Patch Day Followup: Host Integration Server and Forefront UAG Updates

As you probably noticed, yesterday was Microsoft’s Patch Day. Hopefully, you saw our alerts for the most important October security bulletins, and have already gotten a start patching them. If not, you can find our Internet Explorer and consolidated Windows alerts here:

However, if you follow along with Microsoft’s bulletin releases, you may have noticed we left put two bulletins.We try to restrict our major LiveSecurity alerts to products or issues that we feel are relevant to the majority of our audience. A few of yesterday’s bulletins cover flaws in products that we either don’t believe many of our customers use (since we provide great VPN), or that we just don’t think are very popular. Nonetheless, for the sake of completeness, I wanted to quickly mention these bulletins, just in case you use the relevant Microsoft products.

Below is a quick summary of the two Microsoft bulletins we didn’t alert on:

In a nutshell, Forefront Unified Access Gateway (UAG) is Microsoft’s VPN Gateway product. Our products already provide great VPN solutions (IPSec, SSL, PPTP, etc), so we don’t think many of our customers use this product. That said, it does suffer from five security flaws, including a relatively significant remote code execution vulnerability. In short, if an attacker can entice a user with access to a UAG server to a malicious web site, she could exploit this flaw to execute code on that user’s computer, with that user’s privileges (usually local admin privileges in Windows).
Microsoft rating: Important

Microsoft Host Integration Server (HIS) is a product that helps connect Windows networks to old IBM mainframes and AS/400 servers. I really doubt a large percentage of my audience has heard of it, let alone uses  it (though I could be wrong). Of course, if you do use this server, you should know it suffers from two Denial of Service (DoS) vulnerabilities. By sending specially crafted network packets, an attacker can exploit these flaws to prevent the server from responding to new requests. However, firewalls –like WatchGuard’s XTM appliances– will prevent external users from accessing your HIS server’s ports (TCP 1477 and TCP/UDP 1478) by default; thus preventing this sort of attack.
Microsoft rating: Important

In conclusion, if you happen to use either of these less popular Microsoft products, you should definitely download, test, and install the corresponding updates listed in those bulletins. — Corey Nachreiner, CISSP (@SecAdept)

About Corey Nachreiner

Corey Nachreiner has been with WatchGuard since 1999 and has since written more than a thousand concise security alerts and easily-understood educational articles for WatchGuard users. His security training videos have generated hundreds of letters of praise from thankful customers and accumulated more than 100,000 views on YouTube and Google Video. A Certified Information Systems Security Professional (CISSP), Corey speaks internationally and is often quoted by other online sources, including C|NET, eWeek, and Slashdot. Corey enjoys "modding" any technical gizmo he can get his hands on, and considers himself a hacker in the old sense of the word.

No comments yet... Be the first to leave a reply!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 7,374 other followers

%d bloggers like this: