Virus Warnings from December 2000
   ______________________________________________________________

           [Jump to Amiga] [Jump to Windows] [Jump to Mac]
                   [Jump to Linux] [Jump to Misc]
   ______________________________________________________________


   Amiga


   Date: December 28, 2000
   Platform: Amiga
   Warning About: Another Amiga trojan found !!!
   Report From:   Virus Help Denmark
   * Release Note: Today we recived a new 'lame' trojan.  This trojan
     will delete your "sys:" if you run the program.  At this time non
     of the anti-virus programs can detect this  trojan, but in the next
     update they  will be known.
   * Click here for VHT-DK Virus Warning vht-dk93

   Date: December 19, 2000
   Platform: Amiga
   Warning About: New Amiga trojan found !!!
   Report From:   Virus Help Denmark
   * Release Note: Today we recived a new 'lame' trojan. This trojan
     will only execute it self if you have named your hard-disk "DH0"
     and "DH1".  The trojan is spread in  and archive with  the name
     "DKG-BLUM.LHA".
   * Click here for VHT-DK Virus Warning vht-dk92

   Top of Page


   Windows

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows NT 4.0 / NT 2000 / Linux Versions
   Warning About: ikonboard Arbitrary Command Execution Vulnerability
   Report From:   Security Focus
   * Release Note: ikonboard is a forum management software package
     available from ikonboard.com. A problem exists with could allow
     users access to restricted resources.
   * Click here for Advisory on ikonboard Vulnerability

   Date: December 31, 2000
   Released: December 28, 2000
   Platform: Windows NT 4.0 / NT 2000
   Warning About: Technote Inc Technote 'filename' Variable File
                  Disclosure Vulnerability
   Report From:   Security Focus
   * Release Note: Technote Inc. offers a Multicommunication Package which
     includes a web board type of service. Successful exploitation of this
     vulnerability could lead to the disclosure of sensitive information
     and possibly assist in further attacks against the victim.
   * Click here for Advisory on Technote Vulnerability

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows
   Warning About: VBS/Tqll.a@MM Worm
   Aliases:       VBS/Tqll-A
   Report From:   Network Associates
   * Release Note: The Windows Scripting Host (part of Internet Explorer
     5) is required for this virus to function.  When run this script
     creates the executable, "3K.EXE" in the Windows directory, and runs
     it. This file is a trojan, and the script then mails itself to
     everyone in your Windows Address Book. Read the complete report for
     Method Of Infection and Removal Instructions
   * Click here for Report on VBS/Tqll.a@MM Worm

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows / Outlook
   Warning About: W97M/Ftip.a@mm Internet Worm
   Aliases:       ftip.doc
   Report From:   Network Associates
   * Release Note: This is an Internet worm written in Visual Basic for
     Applications within a Word97 document. This worm may arrive via
     email. Read the complete report for Method Of Infection and Removal
     Instructions
   * Click here for Report on W97M/Ftip.a@mm Internet Worm

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows Scripting Host
   Warning About: VBS/Sorry.a Worm
   Aliases:       VBS.Sorry.A, VBS_TTFLOADER.A
   Report From:   Network Associates
   * Release Note: This script is detected by current DAT files and
     Engine as VBS/Pica.worm.gen. The Windows Scripting Host (part of
     Internet Explorer 5) is required for this virus to function. When
     this Visual Basic Script virus is executed, it copies itself to
     a .vbs file, and makes registry modifications. Read the complete
     report for Method Of Infection and Removal Instructions
   * Click here for Report on VBS/Sorry.a Worm

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows Scripting Host
   Warning About: VBS/Mill.f@MM Worm
   Report From:   Network Associates
   * Release Note: The Windows Scripting Host (part of Internet Explorer
     5) is required for this virus to function.  When run this script
     creates copies of itself to some files.  The script then mails it
     self to all entries in the Windows Address Book using certain
     information. Read the complete report for Method Of Infection and
     Removal Instructions
   * Click here for Report on VBS/Mill.f@MM Worm

   Date: December 28, 2000
   Released: December 27, 2000
   Platform: PC
   Warning About: VBS/Yelp@M.intd VBScript Worm
   Report From:   Network Associates
   * Release Note: This script contains a bug which prevents it from
     running.  The intention of the script is an Internet worm which when
     executed emails itself once to the first entry in the address book.
     This script may arrive via email, or may also modify mIRC client
     script to distribute itself when joining IRC chat. Read the complete
     report for Method Of Infection and Removal Instructions
   * Click here for Report on VBS/Yelp@M.intd Worm

   Date: December 26, 2000
   Released: December 22, 2000
   Platform: MS IIS 5.0 / 4.0
             Windows NT 2000 / NT 4.0 / BackOffice 4.5
   Warning About: Front Page Server Extension DoS Vulnerability
   Report From:   Security Focus
   * Release Note: Microsoft IIS ships with Front Page Server Extensions
     (FPSE) which enables administrators remote and local web page and
     content management. Browse - time support is another feature within
     FPSE which provides users with functional web applications. Due to
     the way FPSE handles the processing of web forms, IIS is subject to
     a denial of service.
   * Click here for Advisory on Microsoft IIS DoS Vulnerability

   Date: December 26, 2000
   Released: December 22, 2000
   Platform: Microsoft IIS (Internet Information Server)
   Patch Available: Malformed Web Form Submission Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a security
     vulnerability in a component that ships as part of Microsoft Internet
     Information Server. The vulnerability could potentially allow an
     attacker to prevent an affected web server from providing useful
     service.
   * Click here for MS Security Bulletin MS00-100

   Date: December 21, 2000
   Released: December 20, 2000
   Platform: MS Windows 2000
   Warning About: MS Win2000 Directory Services Restore Mode
                  Blank Password Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Dir Services Vulnerability

   Date: December 21, 2000
   Platform: Windows
   Warning About: VBS/Season Virus
   Aliases:       BAT_SEASON.A, IRC_SEASON.A, VBS_SEASON.A
   Report From:   Network Associates
   * Release Note: The Windows Scripting Host (part of Internet Explorer
     5) is required for this virus to function. When this Visual Basic
     Script virus is executed, the script performs certain functions.
     Read the complete report for Method Of Infection and Removal
     Instructions
   * Click here for Report on VBS/Season Virus

   Date: December 21, 2000
   Released: December 20, 2000
   Platform: Windows
   Warning About: VBS/Sheep Virus
   Aliases:       VBS/Sheep-A
   Report From:   Network Associates
   * Release Note: The Windows Scripting Host (part of Internet Explorer
     5) is required for this virus to function. When this Visual Basic
     Script virus is executed, it will modify the a file to instruct
     mIRC to distribute the worm to others when connecting to a chat
     room. Read the complete report for Method Of Infection and Removal
     Instructions
   * Click here for Report on VBS/Sheep Virus

   Date: December 21, 2000
   Released: December 19, 2000
   Platform: Windows
   Warning About: VBS/Stertor Virus
   Report From:   Network Associates
   * Release Note: This Visual Basic Script virus is contained in a .HTM
     file. The Windows Scripting Host (part of Internet Explorer 5) is
     required for this virus to function. When an infected document is
     opened, the user is prompted by Internet Explorer to allow the
     execution of potentially unsafe ActiveX controls. Read the complete
     report for Method Of Infection and Removal Instructions
   * Click here for Report on VBS/Stertor Virus

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: MS Word97 and Word2000
   Warning About: W97M/Jedan.b Macro Virus
   Aliases:       
   Report From:   Network Associates
   * Release Note: This virus propagates by infecting Word Documents
     and Templates in MS Word97 and Word2000. The virus consists of
     a macro "ThisDocument". When a file is opened the virus checks
     for a prior W97M/Jedan infection. If the document or template is
     not currently infected the virus proceeds in copying its code to
     that file. Read the complete report for Method Of Infection and
     Removal Instructions
   * Click here for Report on W97M/Jedan.b Macro Virus

   Date: December 21, 2000
   Released: December 20, 2000
   Platform: MS Windows 2000 Domain Controllers
   Patch Available: Directory Service Restore Mode Password
                    Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability affecting Microsoft. Windows. 2000 domain
     controllers. The vulnerability could allow a malicious user with
     physical access to a domain controller to install malicious
     software on it.
   * Click here for MS Security Bulletin MS00-099

   Date: December 21, 2000
   Released: December 19, 2000
   Platform: MS Windows 2000
   Patch Available: Indexing Service File Enumeration Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability in a component that ships as part of MS
     Windows 2000. The vulnerability could allow a malicious web site
     operator to learn the names and properties of files and folders on
     the machine of a visiting user.
   * Click here for MS Security Bulletin MS00-098

   Date: December 17, 2000
   Released: December 15, 2000
   Platform: MS Windows Media Services
   Patch Available: Severed Windows Media Server Connection
                    Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability in Microsoft Windows Media Services. The
     vulnerability could allow a malicious user to degradhe performance
     of a Windows Media server, possibly to the point where it could no
     longer provide useful service.
   * Click here for MS Security Bulletin MS00-097

   Date: December 15, 2000
   Released: December 14, 2000
   Platform: Windows and UNIX
   Warning About: Subscribe-Me Lite Administration Access Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in certain versions of
     Subscribe-Me Lite, the non-commercial version of a mailing list
     administration script from cgiscriptcenter.com. Windows and Unix
     versions are affected. It is possible for an attacker to obtain
     access to the script's administration panel, and to delete arbitrary
     members from the mailing lists supported by the vulnerable script.
   * Click here for Advisory on Subscribe-Me Lite Vulnerability

   Date: December 15, 2000
   Released: December 13, 2000
   Platform: PC
   Warning About: Thus Macro Virus
   Aliases:       Thursday
   Report From:   F-Secure
   * Release Note: Thus is a Word 97 macro virus that has a destructive
     payload. Many Thus variants activate their payload at December 13th.
     Then the virus deletes all files frome root of "C:" drive and from
     all its subdirectories, but it does not delete directories
     themselves.
   * Click here for Report on Thus Macro Virus

   Date: December 14, 2000
   Released: December 13, 2000
   Platform: Various MS IIS Far East Editions, Running Windows NT 2000
             Along With Some Versions Of MS BackOffice
   Warning About: MS IIS Far East Edition DBCS File Disclosure Vulnerability
   Report From:   Security Focus
   * Release Note: The Far East editions of Microsoft IIS do not properly
     validate HTTP requests containing double-byte character sets (DBCS) which may lead
     to the disclosure of files contained within the web root. The editions
     that are affected include Traditional Chinese, Simplified Chinese,
     Japanese, and Korean (Hangeul). This vulnerability affects IIS prior
     to SP6.
   * Click here for Advisory on MS IIS Far East Edition

   Date: December 13, 2000
   Released: December 12, 2000
   Platform: MS Windows
   Warning About: Backdoor-JN Trojan
   Aliases:       
   Report From:   Network Associates
   * Release Note: This backdoor trojan is being distributed on a website
     via the VBS/RunScript.gen4 script. The trojan sends information
     about your system to an ICQMail user. This information contains the
     instructions for that user to take control of your computer remotely,
     to perform various tasks including the retrieval of usernames and
     passwords. For those using Internet Explorer 5, viewing this website
     installs this trojan on your system. Read the complete report for
     Method Of Infection and Removal Instructions
   * Click here for Report on Backdoor-JN Trojan

   Date: December 13, 2000
   Released: December 12, 2000
   Platform: MS Outlook, mIRC and Pirch
   Warning About: Forgotten Worm
   Aliases:       VBS/Forgotten.A-mm, VBS/Pica.worm.gen
   Variants:      Forgotten.A
   Report From:   F-Secure
   * Release Note: Forgotten is a worm written in Visual Basic Scipt that
     speads without any attachment.
   * Click here for Report on Forgotten Worm

   Date: December 13, 2000
   Released: December 11, 2000
   Platform: MS Windows
   Warning About: BleBla Worm
   Aliases:       Romeo-and-Juliet, Romeo, Juliet
                  Verona, IWorm_Blebla, I-Worm.Blebla
   Report From:   F-Secure
   * Release Note: BleBla is a worm spreading via Internet. It was
     discovered in Poland on November 16th, 2000. The worm appears as
     an email message that has HTML formal and 2 attached files:
     MyJuliet.CHM and MyRomeo.EXE.
   * Click here for Report on BleBla Worm

   Date: December 13, 2000
   Released: December 11, 2000
   Platform: Win32
   Warning About: Win32 DDoS Trojan
   Aliases:       DDoS_Kozog, DDoS.Kozog, Kozirog
   Report From:   F-Secure
   * Release Note: Kozog is Win32 DDoS (Distributed Denial of Service
     attack) trojan that was distributed by a hacker (or hackers group)
     in November 2000. The trojan was sent as email messages with
     attached file.
   * Click here for Report on Kozog

   Date: December 12, 2000
   Released: December 09, 2000
   Platform: MS Windows 95 / 98 / Windows ME
   Warning About: SmartStuff FoolProof Security Program Restriction
                  Bypass Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in SmartStuff's FoolProof
     Security for Windows 9x/Me. The application, which is designed to
     restrict the executables which can be run on a (usually public)
     workstation, can be circumvented by downloading (ie, via FTP) and
     renaming a copy of the disallowed executable.
   * Click here for Advisory on SmartStuff FoolProof Vulnerability

   Date: December 08, 2000
   Platform: MS Win32
   Warning About: Hybris Internet Worm
   Aliases:       IWorm_Hybris, I-Worm.Hybris
   Report From:   F-Secure
   * Release Note: Hybris is an Internet worm that spreads itself as an
     attachment to email messages. The worm works under Win32 systems
     only. The worm contains components (plugins) in its code that are
     executed depending on what worm needs, and these components can be
     upgraded from an Internet Web site. The major worm versions are
     encrypted with semi-polymorphic encryption loop.
   * Click here for Report on Hybris Internet Worm

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: MS Windows NT 4.0 / NT 2000
   Warning About: Apache Web Server with Php 3 File Disclosure
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Apache Web Server is subject to disclose files to
     unauthorized users when used in conjunction with the PHP3 script
     language. By requesting a specially crafted URL by way of php,
     it is possible for a remote user to gain read access to a known
     file that resides on the target host.
   * Click here for Advisory on Apache Web Server with Php 3

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: MS Windows NT Terminal Server / Windows NT 4.0
   Warning About: MS WinNT 4.0 RAS Administration Registry
                  Key Vulnerability
   Report From:   Security Focus
   * Release Note: The registry key in Windows NT 4.0 that handles the
     administration of Remote Access Service (RAS) third-party tools is
     not properly configured to deny write access to unprivileged users.
     Therefore, the malicious user would be able to perform any action
     under the LocalSystem security context which would basically yield
     full control over the local machine.
   * Click here for Advisory on MS WinNT 4.0 RAS Vulnerability

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: MS Windows NT Terminal Server / Windows NT 4.0
   Warning About: MS WinNT 4.0 MTS Package Administration Registry
                  Key Vulnerability
   Report From:   Security Focus
   * Release Note: Microsoft Transaction Server (MTS) is the mechanism
     used by Microsoft Windows NT to handle transactions or MTS packages
     which are series of software modules that form a transaction.
     The registry key in Windows NT 4.0 that handles the administration of
     Microsoft Transaction Server (MTS) is not properly configured to deny
     write access to unprivileged users.
   * Click here for Advisory on MS WinNT 4.0 MTS Vulnerability

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: MS Windows NT 4.0 / NT 2000
   Warning About: MS WinNT & 2000 SNMP Registry Key Modification
                  Vulnerability
   Report From:   Security Focus
   * Release Note: The SNMP protocol in Windows NT4 and 2000 enables an
     administrator to manage network devices remotely. Due to a default
     configuration error the SNMP Registry Key premits any user, that is
     logged into that particular machine, to edit the settings.
     Successful exploitation of this vulnerability could allow a user to
     gain full control of network devices.
   * Click here for Advisory on MS WinNT & 2000 SNMP Vulnerability

   Date: December 07, 2000
   Platform: Microsoft Windows
   Warning About: QDel126 Trojan Virus
   Report From:   Network Associates
   * Release Note: This is a file deleting trojan. When loaded in memory,
     it will delete all files on non-write-protected diskettes that are
     placed into the foppy dive. It then copies itself to the diskette.
     The Visual Basic runtime files (vesion 6 or higher) are required for
     this program to run. Upon execution the trojan saves a copy of itself
     to the SYSTEM directory under the name "VMM66.EXE" and creates 
     a registry key value to allow the program to load at system
     startup.
   * Click here for Report on QDel126 Virus

   Date: December 07, 2000
   Platform: Microsoft Windows
   Warning About: W32/HLL.ow Virus
   Report From:   Network Associates
   * Release Note: This, file overwriting, virus infects all .EXE files
     in the directory which it is executed from that do not have the
     HIDDEN file attribute set. Infected files must be deleted and
     restored from backup. The Visual Basic Runtimes files (version 6
     or higher) are required for this virus to function.
   * Click here for Report on W32/HLL.ow Virus

   Date: December 07, 2000
   Platform: MS Windows 2000
   Patch Available: SNMP Parameters Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a tool that corrects the
     permissions on several registry values in Microsoft Windows 2000.
     The default permissions could allow a malicious user to monitor or
     reconfigure certain devices on a network.
   * Click here for MS Security Bulletin MS00-096

   Date: December 07, 2000
   Platform: MS Windows NT. 4.0
   Patch Available: Registry Permissions Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a tool that corrects the
     permissions on several registry values in Microsoft Windows NT 4.0.
     The default permissions could allow a malicious user to gain
     additional privileges on an affected machine.
   * Click here for MS Security Bulletin MS00-095

   Date: December 05, 2000
   Platform: Microsoft Windows NT 4.0 / NT 2000
   Warning About: Microsoft PhoneBook Server Buffer Overflow
   Report From:   Security Focus
   * Release Note: The Phone Book Service is an optional component that
     ships with the NT 4 Option Pack and Windows 2000. It is not installed
     by default. A buffer overflow vulnerability was discovered in the URL
     processing routines of the Phone Book Service requests on IIS 4 and
     IIS 5.
   * Click here for MS PhoneBook Server Buffer Overflow

   Date: December 05, 2000
   Platform: MS Windows 98 / 95 / NT 4.0 / NT 2000
   Warning About: MS Internet Explorer 'INPUT TYPE=FILE' Vulnerability
   Report From:   Security Focus
   * Release Note: One of the ways users submit information to remote
     websites is through the INPUT type form options. Users can upload
     files to remote webservers with the input type=FILE option. Due to
     a design error in the implementation of the INPUT TYPE=FILE variable,
     it is possible for a website operator to specify a known filename
     from the visitors machine for upload to the website.
   * Click here for MS IE 'INPUT TYPE=FILE' Vulnerability

   Date: December 05, 2000
   Platform: MS Windows 9x / Windows ME
   Warning About: W32/XTC@MM Virus Internet Worm
   Aliases:       I-Worm.XTC
   Report From:   Network Associates
   * Release Note: This is a mass mailing Internet worm and backdoor
     trojan which is also capable of spreading via open local network
     shares. It arrives as an encrypted and compressed executable.
     Read the report for Method Of Infection and Removal Instructions.
   * Click here for Report on W32/XTC@MM Virus Internet Worm

   Date: December 05, 2000
   Platform: MS Windows NT 4.0 and Windows 2000 Servers
   Patch Available: Phone Book Server Buffer Overflow Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability in an optional service that ships with
     Microsoft Windows NT. 4.0 and Windows. 2000 Servers. The vulnerability
     could allow a malicious user to execute hostile code on a remote
     server that is running the service.
   * Click here for MS Security Bulletin MS00-094

   Date: December 04, 2000  * Updated from Dec 1st
   Platform: Windows 95/98/ME/NT/2000
   Warning About: Creative Email Worm
   Aliases:       Prolin, Shockwave, W32/Prolin@mm, TROJ_SHOCKWAVE,
                  TROJ_PROLIN
   Report From:   F-Secure
   * Release Note: Prolin is an e-mail worm that spreads itself using
     MS Outlook. The worm itself is a Windows EXE file about 37Kb long
     written in VisualBasic. This vandal arrives as an executable
     attachment named CREATIVE.EXE, masquerading as a Shockwave animation.
     The worm uses the standard "Melissa"-like way of spreading itself. It
     opens MS Outlook's address book, gets e-mail addresses from there and
     sends its copies to these addresses.
   * Click here for Report on Creative Email Worm
   * Click here for AISS Report on Creative

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: Multiple Versions of MS Windows Running Certain MS Apps
   Warning About: 
   Report From:   Security Focus
   * Release Note: The API Srv_paraminfo(), which is implemented by
     Extended Stored Procedures (XPs) in Microsoft SQL Server and Data
     Engine, is susceptible to a buffer overflow vulnerability which
     may cause the application to fail or arbitrary code to be executed
     on the target system depending on the data entered into the buffer.
   * Click here for xp_displayparamstmt Buffer Overflow Vulnerability
   * Click here for xp_enumresultset Buffer Overflow Vulnerability

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: MS Windows Running Certain MS Applications
   Warning About: Microsoft SQL Server / Data Engine
   Report From:   Security Focus
   * Release Note: The API Srv_paraminfo(), which is implemented by
     Extended Stored Procedures (XPs) in Microsoft SQL Server and Data
     Engine, is susceptible to a buffer overflow vulnerability which
     may cause the application to fail or arbitrary code to be executed
     on the target system depending on the data entered into the buffer.
   * Click here for xp_showcolv Buffer Overflow Vulnerability
   * Click here for xp_updatecolvbm Buffer Overflow Vulnerability
   * Click here for xp_peekqueue Buffer Overflow Vulnerability
   * Click here for xp_printstatements Buffer Overflow Vulnerability
   * Click here for xp_proxiedmetadata Buffer Overflow Vulnerability
   * Click here for xp_SetSQLSecurity Buffer Overflow Vulnerability

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: MS Internet Explorer 5.x
   Patch Available: Browser Print Template and File Upload via Form
                    Vulnerabilities
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates four
     security vulnerabilities in Microsoft Internet Explorer
   * Click here for MS Security Bulletin MS00-093

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: MS SQL Server and SQL Server Desktop Engine (MSDE)
   Patch Available: Extended Stored Procedure Parameter Parsing
                    Vulnerabilities
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability in Microsoft SQL Server and Microsoft SQL
     Server Desktop Engine. The vulnerability could enable a malicious
     user to run code on the server, subject to a number of restrictions.
   * Click here for MS Security Bulletin MS00-092

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: MS Windows NT 2000 / Windows 95/98/NT with VB 6.0
   Warning About: Prolin Internet-worm
   Report From:   Kaspersky Lab
   * Release Note: Kaspersky Lab, announces the discovery of a new
     Internet- worm, "Prolin", that has been developed by an unknown
     hacker going by the pseudonym of "The Penguin." To date, Kaspersky
     Lab has received many reports of infections by this worm from Poland.
   * Click here for Virus Alert on Prolin Internet-worm

   Date: December 01, 2000
   Released: November 30, 2000
   Platform: MS Windows NT 2000
   Warning About: MS Windows 2000 Telnet Session Timeout DoS
   Report From:   Security Focus
   * Release Note: The Telnet daemon shipped with Windows 2000 is
     susceptible to a trivial denial of service attack if an initiated
     session is not reset.
   * Click here for Advisory on Telnet Session Timeout

   Date: December 01, 2000
   Released: November 30, 2000
   Platform: MS Windows ME / 98se / 98 / 95 / NT 4.0
   Warning About: MS Windows 9x / NT 4.0 NetBIOS Resource
                  Exhaustion Vulnerability
   Report From:   Security Focus
   * Release Note: Microsoft's implementation NetBIOS is vulnerable to
     a remotely exploitable denial of service attack. An attacker who
     has access to the NBT port can cause the system to become exhausted
     of network resources and cease functioning.
   * Click here for Advisory on Resource Exhaustion Vulnerability

   Date: December 01, 2000
   Released: November 30, 2000
   Platform: MS Windows NT 4.0 / 95, 98, 98 2nd Edition, and Windows Me
   Patch Available: Incomplete TCP/IP Packet Vulnerability
   Report From:   MicroSoft TechNet Security
   * Release Note: Microsoft has released a patch that eliminates a
     security vulnerability in Microsoft Windows NT 4.0 and a recommended
     workaround for Windows 95, 98, 98 Second Edition, and Windows Me. The
     vulnerability could allow a malicious user to temporarily prevent an
     affected machine from providing any networking services or cause it
     to stop responding entirely.
   * Click here for MS Security Bulletin MS00-091

   Date: December 01, 2000
   Platform: Microsoft
   Warning About: Creative Email Worm
   Aliases:       Prolin, Shockwave, W32/Prolin@mm, TROJ_SHOCKWAVE,
                  TROJ_PROLIN
   Report From:   F-Secure
   * Release Note: Prolin is a email worm that arrives in a messages.
     When the attached file is executed, the worm will send itself to all
     recipients on all address book using Outlook and adds itself to the
     Windows startup directory.
   * Click here for Report on Creative Email Worm

   Date: December 01, 2000
   Released: November 30, 2000
   Platform: Microsoft
   Warning About: VBS/Draft VBScript Worm
   Aliases:       Forwarder, I-Worm.Draft
   Variants:      Draft.A@mm
   Report From:   F-Secure
   * Release Note: VBS/Draft is a mass mailing email worm written in
     VBScript. VBS/Draft.A@mm is a worm that replicates by forwarding
     the infected message. When the attachment is executed, the worm
     forwards the infected message to all recipients from "All Users"
     distribution list.
   * Click here for Report on VBS/Draft VBScript Worm

   Top of Page


   Macintosh

   Date: December 21, 2000
   Platform: Apple MacIntosh
   Warning About: Apple Macintosh MRJ Unauthorized File Access
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on MRJ Vulnerability

   Top of Page


   Linux

   Date: December 31, 2000
   Released: December 29, 2000
   Platform: Windows NT 4.0 / NT 2000 / Linux Versions
   Warning About: ikonboard Arbitrary Command Execution Vulnerability
   Report From:   Security Focus
   * Release Note: ikonboard is a forum management software package
     available from ikonboard.com. A problem exists with could allow
     users access to restricted resources.
   * Click here for Advisory on ikonboard Vulnerability

   Date: December 31, 2000
   Released: December 29, 2000
   Platform:  Connectiva
   Updates To:    Security Announcement: gnupg
   Report From:   Linux Daily News
   * Release Note: Connectiva has released a security announcement
     concerning a Vulnerability with detached signatures and web of
     trust in gnupg.
   * Click here for LWN Security Announcement: gnupg

   Date: December 28, 2000
   Platform: RedHat Linux 6.1 i386
   Warning About: Security-Enhanced Linux Buffer Overflow Vulnerability
   Report From:   Security Focus
   * Release Note: Security-Enhanced Linux is an add-on access control
     infrastructure developed and distributed by the U.S. National Security
     Agency. A problem exists which could allow the altering of sensitive
     information on a running system.
   * Click here for Advisory on Security-Enhanced Linux Vulnerability

   Date: December 28, 2000
   Released: December 27, 2000
   Platform: Debian Linux
   Warning About: dialog /tmp File Race Condition Vulnerability
   Report From:   Security Focus
   * Release Note: dialog is a program available with the Debian
     distribution of the Linux Operating System. A problem exists which
     could allow a user to append to or overwrite files owned by another
     user.
   * Click here for Advisory on dialog /tmp Vulnerability

   Date: December 28, 2000
   Platform:  TurboLinux
   Updates To:    Security Announcement
   Report From:   Linux Daily News
   * Release Note: Turbolinux has reported a security hole in fetchmail
     5.5.0-2 and earlier.
   * Click here for LWN Security Update To fetchmail-5.5.0-2

   Date: December 26, 2000
   Released: December 24, 2000
   Platform:  Debian
   Updates To:    Debian Security Advisories
   Report From:   Linux Daily News
   * Release Note: Debian has issued security advisories for dialog,
     stunnel and gnupg.
   * Click here for LWN Security Advisory For dialog
   * Click here for LWN Security Advisory For stunnel
   * Click here for LWN Security Advisory For gnupg

   Date: December 26, 2000
   Released: December 21, 2000
   Platform:  Red Hat
   Updates To:    Stunnel Packages
   Report From:   Linux Daily News
   * Release Note: Red Hat has issued another update for its stunnel
     packages. This one addresses writing to non-existent directories.
   * Click here for LWN Security Update To Stunnel Packages

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Linux / FreeBSD
   Warning About: BSD ftpd Single Byte Buffer Overflow Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on ftpd Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Linux / FreeBSD
   Warning About: FreeBSD procfs Access Control Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on procfs Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Linux / FreeBSD
   Warning About: FreeBSD procfs Denial of Service Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on procfs DoS Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Linux / FreeBSD
   Warning About: FreeBSD procfs jail Breaking Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on procfs Vulnerability

   Date: December 17, 2000
   Released: December 16, 2000
   Platform:  Linux Mandrake
   Updates To:    Security Update For pam
   Report From:   Linux Daily News
   * Release Note: Linux Mandrake issued a security update for the pam
     module. Shortly after that they issued an updated advisory.
   * Click here for LWN Security Update To pam
   * Click here for LWN Updated Advisory To pam

   Date: December 17, 2000
   Released: December 16, 2000
   Platform:  Slackware Linux
   Updates To:    OpenSSL Cryptography Libraries
   Report From:   Linux Daily News
   * Release Note: Slackware Linux announced the addition of the OpenSSL
     cryptography libraries and the OpenSSH suite of network connectivity
     tools. Users of Slackware 7.1 and -current can download these
     packages from Slackware's current developmental tree.
   * Click here for LWN OpenSSL Cryptography Libraries

   Date: December 17, 2000
   Released: December 16, 2000
   Platform:  Linux-Mandrake
   Updates To:    Security Alert For jpilot
   Report From:   Linux Daily News
   * Release Note: Linux-Mandrake reports that the jpilot program
     automatically creates a directory called .jpilot/ in the user's home
     directory with 777 (world read/write/execute) permissions. This
     directory is used to store all backups, configuration and
     synchronized Palm Pilot information.
   * Click here for LWN Security Alert To jpilot

   Date: December 15, 2000
   Released: December 14, 2000
   Platform: Windows and UNIX
   Warning About: Subscribe-Me Lite Administration Access Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in certain versions of
     Subscribe-Me Lite, the non-commercial version of a mailing list
     administration script from cgiscriptcenter.com. Windows and Unix
     versions are affected. It is possible for an attacker to obtain
     access to the script's administration panel, and to delete arbitrary
     members from the mailing lists supported by the vulnerable script.
   * Click here for Advisory on Subscribe-Me Lite Vulnerability

   Date: December 15, 2000
   Released: December 14, 2000
   Platform:  Linux-Mandrake
   Updates To:    BitchX
   Report From:   Linux Daily News
   * Release Note: Linux-Mandrake has posted a security bulletin for
     BitchX. A possible stack overflow condition exists if a malformed
     DNS answer is processed by the client, and a second bug allows
     this malformed DNS record to be embedded in a valid DNS packet.
   * Click here for LWN Security Bulletin To BitchX

   Date: December 15, 2000
   Released: December 14, 2000
   Platform:  Conectiva
   Updates To:    ed Editor And pam Module
   Report From:   Linux Daily News
   * Release Note: Conectiva has posted security bulletins for both ed
     and pam. The "ed" editor creates temporary files in an insecure way,
     making it vulnerable to symlink attacks. The pam_localuser module,
     part of the PAM package, has a buffer overflow vulnerability in it,
     though it's not used in any dfault configurations.
   * Click here for LWN Security Update To ed
   * Click here for LWN Security Update To pam

   Date: December 14, 2000
   Released: December 12, 2000
   Platform: Various Versions Of Linux
   Warning About: Multiple Oops Proxy Server Buffer Overflow
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Oops is a freely available proxy server package,
     written by Igor Khasilev. A problem exists in the package which
     could allow for the arbitrary execution of code. Multiple buffer
     overflows exist in this product.
   * Click here for Advisory on Multiple Oops Proxy Server

   Date: December 14, 2000
   Released: December 12, 2000
   Platform: Linux / Unix
   Warning About: University of Washington Pico File Overwrite Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in several versions of University
     of Washington's Pico, a widely-distributed text editor shipped with
     most versions of Linux / Unix. Under very specific circumstances, it
     is possible to cause this version of Pico to overwrite arbitrary
     files with the privilege level of the victim user.
   * Click here for Advisory on Univ. of Wash Pico Vulnerability

   Date: December 14, 2000
   Released: December 12, 2000
   Platform: Linux / NetBSD
   Warning About: Roaring Penguin PPPoE Denial of Service Vulnerability
   Report From:   Security Focus
   * Release Note: Roaring Penguin Software's PPPoE is a freeware PPP over
     Ethernet client often used by ADSL subscribers running Linux or NetBSD.
     PPPoE contains a possibly remotely exploitable denial of service
     vulnerability in its handling of TCP packets when the Clamp_MSS option
     is used.
   * Click here for Advisory on Roaring Penguin PPPoE DDoS Vulnerability

   Date: December 14, 2000
   Platform: Linux / UNIX / BSDI / AT & T SVR4 4.0
   Warning About: Leif M. Wright ad.cgi Unchecked Input Vulnerability
   Report From:   Security Focus
   * Release Note: ad.cgi is an ad rotation script freely available, and
     written by Leif Wright. A problem exists in the script which may
     allow access to restricted resources. The problem occurs in the
     method in which the script checks input.
   * Click here for Advisory on Leif M. Wright ad.cgi

   Date: December 14, 2000
   Platform:  Red Hat
   Updates To:    Security Update To bitchx
   Report From:   Linux Daily News
   * Release Note: Red Hat has issued a security update to bitchx
     (part of the Powertools package) fixing a vulnerability to
     malformed DNS answers.
   * Click here for LWN Security Update To bitchx

   Date: December 13, 2000
   Released: December 12, 2000
   Platform:  Conectiva
   Updates To:    Security Update To rp-pppoe
   Report From:   Linux Daily News
   * Release Note: Conectiva has issued a security update to rp-pppoe
     (a user-space PPP-over-ethernet client) fixing a problem wherein
     an attacker could cause a network connection to be dropped.
   * Click here for LWN Security Update To rp-pppoe

   Date: December 13, 2000
   Released: December 12, 2000
   Platform:  Linux-Mandrake
   Updates To:    Security Updates To apcupsd And mc
   Report From:   Linux Daily News
   * Release Note: MandrakeSoft has issued a security update to apcupsd
     fixing a problem that could allow a local attacker to kill any
     process on the system. Also issued is this update to mc addressing
     a vulnerability that could allow the corruption of arbitrary files
     on the system.
   * Click here for LWN Security Update To apcupsd
   * Click here for LWN Security Update To mc

   Date: December 13, 2000
   Reported: December 12, 2000
   Platform: RedHat Open Source Or Other Systems Running Unpatched
             LPRng Software
   Warning About: Input Validation Problems in LPRng
   Report From:   CERT
   * Release Note: A popular replacement software package to the BSD
     lpd printing service called LPRng contains at least one software
     defect, known as a "format string vulnerability", which may allow
     remote users to execute arbitrary code on vulnerable systems.
   * Click here for CERT CA-2000-22

   Date: December 12, 2000
   Released: December 11, 2000
   Platform: Linux - Various Flavours
   Warning About: ssldump Format String Vulnerability
   Report From:   Security Focus
   * Release Note: ssldump is a traffic analyzer for monitoring network
     traffic in real time. It is written and maintained by Eric Rescorla.
     A problem exists which could allow the arbitrary execution of code.
   * Click here for Advisory on ssldump Format String Vulnerability

   Date: December 10, 2000
   Released: December 09, 2000
   Platform:  Linux Mandrake
   Updates To:    GNU ed line editor package
   Report From:   Linux Daily News
   * Release Note: Linux Mandrake has issued a security advisory for
     the GNU ed line editor package, which can create temporary files
     unsafely.
   * Click here for LWN Security Update To ed

   Date: December 10, 2000
   Released: December 08, 2000
   Platform:  Zope / Digital Creations
   Updates To:    Zope Security Update
   Report From:   Linux Daily News
   * Release Note: All Zope versions up through 2.2.4 have a security
     vulnerability that could allow anonymous users (i.e. anybody on
     the net) to do things inside the server that they should not be
     able to do. A security update has been issued by Digital Creations.
     It is highly recommended that people running Zope apply this fix.
   * Click here for LWN Security Update To Zope

   Date: December 08, 2000
   Platform: UNIX / Linux
   Warning About: Lexmark Markvision Printer Driver Buffer Overflow
                  Vulnerabilities
   Report From:   Security Focus
   * Release Note: MarkVision is a driver software package engineered
     to allow UNIX systems use Lexmark Printers. It is distributed by
     Lexmark International. A problem in the driver software could allow
     elevation of priviledges.
   * Click here for Advisory on Markvision Printer Driver Vulnerabilities

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: Various Linux Versons
   Warning About: phpGroupWare Remote Include File Vulnerability
   Report From:   Security Focus
   * Release Note: phpGroupWare is a multi-user groupware suite originally
     developed by Joseph Engo, and freely distributed. A problem in the
     software could allow users to remotely execute malicious code.
   * Click here for Advisory on phpGroupWare Vulnerability

   Date: December 05, 2000
   Platform: Varioius Versions / Flavours of Linux
   Warning About: phpWebLog Administrator Authentication Bypass
                  Vulnerability
   Report From:   Security Focus
   * Release Note: phpWebLog is an Open Source web news management system,
     authored by Jason Hines. A problem exists which can allow users
     administrative access to the management interface.
   * Click here for Advisory on phpWebLog Adm Vulnerability

   Date: December 05, 2000
   Released: December 04, 2000
   Platform:  Red Hat
   Updates To:    Diskcheck Utility
   Report From:   Linux Daily News
   * Release Note: Red Hat has issued a security update to the diskcheck
     utility, which was part of the 6.x Powertools release. It seems
    that diskcheck has a symlink vulnerability.
   * Click here for LWN Security Update To Diskcheck Utility

   Date: December 03, 2000  * Revised
   Released: December 02, 2000
   Platform:  Debian
   Updates To:    joe Editor
   Report From:   Linux Daily News
   * Release Note: The Debian Project has issued a revised security
     update to joe, evidently the previous version didn't work quite right.
   * Click here for LWN Security Update To joe Editor

   Top of Page


   Miscellaneous

   Date: December 28, 2000
   Platform: Upland Solutions Program
   Warning About: 1st Up Mail Server 4.1
   Report From:   Security Focus
   * Release Note: 1st Up Mail Server is an email server which supports
     most common internet protos and email software offered by Upland
     Solutions. It is possible to cause a denial of service in 1st Up
     Mail Server, the vulnerability exists in the "mail from" field.
   * Click here for Advisory on 1st Up Mail Server 4.1

   Date: December 28, 2000
   Platform: GNU Privacy Guard 1.0.3 / 1.0.3b / 1.0.2 / 1.0.1
   Warning About: GnuPG Silent Import of Secret Keys Vulnerability
   Report From:   Security Focus
   * Release Note: GnuPG is the GNU Privacy Guard, a public key program
     designed to facilitate secure email between parties. A problem exists
     which could allow a breaking of the ring of trust.
   * Click here for Advisory on GnuPG Secret Keys Vulnerability

   Date: December 21, 2000
   Released: December 19, 2000
   Platform: Miscellaneous
   Warning About: Alt-Daemon 3.5.0 Denial of Service Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Alt-Daemon DoS Vulnerability

   Date: December 21, 2000
   Released: December 19, 2000
   Platform: Miscellaneous
   Warning About: Stunnel Weak Encryption Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Stunnel Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Miscellaneous
   Warning About: Sonata Local Arbitrary Command Excution
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Sonata Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Miscellaneous
   Warning About: Solaris patchadd Race Condition Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on patchadd Vulnerability

   Date: December 21, 2000
   Released: December 18, 2000
   Platform: Miscellaneous
   Warning About: Stunnel Local Arbitrary Command Execution
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Stunnel Vulnerability

   Date: December 21, 2000
   Released: December 17, 2000
   Platform: Miscellaneous
   Warning About: Nano Local File Overwrite Vulnerability
   Report From:   Security Focus
   * Release Note: Please read the report for the full details.
   * Click here for Advisory on Nano Vulnerability

   Date: December 17, 2000
   Released: December 15, 2000
   Platform: Watchguard SOHO Firewall 1.6
   Warning About: Watchguard SOHO Firewall Fragmented IP Packet
                  DoS Vulnerability
   Report From:   Security Focus
   * Release Note: SOHO Firewall is an appliance firewall by Watchguard
     Technologies Inc. designed for Small Office/Home Office users.
     Sending a large number of fragmented IP packets to SOHO Firewall will
     cause the service to drop network connections and cease packetforwing.
     Watchguard has addressed this vulnerability with the release of
     version 2.x.
   * Click here for Advisory on SOHO Firewall Vulnerability

   Date: December 15, 2000
   Released: December 14, 2000
   Platform: Palm OS 3.5.2 / 3.3
   Warning About: SafeWord e.Id Trivial PIN Brute-Force Vulnerability
   Report From:   Security Focus
   * Release Note: Safeword e.Id is a one-time password based
     authentication system. In this sort of authentication system, the
     security of the shared secret (the user's PIN) is critical. If an
     attacker can gain access to the PDB file, it is possible to easily
     brute-force the valid PIN number.
   * Click here for Advisory on SafeWord e.Id Vulnerability

   Date: December 15, 2000
   Released: December 14, 2000
   Platform: Leif M. Wright's simplestguest.cgi
   Warning About: Leif M. Wright simplestguest.cgi Remote Command
                  Execution Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerabiliy exists in Leif M. Wright's
     simplestguest.cgi, a script designed to coordinate guestbook
     submissions from website visitors. An insecurely call to the
     open() function leads to a failure to properly filter shell
     metacharacters from user supplied input.
   * Click here for Advisory on simplestguest.cgi Vulnerability

   Date: December 15, 2000
   Released: December 14, 2000
   Platform: CoffeeCup Direct FTP 1.0 / CoffeeCup Free FTP 1.0
   Warning About: CoffeeCup FTP Clients Weak Password Encryption
                  Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in the FTP clients CoffeCupt
     Direct and CoffeeCup Free. The clients use the file FTPServers.ini
     to store password information for sites to which the client has
     been connected. The encryption method designed to obfuscate these
     passwords can be easily defeated.
   * Click here for Advisory on CoffeeCup Vulnerability

   Date: December 14, 2000
   Released: December 13, 2000
   Platform: KDE kmail 1.102
   Warning About: KDE Kmail Weak Password Encryption Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in the K Destop Environment's
     integrated mail client KMail. The encryption system used by the
     program to secure a given user's mail is weak and may be trivially
     defeated.
   * Click here for Advisory on KDE Kmail Vulnerability

   Date: December 14, 2000
   Released: December 13, 2000
   Platform: Leif M. Wright everythingform.cgi 2.0
   Warning About: Leif M. Wright everythingform.cgi Arbitrary
                  Command Execution Vulnerability
   Report From:   Security Focus
   * Release Note: An input validation vulnerability exists in Leif M.
     Wright's everything.cgi, a Perl-based form design tool. The script
     fails to properly filter shell commands from user-supplied input
     to the 'config' field.
   * Click here for Advisory on Leif M. Wright everythingform.cgi

   Date: December 14, 2000
   Released: December 13, 2000
   Platform: Leif M. Wright simplestmail.cgi 1.0
   Warning About: Leif M. Wright simplestmail.cgi Remote Command
                  Execution Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerabiliy exists in Leif M. Wright's
     simplestmail.cgi, a script designed to coordinate email responses
     from web forms.
   * Click here for Advisory on Leif M. Wright simplestmail.cgi

   Date: December 13, 2000
   Reported: December 12, 2000
   Platform: RedHat Open Source Or Other Systems Running Unpatched
             LPRng Software
   Warning About: Input Validation Problems in LPRng
   Report From:   CERT
   * Release Note: A popular replacement software package to the BSD
     lpd printing service called LPRng contains at least one software
     defect, known as a "format string vulnerability", which may allow
     remote users to execute arbitrary code on vulnerable systems.
   * Click here for CERT CA-2000-22

   Date: December 12, 2000
   Released: November 29, 2000
   Platform: Java Development Kit (JDKTM) 1.1.x and
             Java 2 Standard Edition SDKTM v 1.2.x releases
   Warning About: Potential Security Issue in Class Loading
   Report From:   Sun
   * Release Note: Through its own research and rigorous testing, Sun
     has discovered a potential security issue in the JavaTM Runtime
     Environment that affects both Java Development Kit (JDKTM)
     1.1.x and Java 2 Standard Edition SDKTM v 1.2.x releases. The
     issue poses a possible security risk by allowing an untrusted
     class to call into a disallowed class under certain circumstances.
     Read the report for update releases that are available as a remedy
     for this issue.
   * Click here for Advisory on Potential Security Issue

   Date: December 10, 2000
   Released: December 08, 2000
   Platform: Firmware versions 2.2.1 and below
   Warning About: Watchguard SOHO 2.2 Denial of Service Vulnerability
   Report From:   Security Focus
   * Release Note: The SOHO 2.2 is a popular SOHO firewall by Watchguard
     Technologies Inc. A vulnerability exists in Watchguard SOHO 2.2
     firewalls with firmware versions 2.2.1 and below that could allow
     a remote attacker to execute a Denial of Service attack on the
     firewall and render it in-operable.
   * Click here for Advisory on Watchguard SOHO 2.2 DoS Vulnerability

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: Endymion MailMan WebMail v3.x
   Warning About: Endymion MailMan WebMail Remote Arbitrary Command
                  Execution Vulnerability
   Report From:   Security Focus
   * Release Note: A vulnerability exists in 3.x versions of Endymion
     MailMan Webmail prior to release 3.0.26. The widely-used Perl script
     provides a web-email interface. Affected versions make insecure use
     of the perl opn() function. As a result, an attacker can execute
     arbitrary commands on a vulnerable host.
   * Click here for Advisory on Endymion MailMan WebMail

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: Most Versions of Linux / UNIX
   Warning About: APC apcupsd Local Denial of Service Vulnerability
   Report From:   Security Focus
   * Release Note: A denial-of-service vulnerability exists in certain
     versions of APC's UPS daemon, apcupsd. apcupsd is the Unix daemon
     driving various popular models of uninterruptible power supply
     manufactured by American Power Conversion.
   * Click here for Advisory on APC apcupsd Vulnerability

   Date: December 07, 2000
   Released: December 06, 2000
   Platform: VPNet Technologies VPN Service Units
   Warning About: VPNet VSU Source Routed Session Vulnerability
   Report From:   Security Focus
   * Release Note: VPNos is the firmware developed by VPNet technologies
     for use on their VPN Service Units (VSUs). A problem exists in the
     firmware that could allow a remote user unauthorized access.
   * Click here for Advisory on VPNet VSU Vulnerability

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: Great Circle Associates Majordomo 1.94.5 / 1.94.4
   Warning About: Majordomo Config-file admin_password Configuration
                  Vulnerability
   Report From:   Security Focus
   * Release Note: Majordomo is a popular open-source e-mail list server
     written in Perl.  There exists a common configuration error in
     Majordomo's authentication system that may allow for remote attackers
     to execute administrative commands.
   * Click here for Advisory on Majordomo Config Vulnerability

   Date: December 03, 2000
   Released: December 01, 2000
   Platform: Multiple Versions of IBM AIX
   Warning About: AIX Buffer Overflow Vulnerabilities
   Report From:   Security Focus
   * Release Note: AIX is a variant of the UNIX Operating System,
     distributed by IBM. A problem exists which can allow a local user
     elevated priviledges.
   * Click here for setsenv Buffer Overflow Vulnerability
   * Click here for digest Buffer Overflow Vulnerability
   * Click here for enq Buffer Overflow Vulnerability
   * Click here for setclock Buffer Overflow Vulnerability
   * Click here for pioout Buffer Overflow Vulnerability
   * Click here for piobe Buffer Overflow Vulnerability

   Top of Page


   Back to the Virus Archives page

[Home] - [About Us] - [News] - [Downloads] - [Warnings] - [Links]
[Archives] - [Non-Java Web Chat] - [PGP] - [Search Page] - [Feedback]

Virus Help Team Canada Site (c)2000-2012 by Charlene
VHT-CAN and our webhoster disclaimes any responsibility for software
obtained through this site. Contact VHT-Canada