Virus Warnings from October 2000
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
No virus warnings or alerts
Top of Page
Windows
Date: October 31, 2000
Released: October 30, 2000
Platform:
Warning About: Sonic: Self-Updating Internet Worm
Report From: Kaspersky Lab Virus Alerts and F-Secure
* Release Note: Yet another self-updating internet worm has been
discovered "in the wild". Moscow, Russia, October 30, 2000
Kaspersky Lab, an international anti-virus software-development
company, warns users of the discovery of Sonic, a new Internet
worm. This worm was discovered in France and Germany in the
morning on 30 October 2000. A distinctive feature of this
malicious program is its ability to update itself (this means, to
automatically download additional functional components) via the
Internet. The worm consists of two parts: the loader and the main
module.
* Click here for Kaspersky Lab Report on Sonic
* Click here for F-Secure report on Sonic
Date: October 31, 2000 * Updated from 27-Oct-2000
Released: October 30, 2000
Platform: Win32 systems
Warning About: Qaz Network Worm
Report From: F-Secure
* Release Note: This is network worm with backdoor capabilities,
which spreads itself under Win32 systems. The worm was reported
in-the-wild in July-August, 2000. The worm itself is Win32
executable file and about 120K long, written in MS Visual C++.
When an infected file is executed, the worm registers itself in
Windows registry in auto-start section.
* Click here for Report on Qaz Worm
Date: October 29, 2000
Released: October 17, 2000
Platform: Windows 95, Windows 98 and Windows ME
Warning About: SubSeven DEFCON8 2.1 Backdoor Trojan
Report From: NIPC
* Release Note: A new variant of the SubSeven Trojan Horse has been
discovered in the wild. This malicious computer code could
constitute a new threat of distributed denial of service (DDoS)
attacks. DDoS attacks were responsible for serious disruptions of
several major e-commerce web sites in February 2000. The NIPC and
industry partners believe that this new variant may be used to
conduct further DDoS attacks which may be more difficult to detect.
* Click here for NIPC Advisory 00-056
Date: October 29, 2000
Released: October 24, 2000
Platform: MS Word97/2000 documents
Warning About: W97M/Onex.F Macro Virus
Report From: Network Associates
* Release Note: This is a class module macro virus for Word97/2000
documents and templates. This virus will lower macro warnings for
Word. This virus contains a file deletion payload which is rarely
invoked. This virus has a 1 in 5 chance of running the routine
which deletes files from the TEMP folder. Read the complete report
for method of infection removal instructions.
* Click here for Report on W97M/Onex.F Macro Virus
Date: October 29, 2000
Released: October 18, 2000
Platform: MS Outlook Express
Warning About: VBS/Tam@M Internet VBScript Worm
Report From: Network Associates
* Release Note: This worm functions much the same way that
JS/Kak.worm does. AVERT recommends installing the security patch
from Microsoft mentioned in NAI's report. Like JS/Kak.worm, a
dangerous aspect of this Internet worm is its ability to
continuously re-infect yourself if the preview pane is enabled and
you browse between folders specifically the "sent" folder which
happens to contain the Internet worm within a message. This is
another strong reason to update to the security patch. Read the
complete report for method of infection removal instructions.
* Click here for Report on VBS/Tam@M VBScript Worm
Date: October 29, 2000
Released: October 18, 2000
Platform: MS Outlook Express
Warning About: VBS/Godzilla@M Internet VBScript Worm
Report From: Network Associates
* Release Note: This worm functions much the same way that
JS/Kak.worm does. AVERT recommends installing the security patch
from Microsoft mentioned in NAI's report. Like JS/Kak.worm, a
dangerous aspect of this Internet worm is its ability to
continuously re-infect yourself if the preview pane is enabled and
you browse between folders specifically the "sent" folder which
happens to contain the Internet worm within a message. This is
another strong reason to update to the security patch. Read the
complete report for method of infection removal instructions.
* Click here for Report on VBS/Godzilla@M Worm
Date: October 29, 2000
Released: October 19, 2000
Platform: Microsoft Windows
Warning About: PWS.Cain Trojan
Report From: Network Associates
* Release Note: This password stealing trojan is designed to retrieve
Windows, Microsoft Network, Windows screen saver, Windows shares,
and Access database passwords. Later versions also have a server
component named "Abel" which allows the attacker to perform the
some remote tasks. Read the complete report for method of infection
removal instructions.
* Click here for Report on PWS.Cain Trojan
Date: October 29, 2000
Released: October 25, 2000
Platform: Microsoft Virtual Machine (Microsoft VM)
Patch Available: VM File Reading Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in the Microsoft virtual machine (Microsoft
VM) that originally was discussed in Microsoft Security Bulletin
MS00-011. Like the original vulnerability, the new variant could
enable a malicious web site operator to read files from the computer
of a person who visited his site or read web content from inside
an intranet if the malicious site was visited by a computer from
within that intranet.
* Click here for MS Security Bulletin MS00-081
Date: October 29, 2000
Released: October 23, 2000
Platform: Microsoft Internet Information Server
Patch Available: Session ID Cookie Marking Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. Internet Information Server.
The vulnerability could allow a malicious user to hijack another
users secure web session, under a very restricted set of
circumstances.
* Click here for MS Security Bulletin MS00-080
Date: October 29, 2000
Released: October 18, 2000
Platform: Several Microsoft Operating Systems
Patch Available: HyperTerminal Buffer Overflow Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in the HyperTerminal application that ships
with several Microsoft operating systems. This vulnerability could,
under certain circumstances, allow a malicious user to execute
arbitrary code on another users system.
* Click here for MS Security Bulletin MS00-079
Top of Page
Date: October 29, 2000
Released: October 17, 2000
Platform: Microsoft IIS 4.0 and 5.0
Patch Available: Web Server Folder Traversal Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has identified a security vulnerability
in Microsoft IIS 4.0 and 5.0 that is eliminated by a previously-
released patch. The vulnerability could potentially allow a visitor
to a web site to take a wide range of destructive actions against
it, including running programs on it.
There is not a new patch for this vulnerability. Instead, it is
eliminated by the patch that accompanied Microsoft Security Bulletin
MS00-057.
* Click here for MS Security Bulletin MS00-078
Date: October 29, 2000
Released: October 13, 2000
Platform: Windows 2000 / Windows NT 4.0
Patch Available: NetMeeting Desktop Sharing Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in NetMeeting, an application that ships
with Microsoft Windows 2000 and is also available as a separate
download for Windows NT 4.0. The vulnerability could allow a
malicious user to temporarily prevent an affected machine from
providing any NetMeeting services and possibly consume 100 percent
CPU utilization during an attack.
* Click here for MS Security Bulletin MS00-077
Date: October 29, 2000
Released: October 12, 2000
Platform: Microsoft Internet Explorer
Patch Available: Cached Web Credentials Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
a security vulnerability in Microsoft. Internet Explorer. Under
a daunting set of conditions, the vulnerability could enable a
malicious user to obtain another users userid and password to
a web site.
* Click here for MS Security Bulletin MS00-076
Date: October 29, 2000
Released: October 12, 2000
Platform: Microsoft VM
Patch Available: Microsoft VM ActiveX Component
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. virtual machine (Microsoft
VM). If a malicious web site operator were able to coax a user
into visiting his site, the vulnerability could allow him to
take any desired action on a visiting users machine.
* Click here for MS Security Bulletin MS00-075
Date: October 29, 2000
Released: October 27, 2000
Platform: Win32 systems
Warning About: Qaz Network Worm
Report From: F-Secure
* Release Note: This is network worm with backdoor capabilities,
which spreads itself under Win32 systems. The worm was reported
in-the-wild in July-August, 2000. The worm itself is Win32
executable file and about 120K long, written in MS Visual C++.
When an infected file is executed, the worm registers itself in
Windows registry in auto-start section.
* Click here for Report on Qaz Worm
Date: October 29, 2000
Released: October 26, 2000
Platform: French version of Windows 9x
Warning About: VBS/Tam VBScript Worm
Report From: F-Secure
* Release Note: VBS/Tam is a worm similar to JS/Kak. It uses the
same security vulnerability to infect the system. If an infected
message is viewed, the worm creates a file, "tam.hta", to the
startup directory of French version of Windows 9x.
Microsoft has released a patch that fixes this vulnerability.
It is available on Security Bulletin MS99-032
* Click here for Report on VBS/Tam
Date: October 29, 2000
Released: October 25, 2000
Platform: MS Windows
Warning About: LoveLetter VBScript Worm
Report From: F-Secure
* Release Note: VBS/LoveLetter is a VBScript worm. It spreads
through e-mail as a chain letter. The worm uses the Outlook
e-mail application to spread. LoveLetter is also an overwriting
VBS virus and it spreads using a mIRC client as well. Visit
F-Secure to find out how to protect yourself against VBScript
worms.
* Click here for Report on LoveLetter VBScript Worm
Date: October 29, 2000
Released: October 23, 2000
Platform: MS Windows
Warning About: Seeker Trojan
Report From: F-Secure
* Release Note: This trojan uses the same vulnerability that JS/Kak
and VBS/BubbleBoy to drop itself to the Windows Startup directory.
This trojan consists of three different parts: one HTML web page,
and two hta files. The web page is available in an adult site, and
it affects Internet Explorer users. Visit F-Secure and follow the
link for the patch to protect yourself against the vulnerability
that this trojan use.
* Click here for Report on Seeker Trojan
Top of Page
Date: October 29, 2000
Released: October 23, 2000
Platform: MS Windows
Warning About: LoveLetter.AJ VBScript Worm
Report From: F-Secure
* Release Note: This LoveLetter variant simulates a hoax message.
It shows a combination of three common hoaxes that are circulating
in the Internet. Information about the original VBS/LoveLetter.A
is available at: http://www.F-Secure.com/v-descs/love.htm
* Click here for Report on LoveLetter.AJ
Date: October 29, 2000
Released: October 23, 2000
Platform: MS Windows
Warning About: LoveLetter.BD VBScript Worm
Report From: F-Secure
* Release Note: This Loveletter variant was found on August 16,
2000. When the virus activates it first run Notepad and shows a
text in German. The virus sends a hidden message to all recipients
in Outlook's address book. Read F-Secures report for full
description.
* Click here for Report on LoveLetter.BD
Date: October 29, 2000
Released: October 23, 2000
Platform: MS Windows
Warning About: LoveLetter.BG VBScript Worm
Report From: F-Secure
* Release Note: The variant is similar to the original LoveLetter.A
Read F-Secures report for full description.
* Click here for Report on LoveLetter.BG
Date: October 29, 2000
Released: October 23, 2000
Platform: MS Windows
Warning About: LoveLetter.BL VBScript Worm
Report From: F-Secure
* Release Note: VBS/LoveLetter.BL spreads in email messages
Then it sends itself to all recipients listed on all Outlook
address books.
* Click here for Report on LoveLetter.BL
Date: October 12, 2000
Released: October 11, 2000
Platform: MS WebTV for Windows
Patch Available: WebTV for Windows Denial of Service
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. WebTV for Windows. The
vulnerability could allow a malicious user to remotely crash
systems running WebTV for Windows.
* Click here for MS Security Bulletin MS00-074
Date: October 12, 2000
Released: October 11, 2000
Platform: MS Windows 95/98, 98 Second Edition and Windows Me.
Patch Available: Malformed IPX NMPI Packet
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. Windows 95, Windows 98, 98
Second Edition and Windows Me. The vulnerability could be used to
cause an affected system to fail, and depending on the number of
affected machines on a network, potentially could be used to flood
the network with superfluous data. The affected system component
normally is present only if it has been deliberately installed.
* Click here for MS Security Bulletin MS00-073
Date: October 12, 2000
Released: October 10, 2000
Platform: MS Windows 95, 98, 98SE, and Windows Me
Patch Available: Share Level Password Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. Windows 95, 98, 98SE, and
Windows Me. The vulnerability could allow a malicious user to
programmatically access a Windows 9x/ME file share without
knowing the entire password assigned to that share.
* Click here for MS Security Bulletin MS00-072
Date: October 12, 2000
Released: October 05, 2000
Platform: MS Word 2000 and 97
Patch Available: Word Mail Merge Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft. Word 2000 and 97. The
vulnerability could allow a malicious user to run arbitrary code
on a victims computer without their approval.
* Click here for MS Security Bulletin MS00-071
Date: October 12, 2000
Released: October 11, 2000
Platform: PC Windows System
Warning About: Logo, Logo.A Trojan
Report From: F-Secure
* Release Note: This trojan has been found to be embedded into web
based discussion groups. It uses the scriplet.typelib vulnerability.
Once the user has visited in a web page that contains the trojan,
it installs itself to the Windows startup directory as "logo.hta".
After that it will be executed when the system is restarted.
* Click here for Report on Logo, Logo.A Trojan
Top of Page
Date: October 12, 2000
Released: October 11, 2000
Platform: PC Windows System
Warning About: LoveLetter.AS
Report From: F-Secure
* Release Note: VBS/LoveLetter.AS spreads in messages. When the worm
is executed, it replaces all files from every drive in the same way
the VBS/LoveLetter.A virus does. The worm also copies itself to
Windows System directory as "linux32.vbs". This file is added to
the registry and executed in every system startup. This variant has
an additional payload. It activates in September 17th.
* Click here for Report on LoveLetter.AS
Date: October 12, 2000
Released: October 05, 2000
Platform: MS Internet Explorer 5.5 Outlook and Outlook Express
Warning About: Security hole could be exploited by vandals
Report From: AISS
* Release Note: Discovered by known exploit hunter, Georgi Guninski,
a new security hole can allow hackers to infect PCs with Vandals,
Trojans, and other malicious code.
* Click here for Latest AISS Virus/Vandal Alerts
Date: October 12, 2000
Released: October 11, 2000
Platform: PC
Warning About: VBS/Godzilla.worm
Report From: NAI
* Release Note: NAI has issued an updated virus alert
* Click here for NAI Update on VBS/Godzilla.worm
Date: October 12, 2000
Released: October 10, 2000 * Updated From Sept 9th
Platform: PC
Warning About: W97M/Pene.b
Report From: NAI
* Release Note: NAI has issued an updated virus alert
* Click here for NAI Update on W97M/Pene.b
Date: October 06, 2000
Released: October 03, 2000
Platform: Microsoft Windows 98/95/NT 4.0/NT 2000
Warning About: Pegasus Email File Forwarding Vulnerability
Report From: Security Focus
* Release Note: It is possible for a malicious website operator to
obtain copies of known files on a remote system if a website
visitor is running Pegasus Mail client.
* Click here for Pegasus Email File Forwarding Vulnerability
Date: October 06, 2000
Released: October 03, 2000
Platform: Microsoft Windows 98/95/NT 4.0/NT 2000
Warning About: AOL Instant Messenger DoS Vulnerability
Report From: Security Focus
* Release Note: AOL Instant Messenger is a real time messaging
service for users that are on line. The version of AOL Instant
Messenger that is shipped with Netscape is subject to a denial
of service.
* Click here for AOL Instant Messenger DoS Vulnerability
Date: October 06, 2000
Platform: MS Windows Media Play (WMP) version 7
Warning About: Windows Media Player Can Crash Outlook
Report From: MSNBC BugNet
* Release Note: It appears that this latest version of WMP has an
unexpected effect on Rich Text Format (RTF)-enabled e-mail
applications. By attaching a malformed OCX to an e-mail message,
a malicious user can cause a victim's mail application to crash.
The impact of this bug can range from a mildly annoying restart
of the mail client to a full-blown loss of data in all unsaved
documents.
* Click here for BugNet WMP Alert
Date: October 04, 2000
Released: October 03, 2000
Platform: MS Windows NT 4.0 and Windows 2000
Patch Available: Multiple LPC and LPC Ports Vulnerabilities
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates
several security vulnerabilities in Microsoft. Windows NT 4.0
and Windows 2000. The vulnerabilities could allow a range of
effects, from denial of service attacks to, in some cases,
privilege elevation.
* Click here for MS Security Bulletin MS00-070
Date: October 01, 2000
Released: September 29, 2000
Platform: MS Windows 2000
Patch Available: Chinese IME State Recognition Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Windows 2000. The vulnerability could
allow a malicious user to gain complete control over an affected
machine.
* Click here for MS Security Bulletin MS00-069
Date: October 01, 2000
Released: September 28, 2000
Platform: Windows Media Player
Patch Available: OCX Attachment Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability that could cause certain email
applications to fail, requiring the user to restart the e-mail
client to resume normal operation.
* Click here for MS Security Bulletin MS00-068
Top of Page
Macintosh
No virus warnings or alerts
Top of Page
Linux
Date: October 29, 2000
Released: October 13, 2000
Platform: Certain Versions of Linux OS
Warning About: Trinity v3/ Stacheldraht 1.666 DDoS Tool
Report From: NIPC
* Release Note: New variants of the Trinity and Stacheldraht
Distributed Denial of Service (DDoS) tools have been found in
the wild. The "Trinity v3" Distributed Denial of Service (DDoS)
exploit represents a potentially serious and continuing threat to
networked computers running certain versions of the Linux operating
system.
* Click here for NIPC Advisory 00-055
Date: October 29, 2000
Reported: October 28, 2000
Platform: Conectiva
Warning About: Security Update To gnupg
Report From: Linux Daily News
* Release Note: Follow the link, for Conectiva's security update to
gnupg, which fixes the problem with the signature checking code.
* Click here for LWN Security Update To gnupg
Date: October 29, 2000
Reported: October 27, 2000
Platform: Red Hat
Warning About: Updates for Secure Web Server
Report From: Linux Daily News
* Release Note: Red Hat issued updates to the apache, php, mod_perl,
and auth_ldap packages last week in response to the Apache
mod_rewrite module vulnerabilities. This week they add an update
to the Secure Web Server 3.2.
* Click here for LWN Updates for Secure Web Server
Date: October 29, 2000
Reported: October 27, 2000
Platform: Caldera
Warning About: Update To ypbind
Report From: Linux Daily News
* Release Note: Caldera has issued their security advisory for the
recently reported ypbind DOS vulnerabilities.
* Click here for LWN Update To ypbind
Date: October 29, 2000
Reported: October 27, 2000
Platform: SuSE
Warning About: local root Vulnerability in ncurses
Report From: Linux Daily News
* Release Note: SuSE has posted a Security advisory for ncurses to
address possible local root compromise via the screen handling
functions. Users of releases 6.0 through 7.0, inclusive, are
* Click here for LWN local root Vulnerability in ncurses
Date: October 29, 2000
Reported: October 27, 2000
Platform: Slackware
Warning About: ppp-off Advisory
Report From: Linux Daily News
* Release Note: Slackware has released a security advisory for the
ppp-off program. It's a local /tmp bug and users of 7.0, 7.1 and
-current are affected.
* Click here for LWN ppp-off Advisory
Top of Page
Date: October 29, 2000
Reported: October 26, 2000
Platform: Red Hat
Warning About: cyrus-sasl Advisory
Report From: Linux Daily News
* Release Note: Red Hat has released a security advisory for the
cyrus-sasl packages shipped with Red Hat 7. Versions of cyrus-sasl
shipped with earlier Red Hat Power Tools packages do not have the
reported problem.
* Click here for LWN cyrus-sasl Advisory
Date: October 29, 2000
Reported: October 26, 2000
Platform: Immunix Apache
Warning About: Advisory for Apache
Report From: Linux Daily News
* Release Note: Following Red Hat's updates, Immunix has provided a
security advisory for Apache that addresses all of the updates
Red Hat previously covered.
* Click here for LWN Advisory for Apache
Date: October 12, 2000
Platform: Linux PHP 4.0.3
Warning About: Format string vulnerabilities in PHP
Report From: Linux Daily News
* Release Note: PHP 4.0.3 has been released; it contains a number of
fixes, including a few with security implications. It would appear
that there are a few format string vulnerabilities in that package.
There is a Bugtraq message which describes the vulnerabilities in
more detail, and points out that PHP3 is vulnerable as well. PHP
3.0.17, due out shortly, will fix that release.
* Click here for LWN Format string vulnerabilities in PHP
Date: October 12, 2000
Platform: Linux-Mandrake
Warning About: Security Update to Apache
Report From: Linux Daily News
* Release Note: MandrakeSoft has issued a security update to apache
which fixes the vulnerability in the mod_rewrite module.
* Click here for LWN Security Update to Apache
Date: October 12, 2000
Reported: October 02, 2000 * Original Release August 18, 20002000
Platform: Various Linux Distributions
Warning About: Varioius Vulnerabilities
Report From: CERT
* Release Note: Click on link for bulletins regarding
Compromises via rpc.statd Vulnerability
* Click here for CERT CA-2000-17
Widespread Exploitation of rpc.statd and wu-ftpd Vulnerabilities
* Click here for CERT IN-2000-10
Two Input Validation Problems In FTPD
* Click here for CERT CA-2000-13
Systems Compromised Through a Vulnerability in the IRIX telnet
daemon
* Click here for CERT IN-2000-09
Date: October 03, 2000 * Updated from Oct 2nd, below
Platform: GnoRPM versions prior to 0.95.1
Warning About: Patches For GnoRPM
Report From: Linux Daily News
* Release Note: Hot on the heels of the reported bug, Alan Cox has
posted fixes for the GnoRPM vulnerability noted earlier this
week. Conectiva has also posted a security announcement on this
subject.
* Click here for LWN Alan's posted fixes for GnoRPM vulnerability
* Click here for LWN Conectiva's security announcement
Top of Page
Date: October 03, 2000
Reported: October 02, 2000
Platform: GnoRPM versions prior to 0.95.1
Warning About: October 2nd GnoRPM Security Update
Report From: Linux Daily News
* Release Note: Thanks to Gnotices, we hear that a security problem
has been fixed in GnoRPM. There was a /tmp vulnerability in all
versions prior to 0.95.1 that could allow local users to do
undesirable things. An upgrade is recommended - especially since
this utility, which has not distinguished itself as one of the
most stable programs around, is said to actually work these days.
* Click here for LWN GnoRPM Security Update
Date: October 03, 2000
Reported: October 02, 2000
Platform: Linux-Mandrake
Warning About: Security Update To traceroute
Report From: Linux Daily News
* Release Note: MandrakeSoft has a security fix to traceroute.
* Click here for LWN Security Update To traceroute
Date: October 03, 2000
Reported: October 02, 2000
Platform: Linux-Mandrake
Warning About: Security Update To xinitrc
Report From: Linux Daily News
* Release Note: Linux-Mandrake 7.0 and 7.1 come with a default X
user environment that disables X connection authentication for
the local host. This mistake can expose a window system user to
keystroke sniffing and other unpleasant behavior by other users
on the same system. A security update has been issued which
fixes the problem.
* Click here for LWN Security Update To xinitrc
Date: October 03, 2000
Reported: October 02, 2000
Platform: GNU cfengine package
Warning About: Format String Problem With cfengine
Report From: Linux Daily News
* Release Note: The GNU cfengine package - a network administration
utility - has turned up some format string vulnerabilities in its
management daemon. The likely result is remote root compromises -
not quite the sort of remote management that most users had in mind.
If you're running cfengine, LWN recommends taking a look at this
advisory and upgrading to 1.6a11.
* Click here for LWN Format String Problem With GNU cfengine
Date: October 01, 2000
Reported: September 30, 2000
Platform: Conectiva Linux
Warning About: Conectiva security update to traceroute
Report From: Linux Daily News
* Release Note: Conectiva has updated traceroute. Older versions
may allow unauthorized root access, so an upgrade is recommended.
* Click here for LWN Conectiva security update to traceroute
Date: October 01, 2000
Reported: September 29, 2000
Platform: Apache Servers
Warning About: Security problem with Apache RewriteRule directive
Report From: Linux Daily News
* Release Note: An advisory has gone out regarding a vulnerability
with the Apache mod_rewrite module. If certain types of RewriteRule
directives are used, the result can be the disclosure of any file
on the system. A patch is in the works - meanwhile those of you who
maintain Apache servers should have a look at the advisory and
look for potential problems in your configurations.
* Click here for LWN Apache RewriteRule directive
Date: October 01, 2000
Reported: September 29, 2000
Platform: Caldera Linux
Warning About: Caldera security update to traceroute
Report From: Linux Daily News
* Release Note: Caldera Systems has released an update to traceroute
which fixes a memory management problem in that utility. No
exploits are known at this time, but the possibility of a local
root compromise is real, so an upgrade is recommended.
* Click here for LWN Caldera security update to traceroute
Date: October 01, 2000
Reported: September 29, 2000
Platform: LinuxPPC
Warning About: LinuxPPC security update
Report From: Linux Daily News
* Release Note: Jason Haas of LinuxPPC wrote in with an important
security notice for all versions, past and present, of that
distribution. The bug has to do with entering singler user mode
as root - without a password. Be sure to read the instructions
for fixing this that Jason provided.
* Click here for LWN LinuxPPC security update
Date: October 01, 2000
Reported: September 29, 2000
Platform: Slackware Linux
Warning About: Slackware security update to wu-ftpd
Report From: Linux Daily News
* Release Note: Slackware has released a security update to wu-ftpd
(the FTP server) which fixes an unpleasant vulnerability in that
package. An upgrade is strongly recommended.
* Click here for LWN Slackware security update to wu-ftpd
Date: October 01, 2000
Reported: September 28, 2000
Platform: Yellow Dog Linux
Warning About: Yellow Dog security updates to xpdf and glibc
Report From: Linux Daily News
* Release Note: Terra Soft continues to catch up on the security
updates for Yellow Dog Linux - the company has just announced new
versions of glibc and xpdf, which fix the vulnerabilities in
those packages.
* Click here for LWN Yellow Dog security updates to xpdf
* Click here for LWN Yellow Dog security updates to glibc
Top of Page
Miscellaneous
Date: October 29, 2000
Released: October 17, 2000
Platform: Java Applet
Warning About: JV/AntiURL Trojan
Report From: Network Associates
* Release Note: This Java Applet was designed to attack certain
websites in protest. This is a client tool ran from your PC.
It does not carry a damaging payload to the user running the
tool. Read the report to get the method of infection and
removal instructions.
* Click here for Report on JV/AntiURL Trojan
Date: October 29, 2000
Released: October 23, 2000
Platform: Allaire's JRUN Web Server
Warning About: Remote Command Execution Vulnerability
Report From: Foundstone
* Release Note: It is possible to compile and execute any arbitrary
file within the web document root directory of the JRUN's web
server as if it were a JSP file, even if the file type is not .jsp.
* Click here for Report FS Advisory ID: FS-102300-14-JRUN
Date: October 29, 2000
Released: October 23, 2000
Platform: Allaire's JRUN Web Server
Warning About: Arbitrary File Retrieval Vulnerability
Report From: Foundstone
* Release Note: Multiple show code vulnerabilities exist in Allaire's
JRUN Server 2.3 allowing an attacker to view the source code of any
file within the web document root of the web server.
* Click here for Report FS Advisory ID: FS-102300-13-JRUN
Date: October 29, 2000
Released: October 23, 2000
Platform: Allaire's JRUN Web Server
Warning About: Unauthenticated Access to WEB-INF directory
Vulnerability
Report From: Foundstone
* Release Note: A severe security flaw exists with Allaire's
JRun 3.0 allowing an attacker to access WEB-INF directories on
the JRun 3.0 server. The WEB-INF directory tree contains web
application classes, pre-compiled JSP files, server side
libraries, session information and files such as web.xml and
webapp.properties.
* Click here for Report FS Advisory ID: FS-102300-12-JRUN
Date: October 29, 2000
Released: October 24, 2000
Platform: Non-resident COM/EXE-files
Warning About: MSTU Virus
Report From: F-Secure
* Release Note: This virus contains the following text:
This program was written in MSTU,1990
MSTU is an old abbreviation for the name of the Sofia Technical
University.
* Click here for Report on MSTU
Date: October 29, 2000
Reported: October 25, 2000
Platform: Various
Warning About: Browser Certificates
Report From: CERT
* Release Note: To aid in the wide distribution of essential
security information, the CERT Coordination Center is
forwarding the following information from Sun Microsystems.
Users who accept these certificates into their browser may
inadvertently run malicious code signed by the compromised
certificates.
* Click here for CERT CA-2000-19
Date: October 12, 2000
Released: October 10, 2000
Platform: Boot Sector Virus
Warning About: TMC
Report From: F-Secure
* Release Note: TMC is an old boot sector virus, which encrypts
itself with variable encryption both on disk and in memory.
This has sometimes caused false alarms on the virus. TMC was
in the wild years ago, but is nowadays considered extinct.
* Click here for Report on Boot Sector Virus
Date: October 12, 2000
Released: October 05-10, 2000
Platform: Various
Warning About: Various
Report From: Security Focus
* Release Note: There are a number of new advisories listed for
the dates of Oct 5th to Oct 10th.
* Click here for SecurityFocus: Latest Advisories
Date: October 06, 2000
Released: October 04, 2000
Platform: Multiple versions of FreeBSD, NetBSD, OpenBSD
Warning About: Multiple Vendor BSD libutil pw_error()
Format String
Report From: Security Focus
* Release Note: Libutil is a shared library used by almost every
unix that contains code for "standard" functions used in many
different unix untilities. The BSD libutil contains a format
string vulnerability in the pw_error() function, used in the
setuid chpass utility.
* Click here for BSD libutil pw_error() Format String
Date: October 06, 2000
Released: October 04, 2000
Platform: OpenBSD 2.7/2.6/2.5/2.4/2.3
Warning About: Multiple Vendor BSD fstat Format String
Vulnerability
Report From: Security Focus
* Release Note: fstat is a program shipped with BSD unix variants
that is used to list the open files on a system. It is possible
for a user to exec fstat with a value for the PWD variable that
contains malicious format specifiers.
* Click here for BSD fstat Format String Vulnerability
Date: October 03, 2000
Reported: October 02, 2000
Platform: Regular ssh and OpenSSH
Warning About: Security Trouble With SSH
Report From: Linux Daily News
* Release Note: It turns out that there is a security vulnerability
in ssh which bears watching. If a user employs scp to move files
from a server that has been compromised, the operation can be used
to replace arbitrary files on the user's system. Thus, a corrupt
ssh server can be used to crack the systems of people using that
server. Fixes are not yet available, but presumably will be in
short order. Check back to Linux Weekly News for more.
* Click here for LWN Security Trouble With SSH
Date: October 01, 2000
Reported: September 29, 2000
Platform: All platforms with network connections
Warning About: New Variants of Trinity and Stacheldraht DDoS
Report From: CIAC
* Release Note: The clients of these tools are used to flood
networks with packets causing a denial of service. Router
configurations designed to block packets from the original
tools should still work on these variants.
* Click here for CIAC Bulletin K-072
Date: October 01, 2000
Reported: September 28, 2000
Platform: All versions and platforms of Check Point Firewall-1
Warning About: Multiple Vulnerabilities in Check Point Firewall-1
Report From: CIAC
* Release Note: Eight security holes in Firewall-1 were identified
at the Black Hat 2000 briefings. These holes could allow an
intruder to bypass the firewall's protections.
* Click here for CIAC Bulletin K-073
Back to the Virus Archives page
