Virus Warnings from December 2000
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: December 28, 2000
Platform: Amiga
Warning About: Another Amiga trojan found !!!
Report From: Virus Help Denmark
* Release Note: Today we recived a new 'lame' trojan. This trojan
will delete your "sys:" if you run the program. At this time non
of the anti-virus programs can detect this trojan, but in the next
update they will be known.
* Click here for VHT-DK Virus Warning vht-dk93
Date: December 19, 2000
Platform: Amiga
Warning About: New Amiga trojan found !!!
Report From: Virus Help Denmark
* Release Note: Today we recived a new 'lame' trojan. This trojan
will only execute it self if you have named your hard-disk "DH0"
and "DH1". The trojan is spread in and archive with the name
"DKG-BLUM.LHA".
* Click here for VHT-DK Virus Warning vht-dk92
Top of Page
Windows
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows NT 4.0 / NT 2000 / Linux Versions
Warning About: ikonboard Arbitrary Command Execution Vulnerability
Report From: Security Focus
* Release Note: ikonboard is a forum management software package
available from ikonboard.com. A problem exists with could allow
users access to restricted resources.
* Click here for Advisory on ikonboard Vulnerability
Date: December 31, 2000
Released: December 28, 2000
Platform: Windows NT 4.0 / NT 2000
Warning About: Technote Inc Technote 'filename' Variable File
Disclosure Vulnerability
Report From: Security Focus
* Release Note: Technote Inc. offers a Multicommunication Package which
includes a web board type of service. Successful exploitation of this
vulnerability could lead to the disclosure of sensitive information
and possibly assist in further attacks against the victim.
* Click here for Advisory on Technote Vulnerability
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows
Warning About: VBS/Tqll.a@MM Worm
Aliases: VBS/Tqll-A
Report From: Network Associates
* Release Note: The Windows Scripting Host (part of Internet Explorer
5) is required for this virus to function. When run this script
creates the executable, "3K.EXE" in the Windows directory, and runs
it. This file is a trojan, and the script then mails itself to
everyone in your Windows Address Book. Read the complete report for
Method Of Infection and Removal Instructions
* Click here for Report on VBS/Tqll.a@MM Worm
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows / Outlook
Warning About: W97M/Ftip.a@mm Internet Worm
Aliases: ftip.doc
Report From: Network Associates
* Release Note: This is an Internet worm written in Visual Basic for
Applications within a Word97 document. This worm may arrive via
email. Read the complete report for Method Of Infection and Removal
Instructions
* Click here for Report on W97M/Ftip.a@mm Internet Worm
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows Scripting Host
Warning About: VBS/Sorry.a Worm
Aliases: VBS.Sorry.A, VBS_TTFLOADER.A
Report From: Network Associates
* Release Note: This script is detected by current DAT files and
Engine as VBS/Pica.worm.gen. The Windows Scripting Host (part of
Internet Explorer 5) is required for this virus to function. When
this Visual Basic Script virus is executed, it copies itself to
a .vbs file, and makes registry modifications. Read the complete
report for Method Of Infection and Removal Instructions
* Click here for Report on VBS/Sorry.a Worm
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows Scripting Host
Warning About: VBS/Mill.f@MM Worm
Report From: Network Associates
* Release Note: The Windows Scripting Host (part of Internet Explorer
5) is required for this virus to function. When run this script
creates copies of itself to some files. The script then mails it
self to all entries in the Windows Address Book using certain
information. Read the complete report for Method Of Infection and
Removal Instructions
* Click here for Report on VBS/Mill.f@MM Worm
Date: December 28, 2000
Released: December 27, 2000
Platform: PC
Warning About: VBS/Yelp@M.intd VBScript Worm
Report From: Network Associates
* Release Note: This script contains a bug which prevents it from
running. The intention of the script is an Internet worm which when
executed emails itself once to the first entry in the address book.
This script may arrive via email, or may also modify mIRC client
script to distribute itself when joining IRC chat. Read the complete
report for Method Of Infection and Removal Instructions
* Click here for Report on VBS/Yelp@M.intd Worm
Date: December 26, 2000
Released: December 22, 2000
Platform: MS IIS 5.0 / 4.0
Windows NT 2000 / NT 4.0 / BackOffice 4.5
Warning About: Front Page Server Extension DoS Vulnerability
Report From: Security Focus
* Release Note: Microsoft IIS ships with Front Page Server Extensions
(FPSE) which enables administrators remote and local web page and
content management. Browse - time support is another feature within
FPSE which provides users with functional web applications. Due to
the way FPSE handles the processing of web forms, IIS is subject to
a denial of service.
* Click here for Advisory on Microsoft IIS DoS Vulnerability
Date: December 26, 2000
Released: December 22, 2000
Platform: Microsoft IIS (Internet Information Server)
Patch Available: Malformed Web Form Submission Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a security
vulnerability in a component that ships as part of Microsoft Internet
Information Server. The vulnerability could potentially allow an
attacker to prevent an affected web server from providing useful
service.
* Click here for MS Security Bulletin MS00-100
Date: December 21, 2000
Released: December 20, 2000
Platform: MS Windows 2000
Warning About: MS Win2000 Directory Services Restore Mode
Blank Password Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Dir Services Vulnerability
Date: December 21, 2000
Platform: Windows
Warning About: VBS/Season Virus
Aliases: BAT_SEASON.A, IRC_SEASON.A, VBS_SEASON.A
Report From: Network Associates
* Release Note: The Windows Scripting Host (part of Internet Explorer
5) is required for this virus to function. When this Visual Basic
Script virus is executed, the script performs certain functions.
Read the complete report for Method Of Infection and Removal
Instructions
* Click here for Report on VBS/Season Virus
Date: December 21, 2000
Released: December 20, 2000
Platform: Windows
Warning About: VBS/Sheep Virus
Aliases: VBS/Sheep-A
Report From: Network Associates
* Release Note: The Windows Scripting Host (part of Internet Explorer
5) is required for this virus to function. When this Visual Basic
Script virus is executed, it will modify the a file to instruct
mIRC to distribute the worm to others when connecting to a chat
room. Read the complete report for Method Of Infection and Removal
Instructions
* Click here for Report on VBS/Sheep Virus
Date: December 21, 2000
Released: December 19, 2000
Platform: Windows
Warning About: VBS/Stertor Virus
Report From: Network Associates
* Release Note: This Visual Basic Script virus is contained in a .HTM
file. The Windows Scripting Host (part of Internet Explorer 5) is
required for this virus to function. When an infected document is
opened, the user is prompted by Internet Explorer to allow the
execution of potentially unsafe ActiveX controls. Read the complete
report for Method Of Infection and Removal Instructions
* Click here for Report on VBS/Stertor Virus
Date: December 21, 2000
Released: December 18, 2000
Platform: MS Word97 and Word2000
Warning About: W97M/Jedan.b Macro Virus
Aliases:
Report From: Network Associates
* Release Note: This virus propagates by infecting Word Documents
and Templates in MS Word97 and Word2000. The virus consists of
a macro "ThisDocument". When a file is opened the virus checks
for a prior W97M/Jedan infection. If the document or template is
not currently infected the virus proceeds in copying its code to
that file. Read the complete report for Method Of Infection and
Removal Instructions
* Click here for Report on W97M/Jedan.b Macro Virus
Date: December 21, 2000
Released: December 20, 2000
Platform: MS Windows 2000 Domain Controllers
Patch Available: Directory Service Restore Mode Password
Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability affecting Microsoft. Windows. 2000 domain
controllers. The vulnerability could allow a malicious user with
physical access to a domain controller to install malicious
software on it.
* Click here for MS Security Bulletin MS00-099
Date: December 21, 2000
Released: December 19, 2000
Platform: MS Windows 2000
Patch Available: Indexing Service File Enumeration Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in a component that ships as part of MS
Windows 2000. The vulnerability could allow a malicious web site
operator to learn the names and properties of files and folders on
the machine of a visiting user.
* Click here for MS Security Bulletin MS00-098
Date: December 17, 2000
Released: December 15, 2000
Platform: MS Windows Media Services
Patch Available: Severed Windows Media Server Connection
Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft Windows Media Services. The
vulnerability could allow a malicious user to degradhe performance
of a Windows Media server, possibly to the point where it could no
longer provide useful service.
* Click here for MS Security Bulletin MS00-097
Date: December 15, 2000
Released: December 14, 2000
Platform: Windows and UNIX
Warning About: Subscribe-Me Lite Administration Access Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in certain versions of
Subscribe-Me Lite, the non-commercial version of a mailing list
administration script from cgiscriptcenter.com. Windows and Unix
versions are affected. It is possible for an attacker to obtain
access to the script's administration panel, and to delete arbitrary
members from the mailing lists supported by the vulnerable script.
* Click here for Advisory on Subscribe-Me Lite Vulnerability
Date: December 15, 2000
Released: December 13, 2000
Platform: PC
Warning About: Thus Macro Virus
Aliases: Thursday
Report From: F-Secure
* Release Note: Thus is a Word 97 macro virus that has a destructive
payload. Many Thus variants activate their payload at December 13th.
Then the virus deletes all files frome root of "C:" drive and from
all its subdirectories, but it does not delete directories
themselves.
* Click here for Report on Thus Macro Virus
Date: December 14, 2000
Released: December 13, 2000
Platform: Various MS IIS Far East Editions, Running Windows NT 2000
Along With Some Versions Of MS BackOffice
Warning About: MS IIS Far East Edition DBCS File Disclosure Vulnerability
Report From: Security Focus
* Release Note: The Far East editions of Microsoft IIS do not properly
validate HTTP requests containing double-byte character sets (DBCS) which may lead
to the disclosure of files contained within the web root. The editions
that are affected include Traditional Chinese, Simplified Chinese,
Japanese, and Korean (Hangeul). This vulnerability affects IIS prior
to SP6.
* Click here for Advisory on MS IIS Far East Edition
Date: December 13, 2000
Released: December 12, 2000
Platform: MS Windows
Warning About: Backdoor-JN Trojan
Aliases:
Report From: Network Associates
* Release Note: This backdoor trojan is being distributed on a website
via the VBS/RunScript.gen4 script. The trojan sends information
about your system to an ICQMail user. This information contains the
instructions for that user to take control of your computer remotely,
to perform various tasks including the retrieval of usernames and
passwords. For those using Internet Explorer 5, viewing this website
installs this trojan on your system. Read the complete report for
Method Of Infection and Removal Instructions
* Click here for Report on Backdoor-JN Trojan
Date: December 13, 2000
Released: December 12, 2000
Platform: MS Outlook, mIRC and Pirch
Warning About: Forgotten Worm
Aliases: VBS/Forgotten.A-mm, VBS/Pica.worm.gen
Variants: Forgotten.A
Report From: F-Secure
* Release Note: Forgotten is a worm written in Visual Basic Scipt that
speads without any attachment.
* Click here for Report on Forgotten Worm
Date: December 13, 2000
Released: December 11, 2000
Platform: MS Windows
Warning About: BleBla Worm
Aliases: Romeo-and-Juliet, Romeo, Juliet
Verona, IWorm_Blebla, I-Worm.Blebla
Report From: F-Secure
* Release Note: BleBla is a worm spreading via Internet. It was
discovered in Poland on November 16th, 2000. The worm appears as
an email message that has HTML formal and 2 attached files:
MyJuliet.CHM and MyRomeo.EXE.
* Click here for Report on BleBla Worm
Date: December 13, 2000
Released: December 11, 2000
Platform: Win32
Warning About: Win32 DDoS Trojan
Aliases: DDoS_Kozog, DDoS.Kozog, Kozirog
Report From: F-Secure
* Release Note: Kozog is Win32 DDoS (Distributed Denial of Service
attack) trojan that was distributed by a hacker (or hackers group)
in November 2000. The trojan was sent as email messages with
attached file.
* Click here for Report on Kozog
Date: December 12, 2000
Released: December 09, 2000
Platform: MS Windows 95 / 98 / Windows ME
Warning About: SmartStuff FoolProof Security Program Restriction
Bypass Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in SmartStuff's FoolProof
Security for Windows 9x/Me. The application, which is designed to
restrict the executables which can be run on a (usually public)
workstation, can be circumvented by downloading (ie, via FTP) and
renaming a copy of the disallowed executable.
* Click here for Advisory on SmartStuff FoolProof Vulnerability
Date: December 08, 2000
Platform: MS Win32
Warning About: Hybris Internet Worm
Aliases: IWorm_Hybris, I-Worm.Hybris
Report From: F-Secure
* Release Note: Hybris is an Internet worm that spreads itself as an
attachment to email messages. The worm works under Win32 systems
only. The worm contains components (plugins) in its code that are
executed depending on what worm needs, and these components can be
upgraded from an Internet Web site. The major worm versions are
encrypted with semi-polymorphic encryption loop.
* Click here for Report on Hybris Internet Worm
Date: December 07, 2000
Released: December 06, 2000
Platform: MS Windows NT 4.0 / NT 2000
Warning About: Apache Web Server with Php 3 File Disclosure
Vulnerability
Report From: Security Focus
* Release Note: Apache Web Server is subject to disclose files to
unauthorized users when used in conjunction with the PHP3 script
language. By requesting a specially crafted URL by way of php,
it is possible for a remote user to gain read access to a known
file that resides on the target host.
* Click here for Advisory on Apache Web Server with Php 3
Date: December 07, 2000
Released: December 06, 2000
Platform: MS Windows NT Terminal Server / Windows NT 4.0
Warning About: MS WinNT 4.0 RAS Administration Registry
Key Vulnerability
Report From: Security Focus
* Release Note: The registry key in Windows NT 4.0 that handles the
administration of Remote Access Service (RAS) third-party tools is
not properly configured to deny write access to unprivileged users.
Therefore, the malicious user would be able to perform any action
under the LocalSystem security context which would basically yield
full control over the local machine.
* Click here for Advisory on MS WinNT 4.0 RAS Vulnerability
Date: December 07, 2000
Released: December 06, 2000
Platform: MS Windows NT Terminal Server / Windows NT 4.0
Warning About: MS WinNT 4.0 MTS Package Administration Registry
Key Vulnerability
Report From: Security Focus
* Release Note: Microsoft Transaction Server (MTS) is the mechanism
used by Microsoft Windows NT to handle transactions or MTS packages
which are series of software modules that form a transaction.
The registry key in Windows NT 4.0 that handles the administration of
Microsoft Transaction Server (MTS) is not properly configured to deny
write access to unprivileged users.
* Click here for Advisory on MS WinNT 4.0 MTS Vulnerability
Date: December 07, 2000
Released: December 06, 2000
Platform: MS Windows NT 4.0 / NT 2000
Warning About: MS WinNT & 2000 SNMP Registry Key Modification
Vulnerability
Report From: Security Focus
* Release Note: The SNMP protocol in Windows NT4 and 2000 enables an
administrator to manage network devices remotely. Due to a default
configuration error the SNMP Registry Key premits any user, that is
logged into that particular machine, to edit the settings.
Successful exploitation of this vulnerability could allow a user to
gain full control of network devices.
* Click here for Advisory on MS WinNT & 2000 SNMP Vulnerability
Date: December 07, 2000
Platform: Microsoft Windows
Warning About: QDel126 Trojan Virus
Report From: Network Associates
* Release Note: This is a file deleting trojan. When loaded in memory,
it will delete all files on non-write-protected diskettes that are
placed into the foppy dive. It then copies itself to the diskette.
The Visual Basic runtime files (vesion 6 or higher) are required for
this program to run. Upon execution the trojan saves a copy of itself
to the SYSTEM directory under the name "VMM66.EXE" and creates
a registry key value to allow the program to load at system
startup.
* Click here for Report on QDel126 Virus
Date: December 07, 2000
Platform: Microsoft Windows
Warning About: W32/HLL.ow Virus
Report From: Network Associates
* Release Note: This, file overwriting, virus infects all .EXE files
in the directory which it is executed from that do not have the
HIDDEN file attribute set. Infected files must be deleted and
restored from backup. The Visual Basic Runtimes files (version 6
or higher) are required for this virus to function.
* Click here for Report on W32/HLL.ow Virus
Date: December 07, 2000
Platform: MS Windows 2000
Patch Available: SNMP Parameters Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a tool that corrects the
permissions on several registry values in Microsoft Windows 2000.
The default permissions could allow a malicious user to monitor or
reconfigure certain devices on a network.
* Click here for MS Security Bulletin MS00-096
Date: December 07, 2000
Platform: MS Windows NT. 4.0
Patch Available: Registry Permissions Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a tool that corrects the
permissions on several registry values in Microsoft Windows NT 4.0.
The default permissions could allow a malicious user to gain
additional privileges on an affected machine.
* Click here for MS Security Bulletin MS00-095
Date: December 05, 2000
Platform: Microsoft Windows NT 4.0 / NT 2000
Warning About: Microsoft PhoneBook Server Buffer Overflow
Report From: Security Focus
* Release Note: The Phone Book Service is an optional component that
ships with the NT 4 Option Pack and Windows 2000. It is not installed
by default. A buffer overflow vulnerability was discovered in the URL
processing routines of the Phone Book Service requests on IIS 4 and
IIS 5.
* Click here for MS PhoneBook Server Buffer Overflow
Date: December 05, 2000
Platform: MS Windows 98 / 95 / NT 4.0 / NT 2000
Warning About: MS Internet Explorer 'INPUT TYPE=FILE' Vulnerability
Report From: Security Focus
* Release Note: One of the ways users submit information to remote
websites is through the INPUT type form options. Users can upload
files to remote webservers with the input type=FILE option. Due to
a design error in the implementation of the INPUT TYPE=FILE variable,
it is possible for a website operator to specify a known filename
from the visitors machine for upload to the website.
* Click here for MS IE 'INPUT TYPE=FILE' Vulnerability
Date: December 05, 2000
Platform: MS Windows 9x / Windows ME
Warning About: W32/XTC@MM Virus Internet Worm
Aliases: I-Worm.XTC
Report From: Network Associates
* Release Note: This is a mass mailing Internet worm and backdoor
trojan which is also capable of spreading via open local network
shares. It arrives as an encrypted and compressed executable.
Read the report for Method Of Infection and Removal Instructions.
* Click here for Report on W32/XTC@MM Virus Internet Worm
Date: December 05, 2000
Platform: MS Windows NT 4.0 and Windows 2000 Servers
Patch Available: Phone Book Server Buffer Overflow Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in an optional service that ships with
Microsoft Windows NT. 4.0 and Windows. 2000 Servers. The vulnerability
could allow a malicious user to execute hostile code on a remote
server that is running the service.
* Click here for MS Security Bulletin MS00-094
Date: December 04, 2000 * Updated from Dec 1st
Platform: Windows 95/98/ME/NT/2000
Warning About: Creative Email Worm
Aliases: Prolin, Shockwave, W32/Prolin@mm, TROJ_SHOCKWAVE,
TROJ_PROLIN
Report From: F-Secure
* Release Note: Prolin is an e-mail worm that spreads itself using
MS Outlook. The worm itself is a Windows EXE file about 37Kb long
written in VisualBasic. This vandal arrives as an executable
attachment named CREATIVE.EXE, masquerading as a Shockwave animation.
The worm uses the standard "Melissa"-like way of spreading itself. It
opens MS Outlook's address book, gets e-mail addresses from there and
sends its copies to these addresses.
* Click here for Report on Creative Email Worm
* Click here for AISS Report on Creative
Date: December 03, 2000
Released: December 01, 2000
Platform: Multiple Versions of MS Windows Running Certain MS Apps
Warning About:
Report From: Security Focus
* Release Note: The API Srv_paraminfo(), which is implemented by
Extended Stored Procedures (XPs) in Microsoft SQL Server and Data
Engine, is susceptible to a buffer overflow vulnerability which
may cause the application to fail or arbitrary code to be executed
on the target system depending on the data entered into the buffer.
* Click here for xp_displayparamstmt Buffer Overflow Vulnerability
* Click here for xp_enumresultset Buffer Overflow Vulnerability
Date: December 03, 2000
Released: December 01, 2000
Platform: MS Windows Running Certain MS Applications
Warning About: Microsoft SQL Server / Data Engine
Report From: Security Focus
* Release Note: The API Srv_paraminfo(), which is implemented by
Extended Stored Procedures (XPs) in Microsoft SQL Server and Data
Engine, is susceptible to a buffer overflow vulnerability which
may cause the application to fail or arbitrary code to be executed
on the target system depending on the data entered into the buffer.
* Click here for xp_showcolv Buffer Overflow Vulnerability
* Click here for xp_updatecolvbm Buffer Overflow Vulnerability
* Click here for xp_peekqueue Buffer Overflow Vulnerability
* Click here for xp_printstatements Buffer Overflow Vulnerability
* Click here for xp_proxiedmetadata Buffer Overflow Vulnerability
* Click here for xp_SetSQLSecurity Buffer Overflow Vulnerability
Date: December 03, 2000
Released: December 01, 2000
Platform: MS Internet Explorer 5.x
Patch Available: Browser Print Template and File Upload via Form
Vulnerabilities
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates four
security vulnerabilities in Microsoft Internet Explorer
* Click here for MS Security Bulletin MS00-093
Date: December 03, 2000
Released: December 01, 2000
Platform: MS SQL Server and SQL Server Desktop Engine (MSDE)
Patch Available: Extended Stored Procedure Parameter Parsing
Vulnerabilities
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft SQL Server and Microsoft SQL
Server Desktop Engine. The vulnerability could enable a malicious
user to run code on the server, subject to a number of restrictions.
* Click here for MS Security Bulletin MS00-092
Date: December 03, 2000
Released: December 01, 2000
Platform: MS Windows NT 2000 / Windows 95/98/NT with VB 6.0
Warning About: Prolin Internet-worm
Report From: Kaspersky Lab
* Release Note: Kaspersky Lab, announces the discovery of a new
Internet- worm, "Prolin", that has been developed by an unknown
hacker going by the pseudonym of "The Penguin." To date, Kaspersky
Lab has received many reports of infections by this worm from Poland.
* Click here for Virus Alert on Prolin Internet-worm
Date: December 01, 2000
Released: November 30, 2000
Platform: MS Windows NT 2000
Warning About: MS Windows 2000 Telnet Session Timeout DoS
Report From: Security Focus
* Release Note: The Telnet daemon shipped with Windows 2000 is
susceptible to a trivial denial of service attack if an initiated
session is not reset.
* Click here for Advisory on Telnet Session Timeout
Date: December 01, 2000
Released: November 30, 2000
Platform: MS Windows ME / 98se / 98 / 95 / NT 4.0
Warning About: MS Windows 9x / NT 4.0 NetBIOS Resource
Exhaustion Vulnerability
Report From: Security Focus
* Release Note: Microsoft's implementation NetBIOS is vulnerable to
a remotely exploitable denial of service attack. An attacker who
has access to the NBT port can cause the system to become exhausted
of network resources and cease functioning.
* Click here for Advisory on Resource Exhaustion Vulnerability
Date: December 01, 2000
Released: November 30, 2000
Platform: MS Windows NT 4.0 / 95, 98, 98 2nd Edition, and Windows Me
Patch Available: Incomplete TCP/IP Packet Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in Microsoft Windows NT 4.0 and a recommended
workaround for Windows 95, 98, 98 Second Edition, and Windows Me. The
vulnerability could allow a malicious user to temporarily prevent an
affected machine from providing any networking services or cause it
to stop responding entirely.
* Click here for MS Security Bulletin MS00-091
Date: December 01, 2000
Platform: Microsoft
Warning About: Creative Email Worm
Aliases: Prolin, Shockwave, W32/Prolin@mm, TROJ_SHOCKWAVE,
TROJ_PROLIN
Report From: F-Secure
* Release Note: Prolin is a email worm that arrives in a messages.
When the attached file is executed, the worm will send itself to all
recipients on all address book using Outlook and adds itself to the
Windows startup directory.
* Click here for Report on Creative Email Worm
Date: December 01, 2000
Released: November 30, 2000
Platform: Microsoft
Warning About: VBS/Draft VBScript Worm
Aliases: Forwarder, I-Worm.Draft
Variants: Draft.A@mm
Report From: F-Secure
* Release Note: VBS/Draft is a mass mailing email worm written in
VBScript. VBS/Draft.A@mm is a worm that replicates by forwarding
the infected message. When the attachment is executed, the worm
forwards the infected message to all recipients from "All Users"
distribution list.
* Click here for Report on VBS/Draft VBScript Worm
Top of Page
Macintosh
Date: December 21, 2000
Platform: Apple MacIntosh
Warning About: Apple Macintosh MRJ Unauthorized File Access
Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on MRJ Vulnerability
Top of Page
Linux
Date: December 31, 2000
Released: December 29, 2000
Platform: Windows NT 4.0 / NT 2000 / Linux Versions
Warning About: ikonboard Arbitrary Command Execution Vulnerability
Report From: Security Focus
* Release Note: ikonboard is a forum management software package
available from ikonboard.com. A problem exists with could allow
users access to restricted resources.
* Click here for Advisory on ikonboard Vulnerability
Date: December 31, 2000
Released: December 29, 2000
Platform: Connectiva
Updates To: Security Announcement: gnupg
Report From: Linux Daily News
* Release Note: Connectiva has released a security announcement
concerning a Vulnerability with detached signatures and web of
trust in gnupg.
* Click here for LWN Security Announcement: gnupg
Date: December 28, 2000
Platform: RedHat Linux 6.1 i386
Warning About: Security-Enhanced Linux Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: Security-Enhanced Linux is an add-on access control
infrastructure developed and distributed by the U.S. National Security
Agency. A problem exists which could allow the altering of sensitive
information on a running system.
* Click here for Advisory on Security-Enhanced Linux Vulnerability
Date: December 28, 2000
Released: December 27, 2000
Platform: Debian Linux
Warning About: dialog /tmp File Race Condition Vulnerability
Report From: Security Focus
* Release Note: dialog is a program available with the Debian
distribution of the Linux Operating System. A problem exists which
could allow a user to append to or overwrite files owned by another
user.
* Click here for Advisory on dialog /tmp Vulnerability
Date: December 28, 2000
Platform: TurboLinux
Updates To: Security Announcement
Report From: Linux Daily News
* Release Note: Turbolinux has reported a security hole in fetchmail
5.5.0-2 and earlier.
* Click here for LWN Security Update To fetchmail-5.5.0-2
Date: December 26, 2000
Released: December 24, 2000
Platform: Debian
Updates To: Debian Security Advisories
Report From: Linux Daily News
* Release Note: Debian has issued security advisories for dialog,
stunnel and gnupg.
* Click here for LWN Security Advisory For dialog
* Click here for LWN Security Advisory For stunnel
* Click here for LWN Security Advisory For gnupg
Date: December 26, 2000
Released: December 21, 2000
Platform: Red Hat
Updates To: Stunnel Packages
Report From: Linux Daily News
* Release Note: Red Hat has issued another update for its stunnel
packages. This one addresses writing to non-existent directories.
* Click here for LWN Security Update To Stunnel Packages
Date: December 21, 2000
Released: December 18, 2000
Platform: Linux / FreeBSD
Warning About: BSD ftpd Single Byte Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on ftpd Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Linux / FreeBSD
Warning About: FreeBSD procfs Access Control Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on procfs Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Linux / FreeBSD
Warning About: FreeBSD procfs Denial of Service Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on procfs DoS Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Linux / FreeBSD
Warning About: FreeBSD procfs jail Breaking Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on procfs Vulnerability
Date: December 17, 2000
Released: December 16, 2000
Platform: Linux Mandrake
Updates To: Security Update For pam
Report From: Linux Daily News
* Release Note: Linux Mandrake issued a security update for the pam
module. Shortly after that they issued an updated advisory.
* Click here for LWN Security Update To pam
* Click here for LWN Updated Advisory To pam
Date: December 17, 2000
Released: December 16, 2000
Platform: Slackware Linux
Updates To: OpenSSL Cryptography Libraries
Report From: Linux Daily News
* Release Note: Slackware Linux announced the addition of the OpenSSL
cryptography libraries and the OpenSSH suite of network connectivity
tools. Users of Slackware 7.1 and -current can download these
packages from Slackware's current developmental tree.
* Click here for LWN OpenSSL Cryptography Libraries
Date: December 17, 2000
Released: December 16, 2000
Platform: Linux-Mandrake
Updates To: Security Alert For jpilot
Report From: Linux Daily News
* Release Note: Linux-Mandrake reports that the jpilot program
automatically creates a directory called .jpilot/ in the user's home
directory with 777 (world read/write/execute) permissions. This
directory is used to store all backups, configuration and
synchronized Palm Pilot information.
* Click here for LWN Security Alert To jpilot
Date: December 15, 2000
Released: December 14, 2000
Platform: Windows and UNIX
Warning About: Subscribe-Me Lite Administration Access Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in certain versions of
Subscribe-Me Lite, the non-commercial version of a mailing list
administration script from cgiscriptcenter.com. Windows and Unix
versions are affected. It is possible for an attacker to obtain
access to the script's administration panel, and to delete arbitrary
members from the mailing lists supported by the vulnerable script.
* Click here for Advisory on Subscribe-Me Lite Vulnerability
Date: December 15, 2000
Released: December 14, 2000
Platform: Linux-Mandrake
Updates To: BitchX
Report From: Linux Daily News
* Release Note: Linux-Mandrake has posted a security bulletin for
BitchX. A possible stack overflow condition exists if a malformed
DNS answer is processed by the client, and a second bug allows
this malformed DNS record to be embedded in a valid DNS packet.
* Click here for LWN Security Bulletin To BitchX
Date: December 15, 2000
Released: December 14, 2000
Platform: Conectiva
Updates To: ed Editor And pam Module
Report From: Linux Daily News
* Release Note: Conectiva has posted security bulletins for both ed
and pam. The "ed" editor creates temporary files in an insecure way,
making it vulnerable to symlink attacks. The pam_localuser module,
part of the PAM package, has a buffer overflow vulnerability in it,
though it's not used in any dfault configurations.
* Click here for LWN Security Update To ed
* Click here for LWN Security Update To pam
Date: December 14, 2000
Released: December 12, 2000
Platform: Various Versions Of Linux
Warning About: Multiple Oops Proxy Server Buffer Overflow
Vulnerability
Report From: Security Focus
* Release Note: Oops is a freely available proxy server package,
written by Igor Khasilev. A problem exists in the package which
could allow for the arbitrary execution of code. Multiple buffer
overflows exist in this product.
* Click here for Advisory on Multiple Oops Proxy Server
Date: December 14, 2000
Released: December 12, 2000
Platform: Linux / Unix
Warning About: University of Washington Pico File Overwrite Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in several versions of University
of Washington's Pico, a widely-distributed text editor shipped with
most versions of Linux / Unix. Under very specific circumstances, it
is possible to cause this version of Pico to overwrite arbitrary
files with the privilege level of the victim user.
* Click here for Advisory on Univ. of Wash Pico Vulnerability
Date: December 14, 2000
Released: December 12, 2000
Platform: Linux / NetBSD
Warning About: Roaring Penguin PPPoE Denial of Service Vulnerability
Report From: Security Focus
* Release Note: Roaring Penguin Software's PPPoE is a freeware PPP over
Ethernet client often used by ADSL subscribers running Linux or NetBSD.
PPPoE contains a possibly remotely exploitable denial of service
vulnerability in its handling of TCP packets when the Clamp_MSS option
is used.
* Click here for Advisory on Roaring Penguin PPPoE DDoS Vulnerability
Date: December 14, 2000
Platform: Linux / UNIX / BSDI / AT & T SVR4 4.0
Warning About: Leif M. Wright ad.cgi Unchecked Input Vulnerability
Report From: Security Focus
* Release Note: ad.cgi is an ad rotation script freely available, and
written by Leif Wright. A problem exists in the script which may
allow access to restricted resources. The problem occurs in the
method in which the script checks input.
* Click here for Advisory on Leif M. Wright ad.cgi
Date: December 14, 2000
Platform: Red Hat
Updates To: Security Update To bitchx
Report From: Linux Daily News
* Release Note: Red Hat has issued a security update to bitchx
(part of the Powertools package) fixing a vulnerability to
malformed DNS answers.
* Click here for LWN Security Update To bitchx
Date: December 13, 2000
Released: December 12, 2000
Platform: Conectiva
Updates To: Security Update To rp-pppoe
Report From: Linux Daily News
* Release Note: Conectiva has issued a security update to rp-pppoe
(a user-space PPP-over-ethernet client) fixing a problem wherein
an attacker could cause a network connection to be dropped.
* Click here for LWN Security Update To rp-pppoe
Date: December 13, 2000
Released: December 12, 2000
Platform: Linux-Mandrake
Updates To: Security Updates To apcupsd And mc
Report From: Linux Daily News
* Release Note: MandrakeSoft has issued a security update to apcupsd
fixing a problem that could allow a local attacker to kill any
process on the system. Also issued is this update to mc addressing
a vulnerability that could allow the corruption of arbitrary files
on the system.
* Click here for LWN Security Update To apcupsd
* Click here for LWN Security Update To mc
Date: December 13, 2000
Reported: December 12, 2000
Platform: RedHat Open Source Or Other Systems Running Unpatched
LPRng Software
Warning About: Input Validation Problems in LPRng
Report From: CERT
* Release Note: A popular replacement software package to the BSD
lpd printing service called LPRng contains at least one software
defect, known as a "format string vulnerability", which may allow
remote users to execute arbitrary code on vulnerable systems.
* Click here for CERT CA-2000-22
Date: December 12, 2000
Released: December 11, 2000
Platform: Linux - Various Flavours
Warning About: ssldump Format String Vulnerability
Report From: Security Focus
* Release Note: ssldump is a traffic analyzer for monitoring network
traffic in real time. It is written and maintained by Eric Rescorla.
A problem exists which could allow the arbitrary execution of code.
* Click here for Advisory on ssldump Format String Vulnerability
Date: December 10, 2000
Released: December 09, 2000
Platform: Linux Mandrake
Updates To: GNU ed line editor package
Report From: Linux Daily News
* Release Note: Linux Mandrake has issued a security advisory for
the GNU ed line editor package, which can create temporary files
unsafely.
* Click here for LWN Security Update To ed
Date: December 10, 2000
Released: December 08, 2000
Platform: Zope / Digital Creations
Updates To: Zope Security Update
Report From: Linux Daily News
* Release Note: All Zope versions up through 2.2.4 have a security
vulnerability that could allow anonymous users (i.e. anybody on
the net) to do things inside the server that they should not be
able to do. A security update has been issued by Digital Creations.
It is highly recommended that people running Zope apply this fix.
* Click here for LWN Security Update To Zope
Date: December 08, 2000
Platform: UNIX / Linux
Warning About: Lexmark Markvision Printer Driver Buffer Overflow
Vulnerabilities
Report From: Security Focus
* Release Note: MarkVision is a driver software package engineered
to allow UNIX systems use Lexmark Printers. It is distributed by
Lexmark International. A problem in the driver software could allow
elevation of priviledges.
* Click here for Advisory on Markvision Printer Driver Vulnerabilities
Date: December 07, 2000
Released: December 06, 2000
Platform: Various Linux Versons
Warning About: phpGroupWare Remote Include File Vulnerability
Report From: Security Focus
* Release Note: phpGroupWare is a multi-user groupware suite originally
developed by Joseph Engo, and freely distributed. A problem in the
software could allow users to remotely execute malicious code.
* Click here for Advisory on phpGroupWare Vulnerability
Date: December 05, 2000
Platform: Varioius Versions / Flavours of Linux
Warning About: phpWebLog Administrator Authentication Bypass
Vulnerability
Report From: Security Focus
* Release Note: phpWebLog is an Open Source web news management system,
authored by Jason Hines. A problem exists which can allow users
administrative access to the management interface.
* Click here for Advisory on phpWebLog Adm Vulnerability
Date: December 05, 2000
Released: December 04, 2000
Platform: Red Hat
Updates To: Diskcheck Utility
Report From: Linux Daily News
* Release Note: Red Hat has issued a security update to the diskcheck
utility, which was part of the 6.x Powertools release. It seems
that diskcheck has a symlink vulnerability.
* Click here for LWN Security Update To Diskcheck Utility
Date: December 03, 2000 * Revised
Released: December 02, 2000
Platform: Debian
Updates To: joe Editor
Report From: Linux Daily News
* Release Note: The Debian Project has issued a revised security
update to joe, evidently the previous version didn't work quite right.
* Click here for LWN Security Update To joe Editor
Top of Page
Miscellaneous
Date: December 28, 2000
Platform: Upland Solutions Program
Warning About: 1st Up Mail Server 4.1
Report From: Security Focus
* Release Note: 1st Up Mail Server is an email server which supports
most common internet protos and email software offered by Upland
Solutions. It is possible to cause a denial of service in 1st Up
Mail Server, the vulnerability exists in the "mail from" field.
* Click here for Advisory on 1st Up Mail Server 4.1
Date: December 28, 2000
Platform: GNU Privacy Guard 1.0.3 / 1.0.3b / 1.0.2 / 1.0.1
Warning About: GnuPG Silent Import of Secret Keys Vulnerability
Report From: Security Focus
* Release Note: GnuPG is the GNU Privacy Guard, a public key program
designed to facilitate secure email between parties. A problem exists
which could allow a breaking of the ring of trust.
* Click here for Advisory on GnuPG Secret Keys Vulnerability
Date: December 21, 2000
Released: December 19, 2000
Platform: Miscellaneous
Warning About: Alt-Daemon 3.5.0 Denial of Service Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Alt-Daemon DoS Vulnerability
Date: December 21, 2000
Released: December 19, 2000
Platform: Miscellaneous
Warning About: Stunnel Weak Encryption Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Stunnel Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Miscellaneous
Warning About: Sonata Local Arbitrary Command Excution
Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Sonata Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Miscellaneous
Warning About: Solaris patchadd Race Condition Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on patchadd Vulnerability
Date: December 21, 2000
Released: December 18, 2000
Platform: Miscellaneous
Warning About: Stunnel Local Arbitrary Command Execution
Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Stunnel Vulnerability
Date: December 21, 2000
Released: December 17, 2000
Platform: Miscellaneous
Warning About: Nano Local File Overwrite Vulnerability
Report From: Security Focus
* Release Note: Please read the report for the full details.
* Click here for Advisory on Nano Vulnerability
Date: December 17, 2000
Released: December 15, 2000
Platform: Watchguard SOHO Firewall 1.6
Warning About: Watchguard SOHO Firewall Fragmented IP Packet
DoS Vulnerability
Report From: Security Focus
* Release Note: SOHO Firewall is an appliance firewall by Watchguard
Technologies Inc. designed for Small Office/Home Office users.
Sending a large number of fragmented IP packets to SOHO Firewall will
cause the service to drop network connections and cease packetforwing.
Watchguard has addressed this vulnerability with the release of
version 2.x.
* Click here for Advisory on SOHO Firewall Vulnerability
Date: December 15, 2000
Released: December 14, 2000
Platform: Palm OS 3.5.2 / 3.3
Warning About: SafeWord e.Id Trivial PIN Brute-Force Vulnerability
Report From: Security Focus
* Release Note: Safeword e.Id is a one-time password based
authentication system. In this sort of authentication system, the
security of the shared secret (the user's PIN) is critical. If an
attacker can gain access to the PDB file, it is possible to easily
brute-force the valid PIN number.
* Click here for Advisory on SafeWord e.Id Vulnerability
Date: December 15, 2000
Released: December 14, 2000
Platform: Leif M. Wright's simplestguest.cgi
Warning About: Leif M. Wright simplestguest.cgi Remote Command
Execution Vulnerability
Report From: Security Focus
* Release Note: A vulnerabiliy exists in Leif M. Wright's
simplestguest.cgi, a script designed to coordinate guestbook
submissions from website visitors. An insecurely call to the
open() function leads to a failure to properly filter shell
metacharacters from user supplied input.
* Click here for Advisory on simplestguest.cgi Vulnerability
Date: December 15, 2000
Released: December 14, 2000
Platform: CoffeeCup Direct FTP 1.0 / CoffeeCup Free FTP 1.0
Warning About: CoffeeCup FTP Clients Weak Password Encryption
Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in the FTP clients CoffeCupt
Direct and CoffeeCup Free. The clients use the file FTPServers.ini
to store password information for sites to which the client has
been connected. The encryption method designed to obfuscate these
passwords can be easily defeated.
* Click here for Advisory on CoffeeCup Vulnerability
Date: December 14, 2000
Released: December 13, 2000
Platform: KDE kmail 1.102
Warning About: KDE Kmail Weak Password Encryption Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in the K Destop Environment's
integrated mail client KMail. The encryption system used by the
program to secure a given user's mail is weak and may be trivially
defeated.
* Click here for Advisory on KDE Kmail Vulnerability
Date: December 14, 2000
Released: December 13, 2000
Platform: Leif M. Wright everythingform.cgi 2.0
Warning About: Leif M. Wright everythingform.cgi Arbitrary
Command Execution Vulnerability
Report From: Security Focus
* Release Note: An input validation vulnerability exists in Leif M.
Wright's everything.cgi, a Perl-based form design tool. The script
fails to properly filter shell commands from user-supplied input
to the 'config' field.
* Click here for Advisory on Leif M. Wright everythingform.cgi
Date: December 14, 2000
Released: December 13, 2000
Platform: Leif M. Wright simplestmail.cgi 1.0
Warning About: Leif M. Wright simplestmail.cgi Remote Command
Execution Vulnerability
Report From: Security Focus
* Release Note: A vulnerabiliy exists in Leif M. Wright's
simplestmail.cgi, a script designed to coordinate email responses
from web forms.
* Click here for Advisory on Leif M. Wright simplestmail.cgi
Date: December 13, 2000
Reported: December 12, 2000
Platform: RedHat Open Source Or Other Systems Running Unpatched
LPRng Software
Warning About: Input Validation Problems in LPRng
Report From: CERT
* Release Note: A popular replacement software package to the BSD
lpd printing service called LPRng contains at least one software
defect, known as a "format string vulnerability", which may allow
remote users to execute arbitrary code on vulnerable systems.
* Click here for CERT CA-2000-22
Date: December 12, 2000
Released: November 29, 2000
Platform: Java Development Kit (JDKTM) 1.1.x and
Java 2 Standard Edition SDKTM v 1.2.x releases
Warning About: Potential Security Issue in Class Loading
Report From: Sun
* Release Note: Through its own research and rigorous testing, Sun
has discovered a potential security issue in the JavaTM Runtime
Environment that affects both Java Development Kit (JDKTM)
1.1.x and Java 2 Standard Edition SDKTM v 1.2.x releases. The
issue poses a possible security risk by allowing an untrusted
class to call into a disallowed class under certain circumstances.
Read the report for update releases that are available as a remedy
for this issue.
* Click here for Advisory on Potential Security Issue
Date: December 10, 2000
Released: December 08, 2000
Platform: Firmware versions 2.2.1 and below
Warning About: Watchguard SOHO 2.2 Denial of Service Vulnerability
Report From: Security Focus
* Release Note: The SOHO 2.2 is a popular SOHO firewall by Watchguard
Technologies Inc. A vulnerability exists in Watchguard SOHO 2.2
firewalls with firmware versions 2.2.1 and below that could allow
a remote attacker to execute a Denial of Service attack on the
firewall and render it in-operable.
* Click here for Advisory on Watchguard SOHO 2.2 DoS Vulnerability
Date: December 07, 2000
Released: December 06, 2000
Platform: Endymion MailMan WebMail v3.x
Warning About: Endymion MailMan WebMail Remote Arbitrary Command
Execution Vulnerability
Report From: Security Focus
* Release Note: A vulnerability exists in 3.x versions of Endymion
MailMan Webmail prior to release 3.0.26. The widely-used Perl script
provides a web-email interface. Affected versions make insecure use
of the perl opn() function. As a result, an attacker can execute
arbitrary commands on a vulnerable host.
* Click here for Advisory on Endymion MailMan WebMail
Date: December 07, 2000
Released: December 06, 2000
Platform: Most Versions of Linux / UNIX
Warning About: APC apcupsd Local Denial of Service Vulnerability
Report From: Security Focus
* Release Note: A denial-of-service vulnerability exists in certain
versions of APC's UPS daemon, apcupsd. apcupsd is the Unix daemon
driving various popular models of uninterruptible power supply
manufactured by American Power Conversion.
* Click here for Advisory on APC apcupsd Vulnerability
Date: December 07, 2000
Released: December 06, 2000
Platform: VPNet Technologies VPN Service Units
Warning About: VPNet VSU Source Routed Session Vulnerability
Report From: Security Focus
* Release Note: VPNos is the firmware developed by VPNet technologies
for use on their VPN Service Units (VSUs). A problem exists in the
firmware that could allow a remote user unauthorized access.
* Click here for Advisory on VPNet VSU Vulnerability
Date: December 03, 2000
Released: December 01, 2000
Platform: Great Circle Associates Majordomo 1.94.5 / 1.94.4
Warning About: Majordomo Config-file admin_password Configuration
Vulnerability
Report From: Security Focus
* Release Note: Majordomo is a popular open-source e-mail list server
written in Perl. There exists a common configuration error in
Majordomo's authentication system that may allow for remote attackers
to execute administrative commands.
* Click here for Advisory on Majordomo Config Vulnerability
Date: December 03, 2000
Released: December 01, 2000
Platform: Multiple Versions of IBM AIX
Warning About: AIX Buffer Overflow Vulnerabilities
Report From: Security Focus
* Release Note: AIX is a variant of the UNIX Operating System,
distributed by IBM. A problem exists which can allow a local user
elevated priviledges.
* Click here for setsenv Buffer Overflow Vulnerability
* Click here for digest Buffer Overflow Vulnerability
* Click here for enq Buffer Overflow Vulnerability
* Click here for setclock Buffer Overflow Vulnerability
* Click here for pioout Buffer Overflow Vulnerability
* Click here for piobe Buffer Overflow Vulnerability
Top of Page
Back to the Virus Archives page
