Virus Warnings from July 2000
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Misc]
______________________________________________________________
Amiga
No virus warnings from July 2000
Top of Page
Windows
Date: July 30, 2000
CAI Newsletter Date: July 28, 2000
Platform: PC
Warning About: WScript/Kak.B worm (aka Kak.B and Days)
Report From: CAI
* Release Note: Kak.B is a variant of the original
wide-spread Kak.A worm that appeared in late 1999.
Kak.A and Kak.B are Outlook spreading e-mail worms
that exploit a security hole in Internet Explorer 4
and 5. The worm arrives in an e-mail without
attachment and is invoked by just reading the e-mail.
The worm installs its code as Outlook signature and
will attach itself mostly unnoticed to any outgoing
e-mail. It is frequently found in infected messages
on the Usenet newsgroups.
* Click for CAI Virus Information Center
* Click for CAI Managing Virus Incidents
Date: July 26, 2000
NAI Posting Date: July 24, 2000
Platform: PC
Warning About: W97M/Timeless Macro Virus
Report From: NAI
* Release Note: This virus is a class module macro virus
that infects Word97/2000 documents and templates, and
contains a date activated payload.
* Click for NAI Report on W97M/Timeless
Date: July 26, 2000
NAI Posting Date: July 21, 2000
Platform: MS Windows
Warning About: W32/Dilbert Internet Worm
Report From: NAI
* Release Note: This is a dangerous Internet worm which
also carries four date activated payloads of dropping
copies of other viruses. This worm may arrive via email
as an attachment named "dilbertdance.jpg.exe".
* Click for NAI Report on W32/Dilbert Internet Worm
Date: July 26, 2000
CIAC Posting Date: July 21, 2000
Platform: Microsoft Excel 2000, Microsoft PowerPoint 97
and 2000 and Microsoft Internet Explorer 5.5,
5.01 SP1, 5.01, 4.01 SP2
Warning About: Microsoft "Office HTML" & "IE" Script
Vulnerabilities
Report From: CIAC
* Release Note: The first set of vulnerabilities allows
malicious script code on a web page to cause a remotely
hosted file to be saved on a visiting user's hard drive.
The second vulnerability allows malicious script code
on a web page to execute a VBA macro code in a remotely
hosted file. Apply the patches and the workaround as
outlined in the CIAC K-061 Information Bulletin.
* Click for CIAC Report and Solutions in K-061
Date: July 26, 2000
Posting Date: July 19, 2000
Platform: Users of Outlook Express versions 4.0, 4.01,
5.0, 5.01 and Users of Outlook versions 97,
98, 2000M
Warning About: Outlook Security Bug
Report From: CIAC and AISS
* Release Note: A serious bug has been exposed in Microsoft's
Outlook and Outlook Express e-mail clients. Microsoft has
identified a buffer overflow vulnerability that occurs
when downloading e-mail. The buffer overflow can occur
even if the user does not open or preview the e-mail
message. Upgrade the software as directed in the CIAC
K-060 Information Bulletin.
* Click for CIAC Report on MS E-Mail Header Vulnerability
* Click for AISS Report about Outlook Security Bug
Date: July 7, 2000
Platform: Windows System
Warning About: Nsi: Word 97 macro virus
Report From: F-Secure
* Release Note: Nsi: Word 97 macro virus disables the
built in macro virus protection and replicates during
opening and closing.
* Click for F-Secure Report about Stages VBS worm
Date: July 7, 2000
Platform: Windows System
Warning About: X97M/Divi is an Excel macro virus
Report From: F-Secure
* Release Note: When an infected workbook is opened,
this macro virus creates an infected workbook to the
Excel's startup directory, "BASE5874.XLS".
* Click for F-Secure Report about Excel macro virus
Date: July 5, 2000
Platform: Windows System
Warning About: Jer: VBScript worm
Report From: F-Secure
* Release Note: Once excuted, the worm copies itself to
the Windows System directory as "jer.htm". It modifies
the registry, disables several components from the Windows
desktop, and also replaces the "script.ini" from the mIRC
directory.
* Click for F-Secure Report about Jer: VBScript worm
Date: July 4, 2000
Platform: All Microsoft systems, except for Windows 2000,
running MSIE 4.0 to 5.01
Warning About: MS "Active Setup Download" Vulnerability
Report From: CIAC Information Bulletin K-057 (30-jun-2000)
* Release Note: The Microsoft Active Setup Control has an
internal flaw which allows the downloading of a trusted
'.cab' file to any disk location.
Install the Microsoft patch.
* Click for CIAC Report about Setup Vulnerability
Date: July 4, 2000
Platform: Microsoft Internet Explorer
Notice About: Patch for Active Setup Download Vulnerability
Report From: Microsoft TechNet Security (29-jun-2000)
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in an ActiveX control that ships
with Microsoft® Internet Explorer. The vulnerability could be
used to overwrite files on the computer of a user who visited
a malicious web site operators site.
* Click for full report at MS about Patch
Top of Page
Macintosh
No virus warnings from July 2000
Top of Page
Miscellaneous
Date: July 25, 2000
Platform: Windows 95 files in PE format.
Warning About: CIH virus infection on the Net * UPDATE
Report From: Charlene, VirusChecker2 List Moderator
* Release Note: I have been unable to find any information
that this is a 'legit' happening, ie. www . download . com
is infected with the CIH virus. I think (personally)
since nothing was found on the security sites about this
latest outbreak on the web site above, all may be okay
there, and not a threat at all. The last CIH warning on
the AISS site was from 24-April-2000, and there has been
no update saying that CIH has been causing problems.
* Click for Network Associates Description of CIH
Date: July 25, 2000
Platform: Possibly any system
Warning About: CIH virus infection on the Net
Report From: Alex, Programmer of VirusCheckerII
* Release Note: I just picked up this note from Alex,
the programmer of the Amiga VirusCheckerII viri
checking program:
: All files from www.download.com are infected
: by the CIH virus.
: don't open just forward
I'm not quite sure what the "don't open just forward"
means, but possibly it means, -not- to go to that
URL, period.
Date: July 12, 2000
Platform: Systems running Microsoft SQL Server 7.0, or
Enterprise Manager
Warning About: MS "DTS Password" Vulnerability
Report From: CIAC Information Bulletin K-059
* Release Note: A malicious user may gain unauthorized
access to an SQL database to review/add/delete
information in the data base.
* Click for CIAC Report about DTS Password Vulnerability
Date: July 12, 2000
Platform: Windows System
Warning About: Stages: Visual Basic Script worm
Report From: F-Secure
* Release Note: VBS/Stages is a mass mailer which
spreads over e-mail in an attachment with SHS
extension.
* Click for F-Secure Report about Stages VBS worm
Date: July 8, 2000
Platform: Windows Scripting Host (WSH)
Warning About: VBS/COD Internet worm
Report From: NAI
* Release Note: This is an Internet worm written in
VBScript and embedded within a Word document. This
worm may arrive by MAPI email or on IRC chat from
infected users. Read the full report for information
and links on how to protect yourself, and recommended
updates.
* Click for NAI Report on VBS/COD Internet worm
Date: July 5, 2000
Platform: Windows System and Outlook
Warning About: Pica: worm written in VBScript
Report From: F-Secure
* Release Note: When executed the worm copies itself to
the Windows System directory as "Ds9.vbs". Then it
modifies the registry, and also the worm will send itself
to every recipient in every addressbook using Outlook.
* Click for F-Secure Report about Pica worm
Date: July 4, 2000
Platform: Windows Scripting Host (WSH)
Warning About: VBS/Pica.g Alias: Sillyworm.vbs
Report From: NAI
* Release Note: This is an Internet worm which can send itself
via MAPI email and to IRC channels via a modified mIRC
configuration file. Visit NAI for Removal Instructions.
* Click for NAI Report on VBS/Pica.g
Back to the Virus Archives page
