Ixia ATI Update 2016-16 (277126)

Defects Resolved

Ticket Info
DE6395 (1407628) Two new actions, "Set Accept TLS Options" and "Set Start TLS Options", have been added to Web based protocols to allow TLS options to be set when creating encrypted flows which follow.These two actions will also be available on future Evergreen protocols.
DE6400 (1407851)  The "Skip Action When NAT Disable" parameter has been added on the Conditional Request action, on the "MySQL Database Advanced" superflow.
DE6402 (1407859) Updated CVSS score to fractional value for Strike E15-ydi01.
DE6425 (1408218) Fixes an error affecting Security test components whose Attack Retries are greater than 0 and whose Concurrent Strikes mode is set to "default". Subsequent executions of a strike will occur if the first attempt fails and the number of Attack Retries is 1 or greater. In these cases, this strike would affect other strikes that are executed concurrently and use the same source or destination port such that they would not run.

Enhancements

Ticket Info
US42200 (1390797) The 'Radius Accounting' flow now has the 'Behavior on disabled fields' option which allows the user to remove Attribute Value Pairs from the protocol messages if the fields are disabled. The affected AVPs are: NAS IP Address, NAS Port, Framed IP Address, Framed Netmask, Calling Station ID and Called Station ID.
US48014 When a Conditional Request match/nomatch does not have an associated action(s) then the implicit behavior is to advance to the next action in the Super Flow. This update makes that implicit behavior explicit by adding actions to configured match/nomatch blocks that did not have an associated action(s). As such, each of the following Super Flows have been updated such that every match and mismatch in its Conditional Request actions has a corresponding action. The list of updated Super Flows is as follows: BreakingPoint ClientSim IMAP (Authenticated), BreakingPoint ClientSim IPP, BreakingPoint ClientSim LPD, BreakingPoint ClientSim MySQL (Authenticated), BreakingPoint ClientSim NetBIOS Session, BreakingPoint ClientSim NNTP, BreakingPoint ClientSim POP3 (Authenticated), BreakingPoint ClientSim POP3 Login, BreakingPoint ClientSim QOTD, BreakingPoint ClientSim RADIUS Access, BreakingPoint ClientSim RADIUS Accounting
US50684 Added 'Torshammer 'canned test. The test case emulates an HTTP Slow Post application attack traffic sent over the Tor network. A new network neighborhood called 'BreakingPoint Torshammer' was designed for this purpose which has a collection of multiple Tor exitnode IP addresses assigned to the client side.
US49587 Added 'Locky Malware Infection Test Scenario' canned test and the associated 'Malware Infection Network' neighborhood. This test simulates a Locky malware infection scenario. A Locky malware sample gets sent to an email server (through SMTP). An email client downloads the email (through IMAP). In this scenario the client also runs the malicious attachment contained in the email. The attachment is actually a downloader that fetches Locky malware (through HTTP). During the above conversations, DNS queries are also made.

New Protocols & Applications (2)

Name Category Info
Pokemon GO Aug16 Games Pokemon Go is a free-to-play location-based, augmented reality game developed by Niantic for iOS and Android devices. In the game, players use the smart device's GPS and camera to capture, battle, and train virtual creatures, called Pokemon, who appear on the screen as if they were in the same real-world location as the player. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Profinet PNIO-CM SCADA Profinet is a family of SCADA protocols defined in the PROFINET Open Industrial Ethernet standard provided by the PROFIBUS User Organization. PNIO-CM is the Profinet IO Context Manager protocol which runs over UDP DCERPC version 4.

New Super Flows (5)

Name Category Info
Pokemon GO Games The user collects Poke Balls and catches Pokemons. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Pokemon GO Catch and Upgrade Pokemon Games The user catches a Pokemon and upgrades it. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Pokemon GO Spin PokeStops and Collect Games The user walks on the map, spins PokeStops and collects Poke Balls and eggs. This protocol uses dynamically created flows to simulate the various internal actions performed by a modern Web browser. Because these dynamic flows may be large in number and may contain a large amount of generated data, profile creation and test initialization may require a considerable amount of time. The "Max. Request/Response Pairs per Action" and "Max. Generated File Size" flow parameters can be used to control the number and size of the interactions performed by the actions. DNS resolution is always performed for each host. Delete the DNS host from the Super Flow to disable this feature.
Profinet PNIO-CM Read Implicit SCADA The first two actions here emulate a PNIO-CM Read Implicit Request and its response using default parameters. The next Read Implicit Request show the use of a token for the 'API' parameter while the corresponding response shows how the 'Block 4 Data' parameter is used to provide the fourth block in that response.
Profinet PNIO-CM Write SCADA Emulates a PNIO-CM Write Request and its Write Response.

New Strikes (11)

CVSS ID References Category Info
10.0 E16-3nt01 CVE-2016-0857
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
SCIP-80274
URL
ZDI-ZDI-16-121
Exploits This strike exploits a buffer overflow vulnerability in Advantech WebAccess. A specially crafted DCE/RPC request with OpNum 0x00 and certain vulnerable function IDs can overflow a buffer, which could lead to arbitrary code execution or abnormal termination of the WebAccess process.
10.0 E16-4jq01 CVE-2016-2006
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
Exploits This strike exploits a buffer overflow vulnerability in HP Data Protector's Backup Client Service (OmniInet.exe). The vulnerability is due to improper checks on an EXEC_BAR request message. A message with an overly long Domain parameter will overflow a stack buffer which can result in remote code execution.
10.0 E16-3rg01 APSB-16-08
BID-84312
CVE-2016-0988
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
GOOGLE-681
SECURITYTRACKER-1035252
Exploits This strike exploits a remote code execution vulnerability in Adobe Flash Player. The vulnerability is due to a use after free in setInterval. An attacker can entice a target to open a specially crafted flash file to trigger the vulnerability. Successful exploitation may result in execution of arbitrary code or abnormal termination of the flash process.
10.0 E15-9i301 APSB-15-32
BID-78715
CVE-2015-8427
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-39053
GOOGLE-579
SECURITYTRACKER-1034318
Exploits This strike exploits a remote code execution vulnerability in Adobe Flash Player. The vulnerability is due to a use after free in TextField variable setter. An attacker can entice a target to open a specially crafted flash file to trigger the vulnerability. Successful exploitation may result in execution of arbitrary code or abnormal termination of the flash process.
10.0 E15-9i201 APSB-15-32
BID-78715
CVE-2015-8426
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-39650
GOOGLE-581
SECURITYTRACKER-1034318
Exploits This strike exploits a remote code execution vulnerability in Adobe Flash Player. The vulnerability is due to a use after free in TextField maxChars setter. An attacker can entice a target to open a specially crafted flash file to trigger the vulnerability. Successful exploitation may result in execution of arbitrary code or abnormal termination of the flash process.
10.0 E14-9ig01 APSB-14-24
BID-71047
CVE-2014-8440
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-36880
SECURITYTRACKER-1031182
URL
Exploits This strike exploits a remote code execution vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, which fails to initialize allocated memory. An attacker can entice a target to open a specially crafted flash file to trigger the vulnerability. Successful exploitation may result in execution of arbitrary code or abnormal termination of the flash process.
10.0 E14-3eb02 APSB-14-13
BID-67092
CVE-2014-0515
CVSS-10.0 (AV:N/AC:L/AU:N/C:C/I:C/A:C)
EXPLOITDB-33333
SECUNIA-SA58085
SECURITYTRACKER-1030155
Exploits This strike exploits a remote code execution vulnerability in Adobe Flash Player. The vulnerability is due to improper verification of data type of the defaultValue metadata and data type of the parameter. An attacker can entice a target to open a specially crafted flash file to trigger the vulnerability. Successful exploitation may result in execution of arbitrary code or abnormal termination of the flash process.
9.3 E16-5hi01 BID-91094
CVE-2016-3222
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
MS16-068
Exploits This strike exploits a vulnerability in the Microsoft Edge Browser. Specifically, the vulnerability exists in the isEqualNode method. An uninitialized local variable used by another function and is later dereferenced, leading to memory corruption. This memory corruption can potentially result in remote code execution or a denial of service condition in the application.
9.3 E15-7nu01 BID-76984
CVE-2015-6042
CVSS-9.3 (AV:N/AC:M/AU:N/C:C/I:C/A:C)
MS15-106
URL
Exploits This strike exploits a vulnerability in Microsoft Internet Explorer. Specifically a use after free vulnerability occurs when an iframe element is encountered pointing to code in which a CWindow object is created. If the children of this object are deleted upon invoking an event listener, memory corruption can occur leading a use after free condition. It is possible that an attacker can control this, potentially leading to remote code execution, or a denial of service in the Internet Explorer application.
8.5 E16-ofr01 CVSS-8.5 (AV:N/AC:L/AU:N/C:P/I:C/A:N)
EXPLOITDB-40170
MSF-MODULES/EXPLOITS/LINUX/HTTP/CENTREON_USERALIAS_EXEC.RB
Exploits This strike exploits a vulnerability in Centreon Web Interface. The vulnerability is due to how Centreon utilizes the echo command for logging SQL errors. It is possible for an un-authenticated attacker to abuse this functionality to inject and execute commands remotely at the login screen.
7.5 E16-2vf01 CVSS-7.5 (AV:N/AC:L/AU:N/C:P/I:P/A:P)
EXPLOITDB-40130
URL
Exploits This strike exploits a command execution in the Drupal RESTful Web Services (RESTWS) Module. The RESTWS module checks requests to see if it references a callback function. If it does not have a default callback function, other arguments in the URL are handled as arguments, including an argument which is used as the callback function. This argument can be set to "system," allowing for command execution. An attacker can send a specially crafted HTTP request to achieve remote php command execution. Successful exploitation can result in the execution of arbitrary code with the privileges of the target Drupal server.

Modified Strikes (1)

CVSS ID References Category Info
10.0 E15-ydi01 ZDI-15-180
CVSS-10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploits Updated CVSS score to fractional value for Strike E15-ydi01.