exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

netsec37.txt

netsec37.txt
Posted Nov 6, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: ActiveX Parameter Validation vullnerability in Wndows 2000, and much more.

tags | activex
SHA-256 | dde907123b07e3d74e0b1c341846b45e4bcd8609276ed0b212a872a1e87bbb2a

netsec37.txt

Change Mirror Download
Net-Sec newsletter
Issue 37 - 06.11.2000
http://net-security.org

This is a newsletter delivered to you by Help Net Security. It covers weekly
roundups of security events that were in the news the past week. Visit Help
Net Security for the latest security news - http://www.net-security.org.


Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Table of contents:

1) General security news
2) Security issues
3) Security world
4) Featured articles
5) Featured books
6) Security software
7) Defaced archives



============================================================
We are glad to announce that, in association with Zero Knowledge
Systems, you can win several copies of their cutting-edge Internet
Privacy software - Freedom. For your chance to win, please submit
your opinion on the following topic:

What are the current Internet privacy threats?

Opinion submit form is located on:
http://www.net-security.org/your-opinion/zks/
============================================================




General security news
---------------------

----------------------------------------------------------------------------

IT SECURITY SPENDING MISSING MARK
Despite an expected 300 percent spending increase on information technology
security over the next four years, bad decision-making will leave U.S. companies
almost as vulnerable to security breaches as they are today, according to a new
report issued by Forrester Research.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.ecommercetimes.com/news/articles2000/001030-3.shtml


CANADA'S HOLES A THREAT TO U.S?
"James Adams, who has worked with the NSA and the CIA, told the National
Post Canada's vulnerability is a concern to security circles in Washington. That's
because so many major U.S. corporations have offices in Canada". Hmm who
would tell them that sytem administrators and their security expertise is crucial
for the state of computer security in those "U.S. corporations", and not to
generalize the security situation to the whole Canada...
Link: http://www.nationalpost.com/home/story.html?f=/stories/20001030/445647.html


DOWNPLAYING THE SITUATION
On Friday, Microsoft said the attackers had roamed its systems for five weeks.
Now, Microsoft insists that they had high-level access for just 12 days, were
monitored during this time, and that no damage was done.
Link: http://news.bbc.co.uk/hi/english/business/newsid_998000/998449.stm


'INFECTING' THE BACKBONE
"The president of Israel's leading Internet-service provider, Gilad Rabinovich,
tells Newsweek that hackers have tried 'to infect the Internet backbone' of the
country". Strange but as article speaks about Denial of Service attacks and mass
spamming, where should we put the verb infecting?
Link: http://www.hoovershbn.hoovers.com/bin/story?StoryId=CoFU84bWbsfntvtaWnMe


GATEWAY SECURITY "NOT TOTALLY WORKED OUT"
The official charged with ensuring Britain's public bodies can interoperate
electronically has shed more light on the confusion surrounding the Government
Gateway project. Anwar Choudhury, deputy director in the Office of the e-Envoy
at the Cabinet Office, said on 31 October 2000 that the security infrastructure
of e-government "has not been totally worked out yet".
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.kablenet.com/kable.nsf/Frontpage/B59CDF190B182238802569890057D826


MIDDLE EAST CYBER TENSION COULD ESCALATE
Some(?) security experts are warning that the electronic skirmish in the Middle
East could escalate and spill over to the United States. Tensions in the Middle
East have spread to the online arena, with an increased level of activity against
Web sites related to Israel and pro-Palestinian organizations, according to the
FBI's National Infrastructure Protection Center (NIPC). However, Yoran's firm
services clients in the Middle East, and they have not been threatened.
Link: http://www.crn.com/Sections/BreakingNews/dailyarchives.asp?ArticleID=21152


DECREASE YOUR STRESS
Much of a systems administrator's stress comes from unexpected downtime
and dissatisfied users. This month in Pete's Super Systems, Pete introduces
two free tools that will help reduce the chances of both.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.sunworld.com/sunworldonline/swol-10-2000/swol-1027-supersys.html


VNUNET WRITES ABOUT ANTIONLINE DEFACEMENT
Vnunet picked up a story about AntiOnline defacement. While writing this item
the web site was currently not available, but I read earlier that they published
information about the break in. I remember that it started with something like
'between millions of hack attempts, we had a successfull break in'.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1113199


IT TASK FORCE DISCUSSES SECURITY
The Indo-Singapore task force on IT, communication and systems has held
its first meeting in New Delhi and discussed various issues related to
e-commerce laws, content, online security and ways to establish joint
research and development efforts
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://asia.internet.com/2000/11/1101-india.html


DOES IT MEETS MINIMUM SECURITY STANDARDS?
Benchmarks for measuring security got a boost this week when the Center
for Internet Security released a first draft of consensus security actions for
Solaris systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.sans.org/cissummary.htm


SEACH, SPAM, ETC.
If you often use search engines, next Wired story will look strange, because
it talks of some current issues surrounding search inquieries. At least it looked
strange to me ;) Slashdot also picked it of course...
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/technology/0,1282,39896,00.html


UBER ATTACKERS
NewsMax.com has a FUD article saying that targets by 'Russian hackers'
are "America's power plants, telecommunications systems, bridges, dams,
sewage treatment plants, water stations and other key installations."
Link: http://www.newsmax.com/showinsidecover.shtml?a=2000/11/1/24737


HUSHMAIL BACKS UK ANTI-SNOOPING EFFORT
UK Internet civil liberties group Cyber Rights & Cyber Liberties has teamed up
with US email encryption company Hush Communications to overcome the RIP
Act, which was recently made law. Through a joint project 'Cyber-Rights.Net',
the pair will provide a route to bypass snooping regulations in the UK and at
the same time draw attention to what they view as international moves to
synchronise Internet surveillance.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2000/43/ns-18819.html


HITACHI UNVEILS SECURE NOTEBOOK RANGE
Electronics giant Hitachi has launched a range of secure notebook PCs
specifically aimed at companies and users looking to safeguard their data and
equipment from malicious attacks. The HN7200, 7300 and 8300 notebooks,
which go on sale next month, come equipped with remote networking facilities,
a configurable firewall and email filtering tools aimed at defending workers based
outside the corporate firewall from attempted hacks and malicious code appended
to emails.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1113381


MCAFEE VIRUS DEFINITION CRASHES WINDOWS
Keeping virus scanning software files current is usually a good idea... except for
today. Network Associates has confirmed a bug in the latest McAfee VirusScan's
virus definition file that could cause many Windows systems to freeze during start
up. The problem is an incompatibility between a recent virus remedy file and the
scan engine software in VirusScan. For those bitten by this bug, the only solution
is to boot Windows in Safe Mode and disable VirusScan's system scanning at start
up. Then, when an upgraded version of the scan engine is applied to the system,
the user can go back and re-enable startup scans.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2000/43/ns-18853.html


NEW SAFE HARBOR DATA PRIVACY WEBSITE LAUNCHES
Commerce Department Under Secretary Robert LaRussa announced the opening
of a new website that enables U.S. companies to sign up online to participate in
the U.S.-European Union "safe harbor" data privacy framework and thus comply
with EU privacy rules.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://cipherwar.com/news/00/safe_harbor_2.htm


CRACKERS ATTACK PRO-ISRAELI SITE
Pakistani-based attackers attacked a U.S. website belonging to a pro-Israel
lobby, stealing credit card numbers and member records in the latest volley in
what has become an online war. The attack, against the American-Israel Public
Affairs Committee, consisted of the attackers defacing its website with
pro-Palestinian slogans and e-mails downloaded from the webite databases.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,39950,00.html


NET DAD VINT CERF SLAMS RIP
Vinton Cerf, one of the founding fathers of the Internet, has attacked the RIP
bill as a dangerous new piece of legislation. Speaking at the Compsec conference
in London yesterday he commented: "Oh my god. A lot of us in the US are very
worried about the RIP Bill, it has raised some of the same concerns as Carnivore."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/1/14451.html


MICROSOFT'S SLOPPY ADMINS
The Dutch hacker Dimitri, said to IT World that Microsoft failed to install a patch
for a known bug, which let him enter one of Microsoft's servers. A Microsoft
spokesman confirmed that the hacker reached at least one server, but said that
Microsoft security personnel were rechecking their servers for holes to patch.
Funny (or tragic) thing is that Microsoft doesn't secure their servers with their
own patches...
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www2.itworld.com/cma/ett_article_frame/0,,1_3315,00.html

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

IIS 5.0 CROSS SITE SCRIPTING VULNERABILITY
Using specially designed URLs, IIS 5.0 may return user specified content to the
browser. This poses great security risk, especially if the browser is JavaScript
enabled and the problem is greater in IE. By clicking on links, just visiting hostile
web pages or opening HTML email the target IIS sever may return user defined
malicous active content. This is a bug in IIS 5.0, but it affects end users and is
exploited with a browser. A typical exploit scenario is stealing cookies which
may contain sensitive information.
Link: http://www.net-security.org/text/bugs/972959321,32876,.shtml


MICROSOFT TO GEORGI GUNINSKI
Microsoft takes reports of all security vulnerabilities seriously. That being said,
we'd like to share the events surrounding the receipt and impending resolution
of this issue. The Microsoft Security Response Center received a report of this
vulnerability on October 24th, as Georgi states below. Within 24 hours of r
eceiving Georgi's notification, we had a draft patch designed to correct this
problem. What's more at issue here is the manner in which Georgi has decided
to release this security advisory. We informed Georgi that we were working to
address the issue and would probably have a patch available in short order
(within eight days of the time he reported it to us). We asked that he give us
time to finish the patch so we could do a joint release, thus protecting our
mutual customers and reporting the issue in a responsible manner.
Link: http://www.net-security.org/text/bugs/972959339,58883,.shtml


GEORGI GUNINSKI REPLIES TO MICROSOFT
I did not reply to secure@microsoft.com's emails because they were just
informative emails without any questions. Here are some quick checkable facts
regarding Microsoft's time to release a patch: Since Microsoft claims "Microsoft
takes reports of all security vulnerabilities seriously" I'd like to point out that
Microsoft has not fixed several vulnerabilities for very long time. One of them
is file reading bug in IE 5.5 and has not been fixed for 3 1/2 months. Has they
taken them seriously? The least they could do would be to inform their
customers about a workaround.
Link: http://www.net-security.org/text/bugs/972959359,54942,.shtml


REMOTE COMMAND EXECUTION VIA KW WHOIS 1.0
There is a vulnerability in Kootenay Web Inc's KW Whois v1.0 which allows
malicious users to execute commands as the uid/gid of the webserver. The
hole lies in unchecked user input via an input form box. The form element
< input type=text name="whois"> is not checked by the script for unsafe
characters.
Link: http://www.net-security.org/text/bugs/972959380,40592,.shtml


MINOR BUG IN PAGELOG.CGI
Any file on the system with a '.log' extension readable by the uid/gid of the
webserver can be viewed. In addition, two files with extensions of '.txt' and
'.log' can be created in any directory on the system that is writable by the
web server. This bug lies in the failure of the script to check for directory
traversal.
Link: http://www.net-security.org/text/bugs/972959395,24878,.shtml


ADDITONAL THEORY ON PAGELOG.CGI SECURITY ISSUE
At this time this is just a theory, since i can't seem to find any sites running
pagelog.cgi to test it, or a copy of the code anywhere to take a look at it. But,
in theory, if you were to append a %20 to the address you should be able to
open any file it is capable of displaying.
Link: http://www.net-security.org/text/bugs/972959438,13878,.shtml


SAMBA 2.0.7 SWAT VULNERABILITIES
The program swat included in the samba distribution allows username and
password bruteforcing. An attacker can easily generate userlists and then
bruteforce their passwords. Comments in the source code show that
somebody tried to prevent this from happening.
Link: http://www.net-security.org/text/bugs/972959456,32735,.shtml


UNIFY EWAVE SERVLETEXEC DOS
Unify's eWave ServletExec is a JSP and a Java Servlet engine which is to be
used as a plug-in to popular web servers like Apache, IIS, Netscape, etc. It is
possible to send a URL request which causes the ServletExec servlet engine to
terminate abruptly. The web server, however, is not affected.
Link: http://www.net-security.org/text/bugs/972959470,90979,.shtml


PEGASUS MAIL FILE READING VULNERABILITY
David Harris, the author of Pegasus Mail, has released a utility called WSendTo
that protects against the file reading vulnerability discussed on BugTraq a
few weeks ago.
Link: http://www.net-security.org/text/bugs/973042673,34444,.shtml


"MALFORMED MIME HEADER" VULNERABILITY PATCHED
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft Exchange Server 5.5. The vulnerability could enable a malicious
user to cause an Exchange server to fail.
Link: http://www.net-security.org/text/bugs/973042712,32774,.shtml


ALLAIRE'S JRUN DoS
A denial of service vulnerability exists within the Allaire JRun 3.0 web application
server which allows an attacker to bring down the JRun application server engine.
Link: http://www.net-security.org/text/bugs/973132487,53954,.shtml


HOTMAIL CAN ACT AS EMAIL AMPLIFIER
Hotmail can act as email size amplifier with a factor of at least 1000, allowing
flooding and mail-bombing a victim while using a negligible amount of your own
bandwidth.
Link: http://www.net-security.org/text/bugs/973132501,46670,.shtml


UNIFY EWAVE SERVLETEXEC UPLOAD
Unify's eWave ServletExec is a JSP and a Java Servlet engine which is used as
a plug-in to popular web servers like Apache, IIS, Netscape, etc. ServletExec
has a servlet called "UploadServlet" in its server side classes. UploadServlet,
when invokable, allows an attacker to upload any file to any directory on the
server. The uploaded file may have code that can later be executed on the
server, leading to remote command execution.
Link: http://www.net-security.org/text/bugs/973132522,4578,.shtml


NETSCAPE SERVERS HEAP BUFFER OVERFLOW
An exploitable heap buffer overflow vulnerability was discovered in the Netscape
Directory Server product. The Netscape Certificate Management System also
has several server components that share the problem. Vulnerable systems
allow the execution of arbitrary code as the user running the services.
Link: http://www.net-security.org/text/bugs/973132538,13785,.shtml


NETSCAPE SERVERS DENIAL OF SERVICE
A bug in several components of the Netscape Servers suite of products allows
and attacker to successfully conduct a denial of service attack against the
vulnerable systems. The Netscape Certificate Management System has also
several server components that share the problem.
Link: http://www.net-security.org/text/bugs/973132561,625,.shtml


"NETMON PROTOCOL PARSING" BUG PATCHED
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft Windows NT and Windows 2000 server products and Systems
Management Server. The vulnerability could allow a malicious user to
gain control of an affected server.
Link: http://www.net-security.org/text/bugs/973135591,74009,.shtml


"INDEXING SERVICES CROSS SITE SCRIPTING" PATCH
Microsoft has released a patch that eliminates a security vulnerability in
Microsoft Indexing Services for Windows 2000. This vulnerability could
allow a malicious web site operator to misuse another web site as a means
of attacking users.
Link: http://www.net-security.org/text/bugs/973261837,75960,.shtml


MULTIPLE NETWORK MONITOR OVERFLOWS
The Windows Network Monitor tool allows an administrator to capture network
traffic destined to the local host or all traffic on a local network. Network Monitor
is designed to capture network traffic before the information can be viewed in
the graphical interface. Individual packets received from the network are parsed
to provide a readable representation in the user interface. Each application level
protocol is parsed by a separate dynamic linked library within Network Monitor.
One of the vulnerable libraries, 'browser.dll', is documented in the samples section
of the Visual C++ documentation in the MSDN library. Multiple stack overflows in
various function calls within Network Monitor's parsing libraries may allow remote
attackers to gain control of the Network Monitor application and execute
arbitrary code.
Link: http://www.net-security.org/text/bugs/973261858,1489,.shtml


NAI'S DISTRIBUTED SNIFFER AGENT PROBLEMS
NAI's Distributed Sniffer Agent can be overflowed remotely to grant SYSTEM
privilege. Additional vulnerabilities exist in the management protocol to allow an
attacker to recover logins passwords, take control of the agent, and delete logs.
Link: http://www.net-security.org/text/bugs/973261889,85022,.shtml


"ACTIVEX PARAMETER VALIDATION" PATCH
An ActiveX control that ships as part of Windows 2000 contains an unchecked
buffer. If the control was called from a web page or HTML mail using a specially
malformed parameter, it would be possible to cause code to execute on the
machine via a buffer overrun. This could potentially enable a malicious user to
take any desire action on the user's machine, limited only by the permissions of
the user. Microsoft has released a patch that eliminates this vulnerability.
Link: http://www.net-security.org/text/bugs/973261905,68040,.shtml


BUFFER OVERFLOW IN NETWORK MONITOR
Internet Security Systems (ISS) X-Force has discovered a buffer overflow
vulnerability in Microsoft's Network Monitor utility. The vulnerability allows
code to be executed on the remote computer with the privilege levels of
the current user. Administrative privileges are required to run Network Monitor.
Link: http://www.net-security.org/text/bugs/973261921,19800,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

ZKS INTRODUCES MANAGED PRIVACY SERVICES - [31.10.2000]

Zero-Knowledge Systems, the leading developer of privacy solutions,
introduced its new Managed Privacy Services offering to solve the privacy
challenges of businesses and enable enterprise to thrive in a privacy-conscious
climate. Delivering a unique combination of technology, policy and strategy
expertise, Zero-Knowledge Managed Privacy Services (MPS) enables clients to
turn privacy into a competitive advantage by leveraging rich data resources
while building stronger and more profitable relationships with customers,
employees and partners. MPS is based on responsible and ethical information
management in accordance with relevant legislation and industry standards.

Press release:
< http://www.net-security.org/text/press/973006780,81960,.shtml >

----------------------------------------------------------------------------

INFOEXPRESS STRENGTHENS PRESENCE IN CANADA - [31.10.2000]

Responding to exponential growth in demand for effective remote access
security for enterprises, InfoExpress announced the opening of a new office
in Ottawa, Canada, the fast growing high-tech capital city. The new office
will focus on marketing InfoExpress' award-winning CyberArmor Enterprise
Personal Firewall Suite(TM) and FireWalker VPN Suite(TM) to companies in
Ottawa, Toronto, Montreal, and the northeastern United States. In addition
to sales activity, engineering support will also be available from the Ottawa
office.

Press release:
< http://www.net-security.org/text/press/973006842,37204,.shtml >

----------------------------------------------------------------------------

ERAP VIRUS SUSPECT ARRESTED IN PHILIPPINES - [31.10.2000]

Reports from the Philippines indicate that a 19 year old male youth has been
questioned by the authorities about the so-called "Erap Estrada" worm. The
youth, who has not been named, was arrested on October 22 by agents of
the National Bureau of Investigation (NBI) at his house in Laguna. Floppy disks
and other computer equipment were seized by the Anti-Fraud and Computer
Crimes division of the NBI. The man was later released pending further
investigation.

Press release:
< http://www.net-security.org/text/press/973009201,9686,.shtml >

----------------------------------------------------------------------------

TOP TEN VIRUSES REPORTED TO SOPHOS IN OCTOBER - [01.11.2000]

This is the latest in a series of monthly charts counting down the ten most
frequently occurring viruses as compiled by Sophos, the world leaders in
corporate anti-virus protection.

Press release:
< http://www.net-security.org/text/press/973009653,81553,.shtml >

----------------------------------------------------------------------------

VENTUREWORX ANNOUNCES STAKE IN SECURITY FIRM - [01.11.2000]

VentureWorx announced an equity stake in Vynamic™ an Internet infrastructure
company providing security solutions expressly designed to support the needs of
the e-Learning marketplace. Vynamic utilizes a proprietary, secure student ID
technology, which insures that students are authenticated and all online learning
transactions are encrypted and protected. In addition, Vynamic's secure student
ID enables both corporate training and academic e-Learning platforms the ability
to protect their intellectual property by "locking in" their course content.

Press release:
< http://www.net-security.org/text/press/973041155,37624,.shtml >

----------------------------------------------------------------------------

ALADDIN AND DST PARTNER - [01.11.2000]

Aladdin Knowledge Systems, a global leader in the field of Internet content and
software security, and Digital Signature Trust, an affiliate of Zions Bancorporation
and an issuer of trusted digital identity certificates, announced a partnership that
combines Aladdin's eToken and DST's TrustID certificates to provide highly secure
digital certificate storage and authentication.

Press release:
< http://www.net-security.org/text/press/973041378,67098,.shtml >

----------------------------------------------------------------------------

NEW ENCRYPTIONT TECHNOLOGY PREMIERED - [01.11.2000]

CNET's Download.com launched the world's first encrypted Instant Messenging
utility. The Encrypted Messenger program is unique in that it protects user's
online chat and instant messenging by encrypting the text in real-time. The
program will help quell the fear of consumers who are wary of potential online
privacy invasions both from hackers and from accidental eavesdropping by
programs such as Carnivore and Echelon.

Press release:
< http://www.net-security.org/text/press/973086289,42744,.shtml >

----------------------------------------------------------------------------

SC MAGAZINE AWARDS LATEST CYBERWALLPLUS - [01.11.2000]

Security Solutions, Inc., a leader in distributed intrusion prevention solutions for
e-Business networks, announced that SC Magazine has performed a technical
product review of its CyberwallPLUS family of firewall products and awarded
them its highest overall rating of 5 stars. The review is published in the October
issue of SC Magazine.

Press release:
< http://www.net-security.org/text/press/973087847,13789,.shtml >

----------------------------------------------------------------------------

SECUREPRINT BIOMETRIC SOLUTION UNVEILED - [02.11.2000]

Intermate and LCI SMARTpen Inc. introduce SECUREprint, an elegant solution
that enables the secure printing of confidential or sensitive data to any
standard laser printer through biometric authentication. The concept consists
of two parts, the LCI SMARTpen, a biometric authentication system based on
the users unique signature, and LCI Intermate's SECUREprint card for standard
laser printers.

Press release:
< http://www.net-security.org/text/press/973135001,25125,.shtml >

----------------------------------------------------------------------------

INTEL SELECTS SAFENET'S ENCRYPTION BOARD - [02.11.2000]

SafeNet, Inc., formerly IRE, the foundation of Internet security and de facto
leader of VPN technology, announced that Intel has licensed its SafeNet PCI
board to accelerate encryption functionality of the Intel NetStructure 3130
VPN Gateway. The integration of SafeNet PCI into Intel's NetStructure product
offers the highest performing VPN gateway available for fast and secure
Internet communications for mobile users, between offices and partners,
and over corporate networks.

Press release:
< http://www.net-security.org/text/press/973135554,92946,.shtml >

----------------------------------------------------------------------------

CONTROL RISKS GROUP RELEASES RISKMAP 2001 - [03.11.2000]

The business risk consultancy, Control Risks Group, launches its annual survey,
RiskMap 2001 detailing the political, security and reputational risks that will
define the international environment in the year ahead.

Press release:
< http://www.net-security.org/text/press/973262892,95889,.shtml >

----------------------------------------------------------------------------

BINDVIEW'S FREE TROJAN SCOUT FINDS QAZ TROJAN - [03.11.2000]

Following recent hacks exposing Microsoft product code, BindView Corporation,
a leading provider of IT administration and security management solutions,
announced Trojan Scout, software that not only identifies the security
vulnerability created by the QAZ Trojan, but also offers instruction for
closing the "backdoor" created as a result of the intrusion.

Press release:
< http://www.net-security.org/text/press/973264008,56796,.shtml >

----------------------------------------------------------------------------

ANOTHER TREND MICRO PARTNERSHIP DEAL - [03.11.2000]

Trend Micro Inc. has joined forces with Taiwan Telecommunications Network
Services Co., Ltd., Taiwan's largest value-added network service provider and
third-largest ISP, to protect TTN customers from the threat of Internet-borne
viruses. Through this strategic alliance, TTN will offer its dial-up, broadband
and lease-line Internet subscribers an optional virus scanning and cleaning
service for their email messages and user mailboxes, using Trend Micro's
award-winning antivirus technology

Press release:
< http://www.net-security.org/text/press/973264084,15124,.shtml >

----------------------------------------------------------------------------

BRILAW INTERNATIONAL WINS GOLD AGAIN - [04.11.2000]

Stockport based Brilaw International has been re-accredited as a " Gold CSN
Partner". This is an accreditation that relates to the reselling and adding value
to Citrix. Citrix is the ultimate solution for organisations wishing to speed up
applications, reduce their IT overhead and improve security. Brilaw International
has renewed its commitment to the Citrix brand by complying with the new
demands Citrix has placed on its premier resellers.

Press release:
< http://www.net-security.org/text/press/973337772,2484,.shtml >

----------------------------------------------------------------------------




Featured articles
-----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

Below is the list of the recently added articles.

----------------------------------------------------------------------------

SONIC: SELF-UPDATING INTERNET WORM DISCOVERED "IN THE WILD"

Kaspersky Lab, an international anti-virus software development company, is
warning users of the discovery of a new internet-worm, Sonic. This worm was
discovered in France and Germany on the morning of 30th October 2000. The
distinctive feature of this malicious program is its ability to update itself (ie: to
automatically download additional component functionality) via the Internet.

Read more:
< http://www.net-security.org/text/articles/viruses/sonic.shtml >

----------------------------------------------------------------------------

RISK E-BUSINESS by Randy M. Nash

Well, it's finally happened. I had my first close encounter with real life
crackers! A good friend of mine recently went to work for a small Internet
startup company (I generally refer to them as "3 Men and a Web Server").
I sent him an email Tuesday morning after the long President's Day weekend.
His response came as a complete surprise, "Hey, I was just thinking about
calling you. We've been hacked! Can you help us out?"

Read more:
< http://www.net-security.org/text/articles/risk.shtml >

----------------------------------------------------------------------------

We have a new section opened in cooperation with Newtork World Fusion,
listed below are the seven articles added to that section.


WATCH OUT FOR FAX VOTE SCAM by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/fax-vote.shtml >

BANKS AND BIOMETRICS by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/banks.shtml >

FORGED HEADERS AND THE LAW by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/forged.shtml >

HOW TO RESPOND TO A HOAX by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/hoax.shtml >

PEER-TO-PEER SOFTWARE AND SECURITY by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/peer.shtml >

UNAUTHORIZED VULNERABILITY SCANS by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/scans.shtml >

SNIFFING E-MAIL by M. E. Kabay
< http://www.net-security.org/text/articles/nwf/sniffing.shtml >

----------------------------------------------------------------------------




Featured books
----------------

The HNS bookstore is located at:
http://net-security.org/various/bookstore

Suggestions for books to be included into our bookstore
can be sent to staff@net-security.org

----------------------------------------------------------------------------

CISCO ROUTERS FOR IP NETWORKING BLACK BOOK: A PRACTICAL IN DEPTH GUIDE
FOR CONFIGURING CISCO ROUTERS FOR INTERNETWORKING IP-BASED NETWORKS

Explores complex topics in-depth, in the popular Black Book format, using a
complete systematic approach to Cisco IP networking along with examples
and diagrams. Covers the most important routing concepts by introducing
the subject and then going through relevant practical examples. The
configurations in this book were implemented in a lab with real Cisco routers.
Especially written as a comprehensive guide for intermediate and advanced
network professionals, or network specialists studying for the CCIE certification,
to help answer all major router configuring and troubleshooting issues.

Book:
< http://www.amazon.com/exec/obidos/ASIN/1576106101/netsecurity >

----------------------------------------------------------------------------

WINDOWS 2000 REGISTRY (NETWORKING SERIES)

This book targets professional users, system administrators, and support
specialists. It enables the reader to master Registry concepts, properly use
all of its features, plan and implement the most appropriate Registry backup
strategy, and solve the most common problems using the Registry. This book
contains in-depth information,and offers tips, tricks, and useful techniques for
editing, customizing, and securing the Registry.

Book:
< http://www.amazon.com/exec/obidos/ASIN/1584500816/netsecurity >

----------------------------------------------------------------------------

UNIX NETWORK PROGRAMMING, VOLUME 1: NETWORKING APIS - SOCKETS AND XTI

The classic programming text Unix Network Programming has been updated by
author W. Richard Stevens to encompass three new volumes. There have been
a few changes in the computing world since 1990 (the year the original was
published), and Stevens has taken the opportunity to create a complete set of
reference manuals for programmers of all skill levels. The first volume, Networking
APIs: Sockets and XTI, covers everything you need to know to make your
programs communicate over networks. Stevens covers everything from writing
your programs to be compatible with both Internet Protocol version 4 (IPv4)
and IPv6, to raw sockets, routing sockets, User Datagram Protocol (UDP),
broadcasting/multicasting, routing sockets, server internals, and more, plus
a section covering Posix threads. Stevens also notes compatibility issues with
different operating systems so that readers can create code that is more
portable, and he offers plenty of advice on how to make code more robust.

Book:
< http://www.amazon.com/exec/obidos/ASIN/013490012X/netsecurity >

----------------------------------------------------------------------------

DNS AND BIND

This book's early chapters give a view of DNS from high altitude, explaining
basic concepts such as domains, name servers, and name resolution. From
there, the authors proceed on a more practical tack, presenting specific
instructions for setting up your own domain and DNS server using BIND.
The authors then tell you what to do as your domain grows and you need
to add more machines, subdomains, and greater throughput capacity. They
also talk a lot about nslookup and C programming with the various DNS and
BIND libraries. Administrators will find the chapter on BIND debugging output
particularly helpful. Here, the authors translate BIND's mysterious error
messages and offer specific strategies for fixing and optimizing the program.
This edition covers BIND 8.1.2, but pays lots of attention to older versions
that are still in wide use (4.8.3 and 4.9). The authors are careful to note
differences among the versions.

Book:
< http://www.amazon.com/exec/obidos/ASIN/1565925122/netsecurity >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

SAINT VERSION 3.1

SAINT (Security Administrator's Integrated Network Tool) is a security
assessment tool based on SATAN. Features include scanning through a
firewall, updated security checks from CERT & CIAC bulletins, 4 levels of
severity (red, yellow, brown, & green) and a feature rich HTML interface.
Changes: Check for folder traversal vulnerability in IIS 4.0 and 5.0, JRun
server vulnerabilities, iPlanet Directory Server and Certificate Management
System, hex-encoded dot-dot-slash vulnerability in web servers, dot-dot
-slash vulnerability in Web+, and HTTP PUT vulnerabilities. This version
has a new custom scan level, giving you more control over which probes
SAINT will run.

Link:
< http://net-security.org/various/software/973132818,56196,.shtml >

----------------------------------------------------------------------------

POWER CRYPTO 1.0

PowerCrypto lets you type in, or paste in, messages for instant encryption.
The encrypted nonsense text can then be copied into e-mails, as ordinary text.
The receiver then copies this nonsense text into PowerCrypto and decrypts your
secret message, IF and ONLY IF, he has your secret key. The program also
handles all types of files; documents, programs, pictures, and music files, for
example.

Link:
< http://net-security.org/various/software/973043805,81111,.shtml >

----------------------------------------------------------------------------

COMPUTER SOUND SECURITY SYSTEM 1.04

CSSS programme provides effective premises guarding by means of a microphone
or several microphones, which act as sensors and a modem, which acts as a
signaling (informing) device. The CSSS principle of action consists in microphone
(microphones) survey on the scale of real time and highly intellectual analysis of
coming signals on the basis of special algorithms based on the methods of speech
cognition. Due to the flexible system of tooling the user is able to adjust the
action of the programme himself in accordance with the specific requirements
of the premises. The system can be adjusted for different frequency ranges
and different levels of average total sound signals amount received from the
microphone or all microphones in the system. So, it’s possible to adjust the
system e.g. for human steps only (low frequency sound signals) i.e. the level
will start rising considerably after the appearance of low frequency sound
signals.

Link:
< http://net-security.org/various/software/973043978,70494,.shtml >

----------------------------------------------------------------------------

OKIDOKI GUARD 1.1.2 (MACOS)

Okidoki Guard is a simple program designed to password-protect your computer.
After you put in your name and password, an icon will be placed in the startup
folder. After you reboot your Mac, a password prompt screen will come up,
asking for your password.

Link:
< http://net-security.org/various/software/973044264,7082,.shtml >

----------------------------------------------------------------------------

STEALTH SIGNAL 3.8

Stealth Signal is a laptop security system that specializes in providing peace of
mind to you, the laptop owner. Stealth Signal equips your computer with an
undetectable software-based transmitter that sends homing signals to our
monitoring network. These signals are transmitted at random times over any
Internet connection or phone line.

Link:
< http://net-security.org/various/software/973044421,5870,.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[01.11.2000] - Silverton Chamber of Commerce
Original: http://www.silverton.org/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/01/www.silverton.org/

[01.11.2000] - Royal Jordainian Web Site
Original: http://www.rja.com.jo/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/01/www.rja.com.jo/

[02.11.2000] - Governo do Estado da Paraiba
Original: http://ntiserv1.saude.pb.gov.br/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/02/ntiserv1.saude.pb.gov.br/

[02.11.2000] - Cybernet
Original: http://www.cybernetinc.net/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/02/www.cybernetinc.net/

[02.11.2000] - The American Israel Public Affairs Committee
Original: http://www.aipac.org/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/02/www.aipac.org/

[02.11.2000] - SCM Labs, Inc.
Original: http://www.scmlabs.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/02/www.scmlabs.com/

[02.11.2000] - SimTel Computers DBA
Original: http://www.simtelcomputers.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/02/www.simtelcomputers.com/

[03.11.2000] - Jewish Bible Association
Original: http://www.jewishbible.org/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.jewishbible.org/

[03.11.2000] - Yizrael Valley College (Mihlelet Emek Yizrael)
Original: http://www.yvc.ac.il/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.yvc.ac.il/

[03.11.2000] - Quantum Computer Services
Original: http://www.myownemail.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.myownemail.com/

[03.11.2000] - the hehe.com e-mail service
Original: http://www.hehe.com/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.hehe.com/

[03.11.2000] - Visiting Israel Students Association
Original: http://www.visa.org.il/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.visa.org.il/

[03.11.2000] - Health Infosystems Association, Israel
Original: http://www.healthinfonet.co.il/
Defaced: http://www.attrition.org/mirror/attrition/2000/11/03/www.healthinfonet.co.il/

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:

Help Net Security staff

staff@net-security.org
http://net-security.org



---------------------------------------------------------------------
To unsubscribe, e-mail: news-unsubscribe@net-security.org
For additional commands, e-mail: news-help@net-security.org

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close