[AusNOG] AusCERT Week in Review - Week Ending 08/06/2007 (AUSCERT#20073F686)

Robert Lowe rlowe at auscert.org.au
Fri Jun 8 15:43:44 EST 2007


AusCERT Week in Review
08 June 2007


Dear AusCERT member,

While AusCERT has an operational focus we are also involved in a number of
strategic engagements.  Our aim is to deliver sound and accurate policy advice
to decision makers based on our operational perspective.  One of these
strategic engagements is the auDA 2007 Names Policy Panel of which I am
currently the AusCERT representative.

The Panel has been asked to review a number of auDA policies and from a number
of meetings held during the year a issues paper has been released which raises
three key issues ie:

1.  Should .au be opened up to direct registrations (eg. domainname.au)? If
yes, should there be any policy rules, and if so what rules?

2.  Should the policy rules for asn.au, com.au, id.au, net.au and org.au be
changed? If yes, what changes should be made?

3.  Should registrants be allowed to sell their .au domain names?

A copy of the issues paper is currently available on the auDA web site and the
closing date for submissions is Friday 15 June.

http://www.auda.org.au/2007npp/2007npp-index/

While issues 1 and 3 are largely business issues and little to do with
security, issue 2 has an inclusion that I have specifically requested which
relates to malicious/illegal domains ie:

7.14 The Panel has identified a gap in the current policy rules relating to
illegal or malicious use of a domain name, and puts forward the following
suggestion for change:

The policy rules should include a clear process and authority for the deletion
of a domain name for illegal or malicious use. Such uses would include, but are
not limited to, disseminating spam, hosting a phishing site, malware hosting
and distribution, capturing stolen personal information and access credentials,
hosting child pornography, and recruiting individuals to launder or transfer
stolen funds.

While AusCERT will itself be making a formal submission to auDA relating to
7.14 I wanted to alert you to this particular issue.  Already I have received
an informal response from one domain name registrar objecting to the policy
stating for example that unless liability can be waived for a take down then
there will be little incentive for the domain name registrars to act.

To some extent one concern with the policy is correct in that I did not 
specify
that this policy would only relate to domains registered specifically for
fraudulent activity and not existing and legitimate domains that have been
compromised without the knowledge or understanding of the domain name owner.  I
will clarify this in the AusCERT submission and at the next meeting of the
Panel.

I also agree that registrars should not be asked to decide what is illegal or
legal but at the same time it is equally unrealistic to expect that a court and
the existing legal processes will be of any use.  However, at this stage I
would prefer to concentrate on the principle and deal with the "how" as an
implementation issue.

I have already suggested to the Panel that one approach might be to parallel
the 'safeharbour' provisions that currently exist for ISPs flowing from the
FTA with the US and relate to copyright infringements - ie copyright material
illegally hosted.  The 'safeharbour' provisions basically provide protection
for the ISP (limit liability) provided that the ISP acts in good faith and
according to a agreed process.  I believe that this is an approach than could
work in Australia for both ISPs and Domain Name registrars with changes to the
appropriate Commonwealth legislation to deal with malicious and illegal sites.

I do expect that the problem of having illegal or malicious material hosted on
domain names will continue to increase and will continue to make it more
difficult for organisations like LEAs, regulators and CERTs to respond. 
Unfortunately the current trend is that the majority of the malicious sites are
hosted on compromised domains but we still see specific domains registered for
attacks and as such the policy change at 7.14 is definitely worth pursuing.  I
would also like to see the same approach taken with ISPs.

Based on the above it would be useful for any concerned members with comments
or suggestions to respond to auDA re the issues paper.  Consider how you would
react if a domain is registered that is very similar to your online domain,
which is either stealing your customers info or distributing malware to people
under your name.  I presume you would like there to be some way to address this
type of issue?"

Thanks,
Graham 

Graham Ingram
General Manager, AusCERT


AusCERT in the Media:
- - ----------------------------  

Do aliens and God affect your security budget?
ZDNet.com.au, Australia 
Jun 4, 2007
http://www.zdnet.com.au/blogs/securifythis/soa/Do-aliens-and-God-affect-your-se
curity-budget-/0,139033343,339278200,00.htm


Papers, Articles and other documents:
- - -------------------------------------


Alerts, Advisories and Updates:
- - -------------------------------
Title: AA-2007.0041 -- [Win][UNIX/Linux] -- Patches for Lotus Domino Web
Server correct denial of service vulnerability 
Date:  08 June 2007
URL:   http://www.auscert.org.au/7682

Title: AU-2007.0017 -- AusCERT Update - [Win][UNIX/Linux] - PHP 5.2.3 still
vulnerable to chunk_split heap overflow vulnerability 
Date:  06 June 2007
URL:   http://www.auscert.org.au/7677

Title: AL-2007.0072 -- [Win][Netware][UNIX/Linux] -- CA multiple products -
critical vulnerabilities in anti-virus scan engine 
Date:  06 June 2007
URL:   http://www.auscert.org.au/7674

Title: AA-2007.0039 -- [Win][UNIX/Linux] -- PHP 5.2.3 release fixes several
vulnerabilities 
Date:  06 June 2007
URL:   http://www.auscert.org.au/7669

Title: AA-2007.0040 -- [Netware] -- Novell NetWare FTP Server access control
vulnerability 
Date:  05 June 2007
URL:   http://www.auscert.org.au/7670

Title: AA-2007.0038 -- [Win][Linux][OSX] -- Novell GroupWise clients
authentication vulnerability 
Date:  05 June 2007
URL:   http://www.auscert.org.au/7668

Title: AL-2007.0071 -- [Win][Linux][Solaris] -- Sun Java Runtime Environment
vulnerability allows remote compromise 
Date:  04 June 2007
URL:   http://www.auscert.org.au/7664

Title: AA-2007.0037 -- [Win] -- Microsoft IIS 5.x authentication bypass
vulnerability 
Date:  04 June 2007
URL:   http://www.auscert.org.au/7663


External Security Bulletins:
- - ----------------------------
Title: ESB-2007.0389 -- [Linux][Debian] -- New iceape packages fix several
vulnerabilities 
Date:  08 June 2007
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/7681

Title: ESB-2007.0388 -- [Debian] -- New ipsec-tools packages fix denial of
service 
Date:  08 June 2007
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/7680

Title: ESB-2007.0387 -- [Linux][RedHat] -- Moderate: fetchmail security update
Date:  08 June 2007
OS:    Solaris, HP Tru64 UNIX, Debian GNU/Linux, Other BSD Variants, IRIX,
OpenBSD, FreeBSD, Other Linux Variants, Red Hat Linux, Mac OS X, HP-UX,
AIX 
URL:   http://www.auscert.org.au/7679

Title: ESB-2007.0386 -- [Solaris] -- Solaris Management Console (SMC) - two
vulnerabilities allow privilege escalation 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7678

Title: ESB-2007.0385 -- [Win] -- Symantec Ghost Solution Suite denial of
service vulnerabilities 
Date:  06 June 2007
OS:    Windows 2003, Windows 2000, Windows XP, Windows Vista 
URL:   http://www.auscert.org.au/7676

Title: ESB-2007.0384 -- [Win] -- Symantec AntiVirus and Client Security
products - vulnerabilities in Reporting Server component 
Date:  06 June 2007
OS:    Windows 2003, Windows 2000 
URL:   http://www.auscert.org.au/7675

Title: ESB-2007.0383 -- [HP-UX] -- HP-UX running CIFS Server (Samba), Remote
Arbitrary Code Execution 
Date:  06 June 2007
OS:    HP-UX 
URL:   http://www.auscert.org.au/7673

Title: ESB-2007.0382 -- [Solaris] -- Security Vulnerability in How
xscreensaver Interacts With GNOME Assistive Technology May Allow
Arbitrary Command Execution 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7672

Title: ESB-2007.0381 -- [Win] -- Microsoft Internet Explorer cross-domain
vulnerability 
Date:  06 June 2007
OS:    Windows 98/98SE, Windows 2003, Windows 2000, Windows XP, Windows Vista,
Windows ME 
URL:   http://www.auscert.org.au/7671

Title: ESB-2007.0380 -- [Win][UNIX/Linux] -- Symantec Storage Foundation
Solution Suites: Veritas Volume Replicator, Denial of Service 
Date:  05 June 2007
OS:    Solaris, Debian GNU/Linux, Windows 2003, Windows 2000, Other Linux
Variants, Red Hat Linux, HP-UX, AIX 
URL:   http://www.auscert.org.au/7667

Title: ESB-2007.0379 -- [UNIX/Linux][RedHat] -- Moderate: mutt security update
Date:  05 June 2007
OS:    Solaris, HP Tru64 UNIX, Debian GNU/Linux, Other BSD Variants, IRIX,
OpenBSD, FreeBSD, Other Linux Variants, Red Hat Linux, Mac OS X, HP-UX,
AIX 
URL:   http://www.auscert.org.au/7666

Title: ESB-2007.0378 -- [Win] -- Symantec Storage Foundation for Windows
Volume Manager: Authentication Bypass and Potential Code Execution 
Date:  05 June 2007
OS:    Windows 2003, Windows 2000 
URL:   http://www.auscert.org.au/7665

Title: ESB-2007.0367 -- [Solaris] -- A Security Vulnerability in the
in.iked(1M) Service May Lead To a Denial of Service (DoS) 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7650

Title: ESB-2007.0366 -- [Solaris] -- A Security Vulnerability in the Solaris
10 inetd(1M) Service May Lead to a Denial of Service (DoS) Condition 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7649

Title: ESB-2007.0348 -- [Solaris] -- Security Vulnerability With snmpd(1M)
When Processing Certain AgentX Subagent Requests 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7624

Title: ESB-2007.0347 -- [Solaris] -- Security Vulnerability in NFS Client
Module May Lead to a Denial of Service Condition 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7623

Title: ESB-2007.0321 -- [Debian] -- New samba packages fix multiple
vulnerabilities 
Date:  07 June 2007
OS:    Debian GNU/Linux 
URL:   http://www.auscert.org.au/7592

Title: ESB-2007.0214 -- [Win][UNIX/Linux] -- IBM Tivoli Provisioning Manager
for OS Deployment Multiple Vulnerabilities 
Date:  07 June 2007
OS:    Mac OS X, Red Hat Linux, Other Linux Variants, FreeBSD, Windows 2000,
Windows 2003, Debian GNU/Linux, Solaris 
URL:   http://www.auscert.org.au/7445

Title: ESB-2007.0183 -- [Win][UNIX/Linux] -- Sun Java System Web Server May
Allow A User with Revoked Client Certificate to Access Server Instance
Under Certain Conditions 
Date:  07 June 2007
OS:    AIX, HP-UX, Red Hat Linux, Other Linux Variants, FreeBSD, Windows 2000,
OpenBSD, Windows 2003, Other BSD Variants, Debian GNU/Linux, Solaris 
URL:   http://www.auscert.org.au/7405

Title: ESB-2007.0103 -- [Solaris] -- Multiple Integer Overflow Vulnerabilities
in the X Font Server (xfs(1)) and the X Render and DBE Extensions 
Date:  07 June 2007
OS:    Solaris 
URL:   http://www.auscert.org.au/7294



===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert at auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================







More information about the AusNOG mailing list