Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Keepin' it real..Real secure -LONG READ-!!!!!
SANS ^ | Check the link | Some Gov Kooks

Posted on 10/03/2002 9:34:46 PM PDT by Michael Barnes

top20.gif (9467 bytes)
The Twenty Most Critical Internet Security Vulnerabilities (Updated) ~ The Experts’ Consensus
Version 2.6 October 1, 2002 Copyright © 2001-2002, The SANS Institute
www.fbi.gov             www.nipc.gov             www.sans.org

----------------- Jump To Index of Top 20 Threats -----------------

Introduction
The majority of the successful attacks on operating systems come from only a few software vulnerabilities. This can be attributed to the fact that attackers are opportunistic, take the easiest and most convenient route, and exploit the best-known flaws with the most effective and widely available attack tools. They count on organizations not fixing the problems, and they often attack indiscriminately, scanning the Internet for any vulnerable systems. System compromises in the Solar Sunrise Pentagon hacking incident, for example, and the easy and rapid spread of the Code Red and NIMDA worms can be traced to exploitation of unpatched vulnerabilities.

Two years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) released a document summarizing the Ten Most Critical Internet Security Vulnerabilities. Thousands of organizations used that list, and the expanded Top Twenty, which followed a year later, to prioritize their efforts so they could close the most dangerous holes first. The vulnerabilities that led to all three examples above - the Solar Sunrise Pentagon incident, and the Code Red and NIMDA worms - are on that list.

This updated SANS/FBI Top Twenty is actually two Top Ten lists: the ten most commonly exploited vulnerable services in Windows, and the ten most commonly exploited vulnerable services in Unix. Although there are thousands of security incidents each year affecting these operating systems, the overwhelming majority of successful attacks target one or more of these twenty services.

Printer Friendly Version (PDF) >>
Useful Related Resources



Weekly Update of Critical New Vulnerabilities
  • 10/01/02 - Version 2.6 Posted



While experienced security administrators will find the Top Twenty to be a valuable resource in their arsenal, the list is especially intended for those organizations that lack the resources to train, or those without technically-advanced security administrators. The individuals with responsibility for networks in those organizations often report that they have not corrected many of these flaws because they simply do not know which vulnerabilities are most dangerous, they are too busy to correct them all, or they do not know how to correct them safely. Traditionally, auditors and security managers have used vulnerability scanners to search for five hundred or a thousand or even two thousand very specific vulnerabilities, blunting the focus administrators need to ensure that all systems are protected against the most common attacks. When a system administrator receives a report showing thousands of vulnerabilities across hundreds of machines, he is often paralyzed.

The Top Twenty is a prioritized list of vulnerabilities that require immediate remediation. The list is sorted by service because in many cases a single remedy -- disabling the service, upgrading to the most recent version, applying a cumulative patch -- can quickly solve dozens of specific software flaws, which might show up on a scanner. This list is designed to help alleviate that problem by combining the knowledge of dozens of leading security experts. They come from the most security-conscious federal agencies, the leading security software vendors and consulting firms, the top university-based security programs, and CERT/CC and the SANS Institute. A list of participants may be found at the end of this document.

The SANS/FBI Top Twenty is a living document. It includes step-by-step instructions and pointers to additional information useful for correcting the security flaws. We will update the list and the instructions as more critical threats and more current or convenient methods are identified, and we welcome your input along the way. This is a community consensus document -- your experience in fighting attackers and in eliminating the vulnerabilities can help others who come after you. Please send suggestions via e-mail to info@sans.org with the subject "Top Twenty Comments."

Notes For Readers:
CVE Numbers
You'll find references to CVE (Common Vulnerabilities and Exposures) numbers accompanying each vulnerability. You may also see CAN numbers. CAN numbers are candidates for CVE entries that have not yet been fully verified. For more data on the award-winning CVE project, see http://cve.mitre.org.

The CVE and CAN numbers reflect the top priority vulnerabilities that should be checked for each item. Each CVE vulnerability reference is linked to the associated vulnerability entry in the National Institute of Standards and Technology's ICAT vulnerability indexing service (http://icat.nist.gov). ICAT provides a short description of each vulnerability, a list of the characteristics of each vulnerability (e.g. associated attack range and damage potential), a list of the vulnerable software names and version numbers, and links to vulnerability advisory and patch information.

Ports to Block at the Firewall
At the end of the document, you'll find an extra section offering a list of the ports used by commonly probed and attacked services. By blocking traffic to these ports at the firewall or other network perimeter protection devices, you add an extra layer of defense that helps protect you from configuration mistakes. Note, however, that using a firewall to block network traffic directed to a port does not protect the port from disgruntled co-workers who are already inside your perimeter, or from hackers who may have penetrated your perimeter using other means.


Back to Top ^

Top Vulnerabilities to Windows Systems
Top Vulnerabilities to Unix Systems

Back to Top ^
Top Vulnerabilities to Windows Systems (W)
W1 Internet Information Services (IIS)

W1.1 Description
IIS is prone to vulnerabilities in three major classes: failure to handle unanticipated requests, buffer overflows, and sample applications. Each will be addressed briefly here.

  1. Failure to Handle Unanticipated Requests. Many IIS vulnerabilities involve a failure to handle improperly (or just deviously) formed HTTP requests. A well-known example is the Unicode directory traversal vulnerability, which was exploited by the Code Blue worm. By crafting a request to exploit one of these vulnerabilities, a remote attacker may:



TOPICS: Announcements; Crime/Corruption; Extended News; Free Republic; Miscellaneous; News/Current Events; Technical; Unclassified; Your Opinion/Questions
KEYWORDS: help; holes; howto; patches; security; vulnerable
Check it out ya'll....Secure them systems if you haven't already!
1 posted on 10/03/2002 9:34:46 PM PDT by Michael Barnes
[ Post Reply | Private Reply | View Replies]

To: rdb3; Bush2000
psst...port 7 headin at ya!
2 posted on 10/03/2002 9:35:36 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dominic Harr
Okay, port 7 and 111 for you.
3 posted on 10/03/2002 9:36:21 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 2 | View Replies]

To: John Robinson; B Knotts; stainlessbanner; TechJunkYard; ShadowAce; Knitebane; AppyPappy; jae471; ...
The Penguin Ping.

Wanna be Penguified? Just holla!

Got root?

4 posted on 10/03/2002 9:38:24 PM PDT by rdb3
[ Post Reply | Private Reply | To 1 | View Replies]

To: unixfox
2049 for you...

;)

5 posted on 10/03/2002 9:38:50 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 3 | View Replies]

TAKE BACK THE SENATE!
VOTE OUT THE DEMS!

DONATE TODAY!!!.
SUPPORT FREE REPUBLIC

Donate Here By Secure Server

Or mail checks to
FreeRepublic , LLC
PO BOX 9771
FRESNO, CA 93794

or you can use

PayPal at Jimrob@psnw.com
STOP BY AND BUMP THE FUNDRAISER THREAD


6 posted on 10/03/2002 9:40:05 PM PDT by Anti-Bubba182
[ Post Reply | Private Reply | To 1 | View Replies]

To: unix
FILES THANKS
7 posted on 10/03/2002 9:40:59 PM PDT by Quix
[ Post Reply | Private Reply | To 1 | View Replies]

Side note --

Anyone have a link to the HP doc's pertaining to the software that is going to replace SAM? I hear it is gonna be some cool (yet, in my early estimation, security unwise) service based HTTP(s?) service based configurator. I kinda suspect it will be based on webin. Any info would be most welcome...

8 posted on 10/03/2002 9:48:53 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 7 | View Replies]

To: Quix
;)
9 posted on 10/03/2002 9:49:56 PM PDT by Michael Barnes
[ Post Reply | Private Reply | To 7 | View Replies]

To: unix
psst...port 7 headin at ya!

And an "echo" right back atcha!

10 posted on 10/03/2002 9:53:41 PM PDT by rdb3
[ Post Reply | Private Reply | To 2 | View Replies]

To: unix
Well, this should silence all those *ix folks who think that their platform is not vulnerable to exploits...

Real good info... thanx for posting!

11 posted on 10/04/2002 5:32:04 AM PDT by TechJunkYard
[ Post Reply | Private Reply | To 1 | View Replies]

To: unix
Starting at about midnight this AM we suddenly started seeing hit after hit on port #137. They just bounce off but activity on that port has really picked up today. Lot's of the traffic is from *.fr and *jp addresses.

Nice post. By the way.

12 posted on 10/04/2002 6:34:16 AM PDT by isthisnickcool
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson