Virus Warnings from November 2000 ______________________________________________________________ [Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Linux] [Jump to Misc] ______________________________________________________________ Amiga No virus warnings or alerts Top of Page Windows Date: November 29, 2000 Released: November 27, 2000 Platform: MS Windows 3.11WfW/3.1/98/95/NT 4.0/NT 3.5/NT 2000 Warning About: Winsock FTPd Directory Transversal Vulnerability Report From: Security Focus * Release Note: Winsock FTPd is a popular FTP server from Texas Imperial Software. A vulnerability exists in Winsock FTPd that could allow an unauthorized user to browse the root directory of the drive where Winsock FTPd has been installed. * Click here for Advisory on Winsock FTPd Vulnerability Date: November 28, 2000 Released: November 27, 2000 Platform: MS Windows 9x Warning About: BackDoor-JD Internet Backdoor Trojan Aliases: BackDoor.BrainSpy, BrainSpy Report From: Network Associates * Release Note: This is a Windows 9x Internet Backdoor trojan. When running it gives full access to the system over the Internet to anyone running the appropriate client software. This trojan installs a file on the infected computer and adds itself in the registry. * Click here for Report on BackDoor-JD Internet Backdoor Trojan Date: November 28, 2000 Released: November 27, 2000 Platform: MicrosSoft Warning About: W32/Lara.worm Internet Worm Report From: Network Associates * Release Note: This is a file-overwriting worm. In most environments the user will be required to choose a mail recipient in order for the worm to spread. Read the NAI report for Method Of Infection and Removal Instructions. * Click here for Report on W32/Lara.worm Internet Worm Date: November 28, 2000 * Updated Platform: MS Windows Warning About: LoveLetter VBScript Worm Aliases: Lovebug, I-Worm.LoveLetter, ILOVEYOU Variants: See List Below Report From: F-Secure * Release Note: VBS/LoveLetter is a VBScript worm. It spreads through e-mail as a chain letter. You can protect yourself against VBScript worms by uninstalling the Windows Script Host. For further information, please look at http://www.F-Secure.com/virus-info/u-vbs/ The worm uses the Outlook e-mail application to spread. LoveLetter is also an overwriting VBS virus and it spreads using a mIRC client as well. When it is executed, it first copies itself to the Windows System directory * Click here for Report on LoveLetter VBScript Worm * Click here for Report on LoveLetter.F Variant * Click here for Report on LoveLetter.E Variant * Click here for Report on LoveLetter.M Variant * Click here for Report on LoveLetter.P Variant * Click here for Report on LoveLetter.V Variant * Click here for Report on LoveLetter.R Variant * Click here for Report on LoveLetter.S Variant * Click here for Report on LoveLetter.Q Variant * Click here for Report on LoveLetter.O Variant * Click here for Report on LoveLetter.K Variant * Click here for Report on LoveLetter.L Variant * Click here for Report on LoveLetter.N Variant * Click here for Report on LoveLetter.I Variant * Click here for Report on LoveLetter.H Variant * Click here for Report on LoveLetter.G Variant * Click here for Report on LoveLetter.D Variant * Click here for Report on LoveLetter.J Variant * Click here for Report on LoveLetter.BJ Variant Date: November 28, 2000 * Updated Released: November 24, 2000 Platform: MS Windows Warning About: Jean Mass Mailer Worm Aliases: Santa, I-Worm.Santa, Xmas Variants: Jean.A@mm Report From: F-Secure * Release Note: Jean is a mass mailer (worm) written in Visual Basic. Jean.A spreads to first 50 recipients written in MS Outlook address book. Jean.A was found in the wild in Germany on 24 of November 2000. * Click here for Report on Jean Mass Mailer Worm Date: November 27, 2000 Released: November 24, 2000 Platform: MicrosSoft Warning About: VBS/Jean@MM VBScript Worm Aliases: I-Worm.Santa, JEAN.A and VBS_JEAN.A Report From: Network Associates * Release Note: This VBScript worm that originated in Germany, affects users who have the Windows Scripting Host (part of Internet Explorer 5), and Microsoft Outlook installed. Ensure that the extensions .VBS, .HTM are included when scanning. Read the NAI report for method of infection and removal instructions. * Click here for Report on VBS/Jean@MM VBScript Worm Date: November 24, 2000 Released: November 23, 2000 Platform: MS Windows 98 /95 / NT 4.0 / NT 2000 Warning About: IE 5.5 Index.dat Vulnerability Report From: Security Focus * Release Note: IE 5.5 (and possibly other versions) stores recently visited URLs and cache folder names in a local file called index.dat. This file will register as local content in IE's security mechanism, but arbitrary code can be written to it by including scripting commands in a URL. * Click here for Advisory on IE 5.5 Index.dat Vulnerability Date: November 24, 2000 Released: November 23, 2000 Platform: MS Windows 98 / 95 / NT 4.0 / NT 2000 Warning About: MS Win Media Player 6.4/7 .ASX Buffer Overflow Report From: Security Focus * Release Note: Windows Media Player is an application used for digital audio, and video content viewing. An unsafe buffer copy involving remotely-obtained data exists in the Active Stream Redirector (ASX) component in Windows Media Player. * Click here for Advisory on MS Win Media Player Buffer Overflow Date: November 24, 2000 Released: November 23, 2000 Platform: MS IIS 5.0 / NT 2000 and Apache 1.3.9win32 Warning About: Caucho Technology Resin 1.2 JSP Source Disclosure Report From: Security Focus * Release Note: Resin is a servlet and JSP engine that supports java and javascript. ServletExec will return the source code of JSP files when an HTTP request is appended with certain characters. This vulnerability is dependent on the platform that Resin is running on. Successful exploitation could lead to the disclosure of sensitive information contained within JSP pages. * Click here for Advisory on Resin 1.2 JSP Source Disclosure Date: November 24, 2000 Released: November 23, 2000 Platform: MS Windows NT 4.0 / IBM AIX / Various Linux Versions Warning About: IBM HTTP Server Denial of Service Vulnerability Report From: Security Focus * Release Note: IBM HTTP Server is a web server powered by Apache. IBM HTTP Server is subject to a denial of service. Requesting an unusually long GET request comprised of approx 219 characters will cause the server to stop responding with an error message. * Click here for Advisory on IBM HTTP Server DoS Vulnerability Date: November 24, 2000 Released: November 23, 2000 Platform: MS Windows NT 4.0 / NT 2000 Warning About: McAfee WebShield SMTP Content Filter Bypass Report From: Security Focus * Release Note: McAfee WebShield SMTP is an email virus scanner designed for internet gateways. The Content Filtering mechanism in WebShield SMTP filters incoming and outgoing email based upon certain criteria set by the administrator. It is possible to bypass Content Filtering if the email transmitted contains Extended ASCII characters such as d, e or v. This vulnerability does not affect the effectiveness of viral detection in any manner. * Click here for Advisory on WebShield SMTP Bypass Date: November 23, 2000 Released: November 21, 2000 Platform: Sun Solaris 8.0, MS Windows98 /NT 4.0 / NT 2000, Linux kernel 2.3.x, IBM AIX 4.3.2, HP HP-UX 11.4 Warning About: Unify eWave ServletExec JSP Source Disclosure Vulnerability Report From: Security Focus * Release Note: Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. ServletExec will return the source code of JSP files when a HTTP request is appended with a specific character. Read the full report. * Click here for Advisory on Unify eWave ServletExec Date: November 23, 2000 Released: November 21, 2000 Platform: MS Windows NT 2000 Datacenter, MS Windows NT 2000 Warning About: Domain Account Lockout Bypass Vulnerability Report From: Security Focus * Release Note: Under certain circumstances, it is possible to bypass a domain account lockout policy on a local machine which would render this protective measure against brute force password attempts ineffective. * Click here for Advisory on Lockout Bypass Vulnerability Date: November 23, 2000 Platform: MS Windows Patch Available: .ASX Buffer Overrun and .WMS Script Execution Vulnerabilities Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates two security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities could potentially enable a malicious user to cause a program of his choice to run on another users computer. * Click here for MS Security Bulletin MS00-090 Date: November 23, 2000 Platform: MS Windows 2000 Patch Available: Domain Account Lockout Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows 2000. The vulnerability could allow a malicious user to use repeated attempts to guess an account password even if the domain administrator had set an account lockout policy. * Click here for MS Security Bulletin MS00-089 Date: November 23, 2000 * Updated from Nov 16th Released: November 22, 2000 Platform: MS Windows Warning About: Music VBInternet Worm Aliases: IWorm_Music, I-Worm.Music Report From: F-Secure * Release Note: Music is an Internet worm written in Visual Basic that spreads itself as an attachment to e-mail messages. On activation the worm displays a Christmas-related picture and plays a tune as a disguise. * Click here for Report on Music Internet Worm Date: November 23, 2000 * Updated from Nov 03rd Released: November 22, 2000 Platform: PC Warning About: Aureate 'Spying' Case Aliases: Aureate rumours Report From: F-Secure * Release Note: A message appeared to one Internet forum in March, 2000, which accused Aureate.com of spying computer users that have Aureate components installed. F-Secure and other companies have been unable to confirm these rumours to be true or false. The company behind Aureate, called Radiate, has denied all such allegations. The F-Secure report, has the original message that was forwarded to the forum by another person. * Click here for Report on Aureate 'Spying' Case Date: November 23, 2000 * Updated from Nov 18th Released: November 21, 2000 Platform: MicrosSoft Warning About: Cobra Word 97 Virus Variants: Cobra.A, Cobra.F and Cobra.Z Report From: F-Secure * Release Note: Cobra is a Word 97 virus that contains a destructive payload. The virus infects when a document is opened, closed or saved. When the current date is September 11 and a document is closed, the virus inserts a small code in another module - the class module ThisDocument. Read the report for the complete description. * Click here for Report on Cobra Virus Date: November 21, 2000 Platform: MicrosSoft Warning About: VBS/Req.A@MM VBScript Worm Aliases: I-WORM.REQ, VBS_REQ.A Report From: Network Associates * Release Note: This is an Internet worm coded in VBScript. It arrives via email. Due to its configuration, it is not likely for this one to be spread far, other than by complete accident or lack of reading by the end user. * Click here for Report on VBS/Req.A@MM Date: November 21, 2000 * Updated from Nov 17th Platform: MS Windows/Windows98/NT Warning About: BleBla Worm Aliases: IWorm_Blebla, I-Worm.Blebla, Verona Report From: F-Secure * Release Note: BleBla is a worm spreading via Internet. It was discovered in Poland on November 16th, 2000. The worm appears as an email message that has HTML formal and 2 attached files. * Click here for Report on BleBla Worm Date: November 21, 2000 Platform: MicrosSoft Warning About: Cobra Word 97 Virus Variants: Cobra.A, Cobra.F and Cobra.Z Report From: F-Secure * Release Note: Cobra is a Word 97 virus that contains a destructive payload. The virus infects when a document is opened, closed or saved. When the current date is September 11 and a document is closed, the virus inserts a small code in another module - the class module ThisDocument. Read the report for the complete description. * Click here for Report on Cobra Virus Date: November 20, 2000 Released: November 16, 2000 Platform: MS Windows 98/95/NT 4.0/NT 2000, PeleSoft NetSnap 1.2 Warning About: PeleSoft NetSnap Buffer Overflow Vulnerability Report From: Security Focus * Release Note: NetSnap is a webcam application which transmits images and enables a user to directly publish footage to the web. NetSnap is shipped with an http server. Due to an unchecked buffer in the handling of GET requests, NetSnap is subject to a buffer overflow attack. * Click here for Advisory on PeleSoft NetSnap Vulnerability Date: November 20, 2000 Released: November 16, 2000 Platform: MS Windows NT 2000, MS Exchange Server 2000 Warning About: MS Exchange Server EUSR_EXSTOREEVENT Account Report From: Security Focus * Release Note: Microsoft Exchange 2000 Server is a messaging and collaboration application designed specifically for Windows 2000. Successful exploitation would grant the user access to files that the EUSR_EXSTOREEVENT account had read, write, and execute permissions to. The malicious user may also install other programs or exploit other vulnerabilities in order to aid them in escalating their privilege level. * Click here for Advisory on MS Exchange Server 2000 Date: November 20, 2000 Released: November 14, 2000 Platform: Windows 98/95/NT 4.0/NT 2000, ITServ Incorporated RideWayPN 6.22 Warning About: Rideway PN Denial of Service Vulnerability Report From: Security Focus * Release Note: Rideway PN is a proxy server from ITServ Incorporated that allows information to be transferred securely across the Internet. If the Rideway PN proxy server is running with the telnet proxy enabled, a remote attacker could launch a denial of service attack against the proxy. * Click here for Advisory on Rideway PN Denial of Service Vulnerability Date: November 20, 2000 Released: November 14, 2000 Platform: MS Windows 98/95, Max Feoktistov Small HTTP Server 2.01 Warning About: Small HTTP Server Non-Existent File DoS Vulnerability Report From: Security Focus * Release Note: Small HTTP Server is a full service web server. This utility is less than 30Kb and requires minimal system resources. Small HTTP Server is subject to a denial of service. * Click here for Advisory on Small HTTP Server DoS Vulnerability Date: November 20, 2000 Released: November 14, 2000 Platform: MS Windows 98/95, Max Feoktistov Small HTTP Server 2.01 Warning About: Small HTTP Server Incomplete Request Denial of Service Vulnerability Report From: Security Focus * Release Note: Small HTTP Server is a full service web server. This utility is less than 30Kb and requires minimal system resources. By requesting multiple GET, HEAD or POST commands and closing the connection before the server has responded, the server will crash. A restart of the application is required in order to gain normal functionality. * Click here for Advisory on Max Feoktistov Small HTTP Server Date: November 17, 2000 Released: November 16, 2000 Platform: MS WindowsNT/2000 Warning About: AdClicker Trojan Report From: Network Associates * Release Note: This trojan affects WindowsNT/2000 systems. It is designed to connect to the author's website and click banner advertisements. When ran, the trojan copies itself to the Windows System directory and adds a key value to the registry to run at startup. * Click here for Report on AdClicker Trojan Date: November 17, 2000 Released: November 16, 2000 Platform: MS Win32 Warning About: W32/BleBla@MM Internet Worm Aliases: I-Worm.Blebla, W32/Verona Report From: Network Associates * Release Note: This is an Internet worm which implements an I-Frame exploit in HTML in order to run and propagate. This Internet worm was written in Delphi and compressed with UPX. This worm can arrive by email in HTML format. The HTML code instructs Windows to save the attachments and execute them from that location. * Click here for Report on W32/BleBla@MM Internet Worm Date: November 17, 2000 Platform: MS Exchange 2000 Server / Enterprise 2000 Server Patch Available: Exchange User Account Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Exchange 2000 Server and Exchange 2000 Enterprise Server. This vulnerability could potentially allow an unauthorized user to remotely login to an Exchange 2000 server and possibly other servers on the affected computers network. * Click here for MS Security Bulletin MS00-088 Date: November 17, 2000 Platform: MS Windows/Windows98/NT Warning About: BleBla Worm Aliases: IWorm_Blebla, I-Worm.Blebla, Verona Report From: F-Secure * Release Note: BleBla is a worm spreading via Internet. It was discovered in Poland on November 16th, 2000. The worm appears as an email message that has HTML formal and 2 attached files. * Click here for Report on BleBla Worm Date: November 17, 2000 Released: November 16, 2000 Platform: MS Windows Warning About: Music VBInternet Worm Aliases: IWorm_Music, I-Worm.Music Report From: F-Secure * Release Note: Music is an Internet worm written in Visual Basic that spreads itself as an attachment to e-mail messages. On activation the worm displays a Christmas-related picture and plays a tune as a disguise. * Click here for Report on Music Internet Worm Date: November 17, 2000 * Updated from Nov 13th Platform: MS Win32 Systems Warning About: Hybris Internet Worm Aliases: IWorm_Hybris, I-Worm.Hybris Report From: F-Secure and Kaspersky Lab * Release Note: Hybris is an Internet worm that spreads itself as an attachment to email messages. The worm works under Win32 systems only. The worm contains components (plugins) in its code that are executed depending on what the worm needs, and these components can be upgraded from an Internet Web site. The major worm versions are encrypted with semi-polymorphic encryption loop. * Click here for F-Secure Report on Hybris Internet Worm * Click here for KLabs Report on Hybris Internet Worm Date: November 17, 2000 * Updated from Nov 13th Platform: MS Windows Warning About: Navidad Internet worm Aliases: I-Worm.Navidad, W32/Watchit.intd, I-Worm_Navidad, W32/Navidad Report From: F-Secure * Release Note: Navidad is an Internet worm. It spreads itself as NAVIDAD.EXE attachment to e-mail messages sent from an infected computer. The original worm sample that F-Secure received has a bug that makes an infected system inoperable after infection, no EXE files could be started. * Click here for Report on Navidad Internet worm Date: November 14, 2000 Released: November 1, 2000 Platform: PC Warning About: X97M/Jini Excel 97 Macro Virus Variant: Jini.A, Jini.A1 Aliases: Jini.corrupted Report From: F-Secure * Release Note: This is a Excel macro virus that infects by copying the contents of workbook. The virus relies in a protected module, and replicates. When an infected workbook is opened, the virus creates an infected workbook "shn.xls" to the Excel startup directory. The virus does not infect if the name of the workbook start with "Book". The payload activates when the system has been infected for thirty days. At this time the virus chages the names of items in the "File" menu. * Click here for Report on X97M/Jini Date: November 14, 2000 Released: November 1, 2000 Platform: MS Win32 Systems Warning About: Hybris Internet Worm Aliases: IWorm_Hybris, I-Worm.Hybris Report From: F-Secure and Kaspersky Lab * Release Note: Hybris is an Internet worm that spreads itself as an attachment to email messages. The worm works under Win32 systems only. The worm contains components (plugins) in its code that are executed depending on what the worm needs, and these components can be upgraded from an Internet Web site. The major worm versions are encrypted with semi-polymorphic encryption loop. * Click here for F-Secure Report on Hybris Internet Worm * Click here for KLabs Report on Hybris Internet Worm Date: November 14, 2000 * Updated from Nov 8th Released: November 13, 2000 Platform: MS Windows Warning About: Navidad Internet worm Aliases: I-Worm.Navidad, W32/Watchit.intd, I-Worm_Navidad, W32/Navidad Report From: F-Secure * Release Note: Navidad is an Internet worm. It spreads itself as NAVIDAD.EXE attachment to e-mail messages sent from an infected computer. The original worm sample that F-Secure received has a bug that makes an infected system inoperable after infection, no EXE files could be started. * Click here for Report on Navidad Internet worm Date: November 14, 2000 Released: November 10, 2000 Platform: Windows 2000 Warning About: MS Indexing Services File Verification Vulnerability Report From: Security Focus * Click here for Advisory on MS Indexing Services Vulnerability Date: November 14, 2000 Released: November 10, 2000 Platform: MS Operating System Warning About: CA InoculateIT MSExchange Agent Vulnerability Report From: Security Focus * Click here for Advisory on MSExchange Agent Vulnerability Date: November 10, 2000 Released: November 08, 2000 Platform: MS Windows NT 4.0 Terminal Server Patch Available: Terminal Server Login Buffer Overflow Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft. Windows NT 4.0 Terminal Server. The vulnerability could allow a malicious user to cause the Terminal Server to fail or, in certain instances, to execute hostile code on the server. * Click here for MS Security Bulletin MS00-087 Date: November 10, 2000 Released: November 08, 2000 Platform: Windows NT 4.0 Terminal Server Warning About: RegAPI.DLL Buffer Overflow Report From: Security Focus * Click here for Advisory on RegAPI.DLL Buffer Overflow Date: November 10, 2000 Released: November 08, 2000 Platform: Lotus Notes Users Warning About: Lotus Notes R5 S/MIME Vulnerability Report From: Security Focus * Click here for Advisory on Lotus Notes Date: November 08, 2000 Released: November 06, 2000 Platform: MS Internet Information Services 5.0 Patch Available: Web Server File Request Parsing Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a serious security vulnerability in Microsoft Internet Information Services 5.0. The vulnerability could enable a malicious user to run operating system commands on an affected web server. Microsoft strongly urges all customers using IIS 5.0 to apply the patch immediately. IIS 4.0 is not affected by the vulnerability. * Click here for MS Security Bulletin MS00-086 Date: November 08, 2000 Released: November 07, 2000 Platform: MS Windows Warning About: Navidad Internet worm Aliases: I-Worm.Navidad, W32/Watchit.intd, I-Worm_Navidad, W32/Navidad Report From: F-Secure * Release Note: Navidad is an Internet worm. It spreads itself as NAVIDAD.EXE attachment to e-mail messages sent from an infected computer. The original worm sample that F-Secure received has a bug that makes an infected system inoperable after infection, no EXE files could be started. * Click here for Report on Navidad Internet worm Date: November 08, 2000 Released: November 03, 2000 Platform: PC with F-Secure Anti-Virus Program Warning About: Heuristic Report From: F-Secure * Release Note: F-Secure Anti-Virus analyzes scanned files and gives warnings if it finds suspicious code inside. When a file is suspected having a "Type_XXX" virus it means that heuristic scanner found a virus- or a trojan-like code in the analyzed file. In some cases the heuristic engine can give false alarms. * Click here for Report on Heuristic Date: November 08, 2000 Released: November 07, 2000 Platform: MS Windows Warning About: QDel121 Trojan Report From: Network Associates * Release Note: When ran, this trojan deletes the current wallpaper .BMP file. It then creates a registry key value to instruct Windows to launch the program at Startup. Read the NAI report on the method of infection and removal instructions. * Click here for Report on QDel121 Trojan Date: November 08, 2000 Released: November 06, 2000 Platform: PC Warning About: QZap160 Trojan Report From: Network Associates * Release Note: When ran, this trojan displays a blank screen. The program proceeds in attempting to overwrite the floppy diskette in drive A:, such that the diskette and data are no longer accessible. Read the NAI report on the method of infection and removal instructions. * Click here for Report on QZap160 Trojan Date: November 08, 2000 Released: November 03, 2000 Platform: MS Windows Warning About: W32/Navidad Internet Worm Report From: Network Associates * Release Note: The samples of W32/Navidad obtained by AVERT are not fully funtionally. When ran, this intended worm displays a dialog box entitled, "Error" which reads "UI". A blue eye icon appears in the system tray, next to the clock in the lower right corner of the screen, and a copy of the trojan is saved to a file in the Windows System directory. Registry key values are created. * Click here for Report on W32/Navidad Internet Worm Date: November 08, 2000 Released: November 01, 2000 Platform: MS Windows with VBScript enabled Warning About: VBS/Scary.A@mm VBScript worm Report From: Network Associates and F-Secure * Release Note: This is a virus written in VBScript. It contains code to distribute itself via MAPI email. If this script is loaded, it may display suggestive instructions in order to trick the user into running the code * Click here for NAI Report on VBS/Scary.A@mm VBScript worm * Click here for F-Secure Report on VBS/Scary Date: November 04, 2000 Released: November 02, 2000 Platform: MS Windows 2000 Patch Available: ActiveX Parameter Validation Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows 2000. The vulnerability could allow enable a malicious user to potentially run code on another users machine. * Click here for MS Security Bulletin MS00-085 Date: November 04, 2000 Released: November 02, 2000 Platform: MS Windows 2000 Patch Available: Indexing Services Cross Site Scripting Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Indexing Services for Windows 2000. This vulnerability could allow a malicious web site operator to misuse another web site as a means of attacking users. * Click here for MS Security Bulletin MS00-084 Date: November 04, 2000 Released: November 01, 2000 Platform: MS Windows NT and Windows 2000 Patch Available: Netmon Protocol Parsing Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows NT and Windows 2000 server products and Systems Management Server. The vulnerability could allow a malicious user to gain control of an affected server. * Click here for MS Security Bulletin MS00-083 Date: November 04, 2000 Released: November 03, 2000 Platform: PC Warning About: Aureate 'Spying' Case Aliases: Aureate rumours Report From: F-Secure * Release Note: A message appeared to one Internet forum in March, 2000, which accused Aureate.com of spying computer users that have Aureate components installed. F-Secure and other companies have been unable to confirm these rumours to be true or false. The company behind Aureate, called Radiate, has denied all such allegations. The F-Secure report, has the original message that was forwarded to the forum by another person. * Click here for Report on Aureate 'Spying' Case Date: November 04, 2000 Released: November 01, 2000 Platform: Win32 machines Warning About: Sonic Worm Aliases: I_Worm_Sonic, I-Worm.Sonic, Sonic.b Report From: F-Secure * Release Note: This is multi-component Internet worm infecting Win32 machines and spreading itself in email messages as attached EXE file. The worm has several components and is able to 'upgrade' itself from an Internet Web site. The Main worm component also has backdoor abilities. It can provide a limited access to an infected computer for a remote hacker. * Click here for Report on Sonic Worm Date: November 04, 2000 Released: October 31, 2000 Platform: PE executable (Win32 application) Warning About: Bymer Worm Aliases: Worm_Bymer_a, Worm.Bymer, Worm.RC5 Report From: F-Secure * Release Note: During autumn 2000 there appeared 2 worms that drop RC5 clients on computers they infect. At F-Secure, you can find descriptions of both of these worms. This worm infects Win9x machines with open file shares. * Click here for Report on Bymer Worm Top of Page Macintosh No virus warnings or alerts Top of Page Linux Date: November 29, 2000 Released: November 26, 2000 Platform: Linux Versions RedHat, MandrakeSoft, Debian, Debian, ebian Warning About: Secure Locate Heap Corruption Vulnerability Report From: Security Focus * Release Note: Secure Locate maintains an index of the entire filesystem, including files only visible by root. The slocate binary is setgid "slocate" so it can read this index. Slocate contains a heap-corruption vulnerability that may compromise disclosure of these files if exploited. * Click here for Advisory on Secure Locate Heap Vulnerability Date: November 29, 2000 Released: November 28, 2000 Platform: MandrakeSoft Updates To: bash1 Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to bash1 fixing the symlink vulnerability there. * Click here for LWN Security Update To bash1 Date: November 29, 2000 Released: November 28, 2000 Platform: Debian Updates To: ed Editor Report From: Linux Daily News * Release Note: The Debian project has issued a security update to the ed editor fixing a symlink vulnerability. This advisory also apparently initiates a new scheme of advisory numbers for Debian - it's advisory 001-1. * Click here for LWN Security Update To ed Editor Date: November 28, 2000 Released: November 27, 2000 Platform: Caldera Systems Updates To: bash Report From: Linux Daily News * Release Note: Caldera Systems has put out this update to bash fixing the symlink vulnerability in that package. * Click here for LWN Security Update To bash Date: November 28, 2000 Released: November 27, 2000 Platform: MandrakeSoft Updates To: Pine Advisory Report From: Linux Daily News * Release Note: MandrakeSoft has updated its pine advisory to reflect a second vulnerability. * Click here for LWN Security Update To Pine Advisory Date: November 28, 2000 Released: November 27, 2000 Platform: Red Hat Updates To: bash Package Report From: Linux Daily News * Release Note: Red Hat has an updated bash package available. * Click here for LWN Security Update To bash Package Date: November 28, 2000 Released: November 27, 2000 Platform: RedHat Updates To: Red Hat 7 for Alpha distribution Report From: Linux Daily News * Release Note: If you are using the newly-announced Red Hat 7 for Alpha distribution, you should be aware that many (!) updates have been reissued for that platform; we'll not reproduce them here. * Release Note: Virus Help Team Canada suggests visiting the Security Focus Site * Click here for Security Focus LINUX: RedHat Advisories Date: November 27, 2000 Released: November 26, 2000 Platform: Conectiva Updates To: tcsh, ethereal, ghostscript, netscape and OpenSSH Report From: Linux Daily News * Release Note: Conectiva has issued updates to tcsh (symlink vulnerability), ethereal (remotely-exploitable buffer overflow), ghostscript (symlink and dynamic library vulnerabilities), netscape (HTML parsing buffer overflow), and OpenSSH (port forwarding vulnerability). * Click here for LWN Security Update To tcsh * Click here for LWN Security Update To ethereal * Click here for LWN Security Update To ghostscript * Click here for LWN Security Update To netscape * Click here for LWN Security Update To OpenSSH Date: November 27, 2000 Released: November 26, 2000 Platform: Debian Updates To: ghostscript and mc Report From: Linux Daily News * Release Note: Debian has updates to ghostscript and mc (file overwrite vulnerability). * Click here for LWN Security Update To ghostscript * Click here for LWN Security Update To mc Date: November 27, 2000 Released: November 26, 2000 Platform: MandrakeSoft Updates To: ghostscript and modutils Report From: Linux Daily News * Release Note: MandrakeSoft's updates include ghostscript, and modutils (the updated version of this fix). * Click here for LWN Security Update To ghostscript * Click here for LWN Security Update To modutils Date: November 27, 2000 Released: November 26, 2000 Platform: Red Hat Updates To: ncurses and modutils Report From: Linux Daily News * Release Note: Red Hat has issued updates to ncurses (buffer overrun problem) and modutils. * Click here for LWN Security Update To ncurses * Click here for LWN Security Update To modutils Date: November 27, 2000 Released: November 26, 2000 Platform: SuSE Updates To: OpenSSH Report From: Linux Daily News * Release Note: SuSE has an OpenSSH Update Available. * Click here for LWN Security Update To OpenSSH Date: November 24, 2000 Released: November 23, 2000 Platform: GNU Linux modutils 2.3.9/2.3.11 / Wirex Immunix OS / S.u.S.E. Linux / RedHat Linux / MandrakeSoft / Connectiva Linux Warning About: Linux modprobe Buffer Overflow Vulnerability Report From: Security Focus * Release Note: Modutils is a component of many linux systems that includes tools for using loadable kernel modules. One of these tools, modprobe, loads a set of modules that correspond to a provided "name" (passed at the command line) automatically. Though fixes for a recent (as of 11/23/2000) high-profile vulnerability in modprobe have been made available by most vulnerable Linux vendors, it has been reported that there exists another method for an attacker to gain root privileges exploiting modprobe. If the version of linux you are using has not made a patch available for this vulnerability, a temporary workaround is to disable modprobe or remove the setuid bit from ping. Read the report for links to the RedHat and Debian fixes for this vulnerability. * Click here for Advisory on modprobe Overflow Vulnerability Date: November 24, 2000 Released: November 23, 2000 Platform: MS Windows NT 4.0 / IBM AIX / Various Linux Versions Warning About: IBM HTTP Server Denial of Service Vulnerability Report From: Security Focus * Release Note: IBM HTTP Server is a web server powered by Apache. IBM HTTP Server is subject to a denial of service. Requesting an unusually long GET request comprised of approx 219 characters will cause the server to stop responding with an error message. * Click here for Advisory on IBM HTTP Server DoS Vulnerability Date: November 23, 2000 Released: November 21, 2000 Platform: Sun Solaris 8.0, MS Windows98 /NT 4.0 / NT 2000, Linux kernel 2.3.x, IBM AIX 4.3.2, HP HP-UX 11.4 Warning About: Unify eWave ServletExec JSP Source Disclosure Vulnerability Report From: Security Focus * Release Note: Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. ServletExec will return the source code of JSP files when a HTTP request is appended with a specific character. Read the full report. * Click here for Advisory on Unify eWave ServletExec Date: November 23, 2000 Platform: Red Hat Warning About: Security Update To ghostscript Report From: Linux Daily News * Release Note: This update from Red Hat covers a problem in ghostscript where mktemp is used instead of mkstemp and an improper use of LD_RUN_PATH can cause local vulnerabilities. * Click here for LWN Security Update To ghostscript Date: November 23, 2000 Platform: Debian Warning About: Security Update To elvis-tiny, modutils, khoules Report From: Linux Daily News * Release Note: More security updates from Debian: An update for a /tmp file vulnerability in elvis-tiny, uncovered during an audit of that package. The modutils update that everyone will eventually have to deal with. An update for a buffer overflow problem in koules, * Click here for LWN Security Update To elvis-tiny * Click here for LWN Security Update To modutils * Click here for LWN Security Update To khoules Date: November 23, 2000 Platform: Conectiva Warning About: Modutils Vulnerabilities Report From: Linux Daily News * Release Note: Conectiva has provided an update for the recently reported modutils vulnerabilities. * Click here for LWN Modutils Vulnerabilities Date: November 23, 2000 Platform: Linux Kernel Update: Linux 2.2.18pre23 Kernel Report From: Linux Daily News * Release Note: Alan Cox sent notice today of the release of stable 2.2.18 kernel prepatch 23. * Click here for LWN Report on Stable 2.2.18 kernel Date: November 23, 2000 Platform: Debian Warning About: Security Update To xmcd and ncurses Report From: Linux Daily News * Release Note: Debian released two security updates today, one for xmcd and one for ncurses. The version of xmcd shipped with Debian 2.2 (alias potato) included two CDDB helper applications that were installed setuid. A buffer overflow in the ncurses library, which is linked to the "cda" application, opened a vulnerability. These two updates address this issue. * Click here for LWN Security Update To xmcd * Click here for LWN Security Update To ncurses Date: November 23, 2000 Released: November 20, 2000 Platform: Some Linux and BSD variants Warning About: Increased Probes To TCP port 515 Report From: SANS * Release Note: Since November 1 we have been receiving reports to GIAC regarding probes to port 515. The Unix LPR service runs on this port. We did some searching and we found that on October 4, 2000 there were advisories released regarding vulnerabilities for the LPR service, for many distributions of Linux and for the BSD variants. We believe that the increase in probes to port 515 is for attackers looking for this vulnerability. * Click here for SANS link on Increased Probes Date: November 21, 2000 Released: November 20, 2000 Platform: RedHat Linux 7.0 and FreeBSD Warning About: thttpd Remote File Access Vulnerability Report From: Security Focus * Release Note: thttpd is a lightweight httpd package by Acme Labs. A problem exists that can allow remote access to restricted files on a system running thttpd. * Click here for Advisory on Acme thttpd 2.1x Vulnerability Date: November 21, 2000 Released: November 20, 2000 Platform: Slackware, RedHat, FreeBSD and Debian Linux Warning About: Koules SVGALIB Vulnerability Report From: Security Focus * Release Note: Jan Hubicka Koules 1.4 on Slackware Linux 7.1, RedHat Linux 7.0, FreeBSD and Debian Linux Koules is an original, arcade- style game authored by Jan Hubicka. A problem exists which can allow a user to gain higher priviledges. Koules is an SUID installed package on that runs on the Unix/Linux Operating System. * Click here for Advisory on Koules SVGALIB Vulnerability Date: November 21, 2000 Released: November 17, 2000 Platform: Some Debian Linux Warning About: Vixie Cron File Vulnerability Report From: Security Focus * Release Note: Vixie cron is a scheduling daemon written by Paul Vixie, and distributed with many free UNIX Operating Systems. A problem exists that could allow a user to execute commands with priviledge of another user. * Click here for Advisory on Paul Vixie Vixie Cron 3.0pl1 Date: November 22, 2000 Platform: Linux-Mandrake Warning About: Security Update To Pine and joe Editor Report From: Linux Daily News * Release Note: MandrakeSoft has issued a couple of new security updates. The update to pine fixes a buffer overflow problem in its mail header handling. And this update to the joe editor fixes a symlink vulnerability in its crash handling. * Click here for LWN Security Update To Pine * Click here for LWN Security Update To joe Editor Date: November 22, 2000 Platform: Debian Warning About: Security Updates To Modutils and tcpdump Report From: Linux Daily News * Release Note: The Debian Project has issued a security update to modutils fixing the local root exploit there. Also out is this update to tcpdump fixing some buffer overflow problems. * Click here for LWN Security Update To Modutils * Click here for LWN Security Update To tcpdump Date: November 20, 2000 Released: November 18, 2000 Platform: Linux kernel 2.0 Warning About: WatchGuard Firebox II DoS Vulnerability Report From: Security Focus * Release Note: The Watchguard Firebox II is a popular hardware based firewall. A vulnerability exists in the Firebox II that could allow a remote attacker to launch a Denial of Service attack against the FTP proxy of the firewall. * Click here for Advisory on WatchGuard Firebox II Date: November 20, 2000 Released: November 16, 2000 Platform: Slackware Linux 7.1, RedHat Linux 7.0 Warning About: Joseph Allen joe 2.8 Report From: Security Focus * Release Note: joe is a text editor by Joseph Allen, which features familar functions to users of both Microsoft text editors and vi users. A problem occurs with the editor when a session abnormally exits. * Click here for Advisory on joe Text Editor Vulnerability Date: November 20, 2000 Platform: Debian Warning About: Security Update To CUPS Printing System Report From: Linux Daily News * Release Note: The Debian Project has issued a security update to the CUPS printing system fixing the "anybody on the net can use your printer" problem. * Click here for LWN Security Update To CUPS Printing Date: November 20, 2000 Reported: November 18, 2000 Platform: Red Hat Warning About: Security Update To Netscape Report From: Linux Daily News * Release Note: Red Hat has issued a security update to netscape. It appears there is a buffer overflow problem in its HTML parser. * Click here for LWN Security Update To Netscape Date: November 20, 2000 Reported: November 18, 2000 Platform: Debian Warning About: Security Updates For OpenSSH and cron Report From: Linux Daily News * Release Note: The Debian Project has issued a security update to OpenSSH fixing the hostile server vulnerability in that package. Also from Debian is this update to cron fixing a number of local vulnerabilities. * Click here for LWN Security Updates on OpenSSH * Click here for LWN Security Updates on cron Date: November 17, 2000 Reported: November 16, 2000 Platform: Linux-Mandrake Warning About: Modutils and CUPS Report From: Linux Daily News * Release Note: Linux-Mandrake issued a pair of security advisories today, one for modutils and one for CUPS, the Internet printer daemon. The modutils issue was discussed previously here. The CUPS problem allows users on the Internet access to local printers. * Click here for LWN Security Advisory on Modutils * Click here for LWN Security Advisory on CUPS Date: November 17, 2000 Reported: November 16, 2000 Platform: Red Hat Warning About: Security Update to Modutils Report From: Linux Daily News * Release Note: Here is Red Hat's security update to modutils fixing the local root compromise problem in that package. * Click here for LWN Security Update to Modutils Date: November 17, 2000 Reported: November 16, 2000 Platform: SuSE Warning About: SuSE Updates to Bind Report From: Linux Daily News * Release Note: SuSE has put out an update advisory for bind in versions 6.0 through 6.4 of their Linux distribution. * Click here for LWN SuSE Updates to Bind Date: November 17, 2000 Reported: November 16, 2000 Platform: Linux Warning About: Modutils 2.3.20 (security fix) Released Report From: Linux Daily News * Release Note: Modutils 2.3.20 has been released. This version fixes the various local root compromise vulnerabilities found in all recent versions of modutils, an upgrade is recommended - even if you just upgraded to 2.3.19, which only fixed some of the problems. Expect the distributors to come out with packaged versions shortly. (See this week's LWN kernel page for a detailed description of the modutils problem). * Click here for LWN Modutils 2.3.20 Release Date: November 14, 2000 Reported: November 13, 2000 Platform: SuSE Warning About: Security Update to Modules Package Report From: Linux Daily News * Release Note: SuSE has issued a security update to its modules package fixing the local root vulnerability in modutils. * Click here for LWN SuSE Security Update to Modules Date: November 14, 2000 Reported: November 13, 2000 Platform: Systems running kmod and modutils greater than 2.1.121 Warning About: Security Problem in Modutils Report From: Linux Daily News * Release Note: Modutils maintainer Keith Owens has reported a security problem in modutils which makes it possible for a local user to obtain root privileges. It affects all systems running kmod and modutils greater than 2.1.121 - i.e. almost all distributions as they come out of the box. Expect updates from the distributors shortly. Keith's message also contains a patch for those who do not want to wait. (Thanks to Peter Samuelson). * Click here for LWN Update on Local root exploit problem in modutils Date: November 14, 2000 Reported: November 12, 2000 Platform: Linux-Mandrake Warning About: Security Update To nss_ldap Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to nss_ldap fixing a denial of service problem. * Click here for LWN Security Update To nss_ldap Date: November 14, 2000 Reported: November 12, 2000 Platform: Debian Warning About: Security Updates To tcsh and gnupg Report From: Linux Daily News * Release Note: It turns out that tcsh has a symlink vulnerability which can be exploited in some circumstances; the Debian Project has issued this security update fixing the problem. Also from Debian is this update to gnupg fixing a bug in the signature checking code. * Click here for LWN Security Updates To tcsh * Click here for LWN Security Updates To gnupg Date: November 14, 2000 Reported: November 12, 2000 Platform: Various Warning About: More Security Updates to BIND Report From: Linux Daily News * Release Note: More security updates to bind have come in which fix the remote denial of service problem. They include: * Click here for LWN Updates to BIND from Debian * Click here for LWN Updates to BIND from Linux-Mandrake * Click here for LWN Updates to BIND from Red Hat * Click here for LWN Updates to BIND from Slackware Date: November 14, 2000 Reported: November 10, 2000 Platform: Slackware Warning About: Security Update For Pine and Imap Report From: Linux Daily News * Release Note: Slackware has issued a security update for possible Denial of Service exploits in the pine and imap mail package. * Click here for LWN Security Update For Pine and Imap Date: November 14, 2000 Reported: November 10, 2000 Platform: Various Warning About: BIND Updates Report From: Linux Daily News * Release Note: Conectiva and Definite Linux have released updates to BIND in response to recent security issues in that daemon. * Click here for LWN Updates to BIND from Conectiva * Click here for LWN Updates to BIND from Definite Linux Date: November 14, 2000 Reported: November 10, 2000 Platform: Red Hat Warning About: Security Updates For pine, imap Update For Exposed Bug in Fetchmail Report From: Linux Daily News * Release Note: Red Hat has issued a security update for possible Denial of Service exploits in pine and imap mail services. Update: The updated IMAP server released in this notice exposed a bug in fetchmail. An update has been issued for this problem as well. * Click here for LWN Security Updates For pine, imap * Click here for LWN Update For Exposed Bug in Fetchmail Date: November 14, 2000 Released: November 12, 2000 Platform: Linux Warning About: modprobe Arbitrary Command Execution Vulnerability Report From: Security Focus * Click here for Advisory on modprobe Vulnerability Date: November 10, 2000 Reported: November 09, 2000 Platform: Slackware Warning About: security update to pine Report From: Linux Daily News * Release Note: Slackware has issued a security update to pine dealing with the buffer overflow problems in that package. * Click here for LWN Updates for security update to pine Date: November 10, 2000 Reported: November 09, 2000 Platform: Red Hat Warning About: security update to usermode Report From: Linux Daily News * Release Note: Red Hat has issued a security update to usermode which fixes a couple of new problems not addressed in the previous (October 5) update. * Click here for LWN Updates for security update to usermode Date: November 05, 2000 Reported: November 04, 2000 Platform: Linux-Mandrake Warning About: dump exploits Report From: Linux Daily News * Release Note: Linux-Mandrake has posted their update for the dump exploits recently covered in BugTraq. * Click here for LWN Updates for dump exploits Date: November 05, 2000 Reported: November 04, 2000 Platform: Red Hat Warning About: gnorpm and dump Report From: Linux Daily News * Release Note: A couple of Red Hat updates of note have come in: gnorpm - a re-release of the previous errata caused by a missing patch. dump - 7.0 version is being released to 6.x and 5.x users to remove root setuid bits to prevent a known dump exploit. * Click here for LWN Updates for gnorpm * Click here for LWN Updates for dump Top of Page Miscellaneous Date: November 30, 2000 Released: November 29, 2000 Platform: Networks Running SonicWALL SOHO 5.0.0 / 4.0.0 Warning About: SonicWALL SOHO Denial of Service Vulnerability Report From: Security Focus * Release Note: SonicWALL SOHO provides a secure internet connection for a network. SonicWALL SOHO is subject to a denial of service. * Click here for Advisory on SonicWALL SOHO Vulnerability Date: November 30, 2000 Released: November 28, 2000 Platform: Telco's Running Cisco DSL Router 675.0 Warning About: Cisco 675 Web AdminDenial of Service Vulnerability Report From: Security Focus * Release Note: The Cisco 675 DSL Router is a popular DSL router in wide use and distributed to major telco's for their SOHO clients. A vulnerability exists in the Cisco 675 DSL Router that could allow a remote attacker to initiate a Denial of Service attack against the router requiring it to be power cycled in order to resume normal operation. * Click here for Advisory on Cisco DSL Router 675.0 Date: November 29, 2000 Released: November 27, 2000 Platform: BSDI BSD / OS 4.0.1 / 4.0/ 3.1 / 3.0 Warning About: rcvtty Arbitrary Command Execution Vulnerability Report From: Security Focus * Release Note: rcvtty is a component of the unix NH mail system. The version of rcvtty for BSD/OS systems is known to contain a vulnerability that may allow local users to elevate their privileges. * Click here for Advisory on rcvtty Execution Vulnerability Date: November 28, 2000 Released: November 27, 2000 Platform: Systems Running Christopher Heschong Twig 2.5.1 Warning About: Twig Remote Arbitrary Script Execution Vulnerability Report From: Security Focus * Release Note: Twig is a popular web-based email system written in PHP3. Version 2.5.1 and possibly earlier versions of Twig contain a vulnerability that may allow a remote attacker to gain local access to the webserver on which it is installed with httpd privileges. One of Twig's component scripts, index.php3, uses a variable called vhosts[], containing entries for each virtual host on the webserver. It is referenced in index.php3 when loading "include" PHP3 scripts, which will be interpreted and executed when loaded. * Click here for Advisory on Twig Vulnerability Date: November 28, 2000 * Updated Platform: UNIX Warning About: Unix.LoveLetter VBScript Worm Report From: F-Secure * Release Note: Unix.LoveLetter is the VBS/LoveLetter.A virus that is ported to a generic unix shell script and contains the functionality of the original Windows e-mail worm. Unix.LoveLetter is not widespread at all. Information about the original VBS/LoveLetter.A is available at: http://www.F-Secure.com/v-descs/love.htm * Click here for Report on Unix.LoveLetter VBScript Worm Date: November 27, 2000 Released: November 24, 2000 Platform: Java Virtual Machine (VM) Warning About: Lotus Notes Client R5 Vulnerability Report From: Security Focus * Release Note: Lotus Notes Client R5 is a messaging and collaboration tool that contains a built in web browser. The web browser implements a Java Virtual Machine (VM) designed specifically for Lotus Notes. A security vulnerability exists in the Execution Control List (ECL) feature within the Java VM that may allow a third party intruder to verify the existence of files on the system. * Click here for Advisory on Lotus Notes Client R5 Vulnerability Date: November 24, 2000 Released: November 23, 2000 Platform: UNIX Balabit syslog-ng 1.4.7/1.4.6 and prior Warning About: Balabit syslog-ng Incomplete Priority String Remote DoS Report From: Security Focus * Release Note: syslog-ng is a replacement for syslogd on Unix systems. Due to a fault in the log message parsing function, it can be remotely terminated via a SIGSEGV by causing a certain string to be included in a log message. * Click here for Advisory on syslog-ng Incomplete Priority String Date: November 24, 2000 Released: November 23, 2000 Platform: Phorum Phorum 3.1.x to 3.2.7 Warning About: Phorum PHP Source Disclosure Vulnerability Report From: Security Focus * Release Note: Phorum is a PHP based web forums package. Due to an error in the implementation of forum selection in administrative scripts, any user can view the source of any PHP script on the target host. * Click here for Advisory on PHP Vulnerability Date: November 23, 2000 Released: November 21, 2000 Platform: Sun Solaris 8.0, MS Windows98 /NT 4.0 / NT 2000, Linux kernel 2.3.x, IBM AIX 4.3.2, HP HP-UX 11.4 Warning About: Unify eWave ServletExec JSP Source Disclosure Vulnerability Report From: Security Focus * Release Note: Unify eWave ServletExec is a Java/Java Servlet engine plug-in for major web servers such as Microsoft IIS, Apache, Netscape Enterprise Server, etc. ServletExec will return the source code of JSP files when a HTTP request is appended with a specific character. Read the full report. * Click here for Advisory on Unify eWave ServletExec Date: November 20, 2000 Released: November 16, 2000 Platform: Netopia 650-ST ISDN Router Warning About: Netopia 650-ST ISDN Router 3.3.2 firmware Report From: Security Focus * Release Note: A vulnerability exists in the Netopia 650-ST ISDN router, firmware version 3.3.2. A user connected to the unit's telnet interface can cause the device's system logs to be displayed with a simple keystroke entered by the user at the login screen. * Click here for Advisory on Netopia 650-ST ISDN Router Date: November 20, 2000 Released: November 14, 2000 Platform: DC Scripts DCForum 6.0 Warning About: cgforum.cgi Arbitrary File Disclosure Vulnerability Report From: Security Focus * Release Note: DCForum is a commercial cgi script from DCScripts which is designed to facilitate web-based threaded discussion forums. The script improperly validates user-supplied input, which allows the remote viewing of arbitrary files on the host which are readable by user 'nobody' or the webserver. Additionally, it has been reported that the dcforum.cgi script can be made to delete itself if the attacker attempts to read its source code using this method, effectively permitting a denial-of-service attack. * Click here for Advisory on cgforum.cgi Vulnerability Date: November 14, 2000 Reported: November 13, 2000 Platform: Internet Software Consortium (ISC) BIND v8.2 - 8.2.2-P6 Name Servers derived from BIND v8.2 - 8.2.2-P6 Warning About: Mulitple Denial-of-Service Problems in ISC BIND Report From: CERT * Release Note: The Internet Software Consortium, the maintainer of BIND, the software used to provide domain name resolution services, has recently posted information about several denial-of-service vulnerabilities. If exploited, any of these vulnerabilities could allow remote intruders to cause site DNS services to be stopped. For more information about these vulnerabilities and others, please read the CERT advisory. * Click here for CERT CA-2000-20 Date: November 14, 2000 Released: November 10, 2000 Platform: Foundry Firmware Warning About: Telnet Login Denial of Service Vulnerability Report From: Security Focus * Click here for Advisory on Telnet Login DoS Vulnerability Date: November 14, 2000 Released: November 10, 2000 Platform: McMurtrey/Whitaker & Associates Cart32 Warning About: Path Disclosure Vulnerability Report From: Security Focus * Click here for Advisory on Cart32 Path Disclosure Vulnerability Date: November 14, 2000 Released: November 10, 2000 Platform: McMurtrey/Whitaker & Associates Cart32 Warning About: DoS Vulnerability Report From: Security Focus * Click here for Advisory on Cart32 DoS Vulnerability Date: November 10, 2000 Reported: November 08, 2000 Platform: HP's HP-UX Operating System Warning About: Local Arbitrary File Read Vulnerability Report From: Security Focus * Release Note: The registrar service that ships with version 10.20 (possibly others) of HP's HP-UX operating system contains a vulnerability that may allow a local user to read any file on the hosts filesystem. * Click here for Advisory on File Read Vulnerability Date: November 10, 2000 Reported: November 08, 2000 Platform: StarOffice with Some Versions of Sun Solaris / S.u.S.E. Linux / and RedHat Linux Warning About: StarOffice Vulnerability Report From: Security Focus * Release Note: Vulnerability in StarOffice /tmp Directory Symbolic Link * Click here for Security Focus Advisory on StarOffice Date: November 10, 2000 Reported: November 08, 2000 Platform: ISC BIND 8.2.2-P5 Warning About: Denial of Service Vulnerability Report From: Security Focus * Click here for Security Focus Advisory on DDoS Vulnerability Back to the Virus Archives page