Virus Warnings from September 2000
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
No virus warnings or alerts
Top of Page
Windows
Date: September 21, 2000 * Re-released from 15-sep-2000
Platform: MS Windows 2000
Patch Available: Telnet Client NTLM Authentication Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Bulletin re-released to advise of availability
of new patch.
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in the telnet client that ships
with Microsoft Windows 2000. The vulnerability could, under
certain circumstances, allow a malicious user to obtain
cryptographically protected logon credentials from another
user.
* Click here for MS Security Bulletin MS00-067
Date: September 20, 2000
Platform: Windows PC
Warning About: W97M/Passbox.q Macro Virus
Report From: NAI
* Release Note: This Word 97 macro virus contains a module
named Kesseler, which infects the global Normal.dot template
on machines which do not have SP1 installed. Read the complete
report for removal instructions and AVERT recommendations.
* Click here for NAI Report Number k=98835
Date: September 21, 2000
Platform: CiscoSecure ACS for Windows NT Server
Warning About: Cisco CiscoSecure ACS Vulnerability
Report From: CIAC
* Release Note: Multiple vulnerabilities exist in the
CiscoSecure ACS software for Windows NT Server. The potential
vulnerabilities can allow denial of service, loss of data,
and compromise of a server. Read the complete bulletin for
software versions and fixes
* Click here for CIAC Bulletin K-071
Date: September 21, 2000
Platform: Windows PC
Warning About: VBS/LoveLetter.bi VBScript Worm
Aliases: IRC/LoveLetter.bi, VBS/Party
Report From: NAI
* Release Note: This is a VBScript Internet worm that travels
via Outlook and mIRC. This worm may arrive by email. Read
the complete report for Avert's recommendations, and removal
instructions.
* Click here for NAI Report Number k=98833
Date: September 21, 2000
Platform: Windows PC
Warning About: W97M/Crono.a Macro Virus
Report From: NAI
* Release Note: This virus is detected by current engine and DAT
files as W97M/Univ.gen. This is a class module macro virus for
Word97/2000 documents and templates. It does not have a damaging
payload. It lowers the macro warning options in Word. Read
the complete report for Avert's recommendations, and removal
instructions.
* Click here for NAI Report Number k=98834
Date: September 21, 2000
Platform: Windows PC
Updated SDAT: Sdat 4096 Upgrade Available
Report From: NAI
* Release Note: PC Virus Definition And Scan Engine. Upgrade
(sdat) version 4096 is now available for PC VirusScan. Visit
Network Associates for all versions.
Click here for NAI Sdat 4096 Upgrade Available
Date: September 20, 2000 * Updated from 16-Sep-2000
Platform: Windows PC
Warning About: VBS/Netlog.worm.g VBScript Worm Virus
Aliases: VBS/A24.worm
Report From: NAI
* Release Note: This VBScript is designed to delete files, if
present, which are created by VBS/Netlog.worm. Read the
complete report for Avert's recommendations, and removal
instructions.
* Click here for NAI Report on VBS/Netlog.worm.g
Date: September 20, 2000
Platform: Windows PC
Warning About: VBS/Funny.b Internet Worm
Aliases: VBS/FunnyStory
Report From: NAI
* Release Note: This is a VBScript worm with virus qualities.
This worm will arrive in an email message. If the user runs
the attachment the worm runs using the Windows Scripting Host
program. Read the complete report for Avert's recommendations,
and removal instructions.
* Click here for NAI Report on VBS/Funny.b
Date: September 20, 2000 * Updated from 17-Sep-2000
Platform: Win32 Systems
Warning About: MTX Worm, Virus and Backdoor
Report From: F-Secure
* Release Note: The virus has an unusual structure. It consists
of three different components that are run as standalone
programs (Virus, email Worm and Backdoor). The virus is main
component, it keeps worm and backdoor programs in its code in
compressed form. While infecting the system it extracts and
spawns them. It spreads under Win32 systems - virus component
infects Win32 executable files, attempts to send email messages
with infected attachments, as well as installs backdoor
component to download and spawn "plugins" on an affected system.
* Click here for F-Secure Report on MTX Worm, Virus and Backdoor
Date: September 20, 2000
Platform: PC
Warning About: Funny, Funny.A Worm
Aliases: I-WORM.Funny, VBS/Funny
Report From: F-Secure
* Release Note: Funny worm spreads in a similar way as
LoveLetter. All three known variants of this worm drop, run
and delete a binary file Startx.exe that is a password stealing
trojan detected by F-Secure Anti-Virus as 'Trojan.PSW.Hooker.24.e'.
This trojan is run if the virus found a UBS banking software
installed on the victims machine. Otherwise it replicates as a
worm.
* Click here for F-Secure Report on Funny, Funny.A Worm
Date: September 18, 2000
Platform: Windows 95/98/NT 4.0/NT 2000
Warning About: Alt-N MDaemon 3.1.1 DoS Vulnerability
Report From: Security Focus
* Release Note: Alt-N MDaemon 3.1.1 is subject to a denial of
service. If a remote user requests a specially crafted URL
to the web services within MDaemon the service will crash.
A restart of the service is required in order to gain normal
functionality.
* Click here for SF Report on Alt-N MDaemon DoS Vulnerability
Date: September 17, 2000
Platform: Win32 Systems
Warning About: MTX Worm, Virus and Backdoor
Report From: F-Secure
* Release Note: The virus has an unusual structure. It consists
of three different components that are run as standalone
programs (Virus, email Worm and Backdoor). The virus is main
component, it keeps worm and backdoor programs in its code in
compressed form. While infecting the system it extracts and
spawns them. It spreads under Win32 systems - virus component
infects Win32 executable files, attempts to send email messages
with infected attachments, as well as installs backdoor
component to download and spawn "plugins" on an affected system.
* Click here for F-Secure Report on MTX Worm, Virus and Backdoor
Date: September 16, 2000
Platform: Windows 95/98/NT
Warning About: Sambar Server (BETA) Search CGI Vulnerability
Report From: Security Focus
* Release Note: Certain beta versions of this software ship
with a vulnerability in the search.dll which allows remote
attackers to view the contents of the SAMBAR Server, such
as mail folders etc.
* Click here for SF Report on Sambar Server CGI Vulnerability
Date: September 16, 2000
Platform: Windows 95/98/NT
Warning About: CamShot Remote Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: CamShot works with Video For Windows compatible
video equipment. Certain trial versions of this software
contain a possibly exploitable remote buffer overflow by way
of a overly long user supplied Authorization password.
* Click here for SF Report on CamShot Remote Buffer Overflow
Date: September 16, 2000
Platform: Windows PC
Warning About: VBS/A24.worm VBScript Worm
Report From: NAI
* Release Note: This VBScript is designed to delete some files,
if present, which were created by VBS/Netlog.worm. Read the
complete bulletin for info and removal instructions.
* Click here for NAI Report on VBS/A24.worm
Date: September 16, 2000
Platform: Windows PC
Warning About: W97M/Fool.k * Update of W97M/Init Virus
Report From: NAI
* Release Note: This is a Word 97 polymorphic macro virus with
a Windows Scripting Host component. Infected documents contain
a module named "Init". Opening this file drops two files on
your hard disk. Read the complete bulletin for removal
instructions and Avert's recommended updates.
* Click here for NAI Report on W97M/Fool.k
Date: September 16, 2000
Platform: Windows PC
Warning About: I-Worm.Funny Virus
Report From: Kaspersky Lab
* Release Note: Kaspersky Lab, an international anti-virus
software vendor reports the detection of another Internet-worm
"I-Wormunny". The virus has been reported to be "in-the-wild"
in Swiss. This is an Internet worm written in the scripting
language Visual Basic Script (VBS). The worm uses MS Oulook to
spead its copies by email.
* Click here for KLab's Report on I-Worm.Funny Virus
Date: September 15, 2000
Platform: Windows PC
Warning About: W97M/Init Virus
Report From: NAI
* Release Note: This is a Word 97 polymorphic macro virus with
a Windows Scripting Host component. Infected documents contain
a module named "Init". Opening this file drops two files on
your hard disk. Visit NAI for method of infection, and removal
instructions.
* Click here for NAI Report on W97M/Init Virus
Date: September 15, 2000
Platform: Windows PC
Warning About: VBS/Quatro.a Virus
Report From: NAI
* Release Note: This is a destructive virus written in VBScript.
It plays on social engineering in an effort to get executed.
It requires Windows Scripting Host in order to execute. It
arrives via Outlook as an attachment named UPDATE.VBS. This
virus carries a file deletion payload which will remove all
files from all subfolders on all drives. Visit NAI for method
of infection, and removal instructions.
* Click here for NAI Report on VBS/Quatro.a Virus
Date: September 15, 2000
Platform: Windows 2000 Professional Server or Advanced Server
Warning About: SSL Upgrade May Block Accessing Secure Web Pages
Report From: MSNBC Bug of the Day
* Release Note: BugNet says If you upgrade a 40-bit SSL
certificate to a 128-bit SSL certificate from VeriSign on a
Windows 2000 Professional, Server, or Advanced Server computer,
you may not be able to use a 40-bit Netscape browser to connect
to secure web pages.
* Click here for MSNBC Article on SSL Upgrade
Date: September 15, 2000
Platform: MS Windows 2000
Patch Available: Telnet Client NTLM Authentication Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in the telnet client that ships
with Microsoft Windows 2000. The vulnerability could, under
certain circumstances, allow a malicious user to obtain
cryptographically protected logon credentials from another
user.
* Click here for MS Security Bulletin MS00-067
Date: September 14, 2000
Platform: MS Windows
Warning About: W32/ExploreZip.worm.f Worm
Report From: NAI
* Release Note: This variant was found September 13, 2000.
Current .DAT files detect this version of the Internet worm
as a variant, thus removal requires 4096. This worm attempts
to invoke the MAPI aware email applications as in MS Outlook,
MS Outlook Express and MS Exchange.
* Click here for NAI Report on W32/ExploreZip.worm.f Worm
Date: September 14, 2000
Platform: Microsoft Outlook 98, Outlook 2000 and Outlook
Express that comes with Internet Explorer 5
Warning About: VBS/Bubbleboy Worm
Aliases: Seinfeld, BBV
Report From: F-Secure
* Release Note: VBS/Bubbleboy is the very first worm that is
able to spread via e-mail without opening an attacht. It
executes immediately after the user has opened the message
in Outlook. Even viewing the message in Outlook Express
"Preview Panel" causes the execution.
* Click here for F-Secure Report on VBS/Bubbleboy Worm
Date: September 14, 2000
Platform: Windows 95/98
Warning About: Kak Worm
Report From: F-Secure
* Release Note: Kak is a worm that embeds itself without any
attachment to every e-mail sent from the infected system.
Kak is written in JavaScript and it works on both English and
French versions of Windows 95/98 if Outlook Express 5.0 is
installed. The worm uses a known security vulnerability that
is in Outlook Express.
* Click here for F-Secure Report on Kak Worm
Date: September 14, 2000 *Updated from 18-Aug-2000
Platform: Windows System
Warning About: VBS/LoveLetter VBScript Worm
Report From: F-Secure
* Release Note: VBS/LoveLetter is a VBScript worm. It spreads
through e-mail as a chain letter. You can protect yourself
against VBScript worms by uninstalling the Windows Script Host.
* Click here for F-Secure Report on VBS/LoveLetter Worm
Date: September 14, 2000
Reported: September 12, 2000
Platform: Windows 2000 Viruses
Warning About: Alternate Data Streams of the NTFS File System
Report From: Kaspersky Lab
* Release Note: On Sept 4th, KLab released a warning about the
appearance of the W2K.Stream virus, the first known malicious
code, which uses the alternate data streams (ADS) of the NTFS
file system. Unfortunately, many anti-virus companies worldwide
did not recognise this as a serious problem and mislead their
users by classifying the threat as a low. KL emphasises once
more, that viruses in ADS are a serious threat, and should not
be underestimated. KL states, "Taking this into account, we
have already added the anti-virus support for NTFS alternative
streams to Kaspersky Anti-Virus 3.5 (AVP), which will be
released this week."
* Click here for Kaspersky Lab News Updates
Date: September 14, 2000
Reported: September 11, 2000
Platform: MS Windows 2000
Warning About: Windows 2000 Service Pack 1 Installation
Report From: MSNBC Bug of The Day
* Release Note: Windows 2000 SP1 installation order matters a
lot. BugNet says if you are installing Windows 2000 Service
Pack 1, and you are using Windows 2000 Terminal Services,
the order in which you do things is important. Read how to
properly install this package.
* Click here for MSNBC Report on Installing Service Pack 1
Date: September 14, 2000
Reported: September 7, 2000
Platform: Microsoft's Internet Explorer 5.5
Warning About: IE 5.5 Exploit Evades Security Feature
Report From: ZDNet News
* Release Note: The latest in a long line of bugs to hit MSIE,
will allow unauthorised access to files on a victim's computer,
according to respected Bulgarian bug-hunter, Georgi Guninski.
The "IE 5.5 Cross Frame security vulnerability" uses JavaScript,
a Web page scripting language, to bypass security features built
into Internet Explorer. It allows the contents of a file to be
sent back to Web server when a page containing the mischievous
JavaScript is visited.
* Click here for ZDNet Report on IE 5.5 Security
Date: September 14, 2000
Reported: September 11, 2000
Platform: Windows System
Warning About: Scrambler Worm-Virus, W32/Scrambler.worm.e
Aliases: IWorm_Scrambler, I-Worm.Scrambler
Warning About: Variant Scrambler.A
Aliases: Scooter, I-Worm.Scooter, MP3 virus
Report From: F-Secure and NAI
* Release Note: Scrambler spreads itself in e-mail attachments,
sends its copies to IRC channels, and infects Windows EXE
files on the local machine. The worm itself is a Windows PE
executable, about 70Kb long and it is written in MS Visual C++.
* Click here for F-Secure Report on Scrambler Worm-Virus
* Click here for NAI Report on W32/Scrambler.worm.e
Date: September 14, 2000
Reported: September 11, 2000
Platform: MS Windows 2000
Patch Available: Malformed RPC Packet Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in Microsoft. Windows 2000. The
vulnerability could allow a malicious user to cause a Denial
of Service on a Windows 2000 computer.
* Click here for MS Security Bulletin MS00-066
Date: September 08, 2000
Platform: Windows System
Warning About: Nowobbler Worm
Variant: Nowobbler.A
Report From: F-Secure and NAI
* Release Note: Nowobbler is a mass mailing worm, written in
both JScript and VBScript. The worm spreads in Outlook
messages. When executed, the worm shows the Wobbler hoax
text. The Nowobbler Worm spreads the Wobbler Virus Hoax
message within itself. Visit the Nowobbler Worm warning
page, and the Wobbler Hoax page for more information.
* Click here for NAI Report on JS/Wobble.worm
* Click here for F-Secure Report on Nowobbler Worm
* Click here for F-Secure Report on Wobbler Virus Hoax
Date: September 08, 2000
Platform: Windows 9x Systems
Warning About: W95/Butano Trojan
Report From: NAI
* Release Note: This trojan consists of a large file and when
run, it drops two smaller files - one is a batch file and
the other is a system reboot program. Visit NAI for method
of infection, and removal instructions.
* Click here for NAI Report on W95/Butano Trojan
Date: September 08, 2000
Platform: Windows 9x Systems
Warning About: Backdoor-HD Trojan
Report From: NAI
* Release Note: This Windows 9x/NT Internet Backdoor trojan,
when running, allows anyone running the appropriate client
software to perform various functions on your PC. They could
log you off your machine, swap your left/right mouse buttons,
open/close your CD-ROM drive, and simulate a virus warning.
Visit NAI for method of infection, and removal instructions.
* Click here for NAI Report on Backdoor-HD Trojan
Date: September 08, 2000
Platform: MS Windows 2000
Patch Available: Still Image Service Privilege Escalation
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in Microsoft Windows 2000. The
vulnerability could allow a user logged onto a Windows 2000
machine from the keyboard to become an administrator on the
machine. The Still Image Service is not installed by default,
but is automatically installed, via plug-n-play, when a user
attaches a still image device (i.e. digital camera, scanner,
etc.) to a Windows 2000 host.
* Click here for MS Security Bulletin MS00-065
Date: September 07, 2000
Platform: PC
Warning About: Stream Virus
Aliases: Win2k_Stream, Win2K.Stream
Report From: F-Secure
* Release Note: The Win2k.Stream virus was not found in the
wild at the moment of creation of this description.
The Win2k.Stream is the first known Windows virus using
"stream companion" infection method. That method is based on
NTFS feature that allows to create multiple data streams
associated with a file.
* Click here for F-Secure Report on Stream Virus
Date: September 07, 2000
Platform: PC
Warning About: Donald Duck Trojan
Aliases: Erap
Report From: F-Secure
* Release Note: Since September 5th there has been information
in the media about a trojan called Donald Duck, which is said
to spread with a variant of the Love Letter worm. F-Secure is
not aware of such a variant of Love Letter. Instead there has
been a hacker attack against an ISP in the Philippines. The
hackers are spreading two known trojans called "donald.exe"
and "erap.exe" as attachments These files are detected by
F-Secure Anti-Virus as SubSeven.backdoor.v213 and
Trojan.PSW.Barok.c.
* Click here for F-Secure Report on Donald Duck Trojan
Date: September 06, 2000
Platform: PC
Warning About: W95/Heathen.b Virus
Aliases: W97M/Heathen.b
Report From: NAI
* Release Note: This virus was discovered by Virus Patrol
Sept 5, 2000 posted to newsgroups as the file FORM.DOC.
This is a variant to W95/Heathen family. This virus will
infect PE files and also run as a process to infect Word
documents and templates. Read the complete warning, for
removal instructions and AVERT's recommended updates.
* Click here for NAI Report on W95/Heathen.b Virus
Date: September 06, 2000
Platform: MS Windows Media Services
Patch Available: Unicast Service Race Condition Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in Microsoft. Windows Media Services.
The vulnerability could allow a malicious user to prevent an
affected server from providing useful service.
* Click here for MS Security Bulletin MS00-064
Date: September 05, 2000
Platform: MS Internet Information Server (IIS)
Patch Available: Invalid URL Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in Microsoft Internet Information
Server (IIS). The vulnerability could enable alicious user
to prevent an affected web server from providing useful
service.
* Click here for MS Security Bulletin MS00-063
Date: September 05, 2000
Platform: PC
Warning About: Footer Word Macro Virus
Report From: F-Secure
* Release Note: Footer.S is a minor variant of Footer.A
that is functionally identical with it. While spreading,
Footer.A creates two files. The virus activates by
overwriting the footer area in opened documents.
* Click here for F-Secure Report on Footer Macro Virus
Date: September 04, 2000
Platform: MS Windows 2000
Warning About: W2K.Stream WNT/Stream, Win2K.Stream Virus
Report From: Kaspersky Lab and NAI
* Release Note: Kaspersky Lab has report on a new generation
of Windows 2000 viruses, streaming towards PC users. They
announced today, the discovery of W2K.Stream virus, which
represents a new generation of malicious programs for Windows
2000. This virus uses a new breakthrough technology based on
the "Stream Companion" method for self-embedding into the
NTFS file system. The virus originates from the Czech Republic
and was created at the end of August by the hackers going by
the pseudonyms of Benny and Ratter. Read the complete article.
NAI has removal instructions and AVERTs recommended updates.
* Click here for Kaspersky Report on W2K.Stream Virus
* Click here for NAI Report on WNT/Stream Virus
Date: September 04, 2000
Platform: MS Windows
Warning About: W32/Apology Executable File Virus
Report From: Sophos
* Release Note: W32/Apology is a file infecting virus with
email-aware worm and backdoor characteristics. The virus
replaces wsock32.dll with a modified version which monitors
network traffic, among other things. This was detected by
Sophos Anti-Virus version 3.38 or later. Read complete report.
* Click here for Sophos Report on W32/Apology File Virus
Date: September 04, 2000
Platform: MS Windows
Warning About: WM97/Verlor-I Word 97 Macro Virus
Report From: Sophos
* Release Note: WM97/Verlor-I is a reworking of WM97/Verlor-A.
It is a Word macro virus which uses a number of "stealth"
techniques to try and hide itself. This was detected by
Sophos Anti-Virus version 3.38 or later. Read complete report.
* Click here for Sophos Report on WM97/Verlor-I Virus
Date: September 03, 2000
Reported: August 31, 2000
Platform: MS Windows 9x
Warning About: BackDoor-HA Internet Backdoor Trojan
Report From: NAI
* Release Note: This is a Windows 9x Internet Backdoor trojan.
The Visual Basic 6.0 Runtime Module is required to execute
this file. When running it gives access to the system over
the Internet to anyone running the appropriate client
software. The NAI report, contains the removal instructions
and recommended updates.
* Click here for NAI Report on BackDoor-HA
Date: September 03, 2000
Reported: August 28, 2000 * Updated aliases
Platform: MS Windows 9x
Warning About: BackDoor-GZ Internet Backdoor Trojan
Aliases: BackDoor-GZ.svr, W32/NewsTick
Report From: NAI
* Release Note: This is a Windows 9x Internet Backdoor trojan.
When running it gives full access to the system over the
Internet to anyone running the appropriate client software.
The application hides itself from the Win9x task manager.
Visit the NAI link, for removal instructions.
* Click here for NAI Report on BackDoor-GZ
Date: September 01, 2000
Platform: Microsoft Word Documents
Warning About: MS Word Vulnerable to Electronic Spy Web Bugs
MS Word Documents, Among Others, Can Be Bugged
Report From: Hacker Whacker Remote Computer Network Security
* Release Note: There are a couple of article links on the
Hacker Whacker site, that invloves Microsoft Word Documents.
* Click here for Hacker Whacker Sept 1 Articles
Top of Page
Macintosh
No virus warnings or alerts
Top of Page
Linux
Date: September 26, 2000
Platform: Red Hat Linux
Warning About: Red Hat Security Update To glint
Report From: Linux Daily News
* Release Note: Red Hat has issued a security update to glint
which fixes a symlink vulnerability in that package. Glint is
only present on 5.x versions of the distribution.
* Click here for LWN Red Hat Security Update To glint
Date: September 25, 2000
Platform: Caldera Linux
Warning About: Caldera Security Update To LPRng
Report From: Linux Daily News
* Release Note: Caldera Systems has issued a security update to
the LPRng print system which fixes a format string vulnerability.
This problem is potentially exploitable remotely, so an upgrade
is highly recommended.
* Click here for LWN Caldera Security Update To LPRng
Date: September 25, 2000
Platform: Linux-Mandrake
Warning About: Linux-Mandrake Security Update To sysklogd
Report From: Linux Daily News
* Release Note: MandrakeSoft has issued a new security update to
sysklogd which supersedes the original, September 18 update.
This version includes an additional fix that is worth having.
* Click here for LWN Linux-Mandrake Security Update To sysklogd
Date: September 19, 2000
Platform: Caldera Linux
Warning About: Caldera Security Update To syslog
Report From: Linux Daily News
* Release Note: It's Caldera's turn to put out a security
update to syslog fixing the format string problem.
* Click here for LWN Caldera Security Update To syslog
Date: September 19, 2000
Platform: Debian Linux
Warning About: Debian Security Update To syslog
Report From: Linux Daily News
* Release Note: Here is the Debian Project's security update to
syslog fixing the format string vulnerability.
* Click here for LWN Debian Security Update To syslog
Date: September 19, 2000
Platform: Red Hat Linux
Warning About: Red Hat Security Update To syslog
Report From: Linux Daily News
* Release Note: Here is Red Hat's security update to syslog
fixing the nasty format string vulnerability in that package.
An upgrade is strongly recommended. Linux Weekly News, has
a thankyou to Seth Vidal.
* Click here for LWN Red Hat Security Update To syslog
Date: September 19, 2000
Platform: Slackware and MandrakeSoft Linux
Warning About: Syslog Security Updates From Slackware
and MandrakeSoft
Report From: Linux Daily News
* Release Note: Fixes for the unpleasant syslog format string
vulnerability have wandered in from Slackware and MandrakeSoft.
Again, this is a good fix to apply sooner rather than later.
* Click here for LWN Syslog Security Updates From Slackware
* Click here for LWN Syslog Security Updates From MandrakeSoft
Date: September 19, 2000
Platform: FreeBSD Linux
Warning About: Security Update For mailman and pine
Report From: Linux Daily News
* Release Note: FreeBSD issued advisories with updates for
mailman and pine4. Note that the packages referenced in these
advisories have been available for a couple of months - the
advisories are more than a bit late coming out.
* Click here for LWN Security Update For mailman
* Click here for LWN Security Update For pine
Date: September 19, 2000
Platform: FreeBSD Linux
Warning About: Security Advisory For eject
Report From: Linux Daily News
* Release Note: FreeBSD has issued a security advisory for
eject after an internal audit found ways that this setuid
root program can be used locally to gain root privileges.
They've provided updates packages for FreeBSD. This problem
is not limited to FreeBSD, so advisories from other BSD
and Linux distributors can be expected to follow.
* Click here for LWN FreeBSD Security Advisory For eject
Date: September 19, 2000
Platform: FreeBSD Linux
Warning About: Updated listmanager Packages
Report From: Linux Daily News
* Release Note: FreeBSD also put out updated listmanager
packages. Listmanager is not Open Source software, but is
freely distributable. The author has reported locally
exploitable buffer overflow vulnerabilities in versions
previous to 2.105.1.
* Click here for LWN FreeBSD Updated listmanager Packages
Date: September 19, 2000
Platform: FreeBSD Linux
Warning About: Security Update For xchat
Report From: Linux Daily News
* Release Note: FreeBSD has issued updated xchat packages to
fix the vulnerability in xchat prior to 1.4.3.
* Click here for LWN FreeBSD Security Update For xchat
Date: September 19, 2000
Platform: FreeBSD Linux
Warning About: Security Update For screen
Report From: Linux Daily News
* Release Note: FreeBSD issued a security advisory for screen
with information on getting and installing the updated
screen packages they made available on September 1st.
* Click here for LWN FreeBSD Security Update For screen
Date: September 19, 2000
Platform: Immunix Linux
Warning About: Security Update for klogd/sysklogd
Report From: Linux Daily News
* Release Note: Immunix has put out updated sysklogd packages.
This is a potentially remotely exploitable vulnerability, so an
immediate upgrade is strong recommended.
* Click here for LWN Immunix Security Update for klogd/sysklogd
Date: September 19, 2000
Platform: Immunix Linux
Warning About: Security Update for glibc
Report From: Linux Daily News
* Release Note: Updates for glibc are now available for Immunix
as well. Immunix is a Linux distribution, based on Red Hat 6.2,
in which all the applications have been compiled with StackGuard
to protect against buffer overflows.
* Click here for LWN Immunix Security Update for glibc
Date: September 19, 2000
Platform: SuSE Linux
Warning About: SuSE Security Update To syslog
Report From: Linux Daily News
* Release Note: Here is SuSE's security update to syslog fixing
the format string vulnerability in that package.
* Click here for LWN SuSE Security Update To syslog
Date: September 18, 2000
Platform: Linux
Warning About: Conectiva Security Update To sysklogd
Report From: Linux Daily News
* Release Note: Conectiva has issued an update to sysklogd which
fixes a couple of format string vulnerabilities in that package.
Syslog, of course, runs on almost every Linux system out there,
and this problem, apparently, has the potential to be remotely
exploitable. Thus an upgrade is best done sooner rather than later.
* Click here for LWN Security Update To sysklogd
Date: September 17, 2000
Platform: Linux
Warning About: Stable kernel prepatch 2.2.18pre9
Report From: Linux Daily News
* Release Note: Stable kernel prepatch 2.2.18pre9 has been
released. This one contains a bunch of new USB updates and
the long-awaited NFS updates.
* Click here for LWN Stable kernel prepatch 2.2.18pre9
Date: September 16, 2000
Platform: Linux
Warning About: Stable kernel prepatch 2.2.18pre8
Report From: Linux Daily News
* Release Note: Stable kernel prepatch 2.2.18pre8 has been
released. This one, among other things, fixes the compile
problems that some people experienced with -pre7.
* Click here for LWN Stable kernel prepatch 2.2.18pre8
Date: September 16, 2000
Platform: Red Hat Linux
Warning About: Security Update To Screen
Report From: Linux Daily News
* Release Note: Red Hat has issued a security update to screen
which fixes a format string vulnerability in that package.
The problem only affects 5.2 and earlier releases.
* Click here for LWN Security Update To Screen
Date: September 16, 2000
Platform: Debian Linux
Warning About: Phase Out Security Support For 2.1
Report From: Linux Daily News
* Release Note: The Debian Project has announced its intent to
phase out security support for the 2.1 (slink) distribution.
Their expectation is that most users have already upgraded
to 2.2. They are looking for feedback on the idea, so now is
the time to scream if this idea bothers you.
* Click here for LWN Phase Out Security Support For 2.1
Date: September 14, 2000
Platform: Slackware Linux
Warning About: Security Update To xchat
Report From: Linux Weekly News
* Release Note: An input validation bug was found to affect
Slackware Linux 7.0, 7.1, and current. Slackware's security
update to xchat fixes the vulnerability in that package.
* Click here for LWN Security Update To xchat Report
Date: September 14, 2000
Platform: Linux Red Hat
Warning About: Security Update To xpdf
Report From: Linux Weekly News
* Release Note: Red Hat's security update to xpdf fixes the
problems with temporary file and malicious URLs.
* Click here for LWN Security Update To xpdf Report
Date: September 14, 2000
Platform: Linux Mandrake
Warning About: Security Update To mod_php3
Report From: Linux Weekly News
* Release Note: MandakeSoft has issued a security update to
the Apache PHP3 module. There is not, however, a problem with
PHP itself; instead, many scripts which process file uploads
have a bug which can allow them to be subverted. The update
provides a new function which makes it easier to write secure
PHP code. Anybody using PHP for file uploads should have a
look at this advisory.
* Click here for LWN Security Update To mod_php3 Report
Date: September 14, 2000
Reported: September 12, 2000
Platform: Linux Mandrake
Warning About: Bug in PAM modules: pam_smb and pam_ntdom
Report From: Security Focus
* Release Note: Both PAM modules are pluggable authentication
modules that allow authentication of usernames and passwords
in PAM-compatible environments against Windows and Samba.
Both modules contain remotely exploitable stack buffer
overflows. This bug allows an attacker to execute arbitary
code as root.
* Click here for SF Advisory MDKSA-2000:047
Date: September 14, 2000
Reported: September 11, 2000
Platform: Linux Mandrake
Warning About: Linux Mandrake mod_perl update
Report From: Security Focus
* Release Note: The configuration file, mod_perl.conf,
contained an Options directive that was not entirely secure
and allowed people to browse the perl directory.
* Click here for SF Advisory MDKSA-2000:046
Date: September 14, 2000
Reported: September 11, 2000
Platform: Linux
Warning About: Stable kernel prepatch 2.2.18pre5 Available
Report From: Linux Weekly News
* Release Note: Stable kernel prepatch 2.2.18pre5 has been
released. It contains a fair number of new updates, and a
backport of the MSR/CPUID driver from the development kernel.
* Click here for LWN prepatch 2.2.18pre5 Report
Date: September 14, 2000
Reported: September 11, 2000
Platform: Apache as shipped with SuSE 6.0 through SuSE 7.0
Warning About: SuSE Security Update To Apache
Report From: Linux Weekly News
* Release Note: SuSE issued an advisory reporting configuration-
based security problems with Apache, as shipped with SuSE 6.0
through SuSE 7.0. The misconfigurations could allow CGI source
code to be made visible and allow files on the webserver to be
modified, if WebDAV has been installed.
* Click here for LWN SuSE Security Update To Apache
Date: September 14, 2000
Reported: September 11, 2000
Platform: Linux-Mandrake
Warning About: Security Update for mod_perl
Report From: Linux Weekly News
* Release Note: Linux-Mandrake has issued a security advisory
and updated packages to fix a configuration-based security
problem in mod_perl.
* Click here for LWN Linux-Mandrake Update for mod_perl
Date: September 14, 2000
Reported: September 11, 2000
Platform: Linux
Warning About: Security Update for pam_smb
Report From: Linux Weekly News
* Release Note: Conectiva has put out an advisory reporting a
buffer overflow in pam_smb that could be used to gain root
privileges. This affects pam_smb 1.1.5 and earlier. Updated
packages for pam_smb 1.1.6 have been provided.
* Click here for LWN Security Update for pam_smb
Date: September 14, 2000
Reported: September 11, 2000
Platform: SuSE Linux
Warning About: Security Update For Screen
Report From: Linux Weekly News
* Release Note: Here is SuSE's advisory and updates to screen
3.9.5 in response to last week's report of a format string
vulnerability that could be used by a local user to gain
root privileges.
* Click here for SuSE Advisory at SecurityFocus
Date: September 14, 2000
Reported: September 11, 2000
Platform: SuSE Linux
Warning About: SuSE Issues glibc Security Update
Report From: Linux Weekly News
* Release Note: SuSE issued their glibc advisory on Wednesday,
September 6th, with fixes for both the ld.so environment
variable vulnerability and the locale format string
vulnerability. Unfortunately, the suse-security-announce
mailing list appears to be having problems. We picked this
up on BugTraq rather than receiving it directly from SuSE.
* Click here for LWN glibc Security Update
Date: September 14, 2000
Reported: September 10, 2000
Platform: Debian GNU/Linux 2.2
Warning About: Security Updates to horde and imp
Report From: Linux Weekly News
* Release Note: imp as distributed in Debian GNU/Linux 2.2,
suffered from insufficient checking of user supplied data.
* Click here for LWN Security Updates to horde and imp
Date: September 14, 2000
Reported: September 10, 2000
Platform: Debian GNU/Linux 2.2
Warning About: Security Update to xpdf
Report From: Linux Weekly News
* Release Note: xpdf as distributed in Debian GNU/Linux 2.2,
suffered from two problems. Both problems have been fixed in
version 0.90-7, and we recommend you upgrade your xpdf package
immediately.
* Click here for LWN Security Update to xpdf
Date: September 14, 2000
Reported: September 8, 2000
Platform: Apache Web server in SuSE Linux
Warning About: SuSE Linux Apache Vulnerabilities Identified
Report From: Linux Weekly News
* Release Note: LWN reported on Sept 8th, that two SuSE Linux
Apache Vulnerabilities Identified. ZDNet reports on two security
problems with SuSE's version of Apache. Both are difficulties
with the default configuration. "One vulnerability allows a
malicious user to read passwords and discern network structure,
while the other allows a malicious user to create or browse file
directories on a Web server."
* Click here for ZDNet Report on SuSE Apache Vulnerabilities
Date: September 14, 2000
Reported: September 11, 2000
Platform: OpenLinux Desktop 2.3, eServer 2.3, eBuilder
and eDesktop 2.4
Warning About: Security problems in xpdf
Report From: Caldera Systems
* Release Note: There are two security problems in xpdf,
the PDF file viewer. The first is that temporary files
were created insecurely. The second problem is that xpdf
was not cautious enough when the user clicked on a URL.
* Click here for Caldera Advisory CSSA-2000-031.0
Date: September 07, 2000
Platform: Internet-connected host computers, all of them running
the Linux operating system.
Warning About: Denial-Of-Service Tool On Network Hosts
Report From: SANS and NewsBytes
* Release Note: Steven Bonisteel of Newsbytes, syas in part,
"A computer-security company is warning network administrators
to watch out for new rogue software capable of playing the role
of foot soldier in denial-of-service attacks against Internet
servers. X-Force, the research-and-development arm of
Atlanta-based Internet Security Systems Inc., reported today
that the software, being called "Trinity v3," has so far been
found secreted on 400 Internet-connected host computers, all
of them running the Linux operating system." To read the
complete story, visit either of these links
* Click here for SANS link on DDoS Attack Targets Chat
* Click here for NewsBytes Sept 5th Article
Top of Page
Miscellaneous
Date: September 22, 2000
Platform: Palm PDA Operating System
Warning About: Phage Virus
PalmOS/Phage.963 Virus NAI report below
Aliases: PalmOS/Phage, Palm virus
Report From: F-Secure and NAI
* Release Note: PalmOS/Phage is the first real virus for the
Palm PDA operating system. It works by overwriting the
beginning of Palm executables. The host files are destroyed
in the process. Once one infected PRC file is transferred to
Palm, the virus keeps spreading to other Palm programs until
they are all infected (and destroyed). This very simple virus
does nothing else.
* Click for F-Secure Report on Phage Virus
Date: September 22, 2000
Platform: Palm OS Operating System
Warning About: Vapor Trojan
Aliases: PalmOS/Vapor
Report From: F-Secure
* Release Note: The is a trojan written for Palm OS operating
system. When activated, the trojan hides the installed
applications, but it does not destroy the applications
themselves. Read the complete report for removal instructions.
* Click for F-Secure Report on Vapor Trojan
Date: September 22, 2000 * Updated from 04-Sep-2000
Platform: 3COM Palm platform
Warning About: Liberty (Palm) Trojan
Aliases: Palm trojan, PALM/Liberty, Liberty Crack,
PalmOS/Liberty, Warez.prc, Crack 1.1
Report From: F-Secure
* Release Note: The LIBERTY.A is a simple trojan written for
the 3COM Palm platform, when activated the trojan deletes
all application files on the device. To remove the trojan
from PC, you can use F-Secure Anti-Virus. FSAV detects the
trojan with the updates since August 30, 2000. Read the
complete report for removal instructions.
* Click for F-Secure Report on Liberty (Palm) Update
Date: September 21, 2000
Platform: PalmOS PDA Device
Warning About: PalmOS/Phage.963 Virus
Aliases: Phage 1.0
Report From: NAI
* Release Note: When an infected application is run, the
screen is filled in dark gray box and then the program
terminates. This virus will infect all third party
applications on the PDA device. This virus overwrites the
1st section in the host .PRC file. Read the complete report
for removal instructions.
* Click here for NAI Report Number k=98836
Date: September 21, 2000
Platform: PalmOS PDA Device
Warning About: PalmOS/Vapor.741 Trojan
Aliases: Vapor 666
Report From: NAI
* Release Note: This is a Trojan designed for PalmOS. When
this Trojan is first run, all third party application
icons will disappear as if deleted. The files still exist
however their icon is now missing from the available
applications icons. Read the complete report for removal
* Click here for NAI Report Number k=98837
Date: September 21, 2000
Platform: Varied
Warning About: Various Vulnerabilities
Report From: Security Focus
* Release Note: September 21 saw a few reports on vaious
vunabilities. These being,
NetcPlus BrowseGate 2.80 DoS Vulnerability
Extent RBS ISP Directory Traversal Vulnerability
CiscoSecure ACS for Windows NT Buffer Overflow Vulnerability
CiscoSecure ACS for Windows NT Oversized TACACS+ Packet DoS Vulnerability
SuSE Installed Package Disclosure Vulnerability
* Click here for SF Reports for Sept 21st, 2000
Date: September 20, 2000
Platform: Digital (Compaq) TRU64/DIGITAL UNIX 5.0, 4.0f,
4.0e and 4.0d
Warning About: Compaq Tru64 kdebugd Remote Arbitrary File
Write Vulnerability
Report From: Security Focus
* Release Note: Compaq's Tru64 (formerly known as 'Digital Unix')
ships with a daemon that is vulnerable to a serious remote
attack. This can lead to a complete remote compromise of the
system if appropriate files are written to properly. This
vulnerability can also be used to read any file on the
filesystem.
* Click here for SF Report on Compaq Tru64 kdebugd Vulnerability
Date: September 16, 2000
Platform: The scans target the following services:
* sunrpc (e.g., portmap) on ports 111/udp and 111/tcp
* ftp on port 21/tcp
Warning About: Widespread Exploitation of rcp.statd
and wu-ftpd Vulnerabilities
Report From: CERT/CC Incident Notes
* Release Note: Recent reports involving intruder exploitation
of two vulnerabilities have involved very similar intruder
activity. The level of activity and the scope of the attacks
suggests that intruders are using scripts and toolkits to
automate attacks.
* Click here for CERT Incident Note IN-2000-10
Date: September 16, 2000
Platform: University of Washington Pine, S.u.S.E. Linux 6.1
Warning About: Pine Malformed Header DoS Vulnerability
Report From: Security Focus
* Release Note: If a message within a mailbox accessed by pine
has a malformed X-Keywords line, the client will crash without
visible reason when attempting to parse the mailbox file. This
is due to a bug in the c-client library, which is used for
parsing the mailbox files. The result of this being exploited
is a denial of service to the recipient of the email until the
malicious malformed message is removed.
* Click here for SF Report on Pine Malformed Header DoS
Date: September 16, 2000
Platform: FreeBSD
Warning About: Eject Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: Eject is a utility for ejecting the media from
a CD or optical disk. drive.eject contains several explotable
buffers which, upon overflow, can confer root privelege to
local users.
* Click here for SF Report on Eject Buffer Overflow
Date: September 15, 2000 * Revised with SGI patch information
Platform: Irix 6.2 - 6.5.8 and patched versions of the
telnet daemon in Irix 5.2 - 6.1
Warning About: IRIX telnetd Vulnerability
Report From: CIAC
* Release Note: A vulnerability exists in the telnet daemon
which can give an attacker remote root access. A remote
attacker could gain root privileges. SGI has released patches
for most of the affected platforms. Apply the patches or
fixes as outlined in the k-066a bulletin.
* Click here for CIAC Bulletin K-066a
Date: September 14, 2000
Platform: WebTV for Windows
Warning About: MS WebTV DoS Vulnerability
Report From: Security Focus
* Release Note: If a remote user sends a UDP packet to any
port in the 22701 - 22705 range, to a system running WebTV
for Windows, the system may crash entirely or at the least
the program will stop responding.
* Click here for SF Advisory on WebTV DoS Vulnerability
Date: September 14, 2000
Platform: Mobile Devices
Warning About: Tests Uncover Bluetooth Security Flaw
Report From: ZDNet IT Week
* Release Note: Security flaw allows eavesdroppers to listen
in on the digital exchange of data and determine the ID of
the user. Bluetooth, the short-range wireless networking
technology that will enable mobile devices to communicate
with each other, has a security flaw, according to
researchers at Lucent Technologies' Bell Labs in the US.
* Click for ZDNet Report on Bluetooth Security Flaw
Date: September 14, 2000
Platform: Customer of the Swedish furniture firm, IKEA
Warning About: IKEA In Another Security Blunder
Report From: ZDNet News
* Release Note: IKEA experienced a security blunder at its
online store this week, exposing the private details of
hundreds of customers online. A Web server configuration
error left a database file containing the customer
information temporarily unprotected an accessible to any
visitor to IKEA's Web site.
* Click for ZDNet Report on IKEA Security Blunder
Date: September 08, 2000
Platform: Hotmail Users
Warning About: Hotmail Flaw Puts E-Mail At Risk
Report From: MSNBC
* Release Note: A recently discovered security bug in Hotmail
may serve as a wakeup call to all Internet Explorer 4.x and
5.0 users. BugNet has verified a security vulnerability that
would allow a malicious user to usurp control of someone
elses Hotmail account, allowing the hacker to read and to
send e-mail from that account. Since Microsoft has issued
Service Packs and Upgrades for the Unauthorized Cookie Access
bug, this leaves the rest of the blame with Hotmail for their
lax security and authentication procedures. Read the complete
article for available fixes.
* Click for MSNBC Report on Hotmail Vulnerability
Date: September 04, 2000 * Updated from 30-Aug-2000
Platform: 3COM Palm platform
Warning About: Liberty (Palm), Warez.prc, Crack 1.1 Trojan
Report From: F-Secure
* Release Note: The LIBERTY.A is a simple trojan written for
the 3COM Palm platform, when activated the trojan deletes
all application files on the device. To remove the trojan
from PC, you can use F-Secure Anti-Virus. FSAV detects the
trojan with the updates since August 30, 2000.
* Click for F-Secure Report on Liberty (Palm) Update
Date: September 03, 2000
Platform: Miscellaneous
Warning About: Possible Hoax: Pokemon Pikachu worm/Trojan
Report From: Computer Virus Myths at Vmyths.com
* Release Note: On August 25, 2000, Vmyths.com reported
that the Pokemon Pikachu worm/Trojan, as reported by
Reuters reporter Richard Meares, who filed a newswire on
24 August about a deadly Pokemon worm, is a hoax. They
go on to say "The story sounded "new and urgent," yet the
facts indicate otherwise. It appears the press renamed a
months-old (and rarely seen) worm to increase its publicity
value." As of today, Sept 3rd, the warning still appears
to be legitament, and not a hoax, since it is still reported
as real, on sites like F-Secure. The best protection is to
keep your virus checking software up to date.
* Click here for Pokemon Virus Targets Kids Link
* Click here for Pokemon Pikachu worm/Trojan Hoax Link
Date: September 02, 2000
Platform: SGI IRIX systems
Warning About: Vulnerability in SGI IRIX telnetd
Report From: CERT
* Release Note: The CERT/CC is receiving occasional reports
of intruders root compromising SGI IRIX systems via a
vulnerability in the telnetd daemon. The CERT/CC has
published an Incident Note discussing the activity.
* Click here for CERT Incident Note IN-2000-09
Date: September 01, 2000
Platform: Uncertain at time of vht-can Posting
Warning About: DonaldD.trojan Philippines Trojan Horse
Report From: NIPC
* Release Note: NIPC Watch Office received notification that
a Trojan horse was reported in the wild. This Trojan horse
is spread as an e-mail attachment with the President of the
Philippines Joseph Estrada's nickname ("erap estrada") in
the subject line. Once the attachment is opened the
DonaldD.trojan is executed and can be exploited to collect
user names and passwords from the victim.
* Click here for NIPC Trojan Horse Press Release
Date: September 01, 2000
Platform: Miscellaneous
Warning About: Security gaffe gores Bull's servers
Multiple exploitable vulnerabilities at Intacct.com
Developer unleashes Palm Trojan horse program
Cuddly Pokemon Virus Targets Kids
Report From: Hacker Whacker Remote Computer Network Security
* Release Note: There are a few article links on the Hacker
Whacker site, that invloves various computer platforms.
* Click here for Hacker Whacker Sept 1 Articles
Back to the Virus Archives page
