__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Guidance EnCase Vulnerability [US-CERT Vulnerability Note VU#310057] November 9, 2007 18:00 GMT Number S-047 ______________________________________________________________________________ PROBLEM: There are several issues with Guidance Encase: 1) Guidance Software's EnCase Forensic can only detect the first 25 partitions on a volume; and 2) Guidance EnCase Enterprise uses IP authentication to identify target machines PLATFORM: Guidance Software EnCase 6.2 and 6.5 Guidance Software EnCase Enterprise Edition (EEE) 6 DAMAGE: An attacker may be able to: 1) hide or obscure data; and 2) supply the EnCase SAFE with a different image than what was requested by the investigator by using ARP spoofing or other well known network attacks. SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is LOW. An attacker may be able to: 1) hide or obscure ASSESSMENT: data; and 2) supply the EnCase SAFE with a different image than what was requested by the investigator by using ARP spoofing or other well known network attacks. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/s-047.shtml ORIGINAL BULLETIN: http://www.kb.cert.org/vuls/id/310057 ADDITIONAL LINK: http://www.kb.cert.org/vuls/id/912593 CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2007-4201 CVE-2007-4202 ______________________________________________________________________________ [***** Start US-CERT Vulnerability Note VU#310057 *****] Vulnerability Note VU#310057 Guidance EnCase fails to detect more than 25 partitions Overview Guidance Software's EnCase Forensic can only detect the first 25 partitions on a volume. I. Description Guidance Software's EnCase Forensic is a tool that allows an investigator to acquire and analyze a disk image. EnCase names partitions either c: through z:, with an additional partition named \[. EnCase Forensic may only detect the first 25 partitions on a volume. The hidden partitions are searchable, but not can not be browsed. Note that when previewing a drive with EnCase, mounted drives, including CD-ROM, USB keys, native hard drives, and floppy drives will count towards the 25 limit. II. Impact An attacker may be able to hide or obscure data. III. Solution Guidance Encase customers should see the Guidance support portal for information about obtaining fixed software. Systems Affected Vendor Status Date Updated Guidance Software, Inc. Vulnerable 9-Nov-2007 References http://www.guidancesoftware.com/products/ef_index.aspx http://www.isecpartners.com/files/iSEC-Breaking_Forensics_Software-Paper. v1_1.BH2007.pdf http://www.securityfocus.com/archive/1/474727 http://www.securityfocus.com/archive/1/archive/1/474727/100/0/threaded http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4201 Credit This report was based on information released by iSec partners. This document was written by Ryan Giobbi. Other Information Date Public 08/03/2007 Date First Published 11/09/2007 09:39:14 AM Date Last Updated 11/09/2007 CERT Advisory CVE Name CVE-2007-4201 Metric 0.85 Document Revision 19 [***** End US-CERT Vulnerability Note VU#310057 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of US-CERT for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) S-037: Perl-Compatible Regular Expression (PCRE) Vulnerabilities S-038: Perl Security Update S-039: httpd Security Update S-040: Vulnerability in Macrovision SECDRV.SYS Driver on Windows S-041: Wireshark Security Update S-042: CoolKey Security and Bug Fix Update S-043: OpenSSH Security and Bug Fix Update S-044: Apple QuickTime 7.3 Security Update S-045: OpenLDAP Security and Enhancement Update S-046: TeTeX Security Update