Search

See Resources

@RISK Newsletter for January 31, 2013 The Consensus Security Vulnerability Alert

This is a weekly newsletter that provides in-depth analysis of the latest vulnerabilities with straightforward remediation advice. Qualys supplies a large part of the newly-discovered vulnerability content used in this newsletter.


@RISK: The Consensus Security Vulnerability Alert
Vol. 13, Num. 5

Providing a reliable, weekly summary of newly discovered attack vectors, vulnerabilities with active exploits, and explanations of how recent attacks worked.

Archived issues may be found at https://www.qualys.com/research/sans-at-risk/


CONTENTS:

NOTABLE RECENT SECURITY ISSUES
USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK
VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE
MOST PREVALENT MALWARE FILES 1/23/2013 - 1/30/2013


TOP VULNERABILITY THIS WEEK: Another week, another Ruby on Rails

vulnerability. This time the vulnerability lies with the JSON parser in
Ruby on Rails 3.0 and 2.3


NOTABLE RECENT SECURITY ISSUES SELECTED BY THE SOURCEFIRE VULNERABILITY RESEARCH TEAM

Title: Vulnerability in the JSON parser in Ruby on Rails 3.0 and 2.3
(CVE-2013-0333)
Description: Lawrence Pit of Mirror42 discovered this vulnerability in
the JSON code for Ruby on Rails which allows attackers to bypass
authentication systems, inject arbitrary SQL, inject and execute
arbitrary code, or perform a DoS attack on a Rails application. Versions
3.1.x, 3.2.x, and applications using the yajl gem are not affected by
this vulnerability. This vulnerability is separate from CVE-2013-0156,
so if you are running a 2.3 or 3.0 application you must still take
action to protect your application.
Reference:
https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo
http://micrmsoft.blogspot.com/2013/01/cve-2013-0333-ruby-on-rails-json-parser.html
Snort SID: 25552
ClamAV: N/A

Title: DVR Vulnerabilities on port 9000
Description: The vulnerability was discovered in derivatives of RaySharp
CCTV DVRs whereby unauthorized access can be attained & remote code
execution accomplished. DVRs leverage a web front end for management
of the device and for viewing of camera footage. Management functions
of the device occur, however on a separate communications channel
outside of the HTTP connection between the web client and the DVR
server. This communications channel, over TCP port 9000, is monitored
by the server for requests to be processed. A vulnerability exists in
this communication channel whereby the server does not verify
authentication prior to processing the request and providing a response
(‘raysharpdvr’)
Reference:
http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html
http://www.forbes.com/sites/andygreenberg/2013/01/28/more-than-a-dozen-brands-of-security-camera-systems-vulnerable-to-hacker-hijacking/
Snort SID: 25556, 25557
ClamAV: N/A

Title: UNIX.Trojan.SSHDoor Backdoored SSH daemon that steals passwords
Description: UNIX.Trojan.SSHDoor is a backdoored sshd that sends login
credentials and ssh keys of clients that log into it to a remote server.
It also allows remote access to the infected server via either a
hard-coded password or SSH key. The strings related to the hidden
behaviors are XOR encoded. Stolen data is sent to the C&C server via a
HTTP POST. The POST body always contains the ‘id’ and ‘m’ parameters
respectively. Data is encrypted with a 1024-bit RSA key stored in the
malware that is base64 encoded. Two hostnames are hardcoded in the
backdoor: openssh.info and linuxrepository.org.
Reference:
http://blog.eset.com/2013/01/24/linux-sshdoor-a-backdoored-ssh-daemon-that-steals-passwords
https://www.virustotal.com/file/EBFD9354ED83635ED38BD117B375903F9984A18780EF86DBF7A642FC6584271C/analysis/
Snort SID: 25554, 25555
ClamAV: UNIX.Trojan.SSHDoor


USEFUL EXPLANATIONS OF HOW NEW ATTACKS WORK

Walking through Win32/Jabberbot.A instant messaging C&C
http://blog.eset.com/2013/01/30/walking-through-win32jabberbot-a-instant-messaging-cc

The 0-day that wasn’t: Dissecting a highly obfuscated PDF attack
http://vrt-blog.snort.org/2013/01/the-0-day-that-wasnt-dissecting-highly.html

Wow64-Specific anti-debug trick
http://waleedassar.blogspot.com/2013/01/wow64-specific-anti-debug-trick.html

PokerAgent botnet stealing over 16,000 Facebook credentials
http://blog.eset.com/2013/01/29/pokeragent-stealing-over-16000-facebook-credentials

Reverse Engineering the Intel 8085 ALU
http://www.arcfn.com/2013/01/inside-alu-of-8085-microprocessor.html


RECENT VULNERABILITIES FOR WHICH EXPLOITS ARE AVAILABLE COMPILED BY THE QUALYS VULNERABILITY RESEARCH TEAM

This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.

ID: CVE-2013-0422
Title: Oracle Java SE Security Bypass Vulnerability
Vendor: Oracle
Description: Multiple vulnerabilities in Oracle Java 7 before Update 11
allow remote attackers to execute arbitrary code by (1) using the public
getMBeanInstantiator method in the JmxMBeanServer class to obtain a
reference to a private MBeanInstantiator object, then retrieving
arbitrary Class references using the findClass method, and (2) using the
Reflection API with recursion in a way that bypasses a security check
by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method
due to the inability of the sun.reflect.Reflection.getCallerClass method
to skip frames related to the new reflection API, as exploited in the
wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and
a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE:
some parties have mapped the recursive Reflection API issue to
CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose
details are not public as of 20130114. CVE-2013-0422 covers both the
JMX/MBean and Reflection API issues. NOTE: it was originally reported
that Java 6 was also vulnerable, but the reporter has retracted this
claim, stating that Java 6 is not exploitable because the relevant code
is called in a way that does not bypass security checks. NOTE: as of
20130114, a reliable third party has claimed that the
findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update

  1. If there is still a vulnerable condition, then a separate CVE
    identifier might be created for the unfixed issue.
    CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-0156
Title: Ruby on Rails XML Processor YAML Deserialization Code Execution
Vendor: rubyonrails.org
Description: active_support/core_ext/hash/conversions.rb in Ruby on
Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x
before 3.2.11 does not properly restrict casts of string values, which
allows remote attackers to conduct object-injection attacks and execute
arbitrary code, or cause a denial of service (memory and CPU
consumption) involving nested XML entity references, by leveraging
Action Pack support for (1) YAML type conversion or (2) Symbol type
conversion.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2012-5088
Title: Java Applet Method Handle Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote
attackers to affect confidentiality, integrity, and availability via
unknown vectors related to Libraries.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2012-5076
Title: Java Applet AverageRangeStatisticImpl Remote Code Execution
Vendor: Oracle
Description: Unspecified vulnerability in the Java Runtime Environment
(JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote
attackers to affect confidentiality, integrity, and availability,
related to JAX-WS.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)

ID: CVE-2013-0209
Title: Movable Type 4.2x, 4.3x Web Upgrade Remote Code Execution
Vendor: movabletype.org
Description: lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x
and 4.3x through 4.38 does not require authentication for requests to
database-migration functions, which allows remote attackers to conduct
eval injection and SQL injection attacks via crafted parameters, as
demonstrated by an eval injection attack against the
core_drop_meta_for_table function, leading to execution of arbitrary
Perl code.
CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)

ID: CVE-2013-0333
Title: Ruby on Rails JSON Processor YAML Deserialization Code Execution
Vendor: rubyonrails.org
Description: A remote exploitation of an input validation error
vulnerability in versions prior to 3.0.20, 2.3.16 of Ruby on Rails. The
vulnerable application fails to validate specially crafted JSON requests
that are processed by the YAML parser. This vulnerability is very
similar to CVE-2013-0156.
CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)


MOST PREVALENT MALWARE FILES 1/23/2013 - 1/30/2013 COMPILED BY SOURCEFIRE

SHA 256: 9267AAD92DEA47A6A8B2F734037239AB3376E47F969F8B97B64192A820B2A86F
MD5: 3ff52cee72b936c56b4fbb9f970ece74
VirusTotal:
https://www.virustotal.com/file/9267AAD92DEA47A6A8B2F734037239AB3376E47F969F8B97B64192A820B2A86F/analysis/

Typical Filename: wintdiyx.exe
Claimed Product: wintdiyx.exe
Claimed Publisher: wintdiyx.exe

SHA 256: DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C
MD5: 25aa9bb549ecc7bb6100f8d179452508
VirusTotal:
https://www.virustotal.com/file/DF83A0D6940600E4C4954F4874FCD4DD73E781E6690C3BF56F51C95285484A3C/analysis/

Typical Filename: File_0_2.ok
Claimed Product: File_0_2.ok
Claimed Publisher: File_0_2.ok

SHA 256: 0585CDC0293EA6B8C86482608C08C583BF32E12CFA59D143F4A0411D2894C0F3
MD5: b3b9295385f4e74d023181e5a24f4d83
VirusTotal:
https://www.virustotal.com/file/0585CDC0293EA6B8C86482608C08C583BF32E12CFA59D143F4A0411D2894C0F3/analysis/

Typical Filename: Keygen.exe
Claimed Product: Keygen.exe
Claimed Publisher: Keygen.exe

SHA 256: E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B
MD5: bf31a8d79f704f488e3dbcb6eea3b3e3
VirusTotal:
https://www.virustotal.com/file/E0B193D47609C9622AA018E81DA69C24B921F2BA682F3E18646A0D09EC63AC2B/analysis/

Typical Filename: lmlkl.sys
Claimed Product: lmlkl.sys
Claimed Publisher: lmlkl.sys

SHA 256: B7B28E855B8C6225C605330760FF4DC407EFC83F72F1A04E974A72189D0F1D96
MD5: 573b6cc513e1b7cd9e35b491eacc38f3
VirusTotal:
https://www.virustotal.com/file/B7B28E855B8C6225C605330760FF4DC407EFC83F72F1A04E974A72189D0F1D96/analysis/

Typical Filename: 573b6cc513e1b7cd9e35b491eacc38f3
Claimed Product: 573b6cc513e1b7cd9e35b491eacc38f3
Claimed Publisher: 573b6cc513e1b7cd9e35b491eacc38f3


Email or call us at +1 800 745 4355 or try our Global Contacts
Subscription Packages
Qualys Solutions
Qualys Community
Company
Free Trial & Tools
Popular Topics