TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to [EMAIL PROTECTED] Contact [EMAIL PROTECTED] for help with any problems! ----------------------------------------------------------------------------
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 INTERNET THREAT UPDATE for 12-27-2001 ISS X-Force Special Operations Group www.iss.net - Click on 'Current Internet Threat' for more information. ****************************************************** ALERTCON 2 Projected: AlertCon 2 ****************************************************** - - We remain at AlertCon 2 and plan to remain there through the holidays due to the vulnerabilities found in Internet Explorer, the Login Buffer overflow vulnerability and the vulnerability relating to Universal Plug and Play (UPnP) in Windows XP, ME, as well as Win 98 and 98 SE running XP Internet Connection Sharing client. Additionally, Microsoft has released a Security Bulletin with a patch for a vulnerability found in the SQL Server 7.0 and 2000. If unpatched it could lead to buffer overflows and be subject to denial of service attacks. - - Microsoft has just released a patch for Unchecked Buffer in UPnP, which can lead to a system compromise. Microsoft strongly urges all Windows XP customers to apply the patch immediately. Customers using Windows 98, 98SE or ME should apply the patch if the Universal Plug and Play service is installed and running. Please read the FAQ portion of the Microsoft alert for a full understanding of the vulnerabilities. - - Remind users to be suspicious of e-mail attachments; verify that security patches for critical systems are up-to-date; verify call rosters are current and that key personnel can be reached should an emergency occur; and, desktop systems not needed over long weekends and vacations should be turned off to reduce exposure. - ------------------------------------------------------ RECOMMENDATIONS - ------------------------------------------------------ - -Regarding the Microsoft UPnP vulnerability - review the X-Force alert at: (http://xforce.iss.net/alerts/advise106.php). X-Force also recommends that Internet Firewalls should be configured to block ports 1900 and 5000. - - See the Microsoft patch for the unchecked buffer in UPnP found at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/sec urity/bulletin/MS01-059.asp - - Regarding the three vulnerabilities in the IE versions 5.5 and 6.0, review MS Security advisory MS01-058 and apply the appropriate patch: (http://www.microsoft.com/technet/treeview/default.asp?url=/technet/se curity/bulletin/MS01-058.asp) - - Regarding the multi-vendor Login buffer overflow, in addition to loading the vendor patches below, customers can take several precautions to minimize their risk. Disable default terminal communications services, including Telnet and Rlogin. Install and use Secure Shell (SSH) as a secure alternative. SSH implements encrypted terminal connections, and is designed to replace insecure protocols such as Telnet and Rlogin. - - See the X-Force advisory for details, solutions to the SysV derived login vulnerability. http://xforce.iss.net/alerts/advise105.php - - Additional information is available in CERT-CC advisory CA 2001-34 http://www.cert.org/advisories/CA-2001-34.html - - For the Microsoft SQL Server patch see: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/sec urity/bulletin/MS01-060.asp - - Continue to update your anti-virus solution of choice as the virus and worm writers do not seem to understand the concept of taking a vacation. - ------------------------------------------------------ ATTACK SIGNATURE RANKING - global IDS, midnight - midnight, previous Day, % of total - ------------------------------------------------------ Unauthorized Access Attempt 49.94% Protocol Decode 28.22% Suspicious Activity 11.08% Denial Of Service 07.12% Pre-Attack Probe 03.61% Back Door 00.03% - ------------------------------------------------------ TOP TEN ATTACK DESTINATION PORTS - global IDS, midnight - midnight, previous day, % of top ten (ports found at) http://www.networkice.com/Advice/Exploits/Ports/default.htm - ------------------------------------------------------ 80 (http) 89.19% 21 (ftp) 03.32% 22 (ssh) 01.96% 23 (Telnet) 01.61% 25 (smtp) 01.11% 69 (tftp) 00.84% 443 (ssl) 00.76% 515 (lp,lpr,line prnt) 00.63% 6723 (unassigned) 00.32% 15104 (unassigned) 00.27% - ------------------------------------------------------ BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER - ------------------------------------------------------ Background. We provide this information in the spirit of PDD 63 to help security professionals wage the war against Internet threats more effectively. Information in this update derived primarily from global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research, and professional liaison. Other sources as noted. AlertCon 1 reflects the global, malicious, determined, 24 x 7 attacks experienced by all networks. AlertCon 2 means increased vigilance/action recommended due to a specific threat or concern. AlertCon 3 means increased attacks against specific targets or vulnerabilities on a scale that is unusually high, action required. AlertCon 4 reflects an Internet emergency for a target or group of targets whose business continuity may depend on some sort of immediate, decisive action. All summaries cover 24 hours the previous workday, GMT. Monday summaries may cover some weekend activity. Copyright 2001 Internet Security Systems, Inc. Permission is granted for the redistribution of the Internet Threat Update electronically. It is not to be sold or edited in any way without express consent of ISS. Refer comments or questions to: [EMAIL PROTECTED] or [EMAIL PROTECTED] Disclaimer: This information is subject to change without notice. Use of this information constitutes acceptance for use in an 'as is' condition. There are no warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. No other use authorized. FOIA Exemption 4. Patrick Gray Manager, Internet Threat Intelligence Center X-Force, MSS Special Operations Group Internet Security Systems 6303 Barfield Road Atlanta, GA 30328 [EMAIL PROTECTED] -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBPCvIzZG41ROSQPncEQI7mACeKJg6XiASoyshyST6qtw8xmTEppAAnjBH sVfzMDxhTbGsbVUvXG2Mi8tc =isHz -----END PGP SIGNATURE-----
