Virus Warnings from February 2001 ______________________________________________________________ [Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Linux] [Jump to Misc] ______________________________________________________________ Amiga No virus warnings for February 2001 Top of Page Windows Date: February 27, 2001 Platform: Microsoft Warning About: W97M.Shepmah.G Virus Report From: Norton / Symantec Security Updates * Release Note: This is a Microsoft Word macro virus that spreads by infecting Microsoft Word documents and the global template, Normal.dot. * Click here for Report on W97M.Shepmah.G Virus Date: February 27, 2001 Platform: MS Windows Warning About: VBS.Phram Virus Report From: Norton / Symantec Security Updates * Release Note: VBS.Phram is a script written in the Visual Basic Scripting language. However, the script has been put into an HTML file, and it spreads as a file named e-Gen.html. When executed, the virus displays a message in the Web browser. VBS.Phram also contains a macro virus. Norton AntiVirus detects the macro virus as W97M.Phram. * Click here for Report on VBS.Phram Virus Date: February 27, 2001 Platform: Microsoft Warning About: W97M.Phram Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Phram is a macro virus that infects Microsoft Word documents. It can also infect the global template, Normal.dot. * Click here for Report on W97M.Phram Virus Date: February 27, 2001 Platform: Microsoft Warning About: VCard Virus Exploit Aliases: Malformed vCard Exploit, VCF Virus Report From: Network Associates * Release Note: This is not a virus. This is a published exploit, first mentioned in a BugTraq forum posting. * Click here for Report on VCard Virus Exploit Date: February 27, 2001 Platform: PC Warning About: QSD23 Trojan Report From: Network Associates * Release Note: This is a tool used by someone maliciously to create many files on the local hard drive. When run, this trojan displays graphical user interface with a window title that includes "(Windows Bomber)". * Click here for Report on QSD23 Trojan Date: February 27, 2001 Platform: MS Windows 2000 Patch Available: Windows 2000 Event Viewer Contains Unchecked Buffer Report From: MicroSoft TechNet Security * Release Note: The Windows 2000 event viewer snap-in has an unchecked buffer in a section of the code that displays the detailed view of event records. * Click here for MS Security Bulletin MS01-013 Date: February 27, 2001 Released: February 26, 2001 Platform: Microsoft Outlook, Outlook Express Warning About: Microsoft Outlook VCard Unchecked Buffer Vulnerability Report From: CIAC Bulletins * Release Note: An unchecked buffer in the Virtual business card application (VCard) could enable an attacker to run the code of his choice. * Click here for Bulletin Number L-050 Date: February 27, 2001 Released: February 23, 2001 Platform: MS Win 2000 Server, Advanced Server and Datacenter Server Warning About: Microsoft "Malformed Request to Domain Controller" Report From: CIAC Bulletins * Release Note: A core service running only on Windows 2000 domain controllers has a software flaw. This flaw affects system handling of invalid service requests. * Click here for Bulletin Number L-049 Date: February 27, 2001 Platform: PC Warning About: VBSWG.Q@mm Worm Report From: F-Secure * Release Note: At February 16th, a variant of VBS/Onthefly is spreading within messages that has German content, and includes Attachment: r4mac.vbs When the attached file is executed, the worm will mail itself to the each recipient in every address book. After mass mailing, a key is added to the registry. * Click here for F-Secure Report on VBSWG.Q@mm Worm Date: February 27, 2001 Platform: PC using Gnutella peer-to-peer file sharing system Warning About: Mandragore Worm Aliases: GnutellaMandragore, Gnutella worm Report From: F-Secure * Release Note: GnutellaMandragore is a worm which spreads through the Gnutella peer-to-peer file sharing system (which is somewhat similar to Napster). If you're not using Gnutella, you're not at risk. Popular programs to access Gnutella include ToadNode and BearShare. For more information, see: http://www.exocortex.org/gnutella/ * Click here for F-Secure Report on Mandragore Worm Date: February 27, 2001 Released: February 23, 2001 Platform: MS Microsoft Outlook Warning About: Carnival Worm Aliases: VBS/Carnival.A@mm Variant: Carnival.A@mm Report From: F-Secure, Network Associates and Symantec Security * Release Note: Carnival is a mass-mailer (worm) written in Visual Basic Script. It includes Attachment: Brazilian_Carnival.JPG.vbs The worm activates when a user click on the attached file. It spreads to all recipients written in Outlook address book. * Click here for F-Secure Report on Carnival Worm * Click here for NAI Report on VBS/Carnival@mm Worm * Click here for Symantec Report on VBS.Carnival@mm Worm Date: February 23, 2001 Platform: MS Windows 9.x / NT 4.0 / NT 2000 Warning About: Working Resources BadBlue 1.2.7 Path Disclosure Vulnerability Report From: Security Focus * Release Note: Requesting a specially crafted URL to a machine running Working Resources BadBlue, will disclose the physical path to the root directory. * Click here for Advisory on BadBlue Path Disclosure Vulnerability Date: February 23, 2001 Platform: MS Windows 9.x / NT 4.0 / NT 2000 Warning About: Working Resources BadBlue 1.2.7 DoS Vulnerability Report From: Security Focus * Release Note: It is possible for a remote user to cause a denial of service condition in Working Resources BadBlue. * Click here for Advisory on BadBlue DoS Vulnerability Date: February 23, 2001 Platform: MS Windows NT 2000 Server, Win NT 2000 Datacenter and Win NT 2000 Advanced Server Warning About: Microsoft Windows 2000 Domain Controller DoS Vulnerability Report From: Security Focus * Release Note: A denial of service condition exists in Windows 2000 domain controllers. Submitting numerous invalid requests to a domain controller could cause the system to stop responding. * Click here for Advisory on MS Win 2000 DoS Vulnerability Date: February 23, 2001 Platform: Microsoft Warning About: VBS.Eyemagic@mm Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Eyemagic@mm is a worm that attempts to spread using mIRC (a popular chat client) and Microsoft Outlook. The worm itself is detected as VBS.Eyemagic@mm, and the Script.ini file used to spread via IRC is detected as IRC.Eyemagic. * Click here for Report on VBS.Eyemagic@mm Worm Date: February 23, 2001 Platform: Microsoft Warning About: W97M.Black.G Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Black.G is a macro virus that infects Word documents by adding a "BLACKCURSE" module. It changes the Author and Title of all infected documents. On August 31 it also prints out a message. * Click here for Report on W97M.Black.G Virus Date: February 23, 2001 Platform: Microsoft Warning About: W97M.KPMV Worm Report From: Norton / Symantec Security Updates * Release Note: W97M.KPMV is a polymorphic macro virus that infects Word documents when they are opened. * Click here for Report on W97M.KPMV Worm Date: February 23, 2001 Platform: Microsoft Warning About: W97M.Intruded.A Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Intruded.A is a stealth Microsoft Word macro virus that infects the Normal.dot template and the active document. The file summary information is changed, and when you access macros or the VBEditor, a very rude message is displayed. * Click here for Report on W97M.Intruded.A Virus Date: February 23, 2001 Platform: MS Outlook 97 / 2000, MS Outlook Express 5.01 / 5.5 Patch Available: Outlook and OE VCard Handler Contains Unchecked Buffer Report From: MicroSoft TechNet Security * Release Note: Outlook Express provides several components that are used both by it and, if installed on the machine, Outlook.One such component, used to process vCards, contains an unchecked buffer in the functionality that processes VCards. * Click here for MS Security Bulletin MS01-012 Date: February 23, 2001 * Updated Platform: PC Warning About: Onthefly Worm Aliases: VBSWG, I-Worm.Lee.o, SST, VBS_Kalamar, Onthefly.A Variant: VBSWG.J@mm Report From: F-Secure * Release Note: VBS/Onthefly is an encrypted Visual Basic Script worm which spreads (mass mails) itself using Microsoft Outlook application. On February 12th, 2001 this worm has spread rapidly in all over the world in just a few hours. * Click here for Report on Onthefly Worm Date: February 23, 2001 * Updated Platform: PC Warning About: VBSWG.N@mm Worm Report From: F-Secure * Release Note: On February 20th, this variant of VBS/VBSWG has been found from the field. This variant is not encrypted. When it is executed, the worm alters the Internet Explorer start page to point to an adult site. It also modifies the registry in such way that the worm will be executed every time when the system is restarted. * Click here for Report on VBSWG.N@mm Worm Date: February 23, 2001 * Updated Platform: PC Warning About: VBSWG.M Worm Report From: F-Secure * Release Note: On February 19th, this variant of VBS/VBSWG was posted to several newsgroups in an attached file called "Intervieuw with OnTheFly.mp3.vbs". However, due a bug it does not replicate. * Click here for Report on VBSWG.M Worm Date: February 23, 2001 Platform: PC Warning About: VBSWG.L Worm Report From: F-Secure * Release Note: On February 19th, this variant of VBS/VBSWG was posted to several newsgroups in an attached file called "Intervieuw with OnTheFly.mp3.vbs". However, due a bug it does not replicate. * Click here for Report on VBSWG.L Worm Date: February 23, 2001 Platform: PC Warning About: VBSWG.K@mm Worm Aliases: Onthefly.B Report From: F-Secure * Release Note: At February 16th, a variant of VBS/Onthefly is spreading within messages that have German content. The variant also replicates using mIRC and Pirch IRC clients. * Click here for Report on VBSWG.K@mm Worm Date: February 23, 2001 Platform: PC Warning About: Totilix Worm Aliases: I-Worm.Totilix Report From: F-Secure * Release Note: Totilix is a dangerous Internet virus-worm that spreads itself with e-mail messages and overwrites all, except a couple, of EXE files in the Windows directory with its copy. * Click here for Report on Totilix Worm Date: February 21, 2001 Platform: PC Warning About: W97M.Black.F Macro Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Black.F is a macro virus that infects Word documents by adding a "BLACKCURSE" module. It changes the Author and Title of all infected documents. On August 31 it also prints out a message. * Click here for Report on W97M.Black.F Macro Virus Date: February 21, 2001 Platform: PC Warning About: W97M.Black.D Macro Virus Also Known As: W97M/Bleck Report From: Norton / Symantec Security Updates * Release Note: W97M.Black.D is a Microsoft Word macro virus that infects active documents and the global template, Normal.dot. It also disables access to the Macro Editor and the Visual Basic Editor. When the day is August 31, the virus inserts a message in your documents. * Click here for Report on W97M.Black.D Macro Virus Date: February 21, 2001 Platform: PC Warning About: BAT.Install.Trojan Trojan Report From: Norton / Symantec Security Updates * Release Note: BAT.Install.Trojan is a batch file Trojan horse that creates many folders in the root of drive C. After creating the folders, it copies itself to many locations, and in doing so, overwrites necessary Windows files. The original file name is "Install.bat". * Click here for Report on BAT.Install.Trojan Trojan Date: February 21, 2001 Platform: PC Warning About: PWSteal.Coced240b.Tro Trojan Aliases: Trojan.PWS.Coced.240.b, PWS.gen, NAEBI.240B.Trojan Report From: Norton / Symantec Security Updates * Release Note: The password stealer appears as an attachment named 26705-i386-update.exe. It claims to be a vulnernability patch that is mailed from support@microsoft.com. The Trojan sends confidential password information to an email address. Microsoft has posted information regarding bogus files. * Click here for Report on PWSteal.Coced240b.Tro Trojan Date: February 21, 2001 Platform: PC Warning About: VBS.Trojan.Noob Trojan Report From: Norton / Symantec Security Updates * Release Note: VBS.Trojan.Noob uses animation to disguise its actions. Once executed, this Trojan searches for mIRC, and if found, it will attempt to modify mIRC settings to allow unauthorized access to the infected computer. * Click here for Report on VBS.Trojan.Noob Trojan Date: February 21, 2001 Platform: PC Warning About: VBS.Apulia.D@mm Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Apulia.D@mm is a simple VBS Script worm that attempts to email a .zip file to every recipient in your Microsoft Outlook address book. Due to bugs in the code, however, it does not successfully send the file. * Click here for Report on VBS.Apulia.D@mm Worm Date: February 21, 2001 Platform: Windows 98 and Windows 2000 Warning About: JS.Fav Trojan Report From: Norton / Symantec Security Updates * Release Note: JS.Fav is a simple Trojan horse that creates three links in the Favorites folder, which are then displayed on the Start Menu. Two of the three sites are pornographic, and one a search engine. After creating these links, the Trojan destroys itself. * Click here for Report on JS.Fav Trojan Date: February 21, 2001 Platform: PC Warning About: Backdoor.Acropolis Trojan Report From: Norton / Symantec Security Updates * Release Note: This Trojan horse permits a remote operator to control an infected system. The name of the Trojan horse is Acropolis 1.0, and it is detected as Backdoor.Acropolis. When launched, the Trojan horse opens a network connection on ports 32791 and 45673. This gives a remote operator the capability to use your computer to send messages using mIRC. These messages may contain attached files. It is possible, but not confirmed, that the Trojan horse could also be used to control email programs. * Click here for Report on Backdoor.Acropolis Trojan Date: February 21, 2001 Platform: MS Windows. 2000 Server, Advanced Server, Datacenter Server Patch Available: Malformed Request to Domain Controller can Cause Denial of Service Vulnerability Report From: MicroSoft TechNet Security * Release Note: A core service running on all Windows 2000 domain controllers (but not on any other machines) contains a flaw affecting how it processes a certain type of invalid service request. * Click here for MS Security Bulletin MS01-011 Date: February 21, 2001 Platform: PC Hoax Alert: Bud Frogs HOAX Aliases: Budfrogs, Budweiser Frogs, Budsaver Report From: F-Secure Hoax Information * Release Note: There is worm, VBS/VBSWG.N@mm, that spreads itself in an attachement called "budweiser-commercial-spring2001.mpeg.vbs". This worm has nothing to do with this hoax. Further information about the worm is available at: http://www.F-Secure.com/v-descs/vbswg_n.shtml This warning about a possible trojan horse circulates AOL and the Internet. No antivirus lab has seen a sample of the original file, so this can be considered a hoax. * Click here for F-Secure hoax Info on Bud Frogs HOAX * Click here for F-Secure virus Info on VBS/VBSWG.N@mm Worm Date: February 21, 2001 Platform: PC Warning About: VBSWG.O Aliases: Onthefly.C Report From: F-Secure * Release Note: Information about the original VBS/Onthefly.A (also known as I-Worm.Lee.o and VBS/VBSWG) is available at: http://www.F-Secure.com/v-descs/onthefly.shtml This variant is not encrypted. Otherwise it is similar to VBS/Onthefly.B, however, due a bug it does not replicate. * Click here for Report on VBSWG.O Date: February 21, 2001 Platform: PC Warning About: VBSWG.N@mm Worm Report From: F-Secure * Release Note: Information about the original VBS/Onthefly.A (also known as I-Worm.Lee.o and VBS/VBSWG) is available at: http://www.F-Secure.com/v-descs/onthefly.shtml On February 20th, this variant of VBS/VBSWG has been found from the field. This variant is not encrypted. * Click here for Report on VBSWG.N@mm Worm Date: February 21, 2001 * Updated Platform: PC Warning About: Onthefly Worm Aliases: VBSWG, I-Worm.Lee.o, SST, VBS_Kalamar, Onthefly.A Variant: VBSWG.J@mm Report From: F-Secure * Release Note: VBS/Onthefly is an encrypted Visual Basic Script worm which spreads (mass mails) itself using Microsoft Outlook application. * Click here for Report on Onthefly Worm Update Date: February 21, 2001 Platform: PC Warning About: VBSWG.M Worm Report From: F-Secure * Release Note: Information about the original VBS/Onthefly.A (also known as I-Worm.Lee.o and VBS/VBSWG) is available at: http://www.F-Secure.com/v-descs/onthefly.shtml On February 19th, this variant of VBS/VBSWG was posted to several news- groups in an attached file called "Intervieuw with OnTheFly.mp3.vbs". However, due a bug it does not replicate. * Click here for Report on VBSWG.M Worm Date: February 18, 2001 Platform: Microsoft IIS 5.0 / Windows NT 2000 / Apache Group Apache 1.3.9 Warning About: Caucho Tech Resin 1.2 Directory Traversal Vulnerability Report From: Security Focus * Release Note: It is possible for a remote user to gain read access to directories and files outside the root directory of a machine running Resin. * Click here for Advisory on Caucho Technology Vulnerability Date: February 18, 2001 Platform: Microsoft Windows 9.x / NT 4.0 / NT 2000 Warning About: ITAfrica WEBactive 1.0 Directory Traversal Vulnerability Report From: Security Focus * Release Note: It is possible for a remote user to gain read access to directories and files outside the root directory of ITAfrica WEBactive. * Click here for Advisory on ITAfrica WEBactive Vulnerability Date: February 18, 2001 Platform: Microsoft Windows 95 / NT 4.0 Warning About: John Roy Pi3Web 1.0.1 Buffer Overflow Vulnerability Report From: Security Focus * Release Note: A buffer overflow vulnerability has been reported in John Roy Pi3Web web server. The ISAPI application within the server fails to properly handle user supplied input. Requesting a specially crafted URL will cause the buffer to overflow and possibly allow the execution of arbitrary code. * Click here for Advisory on John Roy Pi3Web Vulnerability Date: February 17, 2001 Platform: PC Warning About: VBS/VBSWG.k@MM Worm Aliases: VBS.Vbswg.gen (NAV), I-Worm.Lee.o, VBS/SST@MM Report From: Norton / Symantec Security Updates and Network Associates * Release Note: VBS.Vbswg.K is created using a worm generator tool, and is detected as VBS.Vbswg.gen. This particular variant spreads by using Microsoft Outlook, mIRC and pirch, and it uses the file name "Neue Tarife.txt.vbs". The mIRC .ini script file is detected as VBS.Vbswg.K (mIRC) and the Pirch .ini script file is detected as VBS.Vbswg.K (pirch). When spreading by email, this worm presents itself as a message from the German ISP t-online. The attachment is a price list. * Click here for Symantec Report on VBS.Vbswg.K * Click here for NAI Report on VBS/VBSWG.k@MM Date: February 17, 2001 Platform: PC Warning About: IRC/Abuser DDoS Trojan Aliases: Trojan.MircAbuser (NAV) Report From: Network Associates * Release Note: This is a Distributed Denial of Service trojan which arrives as a software installation package. When run, an installation screen is displayed for, "CD-R Doubler". However, the user is not presented with any installation options, the trojan proceeds to install itself without user intervention. Read the complete report for Method Of Infection and Removal Instructions * Click here for Report on IRC/Abuser Date: February 16, 2001 Platform: Microsoft Warning About: O97M.Hopper.V Macro Virus Aliases: Macro.Office.Hopper.n, X97M/Hopper.r Report From: Norton / Symantec Security Updates * Release Note: O97M.Hopper.V is a stealth macro virus that infects both Microsoft Word documents and Microsoft Excel workbooks. Depending on the day of the month, O97M.Hopper.V may modify data or settings in the Word document or in the Excel workbook. Read the complete report for Removal Instructions. * Click here for Report on O97M.Hopper.V Macro Virus Date: February 15, 2001 Platform: Microsoft Windows Patch Available: Windows Media Player Skins File Download Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows Media Player 7. This vulnerability could potentially enable a malicious user to cause a program of his choice to run on another users computer. * Click here for MS Security Bulletin MS01-010 * Click here for FAQ about vulnerability and the patch Date: February 14, 2001 Platform: PC Warning About: VBS.Delete.Trojan Trojan Report From: Norton / Symantec Security Updates * Release Note: VBS.Delete.Trojan is a Trojan horse that tries to remove the Windows and Program Files folders, including their contents. It is 373 bytes long. After trying to remove these folders, it displays a message box with the following text: http://www.Webtool.com The message box has the title "ERROR." * Click here for Report on VBS.Delete.Trojan Trojan Date: February 14, 2001 Platform: PC Warning About: W97M.Bablas.BR Macro Virus Aliases: Macro.Word97.Bablas, W97M/Bablas.gen Report From: Norton / Symantec Security Updates * Release Note: W97M.Bablas.BR is a Microsoft Word macro virus that infects active documents and the global template, Normal.dot. It also disables access to the Macro Editor and the Visual Basic Editor. * Click here for Report on W97M.Bablas.BR Macro Virus Date: February 14, 2001 Platform: PC Warning About: W97M.Bablas.BS Macro Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Bablas.BS is a Microsoft Word macro virus that infects active documents and the global template, Normal.dot. It also disables access to the Macro Editor and the Visual Basic Editor. * Click here for Report on W97M.Bablas.BS Macro Virus Date: February 14, 2001 Platform: PC Warning About: X97M.Barisada.P Report From: Norton / Symantec Security Updates * Release Note: This Microsoft Excel macro virus replicates when an infected spreadsheet window is closed. This virus has a payload similar to X97M.Barisada.A, but the payload will never execute. * Click here for Report on X97M.Barisada.P Date: February 14, 2001 Platform: PC Warning About: W97M.Candle.Gen Report From: Norton / Symantec Security Updates * Release Note: This is a Microsoft Word macro virus that spreads by infecting Microsoft Word documents and the global template, Normal.dot. * Click here for Report on W97M.Candle.Gen Date: February 14, 2001 Platform: PC Warning About: Trojan.MircAbuser Report From: Norton / Symantec Security Updates * Release Note: Trojan.MircAbuser.dr pretends to install a useful tool. However, this file installs Mirc32 on the computer and creates hidden files that allow a hacker to access the affected computer and use it for a Denial of Service attack. These hidden files are detected as Trojan.MircAbuser. * Click here for Report on Trojan.MircAbuser Date: February 14, 2001 Platform: PC Warning About: W97M.Forget.A Report From: Norton / Symantec Security Updates * Release Note: W97M.Forget.A infects the Microsoft Word Normal.dot template and open Word documents. On the 8th day of every month, W97M.Forget.A causes the Office Assistant to display the message: Today is the day of my sister's birthday don't forget ... * Click here for Report on W97M.Forget.A Date: February 14, 2001 Platform: PC Warning About: HardLock.618 Boot Trojan Aliases: Trojan.Dood, Mutha Trojan Report From: Norton / Symantec Security Updates * Release Note: HardLock.618 is a boot Trojan. It does not infect or delete files. This Trojan changes a byte in the Master Boot Record (MBR) of the hard drive. The change prevents the computer from booting. * Click here for Report on HardLock.618 Boot Trojan Date: February 14, 2001 Platform: PC Warning About: W97M.Thus.CN Macro Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Thus.CN is a macro virus that spreads by infecting the Normal.dot template and Microsoft Word documents as they are opened and closed. This virus is a variant of W97M.Thus.A. * Click here for Report on W97M.Thus.CN Macro Virus Date: February 14, 2001 Platform: PC Warning About: W97M.Bablas.BQ Macro Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Bablas.BQ is a Microsoft Word macro virus that infects active documents and the Normal.dot template. It also disables access to the Macro Editor and the Visual Basic Editor. * Click here for Report on W97M.Bablas.BQ Macro Virus Date: February 14, 2001 Platform: PC Warning About: W97M.Titch.H Macro Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Titch.H is a very simple macro virus. The virus replicates between the global template (Normal.dot) and Microsoft Word documents as the documents are closed. * Click here for Report on W97M.Titch.H Macro Virus Date: February 14, 2001 Platform: PC Warning About: VBS.Davinia.B Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Davinia.B is an email worm that mails a message written in HTML to everyone in your Microsoft Outlook address book. Read the complete report for Removal Instructions and how to Restore Files. * Click here for Report on VBS.Davinia.B Worm Date: February 14, 2001 Released: February , 2001 Platform: PC Warning About: DUNpws.es Trojan Aliases: Trojan.PSW.Billy.b (AVP) Report From: Network Associates * Release Note: This is a Dial-Up Networking password stealing trojan. It uses a WinZip like icon and when run, it displays a typical WinZip corrupted file message. The trojan copies itself to the WINDOWS directory and creates a run key value in the registry to load the trojan at startup. Read the complete report for Method Of Infection and Removal Instructions * Click here for Report on DUNpws.es Trojan Date: February 14, 2001 Platform: Microsoft Windows NT 4.0 Servers Patch Available: Malformed PPTP Packet Stream Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft. Windows NT. 4.0 servers that provide secure remote sessions. The vulnerability could allow an attacker to prevent an affected machine from providing useful service. * Click here for MS Security Bulletin MS01-009 * Click here for FAQ about vulnerability and the patch Date: February 14, 2001 Platform: PC Warning About: VBS/Valentin@MM / Valentine Mass Mailing Worm Variant: Valentine.A@mm Aliases: Valentin.A (CA), Valentine (F-Prot), VBS.Valentin.A Report From: F-Secure and / Network Associates * Release Note: VBS/Valentine is a mass mailing worm written in Visual Basic Script. The worm arrives in an infected message sent with MS Outlook. When it is openend, it first drops "loveday14-b.hta" to the Windows Startup directory in both Spanish and English versions of Windows. The worm creates an infected "main.html" file to the Windows System directory and sets the Internet Explorer start page to point to a web page that contains another worm, VBS/San.A@m. * Click here for Report on Valentine Worm * Click here for Report From Network Associates Date: February 14, 2001 Platform: PC Warning About: VBS/San@M / San Worm Aliases: San (F-Prot), San.A (CA), VBS.San.A Variant: San.A@m Report From: F-Secure and Network Associates * Release Note: San is a worm written in Visual Basic Script. The worm arrives in an infected message sent with Outlook Express. When it is viewed, by opening it or via preview pane, it first drops "loveday14-a.hta" to the Windows Startup directory in both Spanish and English versions of Windows. One of the things this worm does is replace the Internet Explorer start page point to a web page, that contains another worm VBS/Valentine.A@mm. These two worms download each other. If the system date is 8th, 14th, 23rd or 29th on each month, then VBS/Sun.A will destroy the infected system. It will delete all directories and their contents from the drive "C:". * Click here for Report on San Worm * Click here for Report From Network Associates Date: February 14, 2001 Platform: Windows 2000 only. (does not affect NT) Warning About: Microsoft Network DDE Agent Request Vulnerability Report From: CIAC Bulletins * Release Note: A flaw in the Network Dynamic Data Exchange (DDE) agent could enable unprivileged users to run code and elevate privileges on a local machine. * Click here for Bulletin Number L-044 Date: February 14, 2001 Platform: Windows NT 4.0 Workstation and Server Warning About: Microsoft NTLMSSP Privilege Elevation Vulnerability Report From: CIAC Bulletins * Release Note: A flaw in the NTLM Security Support Provider (NTLMSSP) service allows a local user to initiate a specially formed request that executes arbitrary code with LocalSystem security privileges. * Click here for Bulletin Number L-043 Date: February 14, 2001 Reported: February 12, 2001 Platform: Users of Microsoft Outlook who have not applied previously available security updates. Warning About: The VBS.AnnaKournikova Worm VBS/OnTheFly (Anna Kournikova) Malicious Code Aliases: I-Worm.Lee.o, VBS/VBSWG.J@MM, SST, VBS_Kalamar Anna Kournikova, AnnaKournikova, VBS.VBSWG.J (CA) VBS/Anna, VBS/OnTheFly@mm (F-Secure), VBS/SST (VS) VBS/SST-A (Sophos), VBS/SST.A (Panda), VBS/SST.Worm (CAI) VBS/VBSWG.J (F-Prot), VBS_Kalamar.a (Trend) Report From: CIAC Bulletins, CERT, F-Secure, Network Associates * Release Note: A new worm named VBS.AnnaKournikova is spreading in the wild. It runs under the windows scripting host and uses the Outlook program to send itself as an attachment to everyone in your address book. The e-mail message has the subject: "Here you have, ;o)" and body: "Hi:", "Check This!". The attachment is named: "AnnaKournikova.jpg.vbs" though the .vbs extension may be hidden. Removal Removing the worm requires a system reboot to kill the running worm, removal of the e-mail message and its attachment, removal of the AnnaKournikova.jpg.vbs file in the windows directory and removal of the two registry keys: HKCU\software\OnTheFly\Worm made with Vbswg 1.50b HKCU\software\OnTheFly\mailed The registry keys have no effect on your operating system and could be left in place without causing any harm. The second registry key with a value of 1 prevents a future infection with this worm from spreading. * Click here for CIAC Bulletin Number L-046 * Click here for CERT Advisory CA-2001-03 * Click here for F-Secure Report * Click here for Network Associates Report Date: February 08, 2001 Released: February , 2001 Platform: PC Warning About: VBS.LoveLetter.CD Aliases: C'h una cartolina per te!, Cartolina.vbsVBS/Lovelet-CD (Sophos) VBS/Lovelet-CD (Sophos), VBS_CARTOLINA.A (Trend) Report From: Network Associates and Norton / Symantec Security Updates * Release Note: NAI says this is a Visual Basic Script virus. It's only purpose is to spread to other systems using built-in functions of VBScript via Outlook messaging. Symantec says if your computer is infected by this worm, it will use the Microsoft Outlook address book to propagate itself. * Click here for NAI Report on VBS/Loveletter.CD@MM * Click here for Norton Report on VBS.LoveLetter.CD Date: February 08, 2001 Released: February , 2001 Platform: Microsoft Windows NT 4.0 Patch Available: NTLMSSP Privilege Elevation Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows NT 4.0. The vulnerability could allow a locally logged on user to grant herself administrator level privileges. * Click here for MS Security Bulletin MS01-008 * Click here for FAQ about vulnerability and the patch Date: February 08, 2001 Platform: PC Warning About: Cartolina Worm Aliases: LoveLetter.CD, I-Worm.Jer Report From: F-Secure * Release Note: Cartolina is a simple variant of the LoveLetter e-mail worm. This version has been written in Italy. It was found in the wild in early February, 2001. It's unlikely to spread far outside Italy. * Click here for Report on Cartolina Worm Date: February 07, 2001 Platform: PC Warning About: Backdoor.Netbus.444051 Trojan Horse Report From: Norton / Symantec Security Updates * Release Note: This is a variant of the well-known backdoor Trojan, Netbus. This variant contains a registry file that modifies the Windows registry. Read the complete report for Removal Instructions. * Click here for Report on Backdoor.Netbus.444051 Trojan Horse Date: February 07, 2001 Platform: MS Windows 2000 Patch Available: Network DDE Agent Request Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows 2000. The vulnerability could, under certain conditions, allow an attacker to gain complete control over an affected machine. * Click here for MS Security Bulletin MS01-007 * Click here for FAQ about vulnerability and the patch Date: February 07, 2001 Platform: MS Windows 2000 Post Service Pack 1 hotfixes issued prior to December 19, 2000 Warning About: Microsoft Hotfix Packaging Anomalies Report From: CIAC Information Bulletin * Release Note: Post Service Pack 1 hotfix system catalogs were built with same version numbers as older versions. Newer hotfixes could be overwritten or otherwise replaced with older versions. Thus, systems could be open to vulnerabilities considered patched. * Click here for Bulletin Number L-041 Date: February 03, 2001 * Updated Platform: PC Warning About: W32/Joined Used for Heuristic Detection Report From: Network Associates * Release Note: There is a known false with 4118 DAT in some type of packaged files. McAfee AVERT recommends updating to DAT files post 4118 to avoid false detection. The detection is only enabled when scanning heuristically. * Click here for Report on W32/Joined Program Date: February 02, 2001 Platform: Microsoft Win 9x. Warning About: W32/Rast.2060 Worm Report From: Network Associates * Release Note: This is an intended Internet worm originally posted to a newsgroup (anonymously). This threat is not successful in its attempt to spread with intent to send itself via Eudora mail. Read the complete report for Method Of Infection and Removal Instructions. * Click here for Report on W32/Rast.2060 Worm Date: February 01, 2001 Platform: Microsoft Windows 2000 Terminal Servers Patch Available: Invalid RDP Data Vulnerability Report From: MicroSoft TechNet Security * Release Note: Microsoft has released a patch that eliminates a security vulnerability affecting Microsoft Windows 2000 terminal servers. The vulnerability could allow an attacker to cause an affected server to fail. * Click here for MS Security Bulletin MS01-006 * Click here for FAQ about vulnerability and the patch Top of Page Macintosh No virus warnings for February 2001 Top of Page Linux Date: February 27, 2001 Platform: Slackware Updates To: IMAP exploit Report From: Linux Daily News * Release Note: A short note in the slackware-current changelog points out that all previous versions of imapd (which is installed by default for Slackware distributions) has a remote exploit problem. All Slackware users are urged to upgrade their version of imapd. (LWN says Thanks to David Lang) * Click here for LWN Security Update To IMAP exploit Date: February 27, 2001 Platform: Immunix Updates To: Advisories For php, dump and lpr Report From: Linux Daily News * Release Note: Immunix posted a slew of updates in a single advisory to cover updates to php, dump and lpr, all of which had previous security issues but for which Immunix had not yet released updates. * Click here for LWN Advisories For php, dump and lpr Date: February 27, 2001 Platform: Red Hat Updates To: Zope Advisories Report From: Linux Daily News * Release Note: Red Hat has issued a security advisory for Zope. * Click here for LWN Security Advisory To Zope Date: February 27, 2001 Platform: Linux-Mandrake Updates To: sudo and Zope Advisories Report From: Linux Daily News * Release Note: Linux-Mandrake has issued security advisories for sudo and Zope, both of which may allow users advanced priviliges. * Click here for LWN Security Advisory To sudo * Click here for LWN Security Advisory To Zope Date: February 27, 2001 Platform: Trustix Updates To: sudo Advisories Report From: Linux Daily News * Release Note: Trustix have issued an advisories for the sudo buffer overflow problems that may allow an attacker to gain higher privileges. * Click here for LWN Security Update To sudo Advisories Date: February 27, 2001 Platform: Conectiva Updates To: sudo Advisories Report From: Linux Daily News * Release Note: Trustix have issued an advisories for the sudo buffer overflow problems that may allow an attacker to gain higher privileges. * Click here for LWN Security Update To sudo Advisories Date: February 27, 2001 Platform: Digital Creations Updates To: Zope Report From: Linux Daily News * Release Note: Digital Creations has released a security update to Zope (all versions up to 2.3b1) fixing a security vulnerability in how ZClasses are handled. An upgrade is recommended. * Click here for LWN Security Update To Zope Date: February 27, 2001 Platform: Slackware Updates To: Advisory For sudo Report From: Linux Daily News * Release Note: Slackware has released an updated sudo package for their 7.1 and - current releases to address a buffer overflow issue. * Click here for LWN Advisory Update To sudo Date: February 27, 2001 Released: February 25, 2001 Platform: Red Hat Updates To: Red Hat Analog updates are available Report From: Linux Daily News * Release Note: Updated analog packages are available for the Red Hat Secure Web Server 2.0 - i386. * Click here for LWN Security Update To Analog updates Date: February 23, 2001 Platform: Turbolinux Updates To: bind and sendmail Report From: Linux Daily News * Release Note: Turbolinux came out with a security update to bind fixing the (severe) problems that were reported back at the end of January. They also released a security update to sendmail fixing a local root compromise problem with that package. * Click here for LWN Security Update To bind * Click here for LWN Security Update To sendmail Date: February 23, 2001 Platform: Linux-Mandrake Updates To: Security Advisory For CUPS Report From: Linux Daily News * Release Note: Linux-Mandrake has issues a security advisory for the CUPS printing packages. An internal audit found buffer overflow and temporary file creation problems. It is highly recommended that all Linux-Mandrake users upgrade to this new version of CUPS. * Click here for LWN Security Advisory For CUPS Date: February 21, 2001 Platform: Immunix Updates To: Advisory For vixie-cron Report From: Linux Daily News * Release Note: Immunix has posted their security advisory for the recently reported vixie-cron vulnerability. * Click here for Immunix Advisory For vixie-cron Date: February 21, 2001 Platform: Red Hat Linux 5.2, 6.2, 7.0 Warning About: vixie-cron Buffer Overflow Username crontab Report From: CIAC Bulletins * Release Note: A buffer overflow flaw exists in the crontab file. The crontab flaw could allow a local user to elevate their privileges, leading to a possible root compromise. All users are advised to update their RPM files, as outlined in the advisory. * Click here for Bulletin Number L-048 Date: February 21, 2001 Platform: Red Hat Linux 6.2 and 7.0 Warning About: Ramen Worm Aliases: Linux.Ramen, Linux/Ramen, Unix/Ramen Variant: Ramen.A, Ramen.B Report From: F-Secure * Release Note: Ramen is an Internet worm, which propagates from a Linux based server to another. It works in a similar way as the Morris Worm that was widespread in 1989. It attempts to infect the system by exploiting three know security vulnerabilities - found from wu-ftpd, rpc.statd and lpd services. * Click here for Report on Ramen Worm Date: February 19, 2001 Platform: Red Hat Updates To: vixie-cron Advisory and Updated Packages Report From: Linux Daily News * Release Note: Vixie-cron (a popular version of the cron package available on many Linux distributions) has been found to have a buffer overflow problem that could allow certain users to gain elevated privileges. Red Hat has posted their advisory and updated packages for this problem. Expect to see similar reports from other distributors soon. * Click here for LWN Security Update To vixie-cron Date: February 18, 2001 Platform: Microsoft IIS 5.0 / Windows NT 2000 / Apache Group Apache 1.3.9 Warning About: Caucho Tech Resin 1.2 Directory Traversal Vulnerability Report From: Security Focus * Release Note: It is possible for a remote user to gain read access to directories and files outside the root directory of a machine running Resin. * Click here for Advisory on Caucho Technology Vulnerability Date: February 18, 2001 Platform: RedHat Linux 7.0 / Apache Group Apache 1.3.9 Warning About: Thinking Arts ES.One 1.0 Directory Traversal Vulnerability Report From: Security Focus * Release Note: It is possible for a remote user to gain read access to directories and files outside the root directory of ES.One. * Click here for Advisory on Thinking Arts ES.One Vulnerability Date: February 17, 2001 Platform: SuSE Updates To: SSH Report From: Linux Daily News * Release Note: SuSE has issued an advisory for the ssh package for versions 6.0, 6.1, 6.2, 6.3, 6.4, 7.0, 7.1 of their Linux distributions. * Click here for LWN Security Update To SSH Date: February 17, 2001 Platform: Turbolinux Updates To: glibc Report From: Linux Daily News * Release Note: Turbolinux has issued a security update to glibc fixing the LD_PRELOAD problem there. Turbolinux is slowly catching up - this problem was reported on January 16, just one full month ago. It is worth noting that Turbolinux still does not have a bind update available. * Click here for LWN Security Update To glibcglibc Date: February 16, 2001 Platform: Linux kernel 2.0 / WatchGuard Firebox II 4.5 Warning About: Watchguard Firebox ll PPTP DoS Vulnerability Report From: Security Focus * Release Note: A remote attacker could cause a denial of service condition in Firebox II. Submitting multiple maliciously crafted packets to the PPTP services will cause the consumption of all available system resources. * Click here for Advisory on Watchguard Firebox Vulnerability Date: February 14, 2001 Platform: Debian Updates To: XFree86 Report From: Linux Daily News * Release Note: The Debian Project has issued an update to XFree86 fixing an impressively long list of security problems with that package. The advisory is informative, and is worth a look even if you are not running Debian. Expect advisories from other distributors before too long. * Click here for LWN Security Update To XFree86 Date: February 14, 2001 Platform: Debian Updates To: ProFTPd Report From: Linux Daily News * Release Note: Here is Debian's security update to ProFTPd fixing the denial of service problems in that package. * Click here for LWN Security Update To ProFTPd Date: February 14, 2001 Platform: LinuxPPC Updates To: OpenSSH Report From: Linux Daily News * Release Note: Here is LinuxPPC's update to OpenSSH fixing the recent vulnerabilities in that package. * Click here for LWN Security Update To OpenSSH Date: February 14, 2001 Platform: Red Hat Linux 6.x - alpha, i386, i586, i686, sparc,sparc64 Red Hat Linux 7.0 - alpha, i386, i586, i686 Warning About: Red Hat Linux 'sysctl, ptrace, & mxcsr P4 ' Vulnerability Report From: CIAC Bulletins * Release Note: Security vulnerabilities exist in the kernel routines "sysctl, ptrace, and mxcsr P4" which allow privilege escalation and the capability to affect system operation. * Click here for Bulletin Number L-045 Date: February 09, 2001 Platform: Turbolinux Updates To: Security Update To Netscape Report From: Linux Daily News * Release Note: Better late than never...Turbolinux has come out with a security update to netscape fixing the buffer overflow problem that was first reported in the November 9, 2000 LWN security page. * Click here for LWN Security Update To Netscape Date: February 09, 2001 Platform: Debian Updates To: Security Update To man-db Report From: Linux Daily News * Release Note: The Debian Project has released a security update to the man-db fixing a format string vulnerability in that package. * Click here for LWN Security Update To man-db Date: February 09, 2001 Platform: Linux-Mandrake Updates To: Security Update To ProFTPd Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to ProFTPd fixing the denial of service problem there. * Click here for LWN Security Update To ProFTPd Date: February 09, 2001 Platform: Debian Updates To: Security Update To OpenSSH Report From: Linux Daily News * Release Note: The Debian Project has issued a security update to openssh which fixes a number of problems with that package. SSH users really should upgrade... * Click here for LWN Security Update To OpenSSH Date: February 09, 2001 Platform: Red Hat Updates To: Security Update To The kernel Report From: Linux Daily News * Release Note: Red Hat has issued a security update to the kernel fixing the local root compromise problems there. * Click here for LWN Security Update To The kernel Date: February 09, 2001 Platform: Conectiva Updates To: Security Update To ProFTPd Report From: Linux Daily News * Release Note: Conectiva has issued a security update to ProFTPd, fixing some denial-of-service problems in that package. * Click here for LWN Security Update To ProFTPd Date: February 09, 2001 Platform: Turbolinux Updates To: Security Update To slocate Report From: Linux Daily News * Release Note: Turbolinux has issued a security update to slocate which fixes a heap overflow bug in that program. This is not a new bug; it was first reported in the November 30, 2000 LWN security page. * Click here for LWN Security Update To slocate Date: February 09, 2001 Platform: Caldera Updates To: Systems Kernel Security Update Report From: Linux Daily News * Release Note: Caldera Systems has issued a security update to the kernel. It seems that there are two problems which show up in both the 2.2 and 2.4 kernels. One allows (local) attackers to read kernel memory that should not be available to them, and the other allows attaching to a setuid process with ptrace. We (LWN) have not seen discussion of these problems on the linux-kernel list. We'll keep an eye out and pass on any interesting information that we find. * Click here for LWN Security Update To systems kernel Date: February 07, 2001 Platform: Red Hat Updates To: xemacs Report From: Linux Daily News * Release Note: Red Hat has issued a security update to xemacs fixing the gnuserv vulnerability in that package. * Click here for LWN Security Update To xemacs Date: February 07, 2001 Platform: Linux-Mandrake Updates To: CUPS Report From: Linux Daily News * Release Note: Those of you who have not yet applied the CUPS security update from MandrakeSoft, or who had difficulties in the process, will want to have a look at the new, improved update which is said to work better. * Click here for LWN Security Update To CUPS Date: February 07, 2001 Platform: Conectiva Updates To: glibc Report From: Linux Daily News * Release Note: Conectiva has issued a security update to glibc fixing the latest vulnerabilities in that package. * Click here for LWN Security Update To glibc Date: February 03, 2001 Platform: LinuxPPC Updates To: bind Report From: Linux Daily News * Release Note: LinuxPPC has issued a security update to bind fixing the buffer overflow problems in that package. Evidently the release has been out for a while, but we just got word of it now. * Click here for LWN Security Update To bind Date: February 03, 2001 Platform: Linux-Mandrake Updates To: CUPS Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to the CUPS printing system which fixes a number of buffer overflow problems. * Click here for LWN Security Update To CUPS Date: February 03, 2001 Platform: Redhat Linux 6.2 and 7.0 Warning About: The Ramen Worm Report From: CIAC * Release Note: A Linux worm named 'Ramen' has been detected in the wild. CIAC has had reports of compromised systems and numerous scans. Ramen automatically attacks all vulnerable systems it can find. Intruders can gain root access to vulnerable systems. * Click here for Bulletin Number L-040 Date: February 02, 2001 Platform: Linux-Mandrake Updates To: xemacs Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to xemacs fixing a couple of problems in gnuserv that could allow arbitrary code to be executed by an attacker. * Click here for LWN Security Update To xemacs Top of Page Miscellaneous Date: February 23, 2001 Platform: JRE and Solaris Developer Kit versions 1.2.2_005 and 1.2.1_003, and earlier releases, could be affected. Security Alert: Java flaw exposed Report From: VNUNet Security Publications * Release Note: Sun Microsystems has warned of a security hole in Java that could allow hackers to infiltrate Java environments and execute unauthorised commands. * Click here for report on Java flaw Date: February 23, 2001 Platform: Lotus Systems Security Alert: New flaw discovered in Lotus Domino Report From: VNUNet Security Publications * Release Note: Administrators were left with potentially insecure email servers after a new exploit was discovered in Lotus Domino. * Click here for report on New flaw discovered in Lotus Domino Date: February 23, 2001 Platform: Multiple Platforms Security Notice: Security Hole in Java may expose servers Report From: Linux Daily News * Release Note: Sun has issued a warning that a bug in Java Runtime Environments for multiple platforms, including Linux, may allow an attacker to run harmful programs on a server, though client systems running browsers should be unaffected. * Click here for CNet Article on Security Hole in Java Date: February 21, 2001 Platform: Computers That Have PHP Interpreters Warning About: PHP.io Virus Aliases: VBS.io.intended, PHP.io.inc, VBS.Entice Report From: Norton / Symantec Security Updates * Release Note: PHP.io is a virus that is written in the PHP scripting language. (PHP is a server-side scripting language that is used for dynamic Web page generation.) This virus only executes on computers that have PHP interpreters, it cannot be contracted simply by visiting an infected Web page. * Click here for Report on PHP.io Virus Date: February 18, 2001 Platform: Misc Platforms - This hoax arrives as an email message. Hoax Alert: The New Ice Age HOAX Report From: Symantec Security and VMyths Virus Myths & Hoaxes * Release Note: A struggling rock band in St. Louis concocted the New Ice Age virus alert as a publicity stunt to promote their new CD. The New Ice Age is not a virus. It is a hoax, and should be ignored. This hoax arrives as an email message. * Click here for Symantec HOAX Report on The New Ice Age HOAX * Click here for Vmyths HOAX Report on New Ice Age Virus HOAX Date: February 14, 2001 Platform: OpenSSH and SSH Communications Warning About: SSH CRC-32 Compensation Attack Detector Vulnerability Report From: Security Focus * Release Note: SSH is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. * Click here for Advisory on SSH CRC-32 Vulnerability Date: February 14, 2001 Platform: Those running FreeBSD 4.x, 4.2-STABLE versions that were released prior to the correction dates. Warning About: OpenSSH SSH1 Coding Error and Server Key Vulnerability Report From: CIAC Bulletins * Release Note: The SSH server could be root compromised. The encrypted session could be decrypted. * Click here for Bulletin Number L-047 Date: February 08, 2001 Platform: All operating systems running Compaq Web Management Software for Compaq Intel, Alpha, and Storage Hardware platforms to include: MS Win9x, NT and 2000, NetWare, SCO Open Server, SCO UnixWare 7, RedHat 6.2 and 7.0, Tru64Unix and OpenVMS. Warning About: Compaq Web-enabled Management Software Buffer Overflow Report From: CIAC Bulletins * Release Note: The web-enabled management software has a bounds checking error in the authentication code, allowing certain buffer overflows to occur. * Click here for Bulletin Number L-042 Date: February 03, 2001 * Updated Platform: Domain Name System (DNS) Servers, running various versions of ISC BIND Warning About: Multiple Vulnerabilities in BIND Report From: CERT * Release Note: Revision of advisory includes added revised IBM vendor statement, modified exploitation comments, added reference Secure BIND Template and added Frequently Asked Questions as Appendix B. * Click here for CERT CA-2001-02 Date: February 02, 2001 Platform: Subscribers to America Online's (AOL's) email service Warning About: Trojan Worm Strikes America Online Report From: VNUNet Security Publications * Release Note: Subscribers to America Online's (AOL's) email service are being warned to watch out for a password-stealing computer virus that is infecting users' machines worldwide. * Click here for report on AOL's Trojan Worm Date: February 02, 2001 Platform: FreeBSD 4.x and 3.x prior to the correction date. 2000-12-16 (FreeBSD 4.2-STABLE), 2000-12-18 (FreeBSD 3.5.1-STABLE) Warning About: FreeBSD procfs Vulnerabilities Report From: CIAC Bulletin * Release Note: Several vulnerabilities have been discovered in FreeBSD's implementation of the process filesystem (procfs). * Click here for Bulletin Number L-036 Date: February 02, 2001 Platform: FreeBSD 4.1-STABLE after 2000-09-20, 4.1.1-RELEASE, and 4.1.1-STABLE prior to 2000-11-11. The problem was corrected prior to the release of FreeBSD 4.2 Warning About: FreeBSD periodic Uses Insecure Temporary Files Report From: CIAC Bulletin * Release Note: A vulnerability has been found in periodic that causes temporary files with insecure file names to be used in the system's temporary directory. * Click here for Bulletin Number L-037 Date: February 02, 2001 Platform: FreeBSD 3.x (all releases) and FressBSD 4.x (all releases) Warning About: FreeBSD inetd ident Server Vulnerability Report From: CIAC Bulletin * Release Note: During internal auditing, the internal ident server in identd was found to incorrectly set group privileges according to the user. Due to ident using root's group permissions, users may read the first 16 (excluding initial whitespace) bytes of wheel-accessible files. * Click here for Bulletin Number L-038 Date: February 02, 2001 Platform: FreeBSD 3.x (all releases), FreeBSD 4.x (all releases prior to 4.2), FreeBSD 3.5-STABLE prior to the correction date. Warning About: FreeBSD sort Uses Insecure Temporary Files Report From: CIAC Bulletin * Release Note: During internal auditing, sort(1) was found to use easily predictable temporary file names. It does create these temporary files correctly such that they cannot be "subverted" by a symlink attack, but the program will abort if the temporary filename chosen is already in use. * Click here for Bulletin Number L-039 Date: February 01, 2001 Platform: Cisco Warning About: Cisco Works To Fix Switch Glitch Report From: VNUNet Security Publications * Release Note: Cisco has released a security advisory for its Arrowpoint switch, revealing that non-privileged users can either fe a denial of service (DoS) attack on the hardware or view files to which they do not have access rights. * Click here for report on Arrowpoint switch Date: February 01, 2001 Platform: Sun Java Web Server (all versions) Warning About: Sun Java Web Server Vulnerability Report From: CIAC * Release Note: It is possible to use the administration module to invoke servlets on a Java Web Server. A vulnerability within the administration module could allow execution of commands against the web server by a malicious attacker. * Click here for Bulletin Number L-033 Date: February 01, 2001 Platform: HP9000 Series 700 and 800 running HP-UX releases 11.00, 11.04, 10.20, 10.24, 10.10 and 10.01 Warning About: HP Security Vulnerability in man(1) Command Report From: CIAC * Release Note: A security vulnerability in the man(1) command could allow a Denial of Service (DoS) by users. * Click here for Bulletin Number L-034 Date: February 01, 2001 Platform: HP9000 Series 700 and 800 running HP-UX releases 11.11, 11.00, and 10.20 Warning About: HP-UX Support Tools Manager Vulnerability Report From: CIAC * Release Note: A vulnerability exists in the HP9000 series 700/800 Support Tools Manager (xstm, cstm, stm) that could result in a Denial of Service (DoS). * Click here for Bulletin Number L-035 Top of Page Back to the Virus Archives page