Virus Warnings from March 2001 ______________________________________________________________ [Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Linux] [Jump to Misc] ______________________________________________________________ Amiga No virus warnings for March 2001 Top of Page Windows Date: March 29, 2001 Platform: PC Warning About: Anaconda Clipper Directory Traversal Vulnerability Report From: Security Focus * Release Note: Clipper is a headline-gathering tool from Anaconda! Partners which, in certain versions, is vulnerable to directory traversal attacks. * Click here for Advisory on Anaconda Vulnerability Date: March 29, 2001 Platform: MS Windows Media Player 7 Security Bug: Security patch for Microsoft Media Player 7 Report From: MSNBC Bug Of The Day * Release Note: Grab the patch that eliminates a security vulnerability in MS Windows Media Player 7 here. Without the patch, a malicious user may be able to download a Media Player skin (.wmz) file, and then run Java code to read and browse files on another user's computer. * Click here for Bug Report on MS Windows Media Player 7 Date: March 29, 2001 Platform: Microsoft Plus! 98 and Microsoft Windows Me Patch Available: Passwords For Compressed Folders Are Recoverable Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Data compression passwords can be recovered. Recommendation: Customers who password-protect their compressed folders should apply the patch and delete c:\windows\dynazip.log. * Click here for MS Security Bulletin MS01-019 Date: March 29, 2001 Platform: MS Visual Studio 6.0 Enterprise Edition and MS Visual Basic 6.0 Enterprise Edition Patch Available: Visual Studio VB T-SQL Object Contains Unchecked Buffer Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Run code of attackers choice. Recommendation: Customers running either Visual Studio 6.0 Enterprise or Visual Basic 6.0 Enterprise Edition should install this patch. * Click here for MS Security Bulletin MS01-018 Date: March 29, 2001 Platform: Windows PE and Linux ELF Warning About: Lindose Cross-platform Virus / W32/Lindose.2132 Aliases: Winux, Peelf, ELF/Winux (CAI), Linux.Peelf.2132 (NAV) Linux/Lindose, W32.Peelf.2132 (NAV), W32/Winux (CAI) Win32.PEELF.2132 (AVX) Report From: F-Secure, NAI and Symantec * Release Note: Lindose is a cross-platform virus that is able to infect both Windows PE and Linux ELF executables. This is proof of concept virus and has not been found from the field. * Click here for F-Secure Report on Lindose Cross-platform Virus * Click here for NAI Report on W32/Lindose.2132 * Click here for Symantec Report on W32.PEElf.2132 Date: March 27, 2001 Platform: PC Security Bug: JavaScript Trips Up Navigator Report From: MSNBC Bug Of The Day * Release Note: BugNet discovered that Netscape 6 is having problems with standard JavaScript radio buttons. There are no workarounds for this bug at the present time. The best defense is vigilance. * Click here for Bug Report on JavaScript Trips Up Navigator Date: March 25, 2001 Platform: Redi RediPlus 1.0 with MS Windows ME, 98/95, NT 4.0 Win 2000 Warning About: Redi Locally Readable Username/Password Vulnerability Report From: Security Focus * Release Note: Redi.exe is part of a suite of realtime stock trading tools used by professional traders. Sensitive user information, including usernames and passwords, are stored on the client's system in cleartext in a log file used for troubleshooting. This file has a known default location, and is readable by a local attacker. * Click here for Advisory on Redi Username/Password Vulnerability Date: March 25, 2001 Platform: PC Warning About: Angel Worm Aliases: I-Worm.SSIWG2, VBS/Angel@mm, VBS.Rewind@mm Variant: VBS/Angel.A@mm Report From: F-Secure * Release Note: VBS/Angel.A@mm is e-mail worm (mass mailer) which propagates using Outlook application. * Click here for Report on Angel Worm Date: March 25, 2001 Platform: PC Warning About: Opera DOS-based Virus Report From: F-Secure * Release Note: F-Secure Anti-Virus had a relatively common false alarm with this virus in March 2001. This false alarm caused FSAV to report the Opera virus in several different VxD files. If you find Opera in a file with vxd extension, simply download the latest updates for your F-Secure Anti-Virus to fix this false alarm. * Click here for Report on Opera Virus Date: March 25, 2001 Platform: PC Updates About: Invalid Certificates Report From: Network Associates * Release Note: The EXTRA.DAT provided here will detect these fradulent digital certificates. Action of detected items is left to the discretion of the user. * Click here for Report on Invalid Certificates Date: March 25, 2001 Platform: PC Warning About: VBS/Anjulie@MM Worm Aliases: VBS.Rewind.A@mm (NAV) Report From: Network Associates * Release Note: This VBScript worm attempts to mail itself to all recipients in the MS Outlook address book and drops a CIH file infector virus. * Click here for Report on VBS/Anjulie@MM Worm Date: March 23, 2001 Platform: MS Windows NT 4.0 and MS Windows 2000 Warning About: Gordano NTMail 6.0.3c Web Services DoS Vulnerability Report From: Security Focus * Release Note: NTMail is an email server by Gordano. If an unusually long URL is requested to the web services in NTMail, the server could stop responding. A restart of the server is required in order to gain normal functionality. * Click here for Advisory on Gordano NTMail Vulnerability Date: March 23, 2001 Platform: MS Windows 95/98, Windows Me, NT 4.0, MS Windows 2000 MS Bulletin: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Attacker could digitally sign code using the name Microsoft Corporation. Recommendation: All customers should follow the administrative procedures detailed in the FAQ. A software update will be issued shortly to provide permanent remediation. * Click here for MS Security Bulletin MS01-017 Date: March 23, 2001 Platform: MS IE 5.01/5.5, MS Windows Scripting Host 5.1/5.5 Warning About: Microsoft IE can Divulge Location of Cached Content Report From: CIAC Bulletins * Release Note: Because IE can divulge the physical location of cached content, an attacker could potentially plant and execute code of her choice. * Click here for Bulletin Number L-061 Date: March 23, 2001 Platform: MS Windows 95/98, MS Windows Me, MS Windows NT. 4.0 Microsoft Windows 2000 Warning About: Erroneous Verisign-Issued Digital Certificates for Microsoft Report From: CIAC Bulletins * Release Note: Verisign erroneously issued two VeriSign Class 3 code- signing digital certificates to an individual fraudulently claiming to be a Microsoft employee. Both certificates use the name, "Microsoft Corporation". * Click here for Bulletin Number L-062 Date: March 22, 2001 Platform: PC Warning About: W97M.Marker.EN Virus Report From: Norton / Symantec Security Updates * Release Note: This virus is a variant of W97M.Marker. It always infects the Normal.dot template. It can also infect the active document. The virus has a date-triggered payload. * Click here for Report on W97M.Marker.EN Virus Date: March 22, 2001 Platform: PC Warning About: VBS.Linda.A@mm Worm Aliases: VBS/Linda-A, VBS/LoveLetter.CH, VBS.Vbswg2.gen Report From: Norton / Symantec Security Updates * Release Note: SARC has been alerted to a new worm, VBS.Linda.A@mm. It is a variant of VBS.Loveletter. NAV currently detects this worm as VBS.Vbswg2.gen. SARC will be adding specific detection for this worm shortly. SARC has received no wild submissions of this worm. * Click here for Report on VBS.Linda.A@mm Worm Date: March 22, 2001 Platform: PC Warning About: W97M.Goober.E Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Goober.E is a stealth macro virus that infects the active document and the Normal.dot template. Certain words in the active document may be replaced. * Click here for Report on W97M.Goober.E Virus Date: March 22, 2001 Platform: PC Warning About: VBSWG.V@mm Report From: F-Secure * Release Note: This variant spreads in messages. When the attached file is executed, the worm will mail itself to the each recipient in every address book. This variant also replicates using mIRC and Pirch IRC clients. * Click here for Report on VBSWG.V@mm Date: March 22, 2001 Platform: PC Warning About: Staple Worm Variant: Staple.A Report From: F-Secure * Release Note: VBS/Staple is a mass mailing worm written in Visual Basic Script. This worm arrives in a email messages with an Attachment: injustice.TXT.vbs. When executed, the worm copies itself to the Windows System directory as "injustice.TXT.vbs". * Click here for Report on Staple Worm Date: March 22, 2001 Platform: PC Warning About: Three_Tunes Virus Aliases: 1784, 3Tunes Report From: F-Secure * Release Note: This virus is probably made in South America. Three_Tunes allocates approximately two kilobytes of memory and infects practically all executed COM and EXE files. Three_Tunes activates during June, when it randomly plays one of three simple tunes through the speaker. * Click here for Report on Three_Tunes Virus Date: March 19, 2001 Platform: PC Warning About: W32/Scrambler.g@MM Virus Aliases: I-Worm.Xanax, Win32.HLLP.Xanax, Xanax.exe Report From: Network Associates * Release Note: This is a prepending virus for Windows. This virus will also attempt to distribute itself via Outlook, and also through mIRC. * Click here for Report on W32/Scrambler.g@MM Virus Date: March 19, 2001 Platform: PC Warning About: VBS/VBSWG.gen@MM Virus Aliases: VBS.Vbswg2.gen (NAV) Report From: Network Associates * Release Note: This is a generic detection for VBScript viruses created with the VBSWG (Vbs Worms Generator) toolkit. Scripts created with this toolkit are capable of several different operations. * Click here for Report on VBS/VBSWG.gen@MM Virus Date: March 19, 2001 Platform: MS Internet Information Services 5.0 Patch Available: Malformed WebDAV Request Can Cause IIS to Exhaust CPU Resources Report From: MicroSoft TechNet Security * Release Note: If an attacker exploited this vulnerability against an affected server, she could temporarily prevent it from providing web services. * Click here for MS Security Bulletin MS01-016 Date: March 19, 2001 Platform: Win32 Systems Warning About: MTX Worm Aliases: IWorm_MTX, I-Worm.MTX, Matrix, Apol, W32/Apology Report From: F-Secure * Release Note: The MTX worm has three components - worm, virus and backdoor. The virus component infects Win32 executable files, attempts to send e-mail messages with infected attachments and installs the backdoor component to download and spawn "plugins" on an affected system. * Click here for Report on MTX Worm Date: March 19, 2001 Platform: MS Internet Information Services 5.0 Warning About: Microsoft IIS WebDAV Denial of service Vulnerability Report From: CIAC Bulletins * Release Note: Certain malformed WebDAV Request packets can temporarily cause IIS to Exhaust CPU Resources. Temporary denial of service. Does not permanently damage, nor require reboot or reset once attack is complete. * Click here for Bulletin Number L-059 Date: March 19, 2001 Platform: Windows NT/2000, Windows 95/98 Warning About: Magistr Virus Report From: Kaspersky Lab, F-Secure, Network Associates and Symantec * Release Note: "Magistr" carries a very dangerous destructive payload. One month after the day of the first infection, the virus destroys all files on local and network drives on computers running Windows NT/2000 by replacing their original contents with the string "YOUARESHIT". * Click here for KLabs Virus Alert on Magistr * Click here for F-Secure Report on Magistr * Click here for NAI Report on W32/Magistr@MM * Click here for Symantec Report on W32.Magistr.24876@mm Date: March 19, 2001 Platform: PC Warning About: Several Level 1 Warnings Report From: Norton / Symantec Security Updates * Release Note: W97M.Marker.GI Payload Trigger: Upon first infection and also on the first day of the week. W97M.StasOne: This is a Microsoft Word metamorphic macro virus that spreads by infecting Microsoft Word documents and the global template, Normal.dot. Backdoor.Subseven.22.a: is version 2.2 of the SubSeven backdoor Trojan. Behaves similar to Netbus or BackOrifice. W97M.Cross.Epik: Infects the Normal.dot template when an infected document is opened. Trojan.RASDialer: A malicious Trojan horse that attempts to connect to a BBS service. This could result in excessive charges on your phone bill. W97M.Aleja.M: Macro virus that checks a Microsoft Word setting to determine whether or not to infect files. VBS.MXBot@mm: Worm that emails itself to all addresses in the Microsoft Outlook address book. * Click here for Report on W97M.Marker.GI * Click here for Report on W97M.StasOne * Click here for Report on Backdoor.Subseven.22.a * Click here for Report on W97M.Cross.Epik * Click here for Report on Trojan.RASDialer * Click here for Report on W97M.Aleja.M * Click here for Report on VBS.MXBot@mm Date: March 08, 2001 Platform: Windows 95, 98, NT, ME, and 2000 with Outlook installed Warning About: Naked Wife (W32.Naked@mm) Trojan Aliases: I-Worm.Naked, W32/naked@MM, Naked Wife, W32.HLLW.JibJab@MM TROJ_NakedWife Report From: CIAC Advisory Bulletins, Kaspersky Lab, Ariz State U, F-Secure, Network Associates, FBI National Infrastructure Protection Center (NIPC) and Symantec * Release Note: A new Trojan program is spreading rapidly around the Internet. The program travels as an executable attachment to an e-mail message purporting to be a flash movie of a naked wife. The Trojan destroys multiple files in the Windows and Windows\System folders. If the Trojan is allowed to run to completion, Windows will no longer be able to run and must be reinstalled along with most of your apps. * Click here for CIAC Bulletin Number L-056 * Click here for Kaspersky Lab Report on "Naked" * Click here for ASU Report on W32/Naked@MM * Click here for F-Secure Report on NakedWife * Click here for NAI Report on W32/Naked@MM * Click here for NIPC Report on "Naked Wife" Virus/Worm * Click here for Symantec Report on W32.Naked@mm Date: March 08, 2001 Platform: Rasmus J.P. Allenheim SunFTP 1.0 Build 9 Warning About: SunFTP Unauthorized File Access Vulnerability Report From: Security Focus * Release Note: SunFTP is a freeware ftp server written by Rasmus J.P. Allenheim and associates for the Windows platform. SunFTP contains a vulnerability that may allow ftp users to compromise the server. Users may be able to upload or retrieve files from outside the protected ftp-root directory. * Click here for Advisory on SunFTP Vulnerability Date: March 08, 2001 Platform: PC Warning About: W97M.Turn.A Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Turn.A is a macro virus that infects the Normal.dot template upon opening an infected document. It then infects documents when they are closed. This virus also disables the Visual Basic Editor. Read the complete report for Removal Instructions. * Click here for Report on W97M.Turn.A Virus Date: March 08, 2001 Platform: PC Warning About: W97M.Coco.A Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Coco.A is a stealth Word macro virus that infects the active document and the Normal.dot template. W97M.Coco.A stealths by switching off the VirusProtection option. Read the complete report for Removal Instructions. * Click here for Report on W97M.Coco.A Virus Date: March 08, 2001 Platform: PC Warning About: VBS.Sppst Virus Aliases: Report From: Norton / Symantec Security Updates * Release Note: VBS.Sppst is a virus written in the Visual Basic scripting language. The virus attempts to propagate by infecting files that have the .vbs extension and that are in the same folder as the virus. However, because this is the only way that this virus can propagate, it is highly unlikely that it will spread. * Click here for Report on VBS.Sppst Virus Date: March 08, 2001 Platform: PC Warning About: VBS/Vierika@MM Virus Aliases: I-Worm.Vierika.A (AVX, AVP), VBS.Vierika@mm (NAV), VBS/Vierika-a (Sophos), Vierika (F-Secure) Report From: Network Associates * Release Note: This threat has been annihilated due to efforts of the AV community in connection with the hosting site of this threat. This is a VBScript threat which arrives via email. Read the complete report for Method Of Infection and Removal Instructions * Click here for Report on VBS/Vierika@MM Virus Date: March 08, 2001 Platform: Microsoft Windows Warning About: BackDoor-CA.dr Trojan Aliases: Backdoor.MiniCommander.dr (AVP), JS/Cheese (VirusScan), VBS/Godwill_based.Trojan (Norman) Report From: Network Associates * Release Note: Creation of an .HTA file after allowing execution of an ActiveX component when viewing an HTML page, email or newsgroup posting. The next time Windows is started, the .HTA file will execute and create the server component, identified as BackDoor-CA.svr. Read the complete report for Method Of Infection and Removal Instructions * Click here for Report on BackDoor-CA.dr Trojan Date: March 08, 2001 Platform: PC Warning About: Vierika Worm Aliases: VBS/Vierika.A@MM Variant: Vierika.A, Vierika.B Report From: F-Secure and Symantec Security Updates * Release Note: VBS/Vierika is a mass mailer (worm) written in Visual Basic Script. This worm consists of two different script parts, one that arrives in an Outlook message as an attachment and another that is available on a web site. * Click here for F-Secure Report on Vierika Worm * Click here for Symantec Report on VBS.Vierika@mm Worm Date: March 08, 2001 Platform: Microsoft Windows Warning About: Padania Virus Aliases: Win95.Padania, Win95_Padania Report From: F-Secure * Release Note: Padania is a harmless memory resident Win95 virus. It stays resident in the Windows memory, hooks system IFS API calls, intercepts EXE file opening and then writes itself to the end of the file and modifies file's header to get control when infected programs are executed. A short virus entry code is also written into file's PE header. * Click here for Report on Padania Virus Date: March 08, 2001 Platform: Microsoft Internet Explorer 5.01 and 5.5 Windows Scripting Host 5.1 and 5.5 Patch Available: IE can Divulge Location of Cached Content Report From: MicroSoft TechNet Security * Release Note: A vulnerability exists because it is possible for a web page or HTML e-mail to learn the physical location of cached content. Armed with this information, an attacker could cause the cached content to be opened in the Local Computer Zone. This would enable him to launch compiled HTML help (.CHM) files that contain shortcuts to executables, thereby enabling him to run the executables. * Click here for MS Security Bulletin MS01-015 Date: March 03, 2001 Platform: Microsoft IIS 5.0 and Exchange 2000 Warning About: Microsoft IIS and Exchange Malformed URL Denial of Service Report From: CIAC Bulletins * Release Note: If a malformed URL were repeatedly sent to an affected system, a confluence of events could cause a memory allocation error that would result in the failure of the service. * Click here for Bulletin Number L-054 Date: March 03, 2001 Platform: Windows Warning About: Open mail relays used to deliver "Hybris Worm" Report From: CERT * Release Note: The CERT/CC has received reports of intruders using open mail relays to propagate malicious code such as the "Hybris Worm." The code propagates through email messages and newsgroup postings, specifically targeting Windows machines. * Click here for CERT IN-2001-02 Date: March 03, 2001 Platform: PC Warning About: W97M.Wu.A Virus Report From: Norton / Symantec Security Updates * Release Note: W97M.Wu.A is a macro virus that poses as a Virus Inspector when it infects other documents. This virus infects documents when a clean document is opened. * Click here for Report on W97M.Wu.A Virus Date: March 03, 2001 Platform: PC Warning About: VBS.Oap@mm Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Oap@mm is a worm that spreads by replying to all messages in the Microsoft Outlook inbox. The message that the worm sends is the same message that is in the inbox, but with the worm attached at the bottom. * Click here for Report on VBS.Oap@mm Worm Date: March 03, 2001 Platform: PC Warning About: W32.Taz@mm Worm Report From: Norton / Symantec Security Updates * Release Note: W32.Taz@mm is a worm written in Visual Basic. The worm can spread using mIRC, Pirch, and Microsoft Outlook. However, to function, this worm requires the Msbvm60.dll file. * Click here for Report on W32.Taz@mm Worm Date: March 03, 2001 Platform: PC Warning About: VBS.Challenge Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Challenge spreads by using Microsoft Outlook Express. This worm copies itself into every email message that is sent. * Click here for Report on VBS.Challenge Worm Date: March 01, 2001 Platform: PC Warning About: VBS.JongBoy@mm Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.JongBoy@mm is a worm that can spread using the popular chat program mIRC and through Microsoft Outlook. NOTE: Definitions dated prior to 27 February detect this worm as Bloodhound.VBS.Worm. * Click here for Report on VBS.JongBoy@mm Worm Date: March 01, 2001 Platform: Microsoft Internet Information Server 5.0, MS Exchange 2000 Report About: Malformed URL can cause Service Failure in IIS 5.0 and Exchange 2000 Report From: MicroSoft TechNet Security * Release Note: IIS 5.0 contains a flaw affecting the way that an URL is handled if it has a specific construction and its length is within a very narrow range of values. Exchange 2000 is affected by the same vulnerability. * Click here for MS Security Bulletin MS01-014 Date: March 01, 2001 Platform: Microsoft Warning About: MyBabyPic Worm Aliases: IWorm_Myba, I-Worm.Myba Report From: F-Secure * Release Note: Myba is the Internet worm spreading with emails by sending infected messages from affected computers. * Click here for Report on MyBabyPic Worm Top of Page Macintosh No virus warnings for March 2001 Top of Page Linux Date: March 29, 2001 Platform: Trustix Updates To: OpenSSH Report From: Linux Daily News * Release Note: Here is a security advisory for Trustix Secure Linux on its update to OpenSSH-2.5.2p2. * Click here for LWN Security Update To OpenSSH Date: March 29, 2001 Platform: Red Hat Updates To: OpenSSH Report From: Linux Daily News * Release Note: Red Hat has issued a security update to OpenSSH which picks up the latest passive analysis defenses. * Click here for LWN Security Update To OpenSSH Date: March 29, 2001 Platform: Windows PE and Linux ELF Warning About: Lindose Cross-platform Virus / W32/Lindose.2132 Aliases: Winux, Peelf, ELF/Winux (CAI), Linux.Peelf.2132 (NAV) Linux/Lindose, W32.Peelf.2132 (NAV), W32/Winux (CAI) Win32.PEELF.2132 (AVX) Report From: F-Secure, NAI and Symantec * Release Note: Lindose is a cross-platform virus that is able to infect both Windows PE and Linux ELF executables. This is proof of concept virus and has not been found from the field. * Click here for F-Secure Report on Lindose Cross-platform Virus * Click here for NAI Report on W32/Lindose.2132 * Click here for Symantec Report on W32.PEElf.2132 Date: March 25, 2001 Platform: BIND versions 8.2.0-8.2.3(beta) Updates To: Security Alerts and Risks - Lion Worm Aliases: Unix/Lion, Linux/Lion Report From: COVERT Labs at PGP Security, F-Secure and NAI * Release Note: A potentially dangerous worms been discovered in the wild, propagating itself by exploiting vulnerable versions of BIND DNS software. SANS estimates that 20% of all DNS servers on the Internet could be affected. COVERT released an advisory about BIND being vulnerable on January 29th, 2001. Users who upgraded their version of BIND at that time are not vulnerable to this worm. * Click here for COVERT Security Alert - Lion Worm * Click here for F-Secure Report on Lion Worm * Click here for NAI Report on Linux/Lion.worm Date: March 23, 2001 Platform: Linux Mandrake Updates To: timed and openssh Report From: Linux Daily News * Release Note: Linux Mandrake has posted security advisories for their timed and openssh packages. * Click here for LWN Security Advisory for timed * Click here for LWN Security Advisory for openssh Date: March 23, 2001 Platform: Red Hat Updates To: Advisory for licq, vim and sudo Report From: Linux Daily News * Release Note: Red Hat has posted security advisories for licq and vim. The licq update affects only RH 7 for x86 and Alpha's while the vim update affects both RH 7 and Red Hat 6.2. Additionally, RH has posted a security advisory for sudo which affects the Red Hat Powertools 6.2 distributions. * Click here for LWN Security Advisory for licq * Click here for LWN Security Advisory for vim * Click here for LWN Security Advisory for sudo Date: March 23, 2001 Platform: SuSE Updates To: Advisory for in.ftpd, timed, pop Report From: Linux Daily News * Release Note: SuSE has posted a security advisory for their nkitb/ nkitserv packages which contain the in.ftpd and timed daemons. Additionally, SuSE posted an update for their pop package, which includes imapd, ipop2d and ipop3d, to address several buffer overflow vulnerabilities. * Click here for LWN Security Advisory for in.ftpd and timed * Click here for LWN Security Advisory for pop Date: March 23, 2001 Platform: Red Hat Linux 7.0 - alpha, i386 Warning About: RedHat Linux Log Code Buffer Overflow/Unguarded Browser Call Report From: CIAC Bulletins * Release Note: Two Security Vulnerabilities: Logging code flaw provides potential buffer overflow. There exists an unguarded system call to execute an external browser when receiving an URL. * Click here for Bulletin Number L-063 Date: March 22, 2001 Platform: OpenSSH Updates To: OpenSSH 2.5.2p2 released Report From: Linux Daily News * Release Note: OpenSSH 2.5.2p2 has been released. It includes a number of fixes (including improvements in the defenses against the passive analysis attacks discussed in this week's LWN security page) and quite a few new features as well. * Click here for LWN Security Update To OpenSSH 2.5.2p2 Date: March 22, 2001 Platform: Red Hat Linux 5.2, 6.0, and 6.1 are vulnerable. Red Hat Linux 6.2 and 7.0 have GSSAPI incompatibilities Warning About: Mutt Format String Vulnerability and Incompatibility Report From: CIAC Bulletins * Release Note: Mutt, a program for reading electronic mail, has a "format string" vulnerability and a GSSAPI incompatibility. The "format string" vulnerability could allow a compromised or malicious IMAP server to execute code on the local machine. * Click here for Bulletin Number L-060 Date: March 19, 2001 Platform: Linux-Mandrake Updates To: sgml-tools Report From: Linux Daily News * Release Note: Linux-Mandrake has also issued an advisory and updated packages for sgml-tools, fixing the temporary file problems reported last week. * Click here for LWN Security Update To sgml-tools Date: March 19, 2001 Platform: Immunix Updates To: mutt mailer, slrn and sgmltools Report From: Linux Daily News * Release Note: Immunix, a Linux distribution based on Red Hat but compiled with StackGuard and FormatGuard (which prevent many security attacks based on buffer overflows and format string vulnerabilities), has issued their own advisories and package updates for mutt, slrn and sgml-tools. * Click here for LWN Security Update To mutt * Click here for LWN Security Update To slrn * Click here for LWN Security Update To sgml-tools Date: March 19, 2001 Platform: Red Hat Updates To: sgmltools, mutt mailer and slrn Report From: Linux Daily News * Release Note: Red Hat has put out a few security advisories: o There is a /tmp vulnerability in sgmltools which could expose documents to local users. o The mutt mailer has a format string vulnerability in its IMAP code which could cause problems when talking to a hostile IMAP server. This vulnerability does not exist in Red Hat 7.0. o There is a buffer overflow in slrn which could be remotely exploitable. * Click here for LWN Security Update To sgmltools * Click here for LWN Security Update To mutt mailer * Click here for LWN Security Update To slrn Date: March 08, 2001 Platform: Debian Updates To: smgl-tools Advisories Report From: Linux Daily News * Release Note: Debian posted security advisory too late to make it into our Weekly edition. The sgml update addresses insecure temporary file creation issues. * Click here for LWN Advisory on sgml-tools Date: March 08, 2001 Platform: Debian Updates To: nextaw/xaw3d/xaw95 Advisories Report From: Linux Daily News * Release Note: Debian posted security advisory too late to make it into our Weekly edition. The xaw related updates address insecure temporary file updates in a couple of Athena widgets. * Click here for LWN Advisory on nextaw/xaw3d/xaw95 Date: March 03, 2001 Platform: Red Hat Updates To: Advisory for joe Packages Report From: Linux Daily News * Release Note: Red Hat has issued an advisory for the joe text editor packages to address malicious configuration files from being read in the current working directory. * Click here for LWN Advisory for joe Packages Date: March 03, 2001 Platform: Caldera Updates To: /bin/mail advisory Report From: Linux Daily News * Release Note: Caldera has issued a security advisory for a /bin/mail buffer overflow vulnerability. Local user exploits are possible. * Click here for LWN Advisory To /bin/mail Date: March 03, 2001 Platform: Conectiva Updates To: Zope advisory Report From: Linux Daily News * Release Note: Conectiva has issued its advisory for the ZClasses vulnerability in the Zope package. * Click here for LWN Advisory To ZClasses vulnerability Top of Page Miscellaneous Date: March 29, 2001 Platform: Windows PE and Linux ELF Warning About: Lindose Cross-platform Virus / W32/Lindose.2132 Aliases: Winux, Peelf, ELF/Winux (CAI), Linux.Peelf.2132 (NAV) Linux/Lindose, W32.Peelf.2132 (NAV), W32/Winux (CAI) Win32.PEELF.2132 (AVX) Report From: F-Secure, NAI and Symantec * Release Note: Lindose is a cross-platform virus that is able to infect both Windows PE and Linux ELF executables. This is proof of concept virus and has not been found from the field. * Click here for F-Secure Report on Lindose Cross-platform Virus * Click here for NAI Report on W32/Lindose.2132 * Click here for Symantec Report on W32.PEElf.2132 Date: March 27, 2001 Platform: IT Security World Bug Watch: Here Comes The Cyberwoozle Report From: VNUNet Security Publications * Release Note: The cyberwoozle poses a far more serious threat with its ability to secretly siphon company confidential data from the computer's hard drive. This could include the deliberate stripping of sales proposals or accounts information, causing a serious confiden- tiality threat especially in the hands of a competitor. * Click here for Bug Watch: Here Comes The Cyberwoozle Date: March 22, 2001 Platform: Misc Hoax Alert: MobilVirus HOAX Report From: Symantec Security HOAX Updates * Release Note: Symantec reports that Mobilvirus is a hoax and is not a real virus. This hoax is written in Swedish. Please ignore any messages regarding this hoax and do not pass on messages. * Click here for Symantec HOAX Report on MobilVirus HOAX Date: March 22, 2001 Platform: Misc Warning About: St.Patrick's Day HOAX Report From: Network Associates * Release Note: NAI has released a report on an email hoax message, with a Subject: St. Patrick's Day Irish Virus Alert. Please ignore this specific e-mail, delete the e-mail message, don't forward to others. * Click here for NAI HOAX Report on St.Patrick's Day HOAX Date: March 19, 2001 Platform: Networks that use an Intrusion Detection System (IDS) Warning About: Intrusion Detection Systems Exploit Report From: National Infrastructure Protection Center (NIPC) * Release Note: The NIPC is releasing this notice to provide system administrators developing information about a potential new network security vulnerability. The NIPC is still reviewing this information both for accuracy and to determine the level of threat. * Click here for Assessment No: 01-004 Date: March 19, 2001 Platform: AOL Client Software Warning About: Cool Trojan Aliases: Trojan.Cool, Trojan.AOL.Cool, Mine, Trojan/Mine Report From: F-Secure * Release Note: Trojan.AOL.Cool is a trojan that affects AOL client software and steals information from AOL users. Also according to reports it can spread itself to other AOL users (we can't confirm that so far). * Click here for Report on Cool Trojan Date: March 19, 2001 Platform: HP9000 Series 700/800 running HP-UX releases 10.01, 10.10, 10.20 and 11.00 only Warning About: HPUX Sec. Vulnerability asecure Report From: CIAC Bulletins * Release Note: Certain files used by the asecure program have unsafe permissions. HP states that a possible denial of service (DoS) condition exists. * Click here for Bulletin Number L-058 Date: March 19, 2001 Platform: Certain MIT-derived implementations of Kerberos 4 Warning About: Kerberos /tmp Root Vulnerability Report From: CIAC Bulletins * Release Note: A /tmp race condition can lead to root privileges. A local user may be able to overwrite arbitrary files as root, with limited contents. This could potentially result in unauthorized root access. * Click here for Bulletin Number L-057 Date: March 19, 2001 Platform: Sun Solaris 2.6, 7 and 8 Warning About: Solaris snmpXdmid Buffer Overflow Vulnerability Report From: Security Focus * Release Note: Versions 2.6, 7, and 8 of Sun Microsystem's Solaris OE ship with service called 'snmpXdmid'. This daemon is used to map SNMP management requests to DMI requests and vice versa. SnmpXdmid contains a remotely exploitable buffer overflow vulnerability. * Click here for Advisory on Solaris snmpXdmid Vulnerability Date: March 19, 2001 Platform: Jelsoft vBulletin versions prior to 2.0 beta 3 and 1.1.6. Warning About: Jelsoft vBulletin PHP Command Execution Vulnerability Report From: Security Focus * Release Note: Jelsoft vBulletin is an online discussion forum package written in PHP. The vunerability could allow an attacker to gain a local interactive shell with privileges of the web server. * Click here for Advisory on Jelsoft vBulletin Vulnerability Date: March 19, 2001 Platform: HP HP-UX 11.0 / Elm Development Group Elm 2.5alpha3 Warning About: Elm Subject Line Buffer Overflow Vulnerability Report From: Security Focus * Release Note: Elm is a popular Mail User Agent distributed with various versions of the UNIX Operating System. This vulnerability affects the version distributed by Hewlett Packard, as well as other operating systems using Elm 2.5alpha3 with setuid or setgid flags. * Click here for Advisory on Elm Buffer Overflow Vulnerability Date: March 08, 2001 Platform: Palm Palm OS 3.5.2 and OS 3.3 Warning About: Palm Debugger Password Bypass Vulnerability Report From: Security Focus * Release Note: The Palm OS provides password protection, allowing the device's owner to restrict access to sensitive data on the unit. An inbuilt Palm OS debugging mode, accessible from the Graffiti stylus interface, allows any user with physical access to the PDA to bypass the unit's password protection. * Click here for Advisory on Palm Password Vulnerability Date: March 08, 2001 Platform: pcAnywhere v 9.x and 10.x Warning About: pcAnywhere Denial of Service, abnormal server connection Report From: CIAC Info Bulletins * Release Note: A software error exists in the Symantec pcAnywhere remote control solution. An abnormal number of random characters sent to the port, immediately upon connection, causes communications to fail. * Click here for CIAC Bulletin Number L-055 Date: March 03, 2001 Platform: Cisco IOS software running on Cisco routers and switches Warning About: Cisco IOS Software TCP Initial Sequence Number Improvements Report From: CIAC Bulletins * Release Note: Cisco IOS software contains a flaw that permits the successful prediction of TCP Initial Sequence Numbers. * Click here for Bulletin Number L-053 Date: March 01, 2001 Platform: Cisco IOS software Warning About: Cisco IOS Software SNMP Read-Write ILMI Community String Report From: CIAC Bulletins * Release Note: Cisco IOS software allows SNMP objects to be modified without authorization by using an undocumented community string. * Click here for Bulletin Number L-052 Top of Page Back to the Virus Archives page