Virus Warnings from January 2001
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: January 27, 2001
Platform: Amiga
Warning About: NO Virus/Trojan In The "CK-Bombfire" File
Report From: Virus Help Denmark
* Release Note: There is NO virus/trojan in the "CK-Bombfire" file, as
users can read on tour warning page, it is a bug in xvs.library. Alex
will release a new update of xvs this weekend (I hope)......
* Click here for Latest Amiga xvs.library
Date: January 26, 2001
Platform: Amiga
Warning About: Amiga TCP Trojan Has Been Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: At this time only Safe v14.7 (file name Safe147.lha), can
detect the trojan and remove the tojan from memory, and within a few
days, by the "xvs.library".
* Click here for VHT-DK Virus Warning vht-dk94
* Click here for Safe v14.7 Program
Date: January 23, 2001 * See Update dated Jan 27th
Platform: Amiga
Warning About: DKG-Blum Virus on Amiga Active CD 17
Report From: Amiga.org
* Release Note: There is a virus on Amiga Active CD 17. The file
AACD17:AACD/Demos/Spoletium3/Demo/2.CamelKaos-Bombfire/CK-Bombfire.exe
is infected with the DKG-Blum virus. This virus is detected with version
33.24 of xvs.library, but that library wasn't released until two days
after AACD17 was mastered.
* Click here for Amiga Active's Statement on Amiga Active CD 17
* Click here for Amiga.org Posts on Amiga Active CD 17 has a virus
* Click here for Latest Amiga xvs.library
Top of Page
Windows
Date: January 31, 2001
Platform: MS Windows 2000
Patch Available: Tool and Patch Available to correct Hotfix
Packaging Anomalies
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a tool and patch that allow
customers to diagnose and eliminate the effects of anomalies in the
packaging of hotfixes for English language versions of MS Windows 2000.
Under certain circumstances, these anomalies could cause the removal
of some hotfixes, which could include some security patches, from a
Windows 2000 system.
* Click here for MS Security Bulletin MS01-005
* Click here for FAQ about vulnerability and the patch
Date: January 31, 2001
Platform: PC
Warning About: Bymer Worm
Aliases: Worm_Bymer_a, Worm.Bymer, Worm.RC5
Variant: Bymer.A, Bymer.B
Report From: F-Secure
* Release Note: During autumn 2000 there appeared 2 worms that drop RC5
clients on computers they infect. The F-Secure report has descriptions
of both of these worms. You can also use a free version of F-Prot for
DOS to remove Bymer worm from an infected system. It is a requirement
to perform disinfection from pure DOS.
* Click here for Report on Bymer Worm
Date: January 31, 2001
Platform: PC
Warning About: RC5 Client Program
Aliases: Distributed Net, RC5 Client
Report From: F-Secure
* Release Note: There is no virus by this name. Distributed.net is an
organization that distributes a client that can be used to calculate
huge calcutions when a large number of machines is running the client.
Some users have created trojan horses to drop this client to unsuspect-
ing users, effectively using their machine for their own needs.
* Click here for Report on RC5 Client Program
Date: January 31, 2001 * Updated
Platform: PC
Warning About: Navidad.b Worm
Aliases: I-Worm.Navidad, W32/Watchit.intd, I-Worm_Navidad,
W32/Navidad
Report From: F-Secure
* Release Note: Navidad is an Internet worm. It spreads itself as
NAVIDAD.EXE attachment to e-mail messages sent from an infected
computer. The original worm sample that we received has a bug that
makes an infected system inoperable after infection - no EXE files
could be started.
* Click here for Report on Navidad.b Worm
Date: January 31, 2001
Platform: PC Win32
Warning About: MTX Worm
Aliases: IWorm_MTX, I-Worm.MTX, Matrix
Report From: F-Secure
* Release Note: The MTX worm has three components - worm, virus and
backdoor. It spreads under Win32 systems - the virus component infects
Win32 executable files, attempts to send e-mail messages with infected
attachments and installs the backdoor component to download and spawn
"plugins" on an affected system.
* Click here for Report on MTX Worm
Date: January 31, 2001 * Updated
Platform: PC Win32 Systems
Warning About: Hybris Worm
Aliases: IWorm_Hybris, I-Worm.Hybris
Report From: F-Secure
* Release Note: Hybris is an Internet worm that spreads itself as an
attachment to email messages. The worm works under Win32 systems only.
The worm contains components (plugins) in its code that are executed
depending on what worm needs, and these components can be upgraded
from an Internet Web site. The major worm versions are encrypted with
semi-polymorphic encryption loop.
* Click here for Report on Hybris Worm
Date: January 31, 2001
Platform: MS Windows 95
Warning About: CIH Virus
Aliases: PE_CIH, CIHV, SPACEFILLER, VIN32, CHERNOBYL,
TSHERNOBYL, TSERNOBYL
Report From: F-Secure
* Release Note: CIH virus infects Windows 95 and 98 EXE files. After an
infected EXE is executed, the virus will stay in memory and will infect
other programs as they are accessed.
* Click here for Report on CIH Virus
Date: January 31, 2001
Platform: PC
Warning About: AOL Trojan
Aliases: AOL.Trojan, AOL.PWSTEAL
Report From: F-Secure
* Release Note: These are not viruses but trojan horses, made
specifically to work under the America On-Line front-end system.
These AOL trojans can be successfully disinfected with a fresh
version of FSAV and the latest updates for it.
* Click here for Report on AOL Trojan
Date: January 31, 2001
Platform: PC
Warning About: Qaz Worm
Aliases: Worm.Qaz, Worm_Qaz
Report From: F-Secure
* Release Note: This is network worm with backdoor capabilities, which
spreads itself under Win32 systems. The worm was reported in-the-wild
in July-August, 2000. The worm itself is Win32 executable file and
about 120K long, written in MS Visual C++.
* Click here for Report on Qaz Worm
Date: January 31, 2001
Platform: PC
Warning About: NetBus Trojan
Aliases: Netbus.153, Netbus.160, Netbus.170
Report From: F-Secure
* Release Note: NetBus is not a virus, but it is considered to be a
trojan. It is also quite widespread and used frequently to steal data
and delete files on peoples machines. Netbus allows a hacker to access
data and gain control over some Windows functions on remote computer
system.
* Click here for Report on NetBus Trojan
Date: January 31, 2001
Platform: PC
Warning About: SubSeven Backdoor
Aliases: Backdoor-G, Backdoor.SubSeven, Sub7
Report From: F-Secure
* Release Note: The SubSeven backdoor was first discovered in May, 1999.
First samples of this backdoor were not packed, but later some packed versions
appeared which were not easy to detect with contemporary anti-virus
programs. The backdoor is usually distributed under different names via
newsgroups and e-mails.
* Click here for Report on SubSeven Backdoor
Date: January 31, 2001
Platform: PC
Warning About: PrettyPark Worm
Aliases: Pretty Park, I-Worm.PrettyPark
Report From: F-Secure
* Release Note: The 'PrettyPark' also known as 'Trojan.PSW.CHV' is an
Internet worm, a password stealing trojan and a backdoor at the same
time. It was reported to be widespread in Central Europe in June 1999.
There was also an outbreak of this worm in March 2000.
* Click here for Report on PrettyPark Worm
Date: January 31, 2001
Platform: PC Win32 Systems
Warning About: Kriz Virus
Aliases: Win32_Kriz, Win32.Kriz, W32/Kriz
Report From: F-Secure
* Release Note: Kriz is a memory resident polymorphic virus. It replicates
under Win32 systems and infects PE EXE files (portable executables) with
EXE and SCR extensions.
* Click here for Report on Kriz Virus
Date: January 31, 2001
Released: January , 2001
Platform: Windows Production and Solaris(TM) Reference Releases
Warning About: Class Loading Vulnerability in Sun Java (TM) Runtime
Environment
Report From: CIAC
* Release Note: The Java (TM) Runtime Environment can fail to securely
confine the activity of an untrusted Java class. In particular, an
untrusted Java class might be able to call into a disallowed area.
* Click here for Bulletin Number L-032
Date: January 30, 2001
Platform: Microsoft Internet Information Server 4.0 and 5.0
Patch Available: Variant of "File Fragment Reading via .HTR" Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a security
vulnerability in Microsoft Internet Information Service. The vulnerability
could allow enable an attacker, under very unusual conditions, to read
fragments of files from a web server.
* Click here for MS Security Bulletin MS01-004
* Click here for FAQ about vulnerability and the patch
Date: January 30, 2001
Released: January 29, 2001
Platform: PC Windows
Warning About: Mip Virus
Aliases: Archivo, Win32.HLLO.Mip
Report From: F-Secure
* Release Note: The 'Win32.HLLO.Mip' is a Windows-based overwriting virus
created with Visual Basic 6.
* Click here for Report on Mip Virus
Date: January 28, 2001
Platform: PC
Warning About: X97M.Laroux.JG Virus
Report From: Norton / Symantec Security Updates
* Release Note: X97M.Laroux.JG is a macro virus that infects Microsoft
Excel spreadsheets. On infected systems, X97M.Laroux.JG replicates by
copying itself, line by line, to Microsoft Excel spreadsheets when
they are opened. The virus has a payload that triggers on the 25th of
every month. Read the complete report for Removal Instructions.
* Click here for Report on X97M.Laroux.JG Virus
Date: January 28, 2001
Platform: PC
Warning About: W97M.Toy.A Virus
Report From: Norton / Symantec Security Updates
* Release Note: The W97M.Toy.A macro virus infects the Microsoft Word
Normal.dot template and uses that template to spread. It also uses mIRC
to send itself to other users. It will spread using mIRC only if it finds
the Mirc32.exe file on drive C. Read the complete report for Removal
Instructions.
* Click here for Report on W97M.Toy.A Virus
Date: January 28, 2001
Platform: PC with VB5 or higher
Warning About: Flor Trojan
Report From: Network Associates
* Release Note: This is a memory resident trojan written in Visual Basic.
The VB5 (or higher) runtime files are required for this program to
function. Once the program is loaded into memory, every 60 seconds, it
attempts to copy itself to two different folders. Additionally, the trojan
attempts to go to a URL in the http://www3.cybercities.com domain. Read
the complete report for Method Of Infection and Removal Instructions
* Click here for Report on Flor Trojan
Date: January 28, 2001
Released: January 26, 2001
Platform: PC
Warning About: Eight941 Virus
Aliases: Eight
Report From: F-Secure
* Release Note: When an infected document is opened or closed, the virus
infects the global template. After that, it infects all documents that
are closed or opened. Beside replication, W97M/Eight941.A adds a password
protection to all documents that are opened in Word when it infects. The
password is: 8941
* Click here for Report on Eight941 Virus
Date: January 28, 2001
Released: January 25, 2001
Platform: PC with AOL Client Software
Warning About: Cool Trojan
Aliases: Trojan.Cool, Trojan.AOL.Cool, Mine, Trojan/Mine
Report From: F-Secure
* Release Note: Trojan.AOL.Cool is a trojan that affects AOL client
software and steals information from AOL users. Also according to
reports it can spread itself to other AOL users (we can't confirm
that so far). The trojan usually arrives in e-mail message with a
subject 'Hey You' and MINE.EXE file attached. When that attachment
is run, the trojan installs itself 3 times (all its files have hidden
attributes)
* Click here for Report on Cool Trojan
Date: January 28, 2001
Released: January 25, 2001
Platform: PC
Warning About: Ethan Word Macro Virus
Aliases: Ethana
Report From: F-Secure
* Release Note: W97M/Ethan is a Word macro virus that replicates under
Word 97. It was found in the wild in Northern Europe in January 1999.
Ethan is a simple macro virus, consisting of a single macro less than
50 lines long. It infects Word's NORMAL.DOT template and documents by
prepending it's code to a module in the document.
* Click here for Report on W97M/Ethan Virus
Date: January 26, 2001
Platform: MS Windows
Warning About: W32/Shorm Worm
Aliases: Worm.Shorm (AVP)
Report From: Network Associates
* Release Note: This is an Internet worm which attacks specific IP
addresses using a target list downloaded from a (now defunct) website.
This worm is not believed to be of any threat due to its inability to
retrieve the target list. Read the complete report for Method Of
Infection and Removal Instructions
* Click here for Report on W32/Shorm Worm
Date: January 25, 2001
Platform: Windows
Warning About: W97M/Ethan Virus
Aliases: Ethana
Report From: F-Secure
* Release Note: W97M/Ethan is a Word macro virus that replicates under
Word 97. It was found in the wild in Northern Europe in January 1999.
Ethan is a simple macro virus, consisting of a single macro less than
50 lines long. It infects Word's NORMAL.DOT template and documents by
prepending it's code to a module in the document.
* Click here for Report on W97M/Ethan Virus
Date: January 25, 2001
Platform: Windows
Warning About: Universe Worm
Aliases: I-Worm.Universe, IWorm_Universe, Unis
Report From: F-Secure
* Release Note: Universe is a complex modular worm written by Benny of the
29a virus group. The versions of this worm we've seen do not work. Thus,
this worm does not pose any threat at this time. The worm attempts to
download additional modules (plugins) which change its functionality.
Some of the modules are capable of spreading the worm over e-mail and
to IRC channels.
* Click here for Report on Universe Worm
Date: January 25, 2001
Platform: Windows
Warning About: Mcon Worm
Aliases: Sorry, TTFLOADER
Report From: F-Secure
* Release Note: VBS/Mcon is a worm that spreads via open network shares
and mIRC.
* Click here for Report on Mcon Worm
Date: January 24, 2001
Released: January 22, 2001
Platform: MS Windows 98, 95, NT 4.0 and NT 2000
Warning About: Fastream FTP++ Directory Traversal Vulnerability
Report From: Security Focus
* Release Note: Fastream FTP++ Server is a client and server application
used to download and upload files between computers on the internet.
Fastream FTP++ Server is subject to a directory traversal.
* Click here for Advisory on Fastream FTP++ Vulnerability
Date: January 24, 2001
Platform: MS Windows 98
Warning About: W98.Universe.Worm
Report From: Norton / Symantec Security Updates
* Release Note: Universe worm is a new creation by the virus writer,
Benny/29A. This worm has similarities to the Hybris worm written by
Vecna. Universe worm is not known to be in the wild and appears to
contain a few small bugs, as well as conceptual issues that makes it
less likely to operate correctly. Virus definitions are pending.
* Click here for Report on W98.Universe.Worm
Date: January 24, 2001
Platform: Microsoft Windows NT 4.0
Patch Available: Winsock Mutex Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a security
vulnerability in MS Windows NT 4.0. The vulnerability could allow a
malicious user to run a special program to disable an affected computers
network functioality.
* Click here for MS Security Bulletin MS01-003
* Click here for FAQ about vulnerability and the patch
Date: January 23, 2001
Platform: Microsoft Windows 98, 95, NT 4.0, NT 2000
Warning About: Fastream FTP++ Denial of Service Vulnerability
Report From: Security Focus
* Release Note: Fastream FTP++ Server is a client and server application
used to download and upload files between computers on the internet.
Faststream FTP++ is subject to a denial of service.
* Click here for Advisory on Fastream FTP++ Vulnerability
Date: January 23, 2001
Platform: Microsoft Word97 Documents and Templates
Warning About: W97M/TheSec.A Macro Virus
Report From: Network Associates
* Release Note: This is a macro virus for Word97 documents and templates.
This virus exists in the module "TheSecond". This virus contains a
word-switching payload during printing of documents containing a Russian
surname. Read the complete report for Method Of Infection and Removal
Instructions
* Click here for Report on W97M/TheSec.A Macro Virus
Date: January 23, 2001
Released: January 22, 2001
Platform: Microsoft PowerPoint 2000
Patch Available: PowerPoint File Parsing Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a security
vulnerability in Microsoft. PowerPoint 2000. The vulnerability could
allow a user to construct a PowerPoint file that, when opened, could
potentially run code on the readers system .
* Click here for MS Security Bulletin MS01-002
* Click here for FAQ about vulnerability and the patch
Date: January 22, 2001
Released: January 19, 2001
Platform: Microsoft Windows NT 2000
Warning About: Windows 2000 EFS Temporary File Retrieval Vulnerability
Report From: Security Focus
* Release Note: EFS is the encrypted file system package designed to
secure sensitive information. It is included with the Windows 2000
Operating System, distributed and maintained by Microsoft Corporation.
A problem in the package could allow the recovery of sensitive data
encrypted by the EFS.
* Click here for Advisory on Win2000 EFS Vulnerability
Date: January 19, 2001
Platform: Macintosh and Windows Versions of Microsoft Office
Warning About: Melissa.W Virus / Worm
Aliases: Melissa-X, Macro.Word97.Melissa.w, W2001MAC/Melissa.W-mm
Mid/Melissa-X, ANNIV, ANNIV.DOC, W2001MAC/Melissa.W
Report From: F-Secure and Symantec Security Updates
* Release Note: Melissa.W is a version of one of the most widespread
viruses in history, Melissa.A. This version was named Melissa.W. It's
not really a new version of the virus - the format of the infected file
has changed, and several antivirus programs are still unable to handle
this new file format. F-Secure started receiving reports about this new
version of Melissa, this time spreading in a file called Anniv.doc.
W97M.Melissa.W is a Word 97 macro virus that has a payload to email
itself using MS Outlook. The subject of the e-mail is "Important
Message From username".
* Click here for F- Secure Report on Melissa.W
* Click here for Symantec Report on Melissa.W
Date: January 18, 2001
Released: January 17, 2001
Platform: Microsoft Windows9x/ME
Warning About: DUNpws.ep Trojan
Aliases: Barrio Trojan
Report From: Network Associates
* Release Note: This is a password stealing trojan affecting Windows9x/ME.
When run, the trojan installs itself into the Windows System directory
and creates a registry key value to enable the program to load at
startup. Read the complete report for Method Of Infection and Removal
Instructions.
* Click here for Report on DUNpws.ep Trojan
Date: January 18, 2001
Released: January 16, 2001
Platform: Microsoft Win9x/ME
Warning About: W95/Halen Virus
Report From: Network Associates
* Release Note: This virus was discovered by AVERT WebImmune on January
16, 2001. This is an encrypted, appending PE file infector virus,
affecting Win9x/ME systems. Read the complete report for Method Of
Infection and Removal Instructions.
* Click here for Report on W95/Halen Virus
Date: January 18, 2001
Released: January 17, 2001
Platform: Windows 95, 98, NT / Macintosh
Warning About: Melissa Virus
Aliases: Simpsons, Kwyjibo, Kwejeebo, Mailissa
Variant: Many Variants - Read Report
Report From: F-Secure
* Release Note: W97M/Melissa works with MS Word 97, Word 2000 and MS
Outlook 97 or 98 e-mail client. Melissa can infect Windows 95, 98, NT
and Macintosh users. If the infected machine does not have Outlook or
internet access at all, the virus will continue to spread locally within
the user's own documents.
* Click here for Report on Melissa Virus
Date: January 18, 2001
Released: January 16, 2001
Platform: PC Windows
Warning About: Demiurg Virus
Aliases: W32/Demiurg, Demig.16354
Report From: F-Secure
* Release Note: When activated the virus infects and copies files. After
system restart the infected file is loaded into memory, the virus traps
several file access functions and infects other files.
* Click here for Report on Demiurg Virus
Date: January 16, 2001
Released: January 15, 2001
Platform: Microsoft Operating Systems
Warning About: Microsoft MSHTML.DLL Crash Vulnerability
Report From: Security Focus
* Release Note: MSHTML.DLL is the shared library for parsing HTML in
Internet Explorer and related applications. It may be possible for an
attacker to crash this library remotely and cause a denial of service
with special Jscript code. Microsoft has acknowledged this bug and it
should be fixed in the next service pack.
* Click here for Advisory on MS MSHTML.DLL Crash Vulnerability
Date: January 16, 2001
Released: January 15, 2001
Platform: MS Windows 95 / 98 / NT 4.0 / NT 2000
Warning About: Microsoft Windows Media Player .WMZ Arbitrary
Java Applet Vulnerability
Report From: Security Focus
* Release Note: A vulnerability has been reported in Microsoft Windows
Media Player 7 which is exploitable through Internet Explorer and Java.
* Click here for Advisory on Media Player Applet Vulnerability
Date: January 16, 2001
Released: January 15, 2001
Platform: MS Windows 95 / 98 / NT 4.0 / NT 2000
Warning About: Veritas Backup Denial of Service Vulnerability
Report From: Security Focus
* Release Note: Veritas Software Backup 4.5 is a data protection software
by Veritas. Backup is subject to a denial of service.
* Click here for Advisory on Veritas Backup Vulnerability
Date: January 16, 2001
Platform: MS Windows
Warning About: Davinia Worm
Aliases: LittleDavinia, JS/Davinia, W97M/Davinia, VBS/Davinia
Variant: Davinia.A
Report From: F-Secure
* Release Note: Davinia is an Internet worm, that is able to spread
without an attachment. Instead, the worm attempts to connect to a web
site and download part of its code.
* Click here for Report on Davinia Worm
Date: January 14, 2001
Released: January 12, 2001
Platform: Microsoft Windows
Warning About: Backdoor-JZ Trojan
Report From: Network Associates
* Release Note: This, UPX packed, trojan opens TCP/IP port 30005 on a
victim's machine. An attacker can then open, execute and delete files
on the user's local system. They can also shutdown windows, and send
out pings. Read the complete report for Method Of Infection and
Removal Instructions and AVERT recommendations.
* Click here for Report on Backdoor-JZ Trojan
Date: January 14, 2001
Released: January 12, 2001
Platform: Systems Where VBScript is installed, such as IE5
or Visual Studio.
Warning About: VBS/Davinia Worm
Aliases: HTML/LittleDavinia (Panda), LD.doc, LittleDavinia.vbs
Report From: Network Associates
* Release Note: McAfee AVERT has received information that a script
Internet worm may be circulating as the name LITTLEDAVINIA.VBS or
possibly LD.DOC. Read the complete report for Method Of Infection.
* Click here for Report on VBS/Davinia Worm
Date: January 14, 2001
Released: January 13, 2001
Platform: Linux, Solaris, HP-UX, Windows and SCO.
Updates To: Borland InterBase Product
Report From: Linux Daily News
* Release Note: Borland announced the availability of a patch that will
fix a potential security issue within the InterBase product, versions
4.0 through 6.0. The patch is available for Linux, Solaris, HP-UX,
Windows and SCO.
* Click here for LWN Security Note to Borland InterBase Product
Date: January 13, 2001
Platform: MS Windows
Warning About: W97M.Invert.B Virus
Report From: Norton / Symantec Security Updates
* Release Note: This is a macro virus that infects Microsoft word
template, and infects different files in different directories
depending on the date of the month. Read the complete report for
Removal Instructions and how to Restore Files if applicapable.
* Click here for Report on W97M.Invert.B Virus
Date: January 12, 2001
Platform: PC Win32 and DOS / MS Windows 2000
Warning About: W32.Demiurg.16354 Virus
Aliases: W32.Demiurg.16354.dr, X97M.Demiurg.A, Demiurg.16354,
Demiurg.16354.Bat
Report From: Norton / Symantec Security Updates
* Release Note: This is a Win32 virus that infects certain files, then
this virus creates a file in the XLStart folder. Norton AntiVirus
detects the Excel file as X97M.Demiurg.A. The virus uses this Excel
file to recreate itself. The original virus is about 17 KB in size.
This virus also infects Kernel32.dll on Windows 2000 systems. Read the
complete report for Removal Instructions and how to Restore Files if
applicapable.
* Click here for Report on W32.Demiurg.16354 Virus
Date: January 12, 2001
Platform: PC
Warning About: VBS.Sorry.D Worm
Aliases: VBS.Fonts.C, Mcon, TTFLoader
Report From: Norton / Symantec Security Updates
* Release Note: VBS.Sorry.D is a variant of VBS.Sorry.A. It is a Visual
Basic Script worm that copies itself to several folders on a computer
hard drive and on network drives. The worm also drops an mIRC configura-
tion file that searches for computers infected with the SubSeven Trojan.
It then copies itself and executes on computers that it finds are
infected with the SubSeven Trojan. This worm was previously named
VBS.Fonts.C. Read the complete report for Removal Instructions and how
to Restore Files if applicapable.
* Click here for Report on VBS.Fonts.C / VBS.Sorry.D Worm
Date: January 12, 2001
Platform: Microsoft Office 2000, Windows 2000, and Windows Me
Patch Available: Web Client NTLM Authentication Vulnerability
Report From: MicroSoft TechNet Security
* Release Note: Microsoft has released a patch that eliminates a
security vulnerability in a component that ships with MS Office 2000,
Windows 2000, and Windows Me. The vulnerability could, under certain
circumstances, allow a malicious user to obtain cryptographically
protected logon credentials from another user when requesting an
Office document from a web server.
* Click here for MS Security Bulletin MS01-001
* Click here for FAQ about vulnerability and the patch
Date: January 11, 2001
Released: January 10, 2001
Platform: MS Windows
Warning About: W32/Hermes@MM Internet Worm
Aliases: I-Worm.Hermes
Report From: Network Associates
* Release Note: This is a 32bit Internet worm for Windows operating
systems. This worm was coded in Visual Basic 6, and requires VB6
runtime library files in order to run. The worm has been compressed
with UPX. It is not known to be in the wild. Read the complete report
for Method Of Infection and Removal Instructions
* Click here for Report on W32/Hermes@MM Internet Worm
Date: January 11, 2001
Platform: Microsoft Windows
Warning About: Neworld Virus
Variant: Newold.A
Report From: F-Secure
* Release Note: PHP/Neworld is a virus written with PHP. PHP/Neworld.A
infects all files with ".php", ".html", ".htm" and ".htt" in
"C:\Windows" directory.
* Click here for Report on Neworld Virus
Date: January 11, 2001
Platform: Microsoft Windows
Warning About: Pirus Virus
Variant: Pirus.A
Report From: F-Secure
* Release Note: PHP/Pirus is the first virus written with PHP. PHP is
a server side scripting language for web servers.
* Click here for Report on Pirus Virus
Date: January 11, 2001
Released: January 10, 2001
Platform: Microsoft Windows
Warning About: BleBla Worm
Aliases: Romeo-and-Juliet, Romeo, Juliet, Verona, IWorm_Blebla,
I-Worm.Blebla
Report From: F-Secure
* Release Note: BleBla is a worm spreading via Internet. It was
discovered in Poland on November 16th, 2000. The worm appears as an
email message, and when an infected message is opened, the HTML part
of it is executed.
* Click here for Report on BleBla Worm
Date: January 09, 2001
Released: January 08, 2001
Platform: Linux kernel 2.3 / MS Win98 / Win95 / MS NT 4.0 / MS NT 2000
Warning About: StorageSoft ImageCast IC3 DoS Vulnerability
Report From: Security Focus
* Release Note: StorageSoft ImageCast IC3 is an imaging application
which migrates a replication of an existing desired hard drive to
a target drive. All settings, tasks and resources are configured in
the ImageCast Control Center (ICCC). ImageCast IC3 is subject to a
denial of service.
* Click here for Advisory on ImageCast Vulnerability
Date: January 09, 2001
Released: January 08, 2001
Platform: Sun Solaris / Linux / MS Windows NT / IBM AIX / HP HP-UX
Warning About: IBM HTTP Server AfpaCache DoS Vulnerability
Report From: Security Focus
* Release Note: IBM HTTP Server contains AfpaCache directive which
turns the Fast Response Cache Accelerator function on or off. IBM
HTTP Server is subject to a denial of service. Requesting multiple
malformed HTTP GET requests will cause the consumption of kernel
memory and eventually lead to a denial of service.
* Click here for Advisory on IBM HTTP Server Vulnerability
Date: January 09, 2001
Platform: Microsoft Win32 Systems
Warning About: Hybris Internet Worm
Aliases: IWorm_Hybris, I-Worm.Hybris
Report From: F-Secure
* Release Note: Hybris is an Internet worm that spreads itself as an
attachment to email messages. The worm works under Win32 systems
only. The worm contains components (plugins) in its code that are
executed depending on what worm needs, and these components can be
upgraded from an Internet Web site.
* Click here for Report on Hybris Internet Worm
Date: January 09, 2001
Platform: Microsoft Win9x Systems
Warning About: Zhymn Virus
Aliases: USSRHymn
Report From: F-Secure
* Release Note: Zhymn is a dangerous memory resident Win9x virus about
20K in length, and written in Assembler. The virus infects PE EXE
files, by writing its code to the middle of a file.
* Click here for Report on Zhymn Virus
Date: January 09, 2001
Platform: PC
Warning About: Wyx Boot Virus
Aliases: Preboot
Report From: F-Secure
* Release Note: Wyx is a not dangerous memory resident encrypted boot
virus. The virus code consists of two disk sectors. The virus infects
the MBR of the hard drive, the C: drive boot sector and boot sector
on floppy disks.
* Click here for Report on Wyx Boot Virus
Date: January 09, 2001
Platform: Microsoft Windows
Warning About: Navidad Worm
Aliases: I-Worm.Navidad, W32/Watchit.intd, I-Worm_Navidad,
W32/Navidad
Report From: F-Secure
* Release Note: Navidad is an Internet worm. It spreads itself as
NAVIDAD.EXE attachment to e-mail messages sent from an infected
computer.
* Click here for Report on Navidad Worm
Date: January 08, 2001
Platform: Microsoft Outlook
Warning About: Jean Worm
Aliases: Santa, I-Worm.Santa, Xmas
Variant: Jean.A@mm
Report From: F-Secure
* Release Note: Jean.A spreads to first 50 recipients written in
MS Outlook address book.
* Click here for Report on Jean Worm
Date: January 07, 2001
Released: January 05, 2001
Platform: MS Windows
Warning About: PHP/NewWorld Virus
Aliases: Neworld.PHP, PHP.Newworld
Report From: Network Associates
* Release Note: This is the second known PHP virus to be discovered.
PHP is a server-side scripting language used to generate dynamic Web
page content. When a script containing the virus is run, it may display
a particular message, as described in the report. This script virus is
coded to look for particular files. If the files are not read-only,
they are considered viable to the script virus. Read the complete
report for Method Of Infection and Removal Instructions
* Click here for Report on PHP/NewWorld Virus
Date: January 07, 2001
Released: January 03, 2001
Platform: MS Windows
Warning About: BleBla Worm
Report From: F-Secure
* Release Note: BleBla is a worm spreading via Internet. It was
discovered in Poland on November 16th, 2000. The worm appears as an
email message that has HTML formal and 2 attached files: MyJuliet.CHM
and MyRomeo.EXE.
* Click here for Report on BleBla Worm
Date: January 07, 2001
Released: January 02, 2001
Platform: MS Windows
Warning About: Tqll Worm
Aliases: New Year worm
Variant: Tqll.A
Report From: F-Secure
* Release Note: VBS/Tqll is a worm written with Visual Basic Script.
This worm is partially encrypted with a simple encryption.
* Click here for Report on Tqll Worm
Date: January 04, 2001
Released: January 03, 2001
Platform: MS Windows 98 / 95 / NT 4.0 / NT 2000
Warning About: Media Player Javascript URL Vulnerability
Report From: Security Focus
* Release Note: Windows Media Player is an application used for digital
audio, and video content viewing. It can be embedded in webpages as
an ActiveX control. It is possible to execute a javascript URL from
within the Windows Media Player ActiveX control embedded in HTML.
An attacker exploiting this vulnerability can read files on the users
filesystem and reportedly execute arbitrary programs on the victim
host.
* Click here for Advisory on Javascript URL Vulnerability
Date: January 04, 2001
Released: January 03, 2001
Platform: Windows Scripting Host (part of Internet Explorer 5)
Warning About: New Script VBScript Virus
Report From: Network Associates
* Release Note: This is a heuristic detection which indicates that a
file is probably a new VBScript virus or Internet worm. Ensure that
you are using the latest engine and DAT file and send a sample to
AVERT if it is still detected as New Script. The Symptoms varies.
Read the complete report for Method Of Infection and Removal
Instructions
* Click here for Report on New Script
Top of Page
Macintosh
Date: January 19, 2001
Platform: Macintosh and Windows Versions of Microsoft Office
Warning About: Melissa.W Virus / Worm
Aliases: Melissa-X, Macro.Word97.Melissa.w, W2001MAC/Melissa.W-mm
Mid/Melissa-X, ANNIV, ANNIV.DOC, W2001MAC/Melissa.W
Report From: F-Secure and Symantec Security Updates
* Release Note: Melissa.W is a version of one of the most widespread
viruses in history, Melissa.A. This version was named Melissa.W. It's
not really a new version of the virus - the format of the infected file
has changed, and several antivirus programs are still unable to handle
this new file format. F-Secure started receiving reports about this new
version of Melissa, this time spreading in a file called Anniv.doc.
W97M.Melissa.W is a Word 97 macro virus that has a payload to email
itself using MS Outlook. The subject of the e-mail is "Important
Message From username".
* Click here for F- Secure Report on Melissa.W
* Click here for Symantec Report on Melissa.W
Date: January 18, 2001
Released: January 17, 2001
Platform: Windows 95, 98, NT / Macintosh
Warning About: Melissa Virus
Aliases: Simpsons, Kwyjibo, Kwejeebo, Mailissa
Variant: Many Variants - Read Report
Report From: F-Secure
* Release Note: W97M/Melissa works with MS Word 97, Word 2000 and MS
Outlook 97 or 98 e-mail client. Melissa can infect Windows 95, 98, NT
and Macintosh users. If the infected machine does not have Outlook or
internet access at all, the virus will continue to spread locally within
the user's own documents.
* Click here for Report on Melissa Virus
Top of Page
Linux
Date: January 31, 2001
Platform: SuSE Linux
Updates To: bind
Report From: Linux Daily News
* Release Note: Security updates to bind for SuSE Linux.
* Click here for LWN Security Update To bind
Date: January 31, 2001
Platform: Yellow Dog Linux
Updates To: bind
Report From: Linux Daily News
* Release Note: Security updates to bind for Yellow Dog Linux.
* Click here for LWN Security Update To bind
Date: January 31, 2001
Platform: Turbolinux
Updates To: LPRng
Report From: Linux Daily News
* Release Note: Turbolinux has issued a security update to LPRng fixing
the remotely-exploitable format string vulnerability in that package.
* Click here for LWN Security Update To LPRng
Date: January 30, 2001
Platform: SuSE
Updates To: kdesu utility
Report From: Linux Daily News
* Release Note: Here is SuSE's update to the kdesu utility fixing the local
root compromise problem in that package.
* Click here for Security Update To kdesu utility
Date: January 30, 2001
Platform: Slackware
Updates To: bind
Report From: Linux Daily News
* Release Note: Slackware has put out an advisory on the bind vulnerability,
its fix has been available since yesterday.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Red Hat
Updates To: bind
Report From: Linux Daily News
* Release Note: With the arrival of Red Hat's bind update, they we are
getting close to having the full set of major Linux distributions
represented. Remember, this is a remotely-exploitable problem. You
really want to apply the fix for your distribution if you are running
nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Linux
Updates To: Press Release and Advisory
Report From: Linux Daily News
* Release Note: The press release from Nominum and ISC. This release claims
that "an upgrade to bind 9.1 is imperative," but, in fact, version 8.2.3
has the full set of fixes. The CERT advisory describing the current set
of bind problems.
* Click here for Press Release from Nominum and ISC
* Click here for CERT advisory
Date: January 30, 2001
Platform: Caldera Systems
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Conectiva
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Debian
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Immunix
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Linux-Mandrake
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Red Hat
Updates To: bind
Report From: Linux Daily News
* Release Note: Remember, this is a remotely-exploitable problem. You really
want to apply the fix for your distribution if you are running nameservers.
* Click here for Security Update To bind
Date: January 30, 2001
Platform: Trustix
Updates To: bind
Report From: Linux Daily News
* Release Note: Trustix (Also has a fix for a separate OpenLDAP problem)
* Click here for Security Update To bind
Date: January 30, 2001
Released: January 28, 2001
Platform: Debian
Updates To: OpenSSH
Report From: Linux Daily News
* Release Note: Debian reported a problem with OpenSSH. It seems a former
security upload of OpenSSH lacked support for PAM which lead to people
not being able to log in into their server. This was only a problem on
the Sparc architecture. A second security update for OpenSSH was also
issued. Those people who use OpenSSH on a Debian/Sparc system are
encouraged to update their OpenSSH packages.
* Click here for problem with OpenSSH
* Click here for Security Update To OpenSSH
Date: January 30, 2001
Released: January 28, 2001
Platform: Linux-Mandrak
Updates To: webmin package
Report From: Linux Daily News
* Release Note: Linux-Mandrake has an update for the webmin package.
* Click here for Security Update To webmin package
Date: January 30, 2001
Released: January 28, 2001
Platform: Debian
Updates To: inn2 and cron
Report From: Linux Daily News
* Release Note: Debian has a new version of inn2 to fix some vulnerabil-
ities in that package. They also have a new version of cron to fix local
insecure crontab handling.
* Click here for Security Update To inn2
* Click here for Security Update To cron
Date: January 28, 2001
Platform: Linux-Mandrake
Updates To: webmin package
Report From: Linux Daily News
* Release Note: Linux-Mandrake has an update for the webmin package.
* Click here for LWN Security Update To webmin package
Date: January 28, 2001
Platform: Debian
Updates To: inn2 and cron
Report From: Linux Daily News
* Release Note: Debian has a new version of inn2 to fix some vulnerabil-
ities in that package. They also have a new version of cron to fix local
insecure crontab handling.
* Click here for LWN Security Update To inn2
* Click here for LWN Security Update To cron
Date: January 28, 2001
Released: January 26, 2001
Platform: Red Hat
Updates To: sysstat
Report From: Linux Daily News
* Release Note: Security updates from distribution vendor includes
sysstat: update to earlier advisory to add support for additional
iostat command line options.
* Click here for LWN Security Update To sysstat
Date: January 28, 2001
Released: January 26, 2001
Platform: SuSE
Updates To: glibc
Report From: Linux Daily News
* Release Note: Security updates from distribution vendor includes
glibc: local root compromise.
* Click here for LWN Security Update To glibc
Date: January 28, 2001
Released: January 26, 2001
Platform: Debian
Updates To: exmh
Report From: Linux Daily News
* Release Note: Security updates from distribution vendor includes
exmh: local insecure temporary file creation.
* Click here for LWN Security Update To exmh
Date: January 28, 2001
Released: January 26, 2001
Platform: Conectiva
Updates To: MySQL
Report From: Linux Daily News
* Release Note: Security updates from distribution vendor includes
MySQL: buffer overflow may allow remote explotation.
* Click here for LWN Security Update To MySQL
Date: January 26, 2001
Platform: Debian
Updates To: apache
Report From: Linux Daily News
* Release Note: The Debian Project has issued a security update to apache
fixing a couple of temporary file vulnerabilities and a problem with the
mod_rewrite engine which could expose arbitrary files to the net. An
upgrade is recommended.
* Click here for Security Update To apache
Date: January 26, 2001
Platform: Red Hat
Updates To: PHP and micq
Report From: Linux Daily News
* Release Note: Updates received since publication of our Weekly edition,
which is for PHP: updates for 5.2, 6.0, and 7 related to multipart forms,
and micq: fixes buffer overflow that allows arbitrary commands to be
executed.
* Click here for Security Update To PHP
* Click here for Security Update To micq
Date: January 26, 2001
Platform: Debian
Updates To: squid and PHP4
Report From: Linux Daily News
* Release Note: Updates received since publication of our Weekly edition,
which is for squid: insecure temporary file, and PHP4: remote DOS and
remote information leak.
* Click here for Security Update To squid
* Click here for Security Update To PHP4
Date: January 26, 2001
Platform: Conectiva
Updates To: icecast
Report From: Linux Daily News
* Release Note: Updates received since publication of our Weekly edition,
which is for icecast: format string vulnerability.
* Click here for Security Update To icecast
Date: January 26, 2001
Platform: Caldera
Updates To: glibc
Report From: Linux Daily News
* Release Note: Updates received since publication of our Weekly edition,
which is for glibc: problems with the use of LD_PRELOAD.
* Click here for Security Update To glibc
Date: January 24, 2001
Platform: Caldera
Updates To: kdesu
Report From: Linux Daily News
* Release Note: The latest batch of security updates that have come in to
LWN.net, includes Caldera's update for kdesu - stealing of password entry
possible by local user.
* Click here for Security Update To kdesu
Date: January 24, 2001
Platform: Debian
Updates To: wu-ftpd
Report From: Linux Daily News
* Release Note: The latest batch of security updates that have come in to
LWN.net, includes Debian's update for wu-ftpd - additional advisory for
ia32 architecture.
* Click here for Security Update To wu-ftpd
Date: January 24, 2001
Platform: FreeBSD
Updates To: XFree86, ipfw/ip6fw, crontab and bind
Report From: Linux Daily News
* Release Note: The latest batch of security updates that have come in to
LWN.net, includes those from FreeBSD, for:
XFree86 - v3.3.6 has multiple vulnerabilities that may allow local or
remote DoS attacks.
ipfw/ip6fw - allows bypassing of 'established' keyword.
crontab - allows users to read certain files.
bind - remote denial of service vulnerability.
* Click here for Security Update To XFree86
* Click here for Security Update To ipfw/ip6fw
* Click here for Security Update To crontab
* Click here for Security Update To bind
Date: January 24, 2001
Platform: Red Hat
Updates To: icecast and PHP
Report From: Linux Daily News
* Release Note: The latest batch of security updates that have come in to
LWN.net, includes those from Red Hat, for:
icecast - format string vulnerability
PHP - updated packages for 5.2, 6.x and 7 to handle multipart forms
correctly.
* Click here for Security Update To icecast
* Click here for Security Update To PHP
Date: January 24, 2001
Platform: Debian
Updates To: tinyproxy, Intel ia32 architecture and splitvt
Report From: Linux Daily News
* Release Note: Debian has issued and update for tinyproxy as well as an
update to an earlier advisory for wu-ftpd to cover the Intel ia32
architecture. Additionally, an update to the splitvt advisory has also
been posted to correct packaging problems.
* Click here for Security Update To tinyproxy
* Click here for Security Update To Intel ia32 architecture
* Click here for Security Update To splitvt
Date: January 24, 2001
Platform: Red Hat Linux 7
Updates To: MySQL
Report From: Linux Daily News
* Release Note: An update for MySQL for Red Hat Linux 7 has been issued by
that company that addresses a buffer overflow security vulnerability.
* Click here for Security Update To MySQL for Red Hat Linux 7
Date: January 24, 2001
Platform: Linux
Announcement: Linux Gets Stateful Firewalling (SecurityPortal)
Report From: Linux Daily News
* Release Note: SecurityPortal covers Netfilter, the packet filtering
system provided by the new 2.4 kernel release. Among many enhancements,
this "statefulness" allows Netfilter to block/detect many stealth scans
that were previously undetected on Linux firewalls."
* Click here for SecurityPortal Covers Netfilter
Date: January 24, 2001
Platform: Caldera
Updates To: webmin
Report From: Linux Daily News
* Release Note: Caldera has posted a security update for webmin to address
temporary file vulnerability issues.
* Click here for Security Update For webmin
Date: January 24, 2001
Platform: Debian
Bulletins: micq, wu-ftpd and jazip
Report From: Linux Daily News
* Release Note: A small flood of security announcements from Debian came
in last night and this morning to the LWN.net offices. Here is a summary
of those reports.
micq - buffer overflow problem which makes remote code execution
possible.
wu-ftpd - temporary file creation and format string vulnerabilities.
jazip - local root exploit.
* Click here for Security Bulletin For micq
* Click here for Security Bulletin For wu-ftpd
* Click here for Security Bulletin For jazip
Date: January 23, 2001
Released: January 22, 2001
Platform: Debian
Updates To: MySQL, splitvt, sash
Report From: Linux Daily News
* Release Note: The Debian Project has issued a security update to MySQL
fixing the remotely-exploitable vulnerability in that package. Debian
has released an update to splitvt fixing a number of buffer overflow
problems in that package. Finally, there is also a Debian update to sash
fixing a problem with its handling of the shadow file.
* Click here for LWN Security Update To MySQL
* Click here for LWN Security Update To splitvt
* Click here for LWN Security Update To sash
Date: January 23, 2001
Released: January 22, 2001
Platform: MandrakeSoft
Updates To: MySQL
Report From: Linux Daily News
* Release Note: MandrakeSoft also has a MySQL update, this one also
provides a new PHP build which is required to work with the newer MySQL.
* Click here for LWN Security Update To MySQL
Date: January 23, 2001
Released: January 22, 2001
Platform: Trustix
Updates To: glibc
Report From: Linux Daily News
* Release Note: Trustix has issued their update for the recently reported
problems with glibc.
* Click here for LWN Update To Trustix glibc
Date: January 20, 2001
Released: January 19, 2001
Platform: Linux Mandrake
Updates To: glibc
Report From: Linux Daily News
* Release Note: LinuxMandrake has posted an security update for glibc
for it's 6.0, 6.1, 7.0, 7.1, 7.2, Corporate Server 1.0.1 releases.
* Click here for LWN Security Update To glibc
Date: January 20, 2001
Released: January 19, 2001
Platform: Immunix
Updates To: glibc
Report From: Linux Daily News
* Release Note: Immunix has posted an security update for glibc as shipped
in its Immunix OS 7.0-beta.
* Click here for LWN Security Update To glibc
Date: January 20, 2001
Released: January 19, 2001
Platform: LinuxMandrake
Updates To: PHP
Report From: Linux Daily News
* Release Note: Problems with the version of PHP included in their 7.2
distribution have spurred LinuxMandrake to release a security update
for that package.
* Click here for LWN Security Update To PHP
Date: January 20, 2001
Released: January 19, 2001
Platform: Red Hat Linux
Warning About: Ramen: the first successful attack on the Linux?
Report From: Kaspersky Lab
* Release Note: To penetrate computers having Red Hat Linux 6.2 or 7.0
installed, 'Ramen' exploits three security breaches. It is important
to emphasize that the breaches exploited by the "Ramen" worm are also
found on other Linux distributes, such as Caldera OpenLinux, Connectiva
Linux, Debian Linux, HP-UX, Slackware Linux and other. This particular
worm is triggered to activate only on the systems running Read Hat Linux.
However, it is probable that the future will bring us other modifications
of 'Ramen' that will successfully operate on other Linux platforms.
* Click here for Virus Alert and Report on Ramen
Date: January 19, 2001
Released: January 18, 2001
Platform: Conectiva
Updates To: Security Update To php4
Report From: Linux Daily News
* Release Note: Conectiva has issued a security update to php4 which
fixes the recent troubles with per-directory directives.
* Click here for LWN Security Update To php4
Date: January 18, 2001
Released: January 17, 2001
Platform: Linux Operating Systems
Warning About: Linux.Ramen Worm
Report From: Norton / Symantec Security Updates
* Release Note: Linux.Ramen is a Linux worm that attacks web servers that
are based on the Linux operating system. This worm scans the Internet
for Linux-based web servers that have two particular exploits. If it
locates any servers with these exploits it will attempt to modify the
main page of that web server with a short message. The Symantec
AntiVirus Research Center is currently analyzing this worm.
* Click here for Report on Linux.Ramen Worm
Date: January 18, 2001
Released: January 16, 2001
Platform: Linux with Sam Lantinga splitvt 1.6.4 and Previous
Warning About: splitvt Format String Vulnerability
Report From: Security Focus
* Release Note: splitvt is a VT100 window splitter, designed to allow the
user two command line interfaces in one terminal window, originally
written by Sam Lantinga. It is freely available, open source, and
included with many variants of the Linux Operating System. A problem in
the program could allow for a format string attack.
* Click here for Advisory on splitvt Vulnerability
Date: January 18, 2001
Released: January 17, 2001
Platform: Linux Web Servers
Warning About: Linux/Ramen.worm Worm
Aliases: Linux.Ramen
Report From: Network Associates
* Release Note: This is an Internet worm for Linux web servers. This worm
consists of several components, each with a specific function and
purpose. Read the complete report for Method Of Infection and Removal
Instructions.
* Click here for Report on Linux/Ramen.worm Worm
Date: January 18, 2001
Platform: Linux Red Hat Linux 6.2 and 7.0
Warning About: Ramen Worm
Aliases: Linux.Ramen, LINUX/Ramen
Report From: F-Secure
* Release Note: Ramen is an Internet worm, which propagates from a Linux
based server to another. It works in a similar way as the Morris Worm
that was widespread in 1989.
* Click here for Report on Ramen Worm
Date: January 14, 2001
Released: January 13, 2001
Platform: Linux, Solaris, HP-UX, Windows and SCO.
Updates To: Borland InterBase Product
Report From: Linux Daily News
* Release Note: Borland announced the availability of a patch that will
fix a potential security issue within the InterBase product, versions
4.0 through 6.0. The patch is available for Linux, Solaris, HP-UX,
Windows and SCO.
* Click here for LWN Security Note to Borland InterBase Product
Date: January 12, 2001
Platform: RedHat Linux 7.0 / UNIX / Wirex Immunix OS 7.0-Beta
Warning About: Apache /tmp File Race Vulnerability
Report From: Security Focus
* Release Note: Apache web server is a popular http daemon, distributed
with many variants of the UNIX Operating System and maintained by the
Apache Project. Immunix is a hardened Linux distribution maintained by
the Immunix team at the WireX Corporation. A problem has been discovered
which makes it possible for a user with malicious motives to symblink
attack files writable by the UID of the Apache process.
* Click here for Advisory on Apache /tmp File Race Vulnerability
Date: January 12, 2001
Platform: LinuxMandrake
Updates To: arpwatch, squid, rdist, gpm, getty and inn
Report From: Linux Daily News
* Release Note: A flood of security reports have come in since we
published this weeks edition of the Weekly News. All of these
LinuxMandrake updates, are related to temporary file race condition
vulnerabilities.
* Click here for LWN Security Update To arpwatch
* Click here for LWN Security Update To squid
* Click here for LWN Security Update To rdist
* Click here for LWN Security Update To gpm
* Click here for LWN Security Update To getty
* Click here for LWN Security Update To inn
Date: January 12, 2001
Platform: Trustix
Updates To: diffutils and squid packages
Report From: Linux Daily News
* Release Note: Trustix has released a security report for temporary
file vulnerabilities in the diffutils and squid packages.
* Click here for LWN Security Update To diffutils and squid
Date: January 12, 2001
Platform: Red Hat
Updates To: glibc
Report From: Linux Daily News
* Release Note: Red Hat has released a security report for problems in
glibc that allow unpriviledged users read restricted files.
* Click here for LWN Security Update To glibc
Date: January 12, 2001
Platform: Slackware
Updates To: glibc
Report From: Linux Daily News
* Release Note: Slackware has released a security report for problems
in glibc that allow unpriviledged users read restricted files.
* Click here for LWN Security Update To glibc
Date: January 12, 2001
Platform: Various / Linux
Press Report: Major Security Hole Found In Borland Database
Report From: Linux Daily News
* Release Note: C|Net News.com is reporting that a major security hole
has been found in Borland's InterBase database, which runs on various
platforms including Linux. "Borland acknowledged the back door and
has begun releasing patches. The company has notified customers and
sales partners and will begin shipping repaired versions this week."
Update: This is actually the Interbase database, not Inprise. Our bad.
This database was released as open source last year. (Thanks to Pete
Link for the errata notice)
* Click here for LWN CNet News Report on Borland
Date: January 11, 2001
Released: January 10, 2001
Platform: Linux GNU glibc 2.1.9 and Greater
Warning About: glibc RESOLV_HOST_CONF File Read Access Vulnerability
Report From: Security Focus
* Release Note: glibc is the C Library distributed with most
implementations of the Linux Operating System. It is freely available
through the Free Software Foundation, and publicly maintained. A
problem in versions of glibc 2.1.9 and greater allow a local user
access to restricted files. This is also reported below, at Linux Daily
News report.
* Click here for Advisory on glibc Vulnerability
Date: January 11, 2001
Released: January 09, 2001
Platform: S.u.S.E. Linux 7.0
Warning About: Linux ReiserFS Kernel Oops and Code Execution
Vulnerability
Report From: Security Focus
* Release Note: ReiserFS is a file system alternative to the Linux ext2
file system. It was originally written by Hans Reiser, and is freely
available and publicly maintained. A problem has been reported in the
handling of long file names with ReiserFS version 3.5.28 on SuSE Linux
distribution 7.0.
* Click here for Advisory on Linux ReiserFS Kernel
Date: January 11, 2001
Platform: Linux glibc 2.1.9 And Greater
Bug Report: glibc RESOLV_HOST_CONF File Read Access Vulnerability
Report From: Linux Daily News
* Release Note: A bug in glibc 2.1.9 and greater results in the
RESOLV_HOST_CONF environment variable not be properly cleared when
suid/sgid programs are run. This can be exploited to access files
using root privileges, exposing files such as /etc/shadow and
potentially compromising the system. Workarounds are being discussed
and a patch for the problem is likely to be available soon. LWN says
to check BugTraq ID 2181 for more details.
* Click here for BugTraq ID 2181 for more details
Date: January 11, 2001
Platform: Debian
Updates To: mgetty
Report From: Linux Daily News
* Release Note: Debian also posted a temporary file vulnerability update,
this time for mgetty. The new version, 1.1.21-3potato1, addresses this
problem.
* Click here for LWN Security Update To mgetty
Date: January 11, 2001
Platform: Linux Mandrake
Updates To: getty_ps, diffutils, wu-ftpd, shadow-utils
Report From: Linux Daily News
* Release Note: LinuxMandrake posted security updates for getty_ps and
diffutils too late for the Weekly edition of LWN. Both updates address
temporary file race conditions, the latter in sdiff program within the
diffutils. Security updates were also posted for wu-ftpd to address a
temporary file creation problem in the 2.6.1 release of that program,
and another temporary file race condition in shadow-utils (in the
useradd program) package.
* Click here for LWN Security Update To getty_ps
* Click here for LWN Security Update To diffutils
* Click here for LWN Security Update To wu-ftpd
* Click here for LWN Security Update To shadow-utils
Date: January 09, 2001
Released: January 08, 2001
Platform: Linux kernel 2.3 / MS Win98 / Win95 / MS NT 4.0 / MS NT 2000
Warning About: StorageSoft ImageCast IC3 DoS Vulnerability
Report From: Security Focus
* Release Note: StorageSoft ImageCast IC3 is an imaging application
which migrates a replication of an existing desired hard drive to
a target drive. All settings, tasks and resources are configured in
the ImageCast Control Center (ICCC). ImageCast IC3 is subject to a
denial of service.
* Click here for Advisory on ImageCast Vulnerability
Date: January 09, 2001
Released: January 08, 2001
Platform: Sun Solaris / Linux / MS Windows NT / IBM AIX / HP HP-UX
Warning About: IBM HTTP Server AfpaCache DoS Vulnerability
Report From: Security Focus
* Release Note: IBM HTTP Server contains AfpaCache directive which
turns the Fast Response Cache Accelerator function on or off. IBM
HTTP Server is subject to a denial of service. Requesting multiple
malformed HTTP GET requests will cause the consumption of kernel
memory and eventually lead to a denial of service.
* Click here for Advisory on IBM HTTP Server Vulnerability
Date: January 08, 2001
Platform: Various
Updates To: LinuxPPC.org Security Updates
Report From: Linux Daily News
* Release Note: There are several security updates posted to
LinuxPPC.org. They recommend that everyone with the following
packages upgrade to the newly released versions. Packages are:
perl, xchat, umb-scheme, man, wu-ftpd, emacs, openldap, ircii,
piranha and gpm.
* Click here for LinuxPPC.org Security Updates
Date: January 07, 2001
Released: January 04, 2001
Platform: Conectiva
Updates To: slocate
Report From: Linux Daily News
* Release Note: Conectiva has issued a security update for slocate to
address a vulnerability related to bogus databases allowing "slocate"
user compromises.
* Click here for LWN Security Update To slocate
Date: January 04, 2001
Released: January 02, 2001
Platform: Various Versions of Linux
Warning About: GTK+ Arbitrary Loadable Module Execution
Vulnerability
Report From: Security Focus
* Release Note: GTK+ is the Gimp Toolkit, freely available to the
public and maintained by the GTK Development Team. A problem exists
in the Gimp Toolkit that could allow a user elevated privileges.
This issue makes it possible for a user with malicious intent to
potentially gain elevated privileges, overwrite system files, or
execute arbitrary and potentially dangerous code.
* Click here for Advisory on GTK+ Arbitrary Loadable Module
Top of Page
Miscellaneous
Date: January 31, 2001
Platform: Any systems running a version of AnswerBook2 before 1.4.2.
Answerbook2 version 1.4.2 without the appropriate patch.
Warning About: Sun AnswerBook2 Vulnerability
Report From: CIAC
* Release Note: Security vulnerabilities exist in the http server
(dwhttpd) included in Sun Solaris(tm) AnswerBook2.
* Click here for Bulletin Number L-031
Date: January 31, 2001 * Updated
Platform: Various versions of ISC BIND (including both 4.9.x
prior to 4.9.8 and 8.2.x prior to 8.2.3; 9.x is
not affected) and derivatives
Warning About: Multiple Vulnerabilities in BIND
Report From: CERT Advisories
* Release Note: The CERT/CC has updated its advisory. Added Microsoft
vendor statement and Added OpenBSD vendor statement.
* Click here for CERT CA-2001-02
Date: January 30, 2001
Reported: January 29, 2001
Platform: Various versions of ISC BIND (including both 4.9.x
prior to 4.9.8 and 8.2.x prior to 8.2.3; 9.x is
not affected) and derivatives
Warning About: Multiple Vulnerabilities in BIND
Report From: CERT Advisories, Internet Software Consortium,
CIAC Bulletin L-030 and SecurityFocus
* Release Note: The CERT/CC has recently learned of four vulnerabilities
spanning multiple versions of the Internet Software Consortium's (ISC)
Berkeley Internet Name Domain (BIND) server. BIND is an implementation
of the Domain Name System (DNS) that is maintained by the ISC. Because
the majority of name servers in operation today run BIND, these vulner-
abilities present a serious threat to the Internet infrastructure. The
Internet Software Consortium has posted information about all four
vulnerabilities.
* Click here for CERT CA-2001-02
* COVERT Labs at PGP Security Advisory
* COVERT Labs at PGP Security Announcement
* The Internet Software Consortium Article
* CIAC Bulletin Number L-030
SecurityFocus Advisories:
* ISC Bind 8 Transaction Signatures Buffer Overflow Vulnerability
* ISC Bind 8 Transaction Signatures Heap Overflow Vulnerability
* ISC Bind 4 nslookupComplain() Buffer Overflow Vulnerability
* ISC Bind 4 nslookupComplain() Format String Vulnerability
Date: January 30, 2001
Released: January 25, 2001
Platform: Netscape Enterprise Server 3.0
Warning About: Netscape Enterprise Server Web Publishing DoS Vulnerability
Report From: Security Focus
* Release Note: Netscape Enterprise Server is a web server used to host
larger-scale websites. The Web Publishing feature is installed by
default. This directory is accessible by remote or local users without
any authentication.
* Click here for Advisory on Netscape Enterprise Server Vulnerability
Date: January 28, 2001
Platform: FreeBSD 3.5.1, 4.2 and all versions prior to 01/23/2001
Warning About: FreeBSD "ipfw/ip6fw" Vulnerability
Report From: CIAC Information Bulletin
* Release Note: The system routines "ipfw" and "ipfw" do not properly
process the TCP reserved flags field if the field is over-loaded and
the ECE flag is set. Remote attackers may gain access through the
firewall by constructing TCP packets with the ECE flag set.
* Click here for Bulletin Number L-029
Date: January 26, 2001
Platform: Netopia R9100 Router
Warning About: Netopia R9100 Router Denial of Service Vulnerability
Report From: Security Focus
* Release Note: The Netopia R9100 Router, running firmware version 4.6,
is vulnerable to a denial of service attack. Subsequent versions of the
product are not vulnerable.
* Click here for Advisory on Netopia R9100 Router Vulnerability
Date: January 26, 2001
Platform: All versions prior to Solaris 8
Warning About: Solaris ARP Setgid Vulnerability
Report From: CIAC Information Bulletin
* Release Note: Address Resolution Protocol (ARP) command uses Set group
ID (Setgid), and is therefore susceptible to certain setgid attacks.
Exploiting setgid could result in overflow of stack, and possible root
compromise.
* Click here for Bulletin Number L-028
Date: January 24, 2001
Platform: Systems Running Netscape Enterprise Server 4.0 and 3.0
Warning About: Netscape Enterprise Server 'Index' Disclosure
Report From: Security Focus
* Release Note: Netscape Enterprise Server is a web server used to host
larger-scale websites. Netscape Enterprise Server with Web Publishing
enabled, will disclose the directory listing of the target server.
* Click here for Advisory on Netscape Enterprise Server
Date: January 24, 2001
Released: January 23, 2001
Platform: Systems Running Lotus Domino Mail Server 5.0.5
Warning About: Lotus Domino Mail Server 'Policy' BufferOverflow
Report From: Security Focus
* Release Note: A buffer overflow vulnerability has been reported in Lotus
Domino Mail Server. Lotus Domino Mail Server fails to properly validate
user supplied input to the field which specifies permitted domain names
in mail forwarding policy.
* Click here for Advisory on Lotus Domino Mail Server
Date: January 24, 2001
Platform: Computers which run a PHP
Warning About: PHP/Sysbat Virus
Report From: Network Associates
* Release Note: PHP is a server-side scripting language used to generate
dynamic Web page content. Computers which do not run a PHP interpreter
are immune to this virus. Read the complete report for Method Of
Infection and Removal Instructions
* Click here for Report on PHP/Sysbat Virus
Date: January 20, 2001
Released: January 18, 2001
Platform: Hewlett Packard HP-UX 11.11, 11.0 and 10.20
Warning About: HP-UX Support Tools Manager Denial of Service Attack
Report From: Security Focus
* Release Note: Support Tools Manager is a software package included with
HP-UX designed to make administration of systems easier. HP-UX is the
Hewlett Packard UNIX Operating System designed for use on Hewlett
Packard servers. A potential Denial of Service has been discovered in
the three tools included in with the Support Tools Manager. There are
currently few details on this vulnerability. This problem affects HP9000
servers in the 700 and 800 series.
* Click here for Advisory on Support Tools Manager Attack
Date: January 19, 2001
Platform: Software Packages wu-ftpd (port 21/tcp), rpc.statd
(port 111/udp) and lprng (port 515/tcp)
Warning About: Widespread Compromises Via "ramen" Toolkit
Report From: CERT/CC
* Release Note: The CERT/CC has received reports from sites that have
recovered an intruder toolkit called "ramen" from compromised hosts.
Ramen, which is publicly available, exploits one of several known
vulnerabilities and contains a mechanism to self-propagate.
* Click here for CERT IN-2001-01
Date: January 18, 2001
Released: January 17, 2001
Platform: Systems With tinyproxy 1.3.2 and 1.3.3
Warning About: Tinyproxy Heap Overflow Vulnerability
Report From: Security Focus
* Release Note: versions 1.3.2 and 1.3.3 of tinyproxy, a small HTTP proxy,
exhibit a vulnerability to heap overflow attacks.
* Click here for Advisory on Tinyproxy Vulnerability
Date: January 18, 2001
Released: January 16, 2001
Platform: PHP 4.0.4, 4.0.3, 4.0.1 and 4.00
Warning About: PHP .htaccess Attribute Transfer Vulnerability
Report From: Security Focus
* Release Note: PHP the Personal Home Page software package distributed and
maintained by the PHP Development Team. PHP provides enhanced attributes
and added functionality to web pages. A problem with the PHP package
could allow for unauthorized access to restricted resources.
* Click here for Advisory on PHP Vulnerability
Date: January 14, 2001
Released: January 12, 2001
Platform: Systems Where VBScript is installed, such as IE5
or Visual Studio.
Warning About: VBS/Davinia Worm
Aliases: HTML/LittleDavinia (Panda), LD.doc, LittleDavinia.vbs
Report From: Network Associates
* Release Note: McAfee AVERT has received information that a script
Internet worm may be circulating as the name LITTLEDAVINIA.VBS or
possibly LD.DOC. Read the complete report for Method Of Infection.
* Click here for Report on VBS/Davinia Worm
Date: January 14, 2001
Released: January 13, 2001
Platform: Linux, Solaris, HP-UX, Windows and SCO.
Updates To: Borland InterBase Product
Report From: Linux Daily News
* Release Note: Borland announced the availability of a patch that will
fix a potential security issue within the InterBase product, versions
4.0 through 6.0. The patch is available for Linux, Solaris, HP-UX,
Windows and SCO.
* Click here for LWN Security Note to Borland InterBase Product
Date: January 13, 2001
Platform: Unknown Information at this time
Warning About: VBS.Davinia Worm
Report From: Norton / Symantec Security Updates
* Release Note: SARC has received information of a new script-based
Internet worm named VBS.Davinia. However, SARC has not received any
submission of this new worm. We will update this writeup as soon as
we get a submission or more accurate information.
* Click here for Report on VBS.Davinia Worm
Date: January 13, 2001
Platform: Borland/Inprise Interbase 4.x and 5.x
Open source Interbase 6.0 and 6.01
Open source Firebird 0.9-3 and earlier
Warning About: Interbase Server Contains Compiled-in Back Door Account
Report From: CERT
* Release Note: Interbase is an open source database package that had
previously been distributed in a closed source fashion by Borland/
Inprise. Both the open and closed source verisions of the Interbase
server contain a compiled-in back door account with a known password.
* Click here for CERT CA-2001-01
Date: January 12, 2001
Platform: Sun Solaris 2.4 to 7.0_x86
Warning About: Solaris arp Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: The arp utility is used for viewing and manipulating
tables containing network to hardware address mappings. On Solaris
systems up to version 8, arp is installed setgid and owned by group
bin. The vulnerability can be exploited to execute code with effective
groupid bin privileges.
* Click here for Advisory on arp Buffer Overflow Vulnerability
Date: January 12, 2001
Platform: RedHat Linux 7.0 / UNIX / Wirex Immunix OS 7.0-Beta
Warning About: Apache /tmp File Race Vulnerability
Report From: Security Focus
* Release Note: Apache web server is a popular http daemon, distributed
with many variants of the UNIX Operating System and maintained by the
Apache Project. Immunix is a hardened Linux distribution maintained by
the Immunix team at the WireX Corporation. A problem has been discovered
which makes it possible for a user with malicious motives to symblink
attack files writable by the UID of the Apache process.
* Click here for Advisory on Apache /tmp File Race Vulnerability
Date: January 12, 2001
Platform: Various / Linux
Press Report: Major Security Hole Found In Borland Database
Report From: Linux Daily News
* Release Note: C|Net News.com is reporting that a major security hole
has been found in Borland's InterBase database, which runs on various
platforms including Linux. "Borland acknowledged the back door and
has begun releasing patches. The company has notified customers and
sales partners and will begin shipping repaired versions this week."
Update: This is actually the Interbase database, not Inprise. Our bad.
This database was released as open source last year. (Thanks to Pete
Link for the errata notice)
* Click here for LWN CNet News Report on Borland
Date: January 12, 2001
Warning About: WAZUP HOAX
Aliases: Waza.mp3 hoax
Report From: Network Associates
* Release Note: This is a hoax found to be circulating among French
speaking Internet users. See NAI's report for a copy of the french
text and the English translation. Delete or ignore messages
containing this text.
* Click here for NAI HOAX Report on WAZUP
Date: January 11, 2001
Released: January 10, 2001
Platform: Sun Solaris / SGI IRIX / MS Win98 / NT 4.0/2000
Linux kernel 2.3 / FreeBSD / BSDI BSD/OS
Warning About: WebMaster ConferenceRoom Developer Edition DoS Vulnerability
Report From: Security Focus
* Release Note: WebMaster ConferenceRoom Developer Edition is a chat
package which enables a large community of users to chat together.
ConferenceRoom has a wide range of capabilities and a user friendly
channel moderation feature. It is possible to cause a denial of service
in ConferenceRoom.
* Click here for Advisory on ConferenceRoom Vulnerability
Date: January 11, 2001
Released: January 09, 2001
Platform: Sun Solaris 2.6 / 2.5.1 / 2.5 / 2.4
Warning About: Solaris exrecover Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: exrecover is a system binary included with Solaris, a
variant of the UNIX Operating System distributed by Sun Microsystems.
A problem in the binary could lead to a local attack.
* Click here for Advisory on exrecover Vulnerability
Date: January 09, 2001
Released: January 08, 2001
Platform: Sun Solaris / Linux / MS Windows NT / IBM AIX / HP HP-UX
Warning About: IBM HTTP Server AfpaCache DoS Vulnerability
Report From: Security Focus
* Release Note: IBM HTTP Server contains AfpaCache directive which
turns the Fast Response Cache Accelerator function on or off. IBM
HTTP Server is subject to a denial of service. Requesting multiple
malformed HTTP GET requests will cause the consumption of kernel
memory and eventually lead to a denial of service.
* Click here for Advisory on IBM HTTP Server Vulnerability
Date: January 07, 2001
Released: January 05, 2001
Platform: Multiplatforms
Warning About: Lotus Domino Server Directory Traversal Vulnerability
Report From: Security Focus
* Release Note: Lotus Domino is a multiplatform web server which
integrates messaging and various interactive web applications. It is
possible for a remote user to gain access to any known file residing
on the Lotus Domino Server. Successful exploitation of this vulner-
ability could enable a remote user to gain access to systems files,
password files, etc. This could lead to a complete compromise of the
host.
* Click here for Advisory on Lotus Domino Server Vulnerability
Date: January 04, 2001
Released: January 03, 2001
Platform: UNIX Operating System
Warning About: HP-UX kermit Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: Kermit is a communications software package available
with most implementations of the UNIX Operating System. A problem
exists in the kermit software package distributed with HP-UX. This
problem could allow a user with malicious intent to arbitrarily
execute code, and gain elevated privileges with the potential for
administrative access.
* Click here for Advisory on HP-UX kermit Vulnerability
Top of Page
Back to the Virus Archives page
