We just released XPU 1.2 for Network Sensor 5.0. RealSecure Network Sensor
XPU 1.2 addresses two issues in the RealSecure Network Sensor 5.0 release.
This XPU eliminates a remote vulnerability in the TrinooDaemon Decode and a
false positive issue in the ISS Scan Decode. Please read the release notes
for more information. You can download the XPU right now through the RS
Console.
*************************************************************
Audra Eng
Internet Security Systems (ISS)
Phone: 415-379-3566
Fax: 415-831-4780
Internet Security Systems -- The Power to Protect
*******************************************************************
<<RELNOTES_XPU_MU1_2_Aug0200.txt>>
=====================================================================
Network Sensor Micro-Update 1.2 RELEASE NOTES
==================================================
Last modified: August 2, 2000
Two issues in the RealSecure Network Sensor 5.0 release have been identified and are
being addressed by this update:
---------------------
TrinooDaemon Decode
Fix Priority:
critical
Problem Description:
A critical defect has been identified in the TrinooDaemon decode. The defect
can
result in the remote crash of a Network Sensor when the TrinooDeamon decode is
enabled.
Fix Description:
MicroUpdate 1.2 eliminates this remote vulnerability.
Decode Description:
Trin00 is a distributed denial of service attack tool. The TrinooDaemon
decode
detects the Trin00 program's master-daemon communications.
---------------------
ISS Scan Decode
Fix Priority:
low
Problem Description:
A False Positive issue has been identified in the ISS Scan Signature. It was
possible for certain ICMP Echo Request payloads to falsely trigger the ISS
Scan
event, when in fact no scan is taking place.
Fix Description:
MicroUpdate 1.2 eliminates this false positive.
Decode Description:
The ISS Scan Decode provides notification that a network is being probed by
ISS's
Internet Security Scanner.
---------------------
MicroUpdate 1.2 does not contain a console update, this is purely a fix release and
does not contain any new decodes. The console will display update level 1.1, while the
network sensor will display 1.2.
1. Customer Support
====================
Available 8 AM to 8 PM Monday through Friday US Eastern Time (GMT-5).
Telephone (in the U.S.): 1-888-447-4861
Telephone (outside the U.S.): +1-678-443-6400
E-mail: [EMAIL PROTECTED]
=====================================================================
=====================================================================
RealSecure X-Press Updates are cummulative. The Release Notes for Micro-Update 1.1
are included below.
==================================================
Network Sensor Micro-Update 1.1 RELEASE NOTES
==================================================
RealSecure 5.0 now has X-Press Update capability, a technology that allows customers
to take full advantage of ISS X-Force research. From the ISS website, customers can
download just the latest attack signatures and remotely distribute them to their
sensors. As always, our signatures are verified, QA tested and digitally signed for
authentication within the product.
The RealSecure X-Press Update mechanism also supports the ability to completely
upgrade sensors to the new version. Once a RealSecure 5.0 sensor is installed,
customers can upgrade that sensor to the next released version from a remote or
centralized RealSecure WorkGroup Manager (formerly called the Console). This makes it
easier to manage more sensors.
The X-Press Update simplifies the process by automatically pointing you to the latest,
cumulative update for a sensor. Its easy-to-use design ensures that only the software
appropriate for your platform is installed.
DESCRIPTION:
RealSecure X-Press Update 1.1 is released concurrently with RealSecure 5.0 and
delivers a new signature, SubSeven_Scan for the Network Sensor.
SubSeven (aka BackDoor-G) is a trojan tool that can be used by malicious users to
maintain access to Windows 95 and 98 machines and control them from remote over TCP.
Reference:
SubSeven Web Page: http://freehosting2.at.webjump.com/ar/arvid-org/
==================================================
1. X-Press Update Description
1.1 X-Press Update Type Definitions
Micro-update:
A DLL or shared library that contains signature updates only.
Service Release:
A fix to a critical problem. May be a new sensor or daemon binary or some combination
of files. Less than a full install or Full Upgrade but generally treated as one.
Full Upgrade:
A complete new release (full install) of a sensor and new signatures.
Uninstall:
Removing the last installed update and restoring the system to the state it was in
prior to the update. Note this only applies to MicroUpdates and Patches.
1.2 Prerequisites for installing an X-Press Update
* RealSecure console must be version 5.0 or higher.
* RealSecure sensor must be version 5.0 or higher.
* Must have master controller status for the sensor being updated.
* Must have access to the X-Press Updates through an Internet connection, SAFEsuite
CD, or local network.
* Must close the RealSecure online help before installing the X-Press Update package.
1.3 New Signatures
Risk Check Name Category
==== ==================== =========
High SubSeven_Scan Backdoors
1.4 Testing X-Press Updates
In addition to the messages that indicate that an X-Press Update was successfully
installed, you can test the SSH_Detected signature in the update:
1.4.1 Testing the SSH signature in the first X-Press Update
SSH_Detected is the only decode which currently contains event info which indicates
whether the decode is running as a built-in signature or Micro-update.
1. Enable the SSH_Detected signature.
2. Using an SSH client, attempt to connect to an SSH server on the network segment
being
monitored. The SSH_Detected event will trigger.
3. Inspect the event. The SSH_Detected event will report its DecodeType as "Builtin".
4. Install the X-Press Update.
5. Attempt to connect to an SSH server again. The SSH_Detected event will trigger
again.
6. Inspect the event. The SSH_Detected event will report its DecodeType as
"MicroDecode".