003
      • Word 2003
      • Excel 2003
      • PowerPoint 2003
      • FrontPage 2003
      • Publisher 2003
      • InfoPath 2003
      • OneNote 2003
    • Microsoft Project 2002 Service Pack 1 (all versions)
    • Microsoft Project 2003 (all versions)
    • Microsoft Visio 2002 Service Pack 2 (all versions)
    • Microsoft Visio 2003 (all versions)
    • Microsoft Visual Studio .NET 2002
    • Microsoft Visual Studio .NET 2002 Software:
      • Visual Basic .NET Standard 2002
      • Visual C# .NET Standard 2002
      • Visual C++ .NET Standard 2002
    • Microsoft Visual Studio .NET 2003
    • Microsoft Visual Studio .NET 2003 Software:
      • Visual Basic .NET Standard 2003
      • Visual C# .NET Standard 2003
      • Visual C++ .NET Standard 2003
      • Visual J# .NET Standard 2003
    • The Microsoft .NET Framework version 1.0 SDK Service Pack 2
    • Microsoft Picture It! 2002 (all versions)
    • Microsoft Greetings 2002
    • Microsoft Picture It! version 7.0 (all versions)
    • Microsoft Digital Image Pro version 7.0
    • Microsoft Picture It! version 9 (all versions, including Picture It!
      Library)
    • Microsoft Digital Image Pro version 9
    • Microsoft Digital Image Suite version 9
    • Microsoft Producer for Microsoft Office PowerPoint (all versions)
    • Microsoft Platform SDK Redistributable: GDI+
    • Internet Explorer 6 Service Pack 1
    • The Microsoft .NET Framework version 1.0 Service Pack 2
    • The Microsoft .NET Framework version 1.1



    Feedback can be directed to the US-CERT
    Technical Staff
    .


    Revision History

    • Sept 16, 2004: Initial release

    Last updated

    TA14-300A: Phishing Campaign Linked with “Dyre” Banking Malware
    Original release date: October 27, 2014 | Last revised: October 28, 2014

    Systems Affected

    Microsoft Windows

    Overview

    Since mid-October 2014, a phishing campaign has targeted a wide variety of recipients while employing the Dyre/Dyreza banking malware. Elements of this phishing campaign vary from target to target including senders, attachments, exploits, themes, and payload(s).[1][2] Although this campaign uses various tactics, the actor’s intent is to entice recipients into opening attachments and downloading malware.

    Description

    The Dyre banking malware specifically targets sensitive user account credentials. The malware has the ability to capture user login information and send the captured data to malicious actors.[3] Phishing emails used in this campaign often contain a weaponized PDF attachment which attempts to exploit vulnerabilities found in unpatched versions of Adobe Reader.[4][5] After successful exploitation, a user's system will download Dyre banking malware. All of the major anti-virus vendors have successfully detected this malware prior to the release of this alert.[6]

    Please note, the below listing of indicators does not represent all characteristics and indicators for this campaign.

    Phishing Email Characteristics:

    • Subject: "Unpaid invoic" (Spelling errors in the subject line are a characteristic of this campaign)
    • Attachment: Invoice621785.pdf

    System Level Indicators (upon successful exploitation):

    • Copies itself under C:\Windows\[RandomName].exe
    • Created a Service named "Google Update Service" by setting the following registry keys:
      • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\ImagePath: "C:\WINDOWS\pfdOSwYjERDHrdV.exe"
      • HKLM\SYSTEM\CurrentControlSet\Services\googleupdate\DisplayName: "Google Update Service"[7]

    Impact

    A system infected with Dyre banking malware will attempt to harvest credentials for online services, including banking services.

    Solution

    Users and administrators are recommended to take the following preventive measures to protect their computer networks from phishing campaigns:

    US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams.

    You can report phishing to us by sending email to phishing-report@us-cert.gov.

    References

    Revision History

    • October 27, 2014: Initial Release
    • October 28, 2014: Added Reference 7 in Description Section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-295A: Crypto Ransomware
    Original release date: October 22, 2014 | Last revised: October 24, 2014

    Systems Affected

    Microsoft Windows

    Overview

    Ransomware is a type of malicious software (malware) that infects a computer and restricts access to it until a ransom is paid to unlock it. This Alert is the result of Canadian Cyber Incident Response Centre (CCIRC) analysis in coordination with the United States Department of Homeland Security (DHS) to provide further information about crypto ransomware, specifically to:

    • Present its main characteristics, explain the prevalence of ransomware, and the proliferation of crypto ransomware variants; and
    • Provide prevention and mitigation information.

    Description

    WHAT IS RANSOMWARE?

    Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware, which has now been observed for several years, attempts to extort money from victims by displaying an on-screen alert. These alerts often state that their computer has been locked or that all of their files have been encrypted, and demand that a ransom is paid to restore access. This ransom is typically in the range of $100–$300 dollars, and is sometimes demanded in virtual currency, such as Bitcoin.

    Ransomware is typically spread through phishing emails that contain malicious attachments and drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website and malware is downloaded and installed without their knowledge. Crypto ransomware, a variant that encrypts files, is typically spread through similar methods, and has been spread through Web-based instant messaging applications.

    WHY IS IT SO EFFECTIVE?

    The authors of ransomware instill fear and panic into their victims, causing them to click on a link or pay a ransom, and inevitably become infected with additional malware, including messages similar to those below:

    • “Your computer has been infected with a virus. Click here to resolve the issue.”
    • “Your computer was used to visit websites with illegal content. To unlock your computer, you must pay a $100 fine.”
    • “All files on your computer have been encrypted. You must pay this ransom within 72 hours to regain access to your data.”

    PROLIFERATION OF VARIANTS

    In 2012, Symantec, using data from a command and control (C2) server of 5,700 computers compromised in one day, estimated that approximately 2.9 percent of those compromised users paid the ransom. With an average ransom of $200, this meant malicious actors profited $33,600 per day, or $394,400 per month, from a single C2 server. These rough estimates demonstrate how profitable ransomware can be for malicious actors.

    This financial success has likely led to a proliferation of ransomware variants. In 2013, more destructive and lucrative ransomware variants were introduced including Xorist, CryptorBit, and CryptoLocker. Some variants encrypt not just the files on the infected device but also the contents of shared or networked drives. These variants are considered destructive because they encrypt user’s and organization’s files, and render them useless until criminals receive a ransom.

    Additional variants observed in 2014 included CryptoDefense and Cryptowall, which are also considered destructive. Reports indicate that CryptoDefense and Cryptowall share the same code, and that only the name of malware itself is different. Similar to CryptoLocker, these variants also encrypt files on the local computer, shared network files, and removable media.

    LINKS TO OTHER TYPES OF MALWARE

    Systems infected with ransomware are also often infected with other malware. In the case of CryptoLocker, a user typically becomes infected by opening a malicious attachment from an email. This malicious attachment contains Upatre, a downloader, which infects the user with GameOver Zeus. GameOver Zeus is a variant of the Zeus Trojan that steals banking information and is also used to steal other types of data. Once a system is infected with GameOver Zeus, Upatre will also download CryptoLocker. Finally, CryptoLocker encrypts files on the infected system, and requests that a ransom be paid.

    The close ties between ransomware and other types of malware were demonstrated through the recent botnet disruption operation against GameOver Zeus, which also proved effective against CryptoLocker. In June 2014, an international law enforcement operation successfully weakened the infrastructure of both GameOver Zeus and CryptoLocker.

    Impact

    Ransomware doesn’t only target home users; businesses can also become infected with ransomware, which can have negative consequences, including:

    • Temporary or permanent loss of sensitive or proprietary information;
    • Disruption to regular operations;
    • Financial losses incurred to restore systems and files; and
    • Potential harm to an organization’s reputation.

    Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.

    Solution

    Infections can be devastating to an individual or organization, and recovery can be a difficult process that may require the services of a reputable data recovery specialist.

    US-CERT and CCIRC recommend users and administrators take the following preventive measures to protect their computer networks from ransomware infection:

    • Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
    • Maintain up-to-date anti-virus software.
    • Keep your operating system and software up-to-date with the latest patches.
    • Do not follow unsolicited web links in email. Refer to the Security Tip Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.
    • Use caution when opening email attachments. For information on safely handling email attachments, see Recognizing and Avoiding Email Scams.
    • Follow safe practices when browsing the web. See Good Security Habits and Safeguarding Your Data for additional details.

    Individuals or organizations are not encouraged to pay the ransom, as this does not guarantee files will be released. Report instances of fraud to the FBI at the Internet Crime Complaint Center or contact the CCIRC .

    References

    Revision History

    • October 22, 2014: Initial Release
    • October 24, 2014: Minor edit to the reference section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-290A: SSL 3.0 Protocol Vulnerability and POODLE Attack
    Original release date: October 17, 2014 | Last revised: October 20, 2014

    Systems Affected

    All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.

    Overview

    US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. The POODLE attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from inside an encrypted transaction.

    Description

    The SSL 3.0 vulnerability stems from the way blocks of data are encrypted under a specific type of encryption algorithm within the SSL protocol. The POODLE attack takes advantage of the protocol version negotiation feature built into SSL/TLS to force the use of SSL 3.0 and then leverages this new vulnerability to decrypt select content within the SSL session. The decryption is done byte by byte and will generate a large number of connections between the client and server.

    While SSL 3.0 is an old encryption standard and has generally been replaced by Transport Layer Security (TLS) (which is not vulnerable in this way), most SSL/TLS implementations remain backwards compatible with SSL 3.0 to interoperate with legacy systems in the interest of a smooth user experience. Even if a client and server both support a version of TLS the SSL/TLS protocol suite allows for protocol version negotiation (being referred to as the “downgrade dance” in other reporting). The POODLE attack leverages the fact that when a secure connection attempt fails, servers will fall back to older protocols such as SSL 3.0. An attacker who can trigger a connection failure can then force the use of SSL 3.0 and attempt the new attack. [1]

    Two other conditions must be met to successfully execute the POODLE attack: 1) the attacker must be able to control portions of the client side of the SSL connection (varying the length of the input) and 2) the attacker must have visibility of the resulting ciphertext. The most common way to achieve these conditions would be to act as Man-in-the-Middle (MITM), requiring a whole separate form of attack to establish that level of access.

    These conditions make successful exploitation somewhat difficult. Environments that are already at above-average risk for MITM attacks (such as public WiFi) remove some of those challenges.

    Impact

    The POODLE attack can be used against any system or application that supports SSL 3.0 with CBC mode ciphers. This affects most current browsers and websites, but also includes any software that either references a vulnerable SSL/TLS library (e.g. OpenSSL) or implements the SSL/TLS protocol suite itself. By exploiting this vulnerability in a likely web-based scenario, an attacker can gain access to sensitive data passed within the encrypted web session, such as passwords, cookies and other authentication tokens that can then be used to gain more complete access to a website (impersonating that user, accessing database content, etc.).

    Solution

    There is currently no fix for the vulnerability SSL 3.0 itself, as the issue is fundamental to the protocol; however, disabling SSL 3.0 support in system/application configurations is the most viable solution currently available.

    Some of the same researchers that discovered the vulnerability also developed a fix for one of the prerequisite conditions; TLS_FALLBACK_SCSV is a protocol extension that prevents MITM attackers from being able to force a protocol downgrade. OpenSSL has added support for TLS_FALLBACK_SCSV to their latest versions and recommend the following upgrades: [2]

    • OpenSSL 1.0.1 users should upgrade to 1.0.1j.
    • OpenSSL 1.0.0 users should upgrade to 1.0.0o.
    • OpenSSL 0.9.8 users should upgrade to 0.9.8zc.

    Both clients and servers need to support TLS_FALLBACK_SCSV to prevent downgrade attacks.

    Other SSL 3.0 implementations are most likely also affected by POODLE. Contact your vendor for details. Additional vendor information may be available in the National Vulnerability Database (NVD) entry for CVE-2014-3566 [3] or in CERT Vulnerability Note VU#577193. [4]

    References

    Revision History

    • October 17, 2014 Initial Release
    • October 20, 2014 Added CERT Vulnerability Note VU#577193 to the Solution section

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-268A: GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)
    Original release date: September 25, 2014 | Last revised: September 30, 2014

    Systems Affected

    • GNU Bash through 4.3.
    • Linux and Mac OS X systems, on which Bash is part of the base operating system.
    • Any BSD or UNIX system on which GNU Bash has been installed as an add-on.
    • Any UNIX-like operating system on which the /bin/sh interface is implemented as GNU Bash.

    Overview

    A critical vulnerability has been reported in the GNU Bourne-Again Shell (Bash), the common command-line shell used in many Linux/UNIX operating systems and Apple’s Mac OS X. The flaw could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system [1]. The United States Department of Homeland Security (DHS) is releasing this Technical Alert to provide further information about the GNU Bash vulnerability.

    Description

    GNU Bash versions 1.14 through 4.3 contain a flaw that processes commands placed after function definitions in the added environment variable, allowing remote attackers to execute arbitrary code via a crafted environment which enables network-based exploitation. [2, 3]

    Critical instances where the vulnerability may be exposed include: [4, 5]

    • Apache HTTP Server using mod_cgi or mod_cgid scripts either written in bash, or spawn GNU Bash subshells, or on any system where the /bin/sh interface is implemented using GNU Bash.
    • Override or Bypass ForceCommand feature in OpenSSH sshd and limited protection for some Git and Subversion deployments used to restrict shells and allows arbitrary command execution capabilities. This data path is vulnerable on systems where the /bin/sh interface is implemented using GNU Bash.
    • Allow arbitrary commands to run on a DHCP client machine.

    Impact

    This vulnerability is classified by industry standards as “High” impact with CVSS Impact Subscore 10 and “Low” on complexity, which means it takes little skill to perform. This flaw allows attackers who can provide specially crafted environment variables containing arbitrary commands to execute on vulnerable systems. It is especially dangerous because of the prevalent use of the Bash shell and its ability to be called by an application in numerous ways.

    Solution

    Initial solutions for Shellshock do not completely resolve the vulnerability. It is advised to install existing patches and pay attention for updated patches to address CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, and CVE-2014-6278. Red Hat has provided a support article [6] with updated information.

    Many UNIX-like operating systems, including Linux distributions and Apple Mac OS X include Bash and are likely to be affected. Contact your vendor for updated information. A list of vendors can be found in CERT Vulnerability Note VU#252743 [7].

    US-CERT recommends system administrators review the vendor patches and the NIST Vulnerability Summaries for CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE-2014-6278 to mitigate damage caused by the exploit.

    References

    Revision History

    • September 25, 2014 - Initial Release
    • September 26, 2014 - Minor Revisions
    • September 30, 2014 - Update to include additional CVE information

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-212A: Backoff Point-of-Sale Malware
    Original release date: July 31, 2014 | Last revised: August 27, 2014

    Systems Affected

    Point-of-Sale Systems

     

    Overview

    This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and Analysis Center (FS-ISAC), and Trustwave Spiderlabs, a trusted partner under contract with the USSS.  The purpose of this release is to provide relevant and actionable technical indicators for network defense against the PoS malware dubbed "Backoff" which has been discovered exploiting businesses' administrator accounts remotely and exfiltrating consumer payment data.

    Over the past year, the Secret Service has responded to network intrusions at numerous businesses throughout the United States that have been impacted by the “Backoff” malware. Seven PoS system providers/vendors have confirmed that they have had multiple clients affected. Reporting continues on additional compromised locations, involving private sector entities of all sizes, and the Secret Service currently estimates that over 1,000 U.S. businesses are affected.

    Recent investigations revealed that malicious actors are using publicly available tools to locate businesses that use remote desktop applications. Remote desktop solutions like Microsoft's Remote Desktop [1], Apple Remote Desktop [2], Chrome Remote Desktop [3], Splashtop 2 [4], and LogMeIn [5] offer the convenience and efficiency of connecting to a computer from a remote location. Once these applications are located, the suspects attempted to brute force the login feature of the remote desktop solution. After gaining access to what was often administrator or privileged access accounts, the suspects were then able to deploy the point-of-sale (PoS) malware and subsequently exfiltrate consumer payment data via an encrypted POST request.

    Organizations that believe they have been impacted should contact their local Secret Service field office and may contact the NCCIC for additional information.

    Description

    “Backoff” is a family of PoS malware and has been discovered recently. The malware family has been witnessed on at least three separate forensic investigations. Researchers have identified three primary variants to the “Backoff” malware including 1.4, 1.55 (“backoff”, “goo”, “MAY”, “net”), and 1.56 (“LAST”).

    These variations have been seen as far back as October 2013 and continue to operate as of July 2014. In total, the malware typically consists of the following four capabilities. An exception is the earliest witnessed variant (1.4) which does not include keylogging functionality. Additionally, 1.55 ‘net’ removed the explorer.exe injection component:

    • Scraping memory for track data
    • Logging keystrokes
    • Command & control (C2) communication
    • Injecting malicious stub into explorer.exe

    The malicious stub that is injected into explorer.exe is responsible for persistence in the event the malicious executable crashes or is forcefully stopped. The malware is responsible for scraping memory from running processes on the victim machine and searching for track data. Keylogging functionality is also present in most recent variants of “Backoff”. Additionally, the malware has a C2 component that is responsible for uploading discovered data, updating the malware, downloading/executing further malware, and uninstalling the malware.

    Variants

    Based on compiled timestamps and versioning information witnessed in the C2 HTTP POST requests, “Backoff” variants were analyzed over a seven month period. The five variants witnessed in the “Backoff” malware family have notable modifications, to include:

    1.55 “backoff”

    • Added Local.dat temporary storage for discovered track data
    • Added keylogging functionality
    • Added “gr” POST parameter to include variant name
    • Added ability to exfiltrate keylog data
    • Supports multiple exfiltration domains
    • Changed install path
    • Changed User-Agent

    1.55 “goo”

    • Attempts to remove prior version of malware
    • Uses 8.8.8.8 as resolver

    1.55 “MAY”

    • No significant updates other than changes to the URI and version name

    1.55 “net”

    • Removed the explorer.exe injection component

    1.56 “LAST”

    • Re-added the explorer.exe injection component
    • Support for multiple domain/URI/port configurations
    • Modified code responsible for creating exfiltration thread(s)
    • Added persistence techniques

    Command & Control Communication

    All C2 communication for “Backoff” takes place via HTTP POST requests. A number of POST parameters are included when this malware makes a request to the C&C server.

    • op : Static value of ‘1’
    • id : randomly generated 7 character string
    • ui : Victim username/hostname
    • wv : Version of Microsoft Windows
    • gr (Not seen in version 1.4) : Malware-specific identifier
    • bv : Malware version
    • data (optional) : Base64-encoded/RC4-encrypted data

    The ‘id’ parameter is stored in the following location, to ensure it is consistent across requests:

    • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    If this key doesn’t exist, the string will be generated and stored. Data is encrypted using RC4 prior to being encoded with Base64. The password for RC4 is generated from the ‘id’ parameter, a static string of ‘jhgtsd7fjmytkr’, and the ‘ui’ parameter. These values are concatenated together and then hashed using the MD5 algorithm to form the RC4 password. In the above example, the RC4 password would be ‘56E15A1B3CB7116CAB0268AC8A2CD943 (The MD5 hash of ‘vxeyHkSjhgtsd7fjmytkrJosh @ PC123456).

    File Indicators:

    The following is a list of the Indicators of Compromise (IOCs) that should be added to the network security to search to see if these indicators are on their network.

    1.4

    Packed MD5: 927AE15DBF549BD60EDCDEAFB49B829E

    Unpacked MD5: 6A0E49C5E332DF3AF78823CA4A655AE8

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinsvc.exe

    Mutexes:

    uhYtntr56uisGst

    uyhnJmkuTgD

    Files Written:

    %APPDATA%\mskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\AdobeFlashPlayer\mswinsvc.exe

    Static String (POST Request): zXqW9JdWLM4urgjRkX

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent: Mozilla/4.0

    URI(s): /aircanada/dark.php

    1.55 “backoff”

    Packed MD5: F5B4786C28CCF43E569CB21A6122A97E

    Unpacked MD5: CA4D58C61D463F35576C58F25916F258

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    Mutexes:

    Undsa8301nskal

    uyhnJmkuTgD

    Files Written:

    %APPDATA%\mskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    %APPDATA%\AdobeFlashPlayer\Local.dat

    %APPDATA%\AdobeFlashPlayer\Log.txt

    Static String (POST Request): ihasd3jasdhkas

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0

    URI(s): /aero2/fly.php

    1.55 “goo”

    Pa  cked MD5: 17E1173F6FC7E920405F8DBDE8C9ECAC

    Unpacked MD5: D397D2CC9DE41FB5B5D897D1E665C549

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windows/updcheck.php

    1.55 “MAY”

    Packed MD5: 21E61EB9F5C1E1226F9D69CBFD1BF61B

    Unpacked MD5: CA608E7996DED0E5009DB6CC54E08749

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windowsxp/updcheck.php

    1.55 “net”

    Packed MD5: 0607CE9793EEA0A42819957528D92B02

    Unpacked MD5: 5C1474EA275A05A2668B823D055858D9

    Install Path: %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    Mutexes:

    nUndsa8301nskal

    Files Written:

    %APPDATA%\AdobeFlashPlayer\mswinhost.exe

    %APPDATA%\AdobeFlashPlayer\Local.dat

    %APPDATA%\AdobeFlashPlayer\Log.txt

    Static String (POST Request): ihasd3jasdhkas9

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    User-Agent:

    URI(s): /windowsxp/updcheck.php

    1.56 “LAST”

    Packed MD5: 12C9C0BC18FDF98189457A9D112EEBFC

    Unpacked MD5: 205947B57D41145B857DE18E43EFB794

    Install Path: %APPDATA%\OracleJava\javaw.exe

    Mutexes:

    nUndsa8301nskal

    nuyhnJmkuTgD

    Files Written:

    %APPDATA%\nsskrnl

    %APPDATA%\winserv.exe

    %APPDATA%\OracleJava\javaw.exe

    %APPDATA%\OracleJava\Local.dat

    %APPDATA%\OracleJava\Log.txt

    Static String (POST Request): jhgtsd7fjmytkr

    Registry Keys:

    HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\identifier

    HKCU\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    HKLM\ SOFTWARE \Microsoft\Windows\CurrentVersion\Run\Windows NT Service

    HKCU\SOFTWARE\\Microsoft\Active Setup\Installed Components\{B3DB0D62-B481-4929-888B-49F426C1A136}\StubPath

    HKLM\SOFTWARE\\Microsoft\Active Setup\Installed Components\{B3DB0D62-B481-4929-888B-49F426C1A136}\StubPath

    User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0

    URI(s):  /windebug/updcheck.php

    Impact

    The impact of a compromised PoS system can affect both the businesses and consumer by exposing customer data such as names, mailing addresses, credit/debit card numbers, phone numbers, and e-mail addresses to criminal elements. These breaches can impact a business’ brand and reputation, while consumers’ information can be used to make fraudulent purchases or risk compromise of bank accounts. It is critical to safeguard your corporate networks and web servers to prevent any unnecessary exposure to compromise or to mitigate any damage that could be occurring now.

    Solution

    At the time this advisory is released, the variants of the “Backoff’ malware family are largely undetected by anti-virus (AV) vendors. However, shortly following the publication of this technical analysis, AV companies will quickly begin detecting the existing variants. It’s important to maintain up‐to‐date AV signatures and engines as new threats such as this are continually being added to your AV solution. Pending AV detection of the malware variants, network defenders can apply indicators of compromise (IOC) to a variety of prevention and detection strategies.[6],[7],[8] IOCs can be found above.

    The forensic investigations of compromises of retail IT/payment networks indicate that the network compromises allowed the introduction of memory scraping malware to the payment terminals. Information security professionals recommend a defense in depth approach to mitigating risk to retail payment systems. While some of the risk mitigation recommendations are general in nature, the following strategies provide an approach to minimize the possibility of an attack and mitigate the risk of data compromise:

    Remote Desktop Access

    • Configure the account lockout settings to lock a user account after a period of time or a specified number of failed login attempts. This prevents unlimited unauthorized attempts to login whether from an unauthorized user or via automated attack types like brute force.[9]
    • Limit the number of users and workstation who can log in using Remote Desktop.
    • Use firewalls (both software and hardware where available) to restrict access to remote desktop listening ports (default is TCP 3389).[10]
    • Change the default Remote Desktop listening port.
    • Define complex password parameters. Configuring an expiration time and password length and complexity can decrease the amount of time in which a successful attack can occur.[11]
    • Require two-factor authentication (2FA) for remote desktop access.[12]
    • Install a Remote Desktop Gateway to restrict access.[13]
    • Add an extra layer of authentication and encryption by tunneling your Remote Desktop through IPSec, SSH or SSL.[14],[15]
    • Require 2FA when accessing payment processing networks. Even if a virtual private network is used, it is important that 2FA is implemented to help mitigate keylogger or credential dumping attacks.
    • Limit administrative privileges for users and applications.
    • Periodically review systems (local and domain controllers) for unknown and dormant users.

    Network Security

    • Review firewall configurations and ensure that only allowed ports, services and Internet protocol (IP) addresses are communicating with your network. This is especially critical for outbound (e.g., egress) firewall rules in which compromised entities allow ports to communicate to any IP address on the Internet. Hackers leverage this configuration to exfiltrate data to their IP addresses.
    • Segregate payment processing networks from other networks.
    • Apply access control lists (ACLs) on the router configuration to limit unauthorized traffic to payment processing networks.
    • Create strict ACLs segmenting public-facing systems and back-end database systems that house payment card data.
    • Implement data leakage prevention/detection tools to detect and help prevent data exfiltration.
    • Implement tools to detect anomalous network traffic and anomalous behavior by legitimate users (compromised credentials).

    Cash Register and PoS Security

    • Implement hardware-based point-to-point encryption. It is recommended that EMV-enabled PIN entry devices or other credit-only accepting devices have Secure Reading and Exchange of Data (SRED) capabilities. SRED-approved devices can be found at the Payment Card Industry Security Standards website.
    • Install Payment Application Data Security Standard-compliant payment applications.
    • Deploy the latest version of an operating system and ensure it is up to date with security patches, anti-virus software, file integrity monitoring and a host-based intrusion-detection system.
    • Assign a strong password to security solutions to prevent application modification. Use two-factor authentication (2FA) where feasible.
    • Perform a binary or checksum comparison to ensure unauthorized files are not installed.
    • Ensure any automatic updates from third parties are validated. This means performing a checksum comparison on the updates prior to deploying them on PoS systems. It is recommended that merchants work with their PoS vendors to obtain signatures and hash values to perform this checksum validation.
    • Disable unnecessary ports and services, null sessions, default users and guests.
    • Enable logging of events and make sure there is a process to monitor logs on a daily basis.
    • Implement least privileges and ACLs on users and applications on the system.

    References

    Revision History

    • July, 31 2014 - Initial Release
    • August 18, 2014 - Minor revision to remote desktop solutions list
    • August 22, 2014 - Changes to the Overview section
    • August 26, 2014 - Minor revision to remote desktop solutions list

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-150A: GameOver Zeus P2P Malware
    Original release date: June 02, 2014 | Last revised: August 18, 2014

    Systems Affected

    • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
    • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012

    Overview

    GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware identified in September 2011, [1] uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control. The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and the Department of Justice (DOJ), is releasing this Technical Alert to provide further information about the GameOver Zeus botnet.

    Description

    GOZ, which is often propagated through spam and phishing messages, is primarily used by cybercriminals to harvest banking information, such as login credentials, from a victim’s computer. [2] Infected systems can also be used to engage in other malicious activities, such as sending spam or participating in distributed denial-of-service (DDoS) attacks. 

    Prior variants of the Zeus malware utilized a centralized command and control (C2) botnet infrastructure to execute commands. Centralized C2 servers are routinely tracked and blocked by the security community. [1] GOZ, however, utilizes a P2P network of infected hosts to communicate and distribute data, and employs encryption to evade detection. These peers act as a massive proxy network that is used to propagate binary updates, distribute configuration files, and to send stolen data. [3] Without a single point of failure, the resiliency of GOZ’s P2P infrastructure makes takedown efforts more difficult. [1]

    Impact

    A system infected with GOZ may be employed to send spam, participate in DDoS attacks, and harvest users' credentials for online services, including banking services.

    Solution

    Users are recommended to take the following actions to remediate GOZ infections:

    • Use and maintain anti-virus software - Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
    • Change your passwords - Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
    • Keep your operating system and application software up-to-date - Install software patches so that attackers can't take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
    • Use anti-malware tools - Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of GOZ from your system.

    F-Secure       

    http://www.f-secure.com/en/web/home_global/online-scanner (Windows Vista, 7 and 8)

    http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142 (Windows XP)

    Heimdal

    http://goz.heimdalsecurity.com/ (Microsoft Windows XP, Vista, 7, 8 and 8.1)   

    McAfee

    www.mcafee.com/stinger (Windows XP SP2, 2003 SP2, Vista SP1, 2008, 7 and 8)

    Microsoft

    http://www.microsoft.com/security/scanner/en-us/default.aspx (Windows 8.1, Windows 8, Windows 7, Windows Vista, and Windows XP) 

    Sophos

    http://www.sophos.com/VirusRemoval (Windows XP (SP2) and above) 

    Symantec

    http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network (Windows XP, Windows Vista and Windows 7)

    Trend Micro

    http://www.trendmicro.com/threatdetector (Windows XP, Windows Vista, Windows 7, Windows 8/8.1, Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2)

    FireEye and Fox-IT

    www.decryptcryptolocker.com FireEye and Fox-IT have created a web portal claiming to restore/decrypt files of CryptoLocker victims. US-CERT has performed no evaluation of this claim, but is providing a link to enable individuals to make their own determination of suitability for their needs. At present, US-CERT is not aware of any other product that claims similar functionality.

    The above are examples only and do not constitute an exhaustive list. The U.S. Government does not endorse or support any particular product or vendor.

     

    References

    Revision History

    • Initial Publication - June 2, 2014
    • Added McAfee - June 6, 2014
    • Added FireEye and Fox-IT web portal to Solutions section - August 15, 2014

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-098A: OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)
    Original release date: April 08, 2014

    Systems Affected

    • OpenSSL 1.0.1 through 1.0.1f
    • OpenSSL 1.0.2-beta

    Overview

    A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.

    Description

    OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its implementation of the TLS/DTLS heartbeat functionality. This flaw allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time. Note that an attacker can repeatedly leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the intended secrets. The sensitive information that may be retrieved using this vulnerability include:

    • Primary key material (secret keys)
    • Secondary key material (user names and passwords used by vulnerable services)
    • Protected content (sensitive data used by vulnerable services)
    • Collateral (memory addresses and content that can be leveraged to bypass exploit mitigations)

    Exploit code is publicly available for this vulnerability. Additional details may be found in CERT/CC Vulnerability Note VU#720951.

    Impact

    This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time.

    Solution

    OpenSSL 1.0.1g has been released to address this vulnerability. Any keys generated with a vulnerable version of OpenSSL should be considered compromised and regenerated and deployed after the patch has been applied.

    US-CERT recommends system administrators consider implementing Perfect Forward Secrecy to mitigate the damage that may be caused by future private key disclosures.

    References

    Revision History

    • Initial Publication

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-069A: Microsoft Ending Support for Windows XP and Office 2003
    Original release date: March 10, 2014 | Last revised: June 18, 2014

    Systems Affected

    • Microsoft Windows XP with Service Pack 3 (SP3) Operating System
    • Microsoft Office 2003 Products

    Overview

    Microsoft is ending support for the Windows XP operating system and Office 2003 product line on April 8, 2014. [1] After this date, these products will no longer receive:

    • Security patches which help protect PCs from harmful viruses, spyware, and other malicious software
    • Assisted technical support from Microsoft
    • Software and content updates

    Description

    All software products have a lifecycle. End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. [2] As of February 2014, nearly 30 percent of Internet-connected PCs still run Windows XP. [3]

    Microsoft will send “End of Support” notifications to users of Windows XP who have elected to receive updates via Windows Update. Users in organizations using Windows Server Update Services (WSUS), System Center Configuration manager, or Windows Intune will not receive the notification. [4]

    Impact

    Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

    Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows XP or Office 2003.

    Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements. [4]

    Solution

    Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

    Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP and Office 2003 offer additional details.

    There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite. US-CERT does not endorse or support any particular product or vendor.

    Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to receive support temporarily. Users should consult the support pages of their chosen alternative browser for more details.

    References

    Revision History

    • March 10, 2014 - Initial Release
    • June 18, 2014 - A spelling correction was made.

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-017A: UDP-based Amplification Attacks
    Original release date: January 17, 2014 | Last revised: March 07, 2014

    Systems Affected

    Certain UDP protocols have been identified as potential attack vectors:

    • DNS
    • NTP
    • SNMPv2
    • NetBIOS
    • SSDP
    • CharGEN
    • QOTD
    • BitTorrent
    • Kad
    • Quake Network Protocol
    • Steam Protocol

    Overview

    A Distributed Reflective Denial of Service (DRDoS) attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible UDP servers, as well as bandwidth amplification factors, to overwhelm a victim system with UDP traffic.

    Description

    UDP, by design, is a connection-less protocol that does not validate source IP addresses.  Unless the application-layer protocol uses countermeasures such as session initiation, it is very easy to forge the IP packet datagram to include an arbitrary source IP address [7].  When many UDP packets have their source IP address forged to a single address, the server responds to that victim, creating a reflected Denial of Service (DoS) Attack.

    Recently, certain UDP protocols have been found to have particular responses to certain commands that are much larger than the initial request.  Where before, attackers were limited linearly by the number of packets directly sent to the target to conduct a DoS attack, now a single packet can generate tens or hundreds of times the bandwidth in its response.  This is called an amplification attack, and when combined with a reflective DoS attack on a large scale it makes it relatively easy to conduct DDoS attacks.  

    To measure the potential effect of an amplification attack, we use a metric called the bandwidth amplification factor (BAF).  BAF can be calculated as the number of UDP payload bytes that an amplifier sends to answer a request, compared to the number of UDP payload bytes of the request [9] [10].

    The list of known protocols, and their associated bandwidth amplification factors, is listed below.  US-CERT would like to offer thanks to Christian Rossow for providing this information to us.  For more information on bandwith amplificatication factors, please see Christian's blog and associated research paper.

    ProtocolBandwidth Amplification FactorVulnerable Command
    DNS28 to 54see: TA13-088A [1]
    NTP556.9see: TA14-013A [2]
    SNMPv26.3GetBulk request
    NetBIOS3.8Name resolution
    SSDP30.8SEARCH request
    CharGEN358.8Character generation request
    QOTD140.3Quote request
    BitTorrent3.8File search
    Kad16.3Peer list exchange
    Quake Network Protocol63.9Server info exchange
    Steam Protocol5.5Server info exchange

     

    Impact

    Attackers can utilize the bandwidth and relative trust of large servers that provide the above UDP protocols to flood victims with unwanted traffic, a DDoS attack.

    Solution

    DETECTION

    Detection of DRDoS attacks is not easy, due to their use of large, trusted servers that provide UDP services.  As a victim, traditional DoS mitigation techniques may apply.

    As a network operator of one of these exploitable services, look for abnormally large responses to a particular IP address.  This may indicate that an attacker is using your service to conduct a DRDoS attack.

    MITIGATION

    Source IP Verification

    Because the UDP requests being sent by the attacker-controlled clients must have a source IP address spoofed to appear as the victim’s IP, the first step to reducing the effectiveness of UDP amplification is for Internet Service Providers to reject any UDP traffic with spoofed addresses. The Network Working Group of the Internet Engineering Task Force (IETF) released Best Current Practice 38 document in May 2000 and Best Current Practice 84 in March 2004 that describes how an Internet Service Provider can filter network traffic on their network to reject packets with source addresses not reachable via the actual packet’s path [3][4].  The changes recommended in these documents would cause a routing device to evaluate whether it is possible to reach the source IP address of the packet via the interface that transmitted the packet. If it is not possible, then the packet most likely has a spoofed source IP address. This configuration change would substantially reduce the potential for most popular types of DDoS attacks. As such, we highly recommend to all network operators to perform network ingress filtering if possible.  Note that it will not explicitly protect a UDP service provider from being exploited in a DRDoS (all network providers must use ingress filtering in order to completely eliminate the threat).

    To verify your network has implemented ingress filtering, download the open source tools from the Spoofer Project [5].

    Traffic Shaping

    Limiting responses to UDP requests is another potential mitigation to this issue.  This may require testing to discover the optimal limit that does not interfere with legitimate traffic.  The IETF released Request for Comment 2475 and Request for Comment 3260 that describes some methods to shape and control traffic [6] [8].  Most network devices today provide these functions in their software. 

    References

    Revision History

    • February 09, 2014 - Initial Release
    • March 07, 2014 - Updated page to include research links

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    TA14-013A: NTP Amplification Attacks Using CVE-2013-5211
    Original release date: January 13, 2014 | Last revised: February 05, 2014

    Systems Affected

    NTP servers

    Overview

    A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to overwhelm a victim system with UDP traffic.

    Description

    The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the “monlist” command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim’s address.

    Impact

    The attack relies on the exploitation of the 'monlist' feature of NTP, as described in CVE-2013-5211, which is enabled by default on older NTP-capable devices. This command causes a list of the last 600 IP addresses which connected to the NTP server to be sent to the victim. Due to the spoofed source address, when the NTP server sends the response it is sent instead to the victim. Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim. Additionally, because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks. The solution is to disable “monlist” within the NTP server or to upgrade to the latest version of NTP (4.2.7) which disables the “monlist” functionality.

    Solution

    Detection

    On a UNIX-platform, the command “ntpdc” will query existing NTP servers for monitoring data. If the system is vulnerable to exploitation, it will respond to the “monlist” command in interactive mode. By default, most modern UNIX and Linux distributions allow this command to be used from localhost, but not from a remote host. To test for monlist support, execute the following command at the command line:

    /usr/sbin/ntpdc <remote server>

    monlist

    Additionally, the “ntp-monlist” script is available for NMap, which will automatically display the results of the monlist command. If the system does not support the monitor query, and is therefore not vulnerable to this attack type, NMap will return an error type 4 (No Data Available) or no reply at all.

     

    Recommended Course of Action

    As all versions of ntpd prior to 4.2.7 are vulnerable by default, the simplest recommended course of action is to upgrade all versions of ntpd that are publically accessible to at least 4.2.7. However, in cases where it is not possible to upgrade the version of the service, it is possible to disable the monitor functionality in earlier versions of the software.

    To disable “monlist” functionality on a public-facing NTP server that cannot be updated to 4.2.7, add the “noquery” directive to the “restrict default” line in the system’s ntp.conf, as shown below:

    restrict default kod nomodify notrap nopeer noquery

    restrict -6 default kod nomodify notrap nopeer noquery

    References

    Revision History

    • January 13, 2014 - Initial Release

    This product is provided subject to this Notification and this Privacy & Use policy.



    US-CERT Alerts ~Created Sat Nov 1 13:21:58 2014

    ICE and Qatari Security Forces at the Winter Olympics Put Italians on Edge
    The influx of security personnel from around the world is sparking concern among Italians ahead of the Milano Cortina Olympic Games.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Jeffrey Epstein Had a ‘Personal Hacker,’ Informant Claims
    Plus: AI agent OpenClaw gives cybersecurity experts the willies, China executes 11 scam compound bosses, a $40 million crypto theft has an unexpected alleged culprit, and more.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    How to Film ICE
    Filming federal agents in public is legal, but avoiding a dangerous—even deadly—confrontation isn’t guaranteed. Here’s how to record ICE and CBP agents as safely as possible and have an impact.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    ICE Pretends It’s a Military Force. Its Tactics Would Get Real Soldiers Killed
    WIRED asked an active military officer to break down immigration enforcement actions in Minneapolis and elsewhere.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    An AI Toy Exposed 50,000 Logs of Its Chats With Kids to Anyone With a Gmail Account
    AI chat toy company Bondu left its web console almost entirely unprotected. Researchers who accessed it found nearly all the conversations children had with the company’s stuffed animals.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    ICE Is Using Palantir’s AI Tools to Sort Through Tips
    ICE has been using an AI-powered Palantir system to summarize tips sent to its tip line since last spring, according to a newly released Homeland Security document.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Here’s the Company That Sold DHS ICE’s Notorious Face Recognition App
    Immigration agents have used Mobile Fortify to scan the faces of countless people in the US—including many citizens.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    6 Best VPN Services (2026), Tested and Reviewed
    Every VPN says it’s the best, but only some of them are telling the truth.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive
    A source trapped inside an industrial-scale scamming operation contacted me, determined to expose his captors’ crimes—and then escape. This is his story.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Revealed: Leaked Chats Expose the Daily Life of a Scam Compound’s Enslaved Workforce
    A whistleblower trapped inside a “pig butchering” scam compound gave WIRED a vast trove of its internal materials—including 4,200 pages of messages that lay out its operations in unprecedented detail.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Judge Delays Minnesota ICE Decision While Weighing Whether State Is Being Illegally Punished
    A federal judge ordered a new briefing due Wednesday on whether DHS is using armed raids to pressure Minnesota into abandoning its sanctuary policies, leaving ICE operations in place for now.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Deepfake ‘Nudify’ Technology Is Getting Darker—and More Dangerous
    Sexual deepfakes continue to get more sophisticated, capable, easy to access, and perilous for millions of women who are abused with the technology.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    The Instant Smear Campaign Against Border Patrol Shooting Victim Alex Pretti
    Within minutes of the shooting, the Trump administration and right-wing influencers began disparaging the man shot by a federal immigration officer on Saturday in Minneapolis.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    ICE Asks Companies About ‘Ad Tech and Big Data’ Tools It Could Use in Investigations
    A new federal filing from ICE demonstrates how commercial tools are increasingly being considered by the government for law enforcement and surveillance.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    DOGE May Have Misused Social Security Data, DOJ Admits
    Plus: The FAA blocks drones over DHS operations, Microsoft admits it hands over Bitlocker encryption keys to the cops, and more.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    US Judge Rules ICE Raids Require Judicial Warrants, Contradicting Secret ICE Memo
    The ruling in federal court in Minnesota lands as Immigration and Customs Enforcement faces scrutiny over an internal memo claiming judge-signed warrants aren’t needed to enter homes without consent.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    CBP Wants AI-Powered ‘Quantum Sensors’ for Finding Fentanyl in Cars
    US Customs and Border Protection is paying General Dynamics to create prototype “quantum sensors,” to be used with an AI database to detect fentanyl and other narcotics.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    149 Million Usernames and Passwords Exposed by Unsecured Database
    This “dream wish list for criminals” includes millions of Gmail, Facebook, banking logins, and more. The researcher who discovered it suspects they were collected using infostealing malware.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    ICE Agents Are ‘Doxing’ Themselves
    The alleged risks of being publicly identified have not stopped DHS  and ICE employees from creating profiles on LinkedIn, even as Kristi Noem threatens to treat revealing agents’ identities as a crime.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    Surveillance and ICE Are Driving Patients Away From Medical Care, Report Warns
    A new EPIC report says data brokers, ad-tech surveillance, and ICE enforcement are among the factors leading to a “health privacy crisis” that is eroding trust and deterring people from seeking care.
    Security Latest ~Created Tue Feb 3 01:33:39 2026

    + Janes/IHS ~ CurrentActivityCERT ~ CERT ~ WiredSecurity +
    Tech - Linux/BSD - Apache - Security - Hardware - Gaming - Autos - World - Entertainment - About
    Powered by mod_perl Powered by Pure Perl Valid XHTML
    Tuesday, 03-Feb-2026 04:10:35 EST you asked for http://newsbone.com/security/index.shtml from 216.73.216.149:4195