@RISK Newsletter for August 09, 2012
The consensus security vulnerability alert.
Vol. 12, Num. 32
This is a weekly newsletter that provides in-depth analysis of the latest vulnerabilities with straightforward remediation advice. Qualys supplies a large part of the newly-discovered vulnerability content used in this newsletter.
Archived issues may be found at the SANS @RISK Newletter Archive.
CONTENTS:
NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 8/1/2012 - 8/7/2012
TOP VULNERABILITY THIS WEEK: New variants of the popular Gozi keylogging
trojan, a favorite of cybercriminals intent on stealing banking
credentials and other sensitive data since 2005, have been observed in
the wild over the past week. The trojan has been successful over the
years by continually morphing in an effort to evade IDS and AV systems,
and the latest variant does exactly that.
NOTABLE RECENT SECURITY ISSUES SELECTED BY THE SOURCEFIRE VULNERABILITY RESEARCH TEAM
Title: Malvertising Campaign Uses Novel iframe Hiding Technique
Description: Hidden HTML iframes are a common hallmark of malicious web
content. The Sourcefire VRT recently observed a widespread malvertising
campaign in the wild which was employing a novel method for hiding its
malicious iframe, which was designed to evade existing IDS and AV
techniques.
Reference:
http://vrt-blog.snort.org/2012/08/stupid-css-tricks.html
Snort SID: 23618
ClamAV: N/A
Title: Gozi Trojan Continues To Spread In The Wild
Description: The Sourcefire VRT has observed new variants of the Gozi
keylogging trojan spreading in the wild this week. This trojan, which
has been stealing banking credentials and other valuable user data since
2005, has continued to prove effective in the field due to its
constantly shifting behavior and intelligent evasion methods. The
iteration currently being observed in the field has subtle differences
from the most recent variants, but is different enough to warrant
updated coverage by many IDS and AV tools.
Reference:
http://www.virustotal.com/file/a6b6642b2cc6386d71c90c0a6bb27f873e13fa940f8bd568515515471f74b152/analysis/
http://en.wikipedia.org/wiki/Gozi_(Trojan_horse)
Snort SID: 23635
ClamAV: Trojan.Agent-303654
Title: Apache Struts Java Framework Remote Code Executin
Description: The Apache Struts framework, a popular plugin for deploying
Java-based web applications, is vulnerable to a remote code execution
attack. Specifically, the ExceptionDelegator component, when handling
certain input values, can be fooled into simply executing arbitrary Java
code. Public exploit code exists, and the Sourcefire VRT has seen signs
of the bug being exploited in the wild. Administrators are urged to
patch their systems promptly.
Reference:
http://issues.apache.org/jira/browse/WW-3668
http://www.exploit-db.com/exploits/18329/
Snort SIDs: 21072, 21073, 23631
ClamAV: N/A
Title: Blackhole Exploit Kit JavaScript Evasion Methods Evolving
Description: One of the reasons the Blackhole Exploit Kit is so popular
among cybercriminals is that it is constantly updated to evade
detection. The Sourcefire VRT has observed a recent update in the field,
which targets some of the keys previously used for IDS detection. While
old signatures are still useful, as many versions of the kit exist in
the wild, new signatures have been created to handle the latest
revision.
Reference:
http://sophosnews.files.wordpress.com/2012/03/blackhole_paper_mar2012.pdf
http://en.wikipedia.org/wiki/Blackhole_exploit_kit
Snort SIDs: 23619, 23622, 23781, 23785, 23786
ClamAV: Trojan.Blackhole-507
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
Harvesting data on the Xarvester Botmaster:
http://krebsonsecurity.com/2012/08/harvesting-data-on-the-xarvester-botmaster/
Android DNS poisoning: Randomness gone bad (CVE-2012-2808):
http://blog.watchfire.com/wfblog/2012/07/android-dns-poisoning-randomness-gone-bad-cve-2012-2808.html
NinjaTel, the hacker cellphone network
http://www.robotskirts.com/2012/08/02/ninjatel-the-hacker-cellphone-network/
File that is simultaneously a valid PE/PDF/HTML/JAR:
http://code.google.com/p/corkami/downloads/detail?name=CorkaMIX.zip
- From 0 permission app to INSTALL_PACKAGES on Samsung Galaxy S3:
http://sh4ka.fr/android/galaxys3/from_0perm_to_INSTALL_PACKAGES_on_galaxy_S3.html
Anatomy of a targeted attack:
http://blog.accuvantlabs.com/blog/jhorne/anatomy-targeted-attack
How malware employs anti-debugging, anti-disassembly, and
anti-virtualization technologies:
https://community.qualys.com/blogs/securitylabs/2012/07/30/how-malware-employs-anti-debugging-anti-disassembly-and-anti-virtualization-technologies
Snort User Defined Language (UDL) in Notepad++
http://www.tropismgroup.org/2012/08/02/snort-user-defined-language-udl-in-notepad/
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.
ID: : CVE-2012-3020
Title: Siemens Synco OZW Insecure Default Password Vulnerability
Vendor: Siemens
Description: The Siemens Synco OZW Web Server devices OZW672.,
OZW772., and OZW775 with firmware before 4 have an unspecified default
password, which makes it easier for remote attackers to obtain
administrative access via a network session.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: : CVE-2012-0549
Title: Oracle AutoVue ActiveX Control SetMarkupMode Buffer Overflow
Vendor: Oracle
Description: Unspecified vulnerability in the Oracle AutoVue Office
component in Oracle Supply Chain Products Suite 20.0.2 allows remote
attackers to affect confidentiality, integrity, and availability,
related to Desktop API.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: CVE-2012-3951
Title: Scrutinizer Default Password Security Bypass Vulnerability
Vendor: Plixer
Description: The MySQL component in Plixer Scrutinizer (aka Dell
SonicWALL Scrutinizer) 9.0.1.19899 and earlier has a default password
of admin for the (1) scrutinizer and (2) scrutremote accounts, which
allows remote attackers to execute arbitrary SQL commands via a TCP
session.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: CVE-2010-3964
Title: Microsoft Office SharePoint Server 2007 Remote Code Execution
Vendor: Microsoft
Description: Unrestricted file upload vulnerability in the Document
Conversions Launcher Service in Microsoft Office SharePoint Server 2007
SP2, when the Document Conversions Load Balancer Service is enabled,
allows remote attackers to execute arbitrary code via a crafted SOAP
request to TCP port 8082, aka “Malformed Request Code Execution
Vulnerability.”
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: CVE-2012-1723
Title: Oracle Java SE Remote Code Execution Vulnerability / Blackhole
Exploit Kit
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32
and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows
remote attackers to affect confidentiality, integrity, and availability
via unknown vectors related to Hotspot.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
MOST PREVALENT MALWARE FILES 8/1/2012 - 8/7/2012: COMPILED BY SOURCEFIRE
SHA 256: CB85D393C4E0DB5A1514C21F9C51BA4C12D82B7FABD9724616758AE528A5B16B
MD5: 7961a56c11ba303f20f6a59a506693ff
VirusTotal: https://www.virustotal.com/file/CB85D393C4E0DB5A1514C21F9C51BA4C12D82B7FABD9724616758AE528A5B16B/analysis/
Typical Filename: C8A787C22000AE378610003396E67500D587FA4E
.exe
Claimed Product: My Web Search Bar for Internet Explorer and FireFox
Claimed Publisher: MyWebSearch.com
SHA 256: DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C
MD5: 25aa9bb549ecc7bb6100f8d179452508
VirusTotal: https://www.virustotal.com/file/DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C/analysis/
Typical Filename: smona_df83a0d6940600e4c4954f4874fcd4dd73e781e6690c3bf56f51c95285484a3c.bin
Claimed Product: smona_df83a0d6940600e4c4954f4874fcd4dd73e781e6690c3bf56f51c95285484a3c.bin
Claimed Publisher: smona_df83a0d6940600e4c4954f4874fcd4dd73e781e6690c3bf56f51c95285484a3c.bin
SHA 256: AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615
MD5: 3291e1603715c47a23b60a8bf2ca73db
VirusTotal: https://www.virustotal.com/file/AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615/analysis/
Typical Filename: avz00001.dta
Claimed Product: avz00001.dta
Claimed Publisher: avz00001.dta
SHA 256: 9A09BCC1402050E371E13056B606BBDE8DF15CD87732B28C8BDDB863B1C65302
MD5: 923c4d13bee966654f4fe4a8945af0ae
VirusTotal: https://www.virustotal.com/file/9A09BCC1402050E371E13056B606BBDE8DF15CD87732B28C8BDDB863B1C65302/analysis/
Typical Filename: winoaox.exe
Claimed Product: winoaox.exe
Claimed Publisher: winoaox.exe
SHA 256: E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B
MD5: bf31a8d79f704f488e3dbcb6eea3b3e3
VirusTotal: https://www.virustotal.com/file/E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B/analysis/
Typical Filename: bf31a8d79f704f488e3dbcb6eea3b3e3
Claimed Product: bf31a8d79f704f488e3dbcb6eea3b3e3
Claimed Publisher: bf31a8d79f704f488e3dbcb6eea3b3e3