INNOV-04 The SANS Top 20 Internet Security Vulnerabilities



Similar documents
Windows Remote Access

Web Plus Security Features and Recommendations

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Penetration Testing Report Client: Business Solutions June 15 th 2015

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Cyberspace Security Issues and Challenges

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Web App Security Audit Services

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Medical Device Security Health Group Digital Output

Nessus scanning on Windows Domain

Penetration Testing with Kali Linux

System Security Policy Management: Advanced Audit Tasks

Security Considerations White Paper for Cisco Smart Storage 1

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

inforouter V8.0 Server & Client Requirements

Payment Card Industry (PCI) Data Security Standard

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Setting Up Scan to SMB on TaskALFA series MFP s.

SCP - Strategic Infrastructure Security

Network and Host-based Vulnerability Assessment

IBM. Vulnerability scanning and best practices

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

The Twenty Most Critical Internet Security Vulnerabilities (Updated) ~ The Experts Consensus

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

How to Secure a Groove Manager Web Site

Kaseya Server Instal ation User Guide June 6, 2008

Guidance Regarding Skype and Other P2P VoIP Solutions

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

My FreeScan Vulnerabilities Report

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Vulnerability Assessment and Penetration Testing

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Locking down a Hitachi ID Suite server

Installation and Deployment

RemotelyAnywhere Getting Started Guide

enicq 5 System Administrator s Guide

Internal Penetration Test

Directory and File Transfer Services. Chapter 7

Last Updated: July STATISTICA Enterprise Server Security

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

The Trivial Cisco IP Phones Compromise

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Xerox DocuShare Security Features. Security White Paper

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

HP ProLiant Essentials Vulnerability and Patch Management Pack Release Notes

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

Hack Your SQL Server Database Before the Hackers Do

Thick Client Application Security

IBM Managed Security Services Vulnerability Scanning:

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers

HoneyBOT User Guide A Windows based honeypot solution

IT HEALTHCHECK TOP TIPS WHITEPAPER

Novell Access Manager SSL Virtual Private Network

IBM Security QRadar Vulnerability Manager Version User Guide

Network Configuration Settings

Network Security and Firewall 1

Internet Security [1] VU Engin Kirda

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

What is Web Security? Motivation

Nixu SNS Security White Paper May 2007 Version 1.2

SAST, DAST and Vulnerability Assessments, = 4

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560

Topics in Network Security

A Roadmap for Securing IIS 5.0

Hardening IIS Servers

Codes of Connection for Devices Connected to Newcastle University ICT Network

Shellshock Security Patch for X86

Proxies. Chapter 4. Network & Security Gildas Avoine

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Web Application Security

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Networking Best Practices Guide. Version 6.5

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Enterprise Security Critical Standards Summary

Hands-on Hacking Unlimited

Installation Guide For Choic Enterprise Edition

E-Commerce for IT Advanced. Louis Aguila & Matt Burt

Building A Secure Microsoft Exchange Continuity Appliance

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

Security Correlation Server Quick Installation Guide

10 mistakes to avoid when securing your Microsoft Network Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure

Using DC Agent for Transparent User Identification

locuz.com Professional Services Security Audit Services

End User Guide The guide for /ftp account owner

GFI LANguard Network Security Scanner 3.3. Manual. By GFI Software Ltd.

Transcription:

INNOV-04 The SANS Top 20 Internet Security Vulnerabilities (and what it means to OpenEdge Applications) Michael Solomon, CISSP PMP CISM Solomon Consulting Inc. www.solomonconsulting.com (Thanks to John Bruggeman for presentation input)

What is the SANS Top 20 SANS and FBI / NIPC created list in 2000 10 Windows vulnerabilities 10 Unix vulnerabilities 90% of all computer security breaches are caused by known vulnerabilities (Gartner Group 2002) Tools to detect and repair the Top 20 Many referenced tools help detect and repair many more than the Top 20 Vulnerabilities INNOV-04, SANS Top 20 Security Vulnerabilities 2

How do these vulnerabilities affect OpenEdge applications? OpenEdge is not specifically mentioned Many vulnerabilities on the list still apply to OpenEdge application systems Interpret each vulnerability in terms of your system Any system vulnerability affects your OpenEdge application INNOV-04, SANS Top 20 Security Vulnerabilities 3

Windows Top 10 www.sans.org/top20/#w1 1. Web Servers and Services 2. Workstation Service 3. Windows Remote Access Services (not RAS) 4. Microsoft SQL Server 5. Windows Authentication 6. Web Browsers 7. File-Sharing Applications 8. LSAS Exposures 9. Mail Client 10. Instant Messaging INNOV-04, SANS Top 20 Security Vulnerabilities 4

W1: Web Servers and Services Risks of default installations Denial of service (DoS) Compromise server and data Execution of arbitrary commands All web servers are affected, including Internet Information Server (IIS) Even though IIS 6.0 is secure by default Apache iplanet (now SunOne) INNOV-04, SANS Top 20 Security Vulnerabilities 5

W1: Web Servers and Services If you are running a default installation, you are vulnerable The SANS Top 20 list contains links to several tools How to protect against these vulnerabilities Patch your software! Remove unused scripts, binaries and accounts Remove or restrict common attack targets tftp, ftp, cmd.exe, bash, net.exe, remote.exe, telnet OpenEdge impact any application component that allows access from the web INNOV-04, SANS Top 20 Security Vulnerabilities 6

W2: Workstation Service Processes user requests to access resources such as files and printers Service contains a stack buffer overflow Operating systems affected Windows 2000 (SP2, SP3 and SP4) Windows XP SP1 & 64 bit edition How to protect your system Patch your software! Windows XP SP2 (Win 2000 MS03-049) Block ports 139 & 445 from outside OpenEdge impact any systems that share resources in your DB/AppServer environment INNOV-04, SANS Top 20 Security Vulnerabilities 7

W3: Remote Access Services Risks - Compromised host or data, DoS All Windows OS s are affected Examples Windows file sharing NETBIOS shares (C$) Anonymous Logon (Null sessions) Remote Registry Access Remote Procedure Calls (RPC) INNOV-04, SANS Top 20 Security Vulnerabilities 8

W3: Remote Access Services How to determine if you are vulnerable SANS Top 20 document links Anonymous Logon C:\>net use \\ipaddress\ipc$ "" /user:"" If The command completed successfully displays, you are potentially vulnerable How to mitigate Patch your software! Limit file sharing; never over the Internet No unauthenticated shares Set registry to restrict remote access INNOV-04, SANS Top 20 Security Vulnerabilities 9

W4: MS SQL Server Risks - Compromised host and data, DoS All Microsoft OS s and SQL versions Even though this is a SQL Server item, OpenEdge users should pay attention to the nature of the vulnerabilities Make sure the same vulnerabilities do not exist on your OpenEdge system SQL Server is on this list due to market share, not that it is more vulnerable INNOV-04, SANS Top 20 Security Vulnerabilities 10

W4: MS SQL Server The MS SQL vulnerability caused SQL Snake / Spida Worm (May 2002) Default password set to null default install SQL-Slammer/SQL-Hell/Sapphire worm (Jan 2003) Buffer overflow error SQL MSDE Desktop Engine Can be installed by Office XP, Visual Studio.NET, ASP.NET Web Matrix Tool, Visual Fox Pro 7.0 / 8.0 INNOV-04, SANS Top 20 Security Vulnerabilities 11

W4: MS SQL Server How to protect your system Patch your software! Disable listening on port 1434 OpenEdge systems Do not use default ports Enable SQL authentication logging Accomplished via Enterprise Manager Secure the system (server and network level) Change the default (null or blank) password INNOV-04, SANS Top 20 Security Vulnerabilities 12

W5: Windows Authentication Password vulnerabilities Weak passwords Unprotected passwords Default system passwords Well known hash algorithms allow easy cracking Risks - Compromised host and data, DoS INNOV-04, SANS Top 20 Security Vulnerabilities 13

W5: Windows Authentication Windows Hash algorithm problems Windows NT, 2000, XP store LAN Manager (LM) passwords for compatibility LM password hash is very weak Long passwords are truncated to 14 characters Short passwords are padded to 14 characters Passwords are stored all upper case Passwords are broken into 2 7 character blocks INNOV-04, SANS Top 20 Security Vulnerabilities 14

W5: Windows Authentication Windows LM hash Stored in the SAM database Frequently transmitted over network Hash can be sniffed and cracked The hash can be brute force cracked in a few days All Microsoft OS s are affected How to mitigate Good Password policy Enforce strong passwords Special characters, Enforce password aging, length, minimum age INNOV-04, SANS Top 20 Security Vulnerabilities 15

W6: Web Browsers Risks - Dozens of vulnerabilities Cross-site Scripting Poor security in ActiveX modules MIME types not correctly identified Standard buffer overflow Spyware/Adware vulnerabilities Not just IE anymore IE Mozilla Firefox Netscape Opera INNOV-04, SANS Top 20 Security Vulnerabilities 16

W6: Web Browsers All OS and versions are affected IE installed on almost all Windows machines due to tight integration into the OS Vulnerabilities exist even if you don t browse the web How to determine if you are vulnerable Unless you are fully patched, you are vulnerable How to protect Patch your software! Modify default Internet security Internet Options -> Tools -> Security tab Set to prompt for Active Scripting Disable ActiveX Annoying but significantly more secure INNOV-04, SANS Top 20 Security Vulnerabilities 17

W7: File-Sharing Applications Peer to peer (P2P) applications Popular to download and distribute many types of data Risks - Possible compromised host, spyware, legal liability All Windows platforms are affected How to determine if you are at risk If you have installed P2P software you may be vulnerable INNOV-04, SANS Top 20 Security Vulnerabilities 18

W7: File-Sharing Applications How to protect against it Establish a P2P policy against downloading copyrighted materials Monitor usual ports Napster TCP 8888, 8875, 6699 edonkey TCP 4661, 4662, UDP 4665 Gnutella TCP/UDP 6345, 6346, 6347, 6348, 6349 Kazaa WWW (TCP 80), TCP/UDP 1214 INNOV-04, SANS Top 20 Security Vulnerabilities 19

W8: Local Authority Subsystem Service (LSAS) Exposures Important in System authentication and Active Directory Contains a buffer overflow vulnerability Exploited by Sasser and Korgo worms Affected OS s Windows 2000 Windows XP & 64 bit edition Windows 2003 INNOV-04, SANS Top 20 Security Vulnerabilities 20

W8: Local Authority Subsystem Service (LSAS) Exposures How to protect your system Patch your software! Block the following ports: UDP/135, UDP/137, UDP/138, UDP/445 TCP/135, TCP/139, TCP/445, TCP/593 Ensure your firewall is properly configured INNOV-04, SANS Top 20 Security Vulnerabilities 21

W9: Mail Client Risks - Allows attackers to run the code of choice on a machine All Microsoft OS s are affected If mail client is loaded you are vulnerable How to protect your system Patch your software! Disable Message Preview panel Block suspicious attachments Remove unused mail clients INNOV-04, SANS Top 20 Security Vulnerabilities 22

W10: Instant Messaging IM has seen tremendous growth and maturity Risks data disclosure or modification, loss of productivity All Microsoft OS s are affected How to protect your system Patch your software! Configure your firewall to disallow IM file transfers Block access to web pages containing links such as aim: or ymsgr: INNOV-04, SANS Top 20 Security Vulnerabilities 23

Unix Top 10 - www.sans.org/top20/#u1 1. BIND Domain Name System 2. Web Server 3. General Unix Authentication (Weak passwords) 4. Version Control Systems 5. Mail Transport Service 6. Simple Network Management Protocol (SNMP) 7. Open Secure Sockets Layer (SSL) 8. Misconfiguration of Enterprise Services (NIS/NFS) 9. Databases 10. Kernel INNOV-04, SANS Top 20 Security Vulnerabilities 24

U1: BIND Domain Name System Risks - Loss of Internet naming system, DoS Nearly all Unix and Linux flavors are affected How to determine if you are affected Type named v to see what version you are running How to protect against vulnerabilities Patch your software! Disable named unless DNS is required Change version information in the named.conf file Run BIND from a non-privileged account INNOV-04, SANS Top 20 Security Vulnerabilities 25

U2: Web Server Risks - DoS, information disclosure, remote root access All Linux and Unix flavors can run a web server Most common UNIX/Linux web servers (and addon modules) Apache iplanet/sun Java System PHP OpenSSL All un-patched software is vulnerable INNOV-04, SANS Top 20 Security Vulnerabilities 26

U2: Web Server How to protect against vulnerabilities Patch your software! Don t run as root Limit server information OpenEdge users - pay attention to webrelated vulnerabilities Web servers provide critical front-end access to many OpenEdge applications INNOV-04, SANS Top 20 Security Vulnerabilities 27

U3: Authentication Risks - compromised host and data, DoS All UNIX/Linux systems are affected How to determine if you are vulnerable Look for generic accounts Check etc/passwd with a password checker Search for clear text transmission of passwords Telnet, FTP, HTTP, DB connection How to mitigate Same strong password policy as Windows INNOV-04, SANS Top 20 Security Vulnerabilities 28

U4: Version Control Systems Version control systems manage changes to documents or source code The most popular, CVS and Subversion, both contain heap-buffer overflow vulnerabilities Can allow remote execution of arbitrary code Risks compromised host, ability for attacker to execute arbitrary code All Linux/UNIX systems that run version control systems are vulnerable INNOV-04, SANS Top 20 Security Vulnerabilities 29

U4: Version Control Systems How to determine if you are vulnerable Check CVS version cvs ver stable rel ver 1.11.16 and prior, feature rel ver 1.12.8 and prior Subversion prior to 1.0.5 configured for remote access How to mitigate Patch your software! Use SSH instead of pserver protocol (CVS) Use webdav instead of svn protocol (Subversion) Block ports if repository access is internal only CVS 2401/tcp Subversion 3690/tcp INNOV-04, SANS Top 20 Security Vulnerabilities 30

U5: Mail Transport Service Risks - Privilege escalation, open relay All Linux/UNIX systems are affected How to determine if you are vulnerable Outdated or un-patched mail transport agents are vulnerable Refer to SANS Top 20 list for more details: Sendmail Exim Qmail Courier-MTA Postfix Assess your mail server using a vulnerability scanner INNOV-04, SANS Top 20 Security Vulnerabilities 31

U5: Mail Transport Service How to protect your system Patch your software! Disable mail transport services on systems not designed to be mail servers Verify configuration will not allow relay of email Consult SANS Top 20 list for specifics INNOV-04, SANS Top 20 Security Vulnerabilities 32

U6: Simple Network Management Protocol (SNMP) Risks - Compromised host, privilege escalation Nearly all Linux/UNIX systems come with SNMP and are vulnerable Many have SNMP installed and active by default Scan your network to see if you are vulnerable How to protect your system Patch your software! Disable SNMP unless needed Filter SNMP traffic (161 tcp/udp, 162 tcp/udp) Modify community strings INNOV-04, SANS Top 20 Security Vulnerabilities 33

U7: Open Secure Sockets Layer (SSL) Risks - Remote code execution, root privilege escalation Nearly all UNIX/Linux flavors can run Open SSL How to determine if you are vulnerable Check your version openssl version Version 0.9.7c or earlier is vulnerable How to protect your system Patch your software! Use IP filtering to limit who can access via Open SSL INNOV-04, SANS Top 20 Security Vulnerabilities 34

U8: Misconfiguration of Enterprise Services (NIS NFS) Risks - Compromised hosts, escalated privileges Most UNIX/Linux flavors run NIS and NFS How to determine if you are vulnerable Check version to verify on the most recent version How to protect your system Configure client to only connect to specific NIS server For NFS use numeric IP addresses not aliases Check NFS configuration with NFSBug Use /etc/exports to restrict access to NFS INNOV-04, SANS Top 20 Security Vulnerabilities 35

U9: Databases Databases are the core component in most business applications Risks data integrity, confidentiality, and availability Databases provide attractive targets for attackers wishing to access restricted data OpenEdge users should pay particular attention to database vulnerabilities Even though well-known database port lists generally do NOT include Progress and OpenEdge dbs, a quick visit to www.progress.com provide attackers with all the information they need for default ports. INNOV-04, SANS Top 20 Security Vulnerabilities 36

U9: Databases How to determine if you are vulnerable If you use a DB product, you are How to protect your system Patch your software! Know the risks Harden your database and software This is the hardest part See the references section for more information INNOV-04, SANS Top 20 Security Vulnerabilities 37

U10: Kernel Core OS functionality The kernel manages interaction between OS and hardware Often operates in privileged mode A kernel compromise can be devastating All systems are vulnerable (even Windows) How to protect your system Patch your kernel! Use a vulnerability scanner to assess your systems Harden your kernel INNOV-04, SANS Top 20 Security Vulnerabilities 38

Summary Use the SANS Top 20 list as a guideline Although OpenEdge is not on the list, many vulnerabilities still apply to your applications Good security requires frequent attention Take the time to learn how to harden your systems, then do it! INNOV-04, SANS Top 20 Security Vulnerabilities 39

Resources Solomon Consulting Inc. www.solomonconsulting.com SANS Top 20 list www.sans.org/top20 Website that tracks top scanned ports www.incidents.org Lists of MS bugs, patches, and security updates www.microsoft.com/technet www.ntbugtraq.com Great site for latest vulnerabilites www.insecure.org INNOV-04, SANS Top 20 Security Vulnerabilities 40