Student PresentationsIV

advertisement
Department of Accounting & Law
State University of New York at Albany
Acc 661 Auditing of Advanced Accounting Information Systems (J Gangolly)
Spring, 2002
STUDENT PRESENTATIONS FOR March 11/13, 2002
Topics:

Network Address Translation (Presenter: Bradshaw)
http://www.howstuffworks.com/nat.htm

Carnovore (Presenter: Brennan)
http://www.howstuffworks.com/carnivore.htm

Viruses (Presenter: Chuang)
http://www.howstuffworks.com/virus.htm

Ethernet (Presenter: Kraycer)
http://www.howstuffworks.com/ethernet.htm

Workplace surveillance (Presenter: Lai)
http://www.howstuffworks.com/workplace-surveillance.htm

Vulnerability Process (Presenter: Liao)
http://www.ee.oulu.fi/research/ouspg/protos/sota/FIRST1999-process/paper.pdf

Date: Thu, 28 Feb 2002. From: CERT Advisory cert-advisory@cert.org
o
Buffer Overflow Vulnerability in Microsoft Windows UPnP Service (Presenter: Martin)
Vulnerabilities in software included by default on Microsoft Windows XP, and optionally on
Windows ME and Windows 98, may allow an intruder to execute arbitrary code on vulnerable
systems, to launch denial-of-service attacks against vulnerable systems, or to use vulnerable systems to
launch denial-of-service attacks against third-party systems. To date we have not received any
confirmed reports of UPnP exploitation; however, we urge Windows users to follow the advice
provided in CA-2001-37 to protect their systems.
CERT Advisory CA-2001-37:
Buffer Overflow in UPnP Service On Microsoft Windows
http://www.cert.org/advisories/CA-2001-37.html
Vulnerability Note #951555:
Microsoft Windows Universal Plug and Play (UPNP) vulnerable
to buffer overflow via malformed advertisement packets
http://www.kb.cert.org/vuls/id/951555
Vulnerability Note #411059:
Microsoft Windows Universal Plug and Play (UPNP) fails to
limit the data returned in response to a NOTIFY message
http://www.kb.cert.org/vuls/id/411059

Recent Activity Against Secure Shell Daemons (Presenter: Shen)
There are multiple vulnerabilities in several implementations of the Secure Shell (SSH)
protocol. The SSH protocol enables a secure communications channel from a client to a
server. We are still seeing a high amount of scanning for SSH daemons, and we are
receiving reports of exploitation. System administrators should review their configurations
to ensure that they have applied all relevant patches.
CERT Advisory CA-2001-35:
Recent Activity Against Secure Shell Daemons
http://www.cert.org/advisories/CA-2001-35.html
Vulnerability Note #945216:
SSH CRC32 attack detection code contains remote integer overflow
http://www.kb.cert.org/vuls/id/945216
CERT Incident Note IN-2001-12:
Exploitation of vulnerability in SSH1 CRC-32 compensation
attack detector
http://www.cert.org/incident_notes/IN-2001-12.html

W32/BadTrans Worm (Presenter: Wang)
We have seen a steady stream of reports related to W32/Badtrans since November
2001. W32/BadTrans is a malicious Windows program distributed as an email file
attachment. Because of a known vulnerability in Internet Explorer, some email programs,
such as Outlook Express and Outlook, may execute the malicious program as soon as the
email message is viewed. Windows users should apply appropriate patches and update
their antivirus programs as described in IN-2001-14.
CERT Incident Note IN-2001-14: W32/BadTrans Worm
http://www.cert.org/incident_notes/IN-2001-14.html

"Kaiten" Malicious Code (Presenter: Williamston)
The CERT/CC has received reports of a new variant of the "Kaiten" malicious code
being installed through exploitation of null default sa passwords in Microsoft SQL
Server and Microsoft Data Engine. (Microsoft SQL 2000 Server will allow a null sa
password to be used, but this is not default behavior.) Various sources have referred to
this malicious code as "W32/Voyager," "Voyager Alpha Force," and "W32/CBlade.worm."
CERT Incident Note IN-2001-13:
"Kaiten" Malicious Code Installed by Exploiting Null
Default Passwords in MS-SQL
http://www.cert.org/incident_notes/IN-2001-13.html

Vulnerability Note VU#297363. PHP contains vulnerability in "php_mime_split" function
allowing arbitrary code execution (Presenter: Yang)
http://www.kb.cert.org/vuls/id/297363
Download