Operating System:

[WIN]

Published:

11 February 2010

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0141
               Vulnerability in TLS/SSL Could Allow Spoofing
                             11 February 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Transport Layer Security (TLS)
                   Secure Sockets Layer (SSL)
Publisher:         Microsoft
Operating System:  Windows Server 2008
                   Windows Server 2003
                   Windows 2000
                   Windows 7
                   Windows Vista
                   Windows XP
Impact/Access:     Provide Misleading Information -- Remote with User Interaction
Resolution:        Mitigation
CVE Names:         CVE-2009-3555  

Reference:         ASB-2009.1150
                   ESB-2010.0036.2

Original Bulletin: 
   http://www.microsoft.com/technet/security/advisory/977377.mspx

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Advisory (977377)

Vulnerability in TLS/SSL Could Allow Spoofing

Published: February 09, 2010

Version: 1.0

General Information

Executive Summary

  Microsoft is investigating public reports of a vulnerability in the 
  Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. 
  At this time, Microsoft is not aware of any attacks attempting to exploit 
  the reported vulnerability.

  As an issue affecting an Internet standard, we recognize that this issue 
  affects multiple vendors. We are working on a coordinated response with 
  our partners in the Internet Consortium for Advancement of Security on 
  the Internet (ICASI). The TLS and SSL protocols are implemented in 
  several Microsoft products, both client and server, and this 
  advisory will be updated as our investigation continues.

  As part of this security advisory, Microsoft is making available a 
  workaround which enables system administrators to disable TLS and SSL 
  renegotiation functionality. However, as renegotiation is required 
  functionality for some applications, this workaround is not intended 
  for wide implementation and should be tested extensively prior to 
  implementation.

  Upon completion of this investigation, Microsoft will take the 
  appropriate action to protect our customers, which may include providing 
  a solution through our monthly security update release process, 
  depending on customer needs.

Affected Software

  Microsoft Windows 2000 Service Pack 4
  Windows XP Service Pack 2 and Windows XP Service Pack 3
  Windows XP Professional x64 Edition Service Pack 2
  Windows Server 2003 Service Pack 2
  Windows Server 2003 x64 Edition Service Pack 2
  Windows Server 2003 with SP2 for Itanium-based Systems
  Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service 
    Pack 2
  Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and 
    Windows Vista x64 Edition Service Pack 2
  Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit 
    Systems Service Pack 2
  Windows Server 2008 for x64-based Systems and Windows Server 2008 for 
    x64-based Systems Service Pack
  Windows Server 2008 for Itanium-based Systems and Windows Server 2008 
    for Itanium-based Systems Service Pack 2
  Windows 7 for 32-bit Systems
  Windows 7 for x64-based Systems
  Windows Server 2008 R2 for x64-based Systems
  Windows Server 2008 R2 for Itanium-based Systems

What is the scope of the advisory?

  Microsoft is aware of a new report of a vulnerability affecting the 
  Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. 
  This vulnerability could allow a malicious man-in-the-middle attack to 
  introduce and execute a request in the protected TLS/SSL session between a 
  client and a server.

Workarounds

  Microsoft has tested the following workarounds. Although these workarounds 
  will not correct the underlying vulnerability, they help block known attack 
  vectors. When a workaround reduces functionality, it is identified in the 
  following section.
	
Enable SSLAlwaysNegoClientCert on IIS 6 and above

  Web servers running IIS 6 and later that are affected because they require 
  mutual authentication by requesting a client certificate, can be hardened 
  by enabling the SSLAlwaysNegoClientCert setting. This will cause IIS to 
  prompt the client for a certificate upon the initial connection, and does 
  not require a server-initiated renegotiation.

For IIS 6:

  Run the following command from the "c:\inetpub\adminscripts" folder in an 
  elevated / administrator command prompt:

    adsutil.vbs SET w3svc/<N>/SSLAlwaysNegoClientCert true

  Where <N> represents the number of the web site to be configured 
  (i.e. the 'Default Web Site' is 1, the next web site is 2, etc.). 
  So for example - to protect the 'Default Web Site' created by IIS the 
  following command would be used:

    adsutil.vbs SET w3svc/1/SSLAlwaysNegoClientCert true

For IIS 7:

  Save the following text to a file called 
  "Enable_SSL_Renegotiate_Workaround.js"

    var vdirObj=GetObject("IIS://localhost/W3svc/1"); 
    // replace 1 on this line with the number of the web site you wish 
    to configure 

    WScript.Echo("Value of SSLAlwaysNegoClientCert Before: " + vdirObj.SSLAlwaysNegoClientCert); 
    vdirObj.Put("SSLAlwaysNegoClientCert", true); 
    vdirObj.SetInfo(); 
    WScript.Echo("Value of SSLAlwaysNegoClientCert After: " + vdirObj.SSLAlwaysNegoClientCert);

  Run the following command from an elevated / administrator command 
  prompt:

    cscript.exe enable_ssl_renegotiate_workaround.js

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD4DBQFLc0vK/iFOrG6YcBERAnNbAJMEnhaVVTS3rmMbwrxNJnJg9FG3AJ4uSsEU
ELCnRlpcKznlJT/uJr2j2g==
=9FrK
-----END PGP SIGNATURE-----