@RISK Newsletter for May 02, 2013
The consensus security vulnerability alert.
Vol. 13, Num. 18
This is a weekly newsletter that provides in-depth analysis of the latest vulnerabilities with straightforward remediation advice. Qualys supplies a large part of the newly-discovered vulnerability content used in this newsletter.
Archived issues may be found at the SANS @RISK Newletter Archive.
CONTENTS:
NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 4/23/2013 - 4/30/2012
TOP VULNERABILITY THIS WEEK: A new Linux worm is rapidly spreading in
the wild, covertly dropping a new copy of the Apache binary on infected
systems and using them to quietly inject the Blackhole exploit kit.
Administrators are urged to carefully check their systems for signs of
compromise to the Apache binary, and to secure CPanel installations
tightly, or keep them off of the public Internet where possible.
NOTABLE RECENT SECURITY ISSUES SELECTED BY THE SOURCEFIRE VULNERABILITY RESEARCH TEAM
Title: CDorked worm spreads through Linux servers, dropping Blackhole
Description: A new virus specifically targeting Linux systems with
CPanel installed, known as Linxu/CDorked, is currently making its way
through the Internet, dropping Blackhole exploit kits on infected
systems after replacing their copy of the local Apache server binary.
System administrators are urged to patch their systems to current
levels, and to disable remote access to CPanel except where strictly
necessary.
Reference:
http://blog.sucuri.net/2013/04/apache-binary-backdoors-on-cpanel-based-servers.html
Snort SID: 26527-26532
ClamAV: Linux/CDorked.A
Title: Multiple vulnerabilities in DLink IP cameras
Description: A slew of serious, remotely exploitable vulnerabilities
were announced in DLink IP cameras this week, including default
passwords and arbitrary command injection without authentication. Owners
of these cameras are urged to immediately disable remote access to them
wherever possible, and apply current firmware updates in all cases.
Reference:
http://seclists.org/fulldisclosure/2013/Apr/253
Snort SID: 1122, 26559
ClamAV: N/A
Title: WordPress brute force scanners spiking in the wild
Description: A rash of scanners brute-forcing their way into poorly
secured WordPress installations has been detected in the wild within the
last few weeks, rising to heretofore unseen levels of activity. Once
inside, the scanners typically drop web shells disguised as GIF files,
along with other malicious content such as exploit kits and the like.
Administrators are urged to ensure the use of secure, non-default
passwords for all WordPress installations.
Reference:
http://engineeringevil.com/2013/04/16/massive-brute-force-attack-targets-wordpress-sites-worldwide/
http://vrt-blog.snort.org/2012/06/web-shell-poses-as-gif.html
Snort SID: 23114, 26557
ClamAV: N/A
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
Library of malware traffic patterns:
http://www.deependresearch.org/2013/04/library-of-malware-traffic-patterns.html
Introducing EMET v4 beta:
http://blogs.technet.com/b/srd/archive/2013/04/18/introducing-emet-v4-beta.aspx
Google Glass rooted, then kernel source code released:
http://www.infosecurity-magazine.com/view/32090/google-glass-rooted-then-kernel-source-code-released/
The Redkit malware gang has a message for Brian Krebs:
http://nakedsecurity.sophos.com/2013/04/25/redkit-exploit-brian-krebs/
AP Twitter hack came after well-disguised spear phish:
https://twitter.com/MikeBakerAP/status/326749951960940544
CVE-2013-0640 samples listing:
http://contagiodump.blogspot.com/2013/04/cve-2013-0640-samples-listing.html
Analysis of an evasive backdoor:
http://www.lastline.com/analysis-of-an-evasive-backdoor
Don’t sign that applet:
http://www.cert.org/blogs/certcc/2013/04/dont_sign_that_applet.html
RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM
This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.
ID: CVE-2013-2423
Title: Java Applet Reflection Type Confusion Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK
7, allows remote attackers to affect integrity via unknown vectors
related to HotSpot. NOTE: the previous information is from the April
2013 CPU. Oracle has not commented on claims from the original
researcher that this vulnerability allows remote attackers to bypass
permission checks by the MethodHandles method and modify arbitrary
public final fields using reflection and type confusion, as demonstrated
using integer and double fields to disable the security manager.
CVSS v2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
ID: CVE-2013-1362
Title: Nagios Remote Plugin Executor Arbitrary Command Execution
Vendor: nagios.org
Description: A remote exploitation of an input validation error
vulnerability in versions prior to 2.14 of Nagios, as included in
various vendors’ operating system distributions, could allow attackers
to execute arbitrary commands on the targeted host.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
ID: CVE-2013-0632
Title: Adobe ColdFusion APSB13-03 Remote Exploit
Vendor: Adobe
Description: Adobe ColdFusion 9.0, 9.0.1, 9.0.2, and 10 allows remote
attackers to bypass authentication and possibly execute arbitrary code
via unspecified vectors, as exploited in the wild in January 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: CVE-2013-1080
Title: Novell ZENworks Configuration Management Remote Execution
Vendor: Novell
Description: The web server in Novell ZENworks Configuration Management
(ZCM) 10.3 and 11.2 does not properly perform authentication for
zenworks/jsp/index.jsp, which allows remote attackers to conduct
directory traversal attacks, and consequently upload and execute
arbitrary programs, via a request to TCP port 443.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
ID: CVE-2013-1493
Title: Oracle Java SE JVM 2D Subcomponent Remote Code Execution
Vulnerability (Oracle Security Alert for CVE-2013-1493)
Vendor: Oracle
Description: The color management (CMM) functionality in the 2D
component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and
earlier, and 5.0 Update 40 and earlier allows remote attackers to
execute arbitrary code or cause a denial of service (crash) via an image
with crafted raster parameters, which triggers (1) an out-of-bounds read
or (2) memory corruption in the JVM, as exploited in the wild in
February 2013.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
MOST PREVALENT MALWARE FILES 4/23/2013 - 4/30/2012 COMPILED BY SOURCEFIRE
SHA 256: D14B66BD4C4C8F66A6EDF2820FD4162D09B326BEAF6A42014596571E81A1A503
MD5: 68b7f7a26b76805432e3d50009d2ab1f
VirusTotal: https://www.virustotal.com/file/D14B66BD4C4C8F66A6EDF2820FD4162D09B326BEAF6A42014596571E81A1A503/analysis/
Typical Filename: desgrx.exe
Claimed Product: desgrx.exe
Claimed Publisher: desgrx.exe
SHA 256: E83A61AE6CFED6861AFDFA73CA41B0000BFCFD4FF710B8C0067805024286CD07
MD5: 8bc3498a39fb2d290a8975fd5419eb55
VirusTotal: https://www.virustotal.com/file/E83A61AE6CFED6861AFDFA73CA41B0000BFCFD4FF710B8C0067805024286CD07/analysis/
Typical Filename: 8bc3498a39fb2d290a8975fd5419eb55
Claimed Product: 8bc3498a39fb2d290a8975fd5419eb55
Claimed Publisher: 8bc3498a39fb2d290a8975fd5419eb55
SHA 256: E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B
MD5: bf31a8d79f704f488e3dbcb6eea3b3e3
VirusTotal: https://www.virustotal.com/file/E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B/analysis/
Typical Filename: klplmq.sys
Claimed Product: klplmq.sys
Claimed Publisher: klplmq.sys
SHA 256: AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615
MD5: 3291e1603715c47a23b60a8bf2ca73db
VirusTotal: https://www.virustotal.com/file/AA0BBAECB678868E1E7F57C7CA9D61B608B3D788BE490790EB1D148BEADF4615/analysis/
Typical Filename: 01.tmp
Claimed Product: 01.tmp
Claimed Publisher: 01.tmp
SHA 256: 02DB0F24CF8461FB903C65FAB7A1B5668BB6D912AFD8414D4AE872E97FCAD090
MD5: 64645e81435058738c137a67df84a5c5
VirusTotal: https://www.virustotal.com/file/02DB0F24CF8461FB903C65FAB7A1B5668BB6D912AFD8414D4AE872E97FCAD090/analysis/
Typical Filename: bitcoin-miner.exe
Claimed Product: Bitcoin Miner
Claimed Publisher: Ufasoft