Virus Warnings from April 2001
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: April 25, 2001
Platform: Amiga
Update About: Installer Of Linkvirus BOBEK Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: Virus Help Denmark reports the archive (OozeAGA.lha) was
on Aminet for a very short time, but it has been removed now.
* Click here for VHT-DK Virus Warning vht-dk99
* VirusExecutor v2.15 finds and removes BOBEK link-virus
* Subscribe online to the VHT-DK Virus Warnings Announcement list.
Date: April 24, 2001
Platform: Amiga
Warning About: "BOBEK" Link-virus Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: a new link-virus has been found, the installer
is still unknown, we are looking for it. This new virus will add 460
bytes to every file that is opened or executet. That also means that
even an antivirus program (that the virus is unknown to), will infect
every file it checks for virus. The new virus patches dos.library ExNext
function to spread it self. The new virus has been given the name
"BOBEK", this is the text you can read in the end of every infected tile.
At this time there is no cure to this virus, but we hope to have an
update of VirusExecutor ready later today, to fix this virus.
Since the time of the vht-dk alert, VE had been updated to v2.14.
* Click here for VHT-DK Virus Warning vht-dk98
* VirusExecutor v2.14 updated for BOBEK link-virus
* Subscribe online to the VHT-DK Virus Warnings Announcement list.
Date: April 14, 2001
Platform: Amiga
Warning About: HitchHiker Infected Archive Found
Report From: Virus Help Denmark (VHT-DK)
* Release Note: Another infected archive has been found. The archive
is infected with "Hitch-Hiker 4.11". All the big antivirus programs
can find HitchHiker 4.11 linkvirus, so there is no problem there.
* Click here for VHT-DK Virus Warning vht-dk97
Date: April 10, 2001
Platform: Amiga
Warning About: New Linkvirus Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: A new link virus has been found. The virus is polymorphic
and hacks VirusCheckerII in memory to make it infect all files you
check. The virus is very well coded as for the things we see these
days. Be sure to get Safe v15.1 SE which can find this virus.
* Click here for VHT-DK Virus Warning vht-dk96
* Click here for Latest Safe v15.1 SE
Date: April 10, 2001 * Updated to Include Safe v14.10
Platform: Amiga
Warning About: TCP Trojans Inside Aminet Files
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: Four archives with TCP trojan's has been found on Aminet
today. The four archives reported at vht-dk are:
o fblit.lha - v 3.84 - 142.086 bytes
o Safe.lha - v14.10 - 20.737 bytes
o stackattack.lha - v 1.2b - 69.229 bytes
o BlazeWCP.lha - v 1.8 - 32.862 bytes
If you have installed one or more of these archives, then delete the
files you have installed. All of these archives has a new TCP trojan
inside, and the trojan will send an e-mail to Haage & Partner, with a
stupid text. Virus Help Denmark hopes to have a cure for these trojan
later tody, so please check back here or at VHT-Denmark Amiga News.
Virus Help Denmark have been able to get some clean versions of the fake
archives, so if if you have installed one or more of the fake archives
you can download the clean archives by following the links on their
Amiga News page above. Aminet says that as a protest against this abuse
of Aminet, they will shut down their services on "us.aminet.net" and
"de.aminet.net" until Friday.
* Click here for VHT-DK Virus Warning vht-dk95
Date: April 09, 2001
Platform: Amiga
Warning About: BlazeWCP.lha, FBlit.lha, and StackAttack.lha
and possibly others
Report From: Amiga.org and Subscriber to VirusChecker2 Mail List
* Release Note: If you downloaded said files, please do not install
them. Virus Help Denmark should have a fix shortly.
* Click here for Amiga.org Post on Aminet Virus warning
Top of Page
Windows
Date: April 30, 2001
Platform: Windows / Win32
Warning About: Magistr Worm
Aliases: IWorm_Magistr, I-Worm.Magistr, W32/Magistr@mm
Report From: F-Secure
* Release Note: Magistr is a very dangerous memory resident Win32 worm
combined with virus infection routines. It was found in-the-wild in
the middle of March 2001. Magistr virus spreads via Internet with
infected emails, infects Windows executable files on an affected
machine (local machine) and is able to spread itself over a local
network (LAN). The virus has an extremely dangerous payload.
* Click here for Report on Magistr Worm
Date: April 29, 2001
Platform: Windows NT and Windows NT Server. Possibly also on
Windows 95,98,ME, and Windows 2000
Warning About: The Glacier Backdoor
Report From: CIAC Bulletins
* Release Note: The Glacier backdoor program allows an intruder to remote
control a Windows computer. The intruder can see the desktop, click on
files, and type on the keyboard of the remote computer.
* Click here for Bulletin Number L-077
Date: April 26, 2001
Platform: Microsoft WebDAV
Security Bug: Security Flaw in MS Internet Information Services 5
Report From: MSNBC Bug Of The Day
* Release Note: Because of the flaw, IIS is vulnerable to a denial of
service attack that would temporarily cause CPU time to go to 100
percent for the duration of the attack.
* Click here for Bug Report on MS IIS 5
Date: April 26, 2001
Platform: MSN Messenger Service
Warning About: W32.FunnyFiles.Worm Worm
Aliases: W32/Hello
Report From: Norton / Symantec Security Updates
* Release Note: W32.FunnyFiles.Worm is a worm that spreads using the MSN
Messenger Service program. This is the first known worm to use MSN
Messenger Service to propagate. The worm itself does nothing more than
spread, and if it is executed on a system without the MSN MSN Messenger
Service installed in the default folder, the worm will crash.
* Click here for Report on W32.FunnyFiles.Worm Worm
Date: April 26, 2001
Platform: MS Windows
Warning About: X97M.Squared.B.Gen Virus
Variant: X97M/Laroux
Report From: Norton / Symantec Security Updates
* Release Note: X97M.Squared.B.Gen infects active workbooks and inserts an
infected workbook in the \XLStart folder.
* Click here for Report on X97M.Squared.B.Gen
Date: April 26, 2001
Platform: PC
Warning About: Zag.1106 Virus
Report From: Norton / Symantec Security Updates
* Release Note: Zag.1106 is a DOS .exe virus. Damaged done by the virus
is not repairable. It writes its viral code onto all files that are in
the same folder as the virus, as well as in the root directory.
* Click here for Report on Zag.1106 Virus
Date: April 25, 2001
Platform: PC
Warning About: Internet-worm "Stator"
Report From: Kaspersky Lab, Network Associates and Symantec
* Release Note: This worm utilizes the popular e-mail client "The Bat!"
in order to spread. The worms copy contains the name "photo1.jpg.pif".
The worm also installs itself to the system and infects a few files in
the system, and sends passwords and other confidential information out
of the computer. To hide its activity the worm displays a JPEG image
of a girl.
* Click here for KLabs Virus Alert on Stator
* Click here for NAI Report on W32/Stator.worm
* Click here for Symantec Report on W32.Stator@mm
Date: April 25, 2001
Platform: MS Windows 95, 98, and Me
Warning About: VBS.Zeichen.A Trojan horse
Report From: Norton / Symantec Security Updates
* Release Note: VBS.Zeichen.A is a Trojan horse written in Visual Basic
Script (VBS). It pretends to be a script that obtains URLs to the
sites with porno-related contents.
* Click here for Report on VBS.Zeichen.A
Date: April 25, 2001
Platform: MS Internet Information Services 5
Security Bug: Security flaw in MS Internet Information Services 5
Report From: MSNBC Bug Of The Day
* Release Note: Because of the flaw, IIS is vulnerable to a denial of
service attack that would temporarily cause CPU time to go to 100
percent for the duration of the attack. Microsoft is working on a fix.
* Click here for Bug Report on Security flaw
Date: April 25, 2001
Platform: Yahoo or MSN's instant messaging services
Security Bug: Instant Messaging Vulnerability
Report From: MSNBC Bug Of The Day
* Release Note: An innocent chat with a co-worker using your favorite
instant messaging software could expose you to eavesdroppers or make
it possible for someone to send you malicious code. Fortunately,
plug-in antivirus help is now available for users of Yahoo or MSN's
instant messaging services.
* Click here for Report on How To Secure Instant Messaging
Date: April 25, 2001
Platform: PC
Warning About: "Carko" Distributed Denial-of-Service Tool
Report From: CERT
* Release Note: The CERT/CC has received reports that a distributed
denial-of-service (DDoS) tool named Carko is being installed on
compromised hosts. Compromised hosts are at high risk for being
used to attack other Internet sites, having system binaries and
configuration files altered, and exposing sensitive information
to external parties.
* Click here for CERT IN-2001-04
Date: April 25, 2001
Platform: Microsoft ISA Server 2000
Warning About: Microsoft ISA Web Proxy Service Denial of Service
Report From: CIAC Bulletins
* Release Note: The ISA server web proxy service does not correctly
handle web requests that contain a particular type of malformed
argument. Processing such a request would cause the web proxy service
to fail, blocking all incoming and outgoing requests until the service
is restarted.
* Click here for Bulletin Number L-073
Date: April 25, 2001
Platform: Microsoft Data Access Component Internet Publishing
Provider. WebDAV
Warning About: Microsoft WebDAV Runs Scripts As User
Report From: CIAC Bulletins
* Release Note: The Microsoft WebDAV service does not differentiate
between requests made by a user and those made by a script. A user
browsing a web page containing a WebDAV script would unknowingly run
that script with the user's privilages and possibly compromise the
user's security.
* Click here for Bulletin Number L-074
Date: April 20, 2001
Platform: MS Windows
Security Bug: Windows Class IDs Create Vulnerability
Report From: MSNBC Bug Of The Day
* Release Note: Security analyst Georgi Guninski has recently shown,
malicious users can play a devastating trick on Windows systems using
a CLSID extension, and thereby disguise a potentially dangerous COM
object as a lowly .TXT file.
* Click here for Bug Report on Windows Class IDs
Date: April 19, 2001
Platform: Any Microsoft Operating System
Patch Available: WebDAV Service Provider Can Allow Scripts
to Levy Requests as User
Report From: MicroSoft TechNet Security
* Release Note: Web-based script could levy WebDAV requests on the users
behalf. Recommendation: Customers should consult the FAQ to determine
whether they have an affected version and consider applying the patch
if they do.
* Click here for MS Security Bulletin MS01-022
Date: April 18, 2001
Platform: PC
Warning About: Matcher Worm
Aliases: I-Worm_Matcher, I-Worm.Matcher
Report From: Kaspersky Lab, F-Secure and Symantec
* Release Note: Kaspersky Labs warns computer users about the discovery
"in-the-wild" of the Internet-worm "Matcher" that spreads via e-mail.
W32.Matcher is an executable that arrives via email. When executed,
the worm will email itself to everyone in the Microsoft Outlook
Address book. The worm will continue to send emails while the process
is running in the background.
* Click here for Kap Lab Alert on Matcher Worm
* Click here for F-Secure Report on Matcher
* Click here for Symantec Report on W32.Matcher
Date: April 16, 2001
Platform: Microsoft ISA Server 2000
Patch Available: Invalid Web Request Can Cause Access Violation
in ISA Server Web Proxy Service
Report From: MicroSoft TechNet Security
* Release Note: The ISA Server Web Proxy service does not correctly
handle web requests that contain a particular type of malformed
argument. System administrators who have enabled the ISA Server Web
Publishing feature should apply the patch immediately.
* Click here for MS Security Bulletin MS01-021
Date: April 16, 2001
Platform: MS Windows
Warning About: X97M.Hihihoho Virus
Report From: Norton / Symantec Security Updates
* Release Note: X97M.Hihihoho is a macro virus that infects Microsoft
Excel worksheets. The virus does not attempt to stealth itself in any
way, so when an infected worksheet is opened in Excel 97 or Excel 2000,
the Microsoft macro virus warning dialog box should appear.
* Click here for Report on X97M.Hihihoho Virus
Date: April 16, 2001
Platform: MS Windows
Warning About: W97M.Bobo.F.Gen Virus
Report From: Norton / Symantec Security Updates
* Release Note: W97M.Bobo.F.Gen is a Microsoft Word macro virus that
spreads by infecting the active Microsoft Word document and the global
template, Normal.dot.
* Click here for Report on W97M.Bobo.F.Gen Virus
Date: April 12, 2001
Platform: Windows NT 4 Service Pack 3 and 2000 systems
Reported Bug: McAfee VirusScan 5.1 Lock Ups
Report From: MSNBC Bug Of The Day
* Release Note: According to McAfee, VSMAIN may freeze on a Windows NT 4
Service Pack 3 and 2000 system while running VirusScan 5.1x. Read the
report for fixes.
* Click here for Bug Report on McAfee VirusScan 5.1 Lock Ups
Date: April 12, 2001
Platform: MS Windows
Warning About: QDel157 Trojan
Aliases: Trojan.Taliban (NAV)
Report From: Network Associates
* Release Note: This is a DOS trojan which attempts to delete critical
files in the C:\WINDOWS directory and selected subdirectories.
* Click here for Report on QDel157 Trojan
Date: April 12, 2001
Platform: PC
Warning About: W32/Badtrans@MM Virus
Aliases: Backdoor-NK.svr, BadTrans (F-Secure),
I-Worm.Badtrans (AVP), W32.Badtrans.13312@mm (NAV)
Report From: Network Associates, F-Secure and Symantec
* Release Note: This mass mailing worm attempts to send itself using MS
Outlook by replying to unread email messages. It also drops a remote
access trojan.
* Click here for NAI Report on W32/Badtrans@MM Virus
* Click here for F-Secure Report on BadTrans Worm
* Click here for Symantec Report on W32.Badtrans.13312@mm
Date: April 12, 2001
Platform: MS Windows
Warning About: W97M.Eight941.T Virus
Report From: Norton / Symantec Security Updates
* Release Note: W97M.Eight941.T is a macro virus that infects the active
document and the Microsoft Word template file, Normal.dot.
* Click here for Symantec Report on W97M.Eight941.T
Date: April 12, 2001
Platform: MS Windows
Warning About: VBS.Ptnet.A@mm Worm
Report From: Norton / Symantec Security Updates
* Release Note: The VBS.Ptnet.A worm spreads by sending itself to all
addresses in your MS Outlook Address book. This worm also overwrites
.vbs and .vbe files that are on all local or mapped network drives. It
also spreads through mIRC.
* Click here for Symantec Report on VBS.Ptnet.A@mm
Date: April 12, 2001
Platform: MS Windows. but not Windows NT or 2000
Warning About: W95.Miam.4716 Resident Infector
Report From: Norton / Symantec Security Updates
* Release Note: W95.Miam.4716 is a per-process resident infector of .exe
files. When an infected file is executed, the virus will hook the
CreateFileA() function in the host, and will then infect .exe files in
the current folder.
* Click here for Symantec Report on W95.Miam.4716
Date: April 12, 2001
Platform: MS Windows
Warning About: VBS.GodWill.A@mm Worm
Report From: Norton / Symantec Security Updates
* Release Note: This Worm attempts to spread to all recipients in your MS
Outlook Address Book. This worm configures itself to run every time
that an infected computer starts.
* Click here for Symantec Report on VBS.GodWill.A@mm
Date: April 12, 2001
Platform: PC
Warning About: VBS.Homemade@mm Worm
Aliases: Bloodhound.VBS.Worm
Report From: Norton / Symantec Security Updates
* Release Note: VBS.Homemade@mm is a worm written in the Visual Basic
scripting language. VBS.Homemade@mm sends email to everyone in the MS
Outlook Address Book. After doing so, it adds a registry key so that
the action is not performed more than once.
* Click here for Symantec Report on VBS.Homemade@mm
Date: April 12, 2001
Platform: PC
Warning About: W32.ThreeForOne Trojan Horse
Report From: Norton / Symantec Security Updates
* Release Note: This Trojan horse, which is packed with the "Petite"
packing utility, lauches three instances of itself for each one that
is closed.
* Click here for Symantec Report on W32.ThreeForOne
Date: April 12, 2001
Platform: PC
Warning About: Amanita.1151 Virus
Aliases: Amanita.1135
Report From: Norton / Symantec Security Updates
* Release Note: Amanita.1151 is an encrypted, polymorphic, memory-
resident virus. Files with the .com and .exe extensions are infected
if the virus is in memory. The infection size varies betweeen 1143 and
1151 bytes.
* Click here for Symantec Report on Amanita.1151 Virus
Date: April 12, 2001
Platform: PC
Warning About: Logo.Logic Worm
Report From: Norton / Symantec Security Updates and Kapersky Labs
* Sympatec Release Note: Logo.Logic is a worm that uses SuperLogo to
create text files, which it uses to spread. It drop a .vbs file and
an .ini file to spread by email and mIRC.
* Kapersky Release Note: KLabs firmly states that this Internet-worm
still has not yet been found "in-the-wild," and poses absolutely no
threat to the majority of computer users, simply because, in order to
be activated, "Logic" requires the Logo interpreter to be installed
on the target systems (for example, SuperLogo for Windows). Therefore,
the worm's possible existence is severely limited by the dearth of
computers that have the Logo interpreter installed.
* Click here for Symantec Report on Logo.Logic Worm
* Click here for Kapersky Labs Report on Logic
Date: April 12, 2001
Platform: PC
Warning About: VBS.Zeam.A@mm
Report From: Norton / Symantec Security Updates
* Release Note: VBS.Zeam.A@mm uses Microsoft Outlook to send itself to
all recipients in your Outlook address book.
* Click here for Symantec Report on VBS.Zeam.A@mm
Date: April 12, 2001
Platform: MS Windows
Warning About: Futs Virus
Aliases: Tojan/Futs (Panda, Sophos), Trojan.Futs (AVX)
Report From: Network Associates
* Release Note: Futs is a program with many dangerous possibilities. It's
intended to be an "anti-school" package, capable of trojan activity
like deleting files, sending e-mail bombs, but it can also drop a
virus.
* Click here for Report on Futs Virus
Date: April 09, 2001
Platform: PC
Warning About: Magistr Virus
Report From: Kaspersky Lab
* Release Note: Taking into account that the first reports about
infection with this virus were received in the middle of March,
Kaspersky Labs expects a real avalanche of destructive incidents by
Magistr to happen in the middle-end of April. As a result, Magistr can
cause the loss of important information and infect computer hardware.
* Click here for Virus Alert on Magistr
Date: April 09, 2001
Platform: MS Windows
Warning About: JS.StartPage Trojan Horse
Report From: Norton / Symantec Security Updates
* Release Note: JS.StartPage is a Trojan horse program, which alters the
default home page of Microsoft Internet Exporer. It sometimes arrives
as a file with the .hta extension.
* Click here for Report on JS.StartPage Trojan Horse
Date: April 09, 2001
Platform: PC DOS
Warning About: BW.770.B Virus
Report From: Norton / Symantec Security Updates
* Release Note: BW.770.B is a virus that infects DOS .exe and .com files.
It appears to have been created with the "Biological Warfare" virus
creation kit, then modified manually after being created with the kit.
* Click here for Report on BW.770.B Virus
Date: April 09, 2001
Platform: PC DOS
Warning About: LittleChild.754 Virus
Report From: Norton / Symantec Security Updates
* Release Note: LittleChild.754 is a small, non-memory-resident virus
that infects only .com files when it is run from DOS.
* Click here for Report on LittleChild.754 Virus
Date: April 09, 2001
Platform: PC
Warning About: W32.BrainProtect Trojan Horse
Report From: Norton / Symantec Security Updates
* Release Note: W32.BrainProtect is a simple mIRC script-dropping Trojan
horse.
* Click here for Report on W32.BrainProtect Trojan Horse
Date: April 05, 2001
Platform: Microsoft Windows 98/95 and Windows NT 4.0
Warning About: Rit Research Labs "The Bat!" Concealed Attachment
Vulnerability
Report From: Security Focus
* Release Note: "The Bat!" is an MUA for Windows by Rit Research Labs.
A remote attacker can compose an email message which contains an
attached file having a carefully-composed filename, in which excess
whitespace is used to conceal the filename, and the file's presence,
in the "The Bat!" user's inbox. This could lead a victim user to
execute a potentially malicious attachment without being properly
alerted that the attachment is of an executable type.
* Click here for Advisory on Rit Research Labs "The Bat!"
Date: April 05, 2001
Platform: Microsoft
Warning About: X97M.Barisada.K Virus
Report From: Norton / Symantec Security Updates
* Release Note: This is a simple Excel macro virus that looks for the
file iod.vxd, and then performs certain actions if it is found.
* Click here for Report on X97M.Barisada.K Virus
Date: April 05, 2001
Platform: Microsoft
Warning About: W97M.NSI.G Virus
Report From: Norton / Symantec Security Updates
* Release Note: This is a simple Microsoft Word macro virus that infects
Normal.dot and other open documents when you open an infected document.
* Click here for Report on W97M.NSI.G Virus
Date: April 05, 2001
Platform: PC
Warning About: T&E.927 Virus
Report From: Norton / Symantec Security Updates
* Release Note: T&E.927 is a small memory-resident virus that infects
only .exe files. The size of infected files is increased by 927 bytes.
* Click here for Report on T&E.927 Virus
Date: April 05, 2001
Platform: PC
Warning About: ADT.1765 Virus
Report From: Norton / Symantec Security Updates
* Release Note: ADT.1765 is a memory-resident DOS virus, which infects
.exe and .com files. If the virus is executed on the 19th of any month,
the virus also hooks INT 6 to display certain text at the DOS prompt.
* Click here for Report on ADT.1765 Virus
Date: April 05, 2001
Platform: PC
Warning About: Viroped.460 Virus
Report From: Norton / Symantec Security Updates
* Release Note: Viroped.460 is a small, non-memory-resident virus that
infects .com files when they are run. Infected files are enlarged by
492 bytes. Viroped.460 is not usually seen in the wild.
* Click here for Report on Viroped.460 Virus
Date: April 04, 2001
Platform: Microsoft Internet Explorer 5.5 SP1 or earlier,
except IE 5.01 SP2
Warning About: Automatic Execution of Embedded MIME Types
Report From: CERT
* Release Note: Microsoft Internet Explorer has a vulnerability triggered
when parsing MIME parts in a document that allows a malicious agent to
execute arbitrary code.
* Click here for CERT CA-2001-06
Date: April 04, 2001
Platform: Windows platforms with mail readers that use Internet Explorer
to render html formatted mail messages
Warning About: IE MIME Header Vulnerability
Report From: CIAC Bulletins
* Release Note: Internet Explorer incorrectly handles some unusual MIME
types which could allow binary attachments to be run in mail messages.
* Click here for Bulletin Number L-066
Date: April 04, 2001
Platform: PC
Warning About: W97M.Thus.BQ Virus
Report From: Norton / Symantec Security Updates
* Release Note: W97M.Thus.BQ is a stealth macro virus, which infects
active documents and the normal template file (Normal.dot). On certain
dates, it displays messages and may attempt to shut down Windows.
* Click here for Report on W97M.Thus.BQ Virus
Date: April 04, 2001
Platform: PC
Warning About: VBS.Yabran.A@mm Worm
Report From: Norton / Symantec Security Updates
* Release Note: This is a simple worm, which spreads from an infected
computer by emailing itself to everyone listed in the Microsoft Outlook
address book.
* Click here for Report on VBS.Yabran.A@mm Worm
Date: April 01, 2001
Platform: MS Windows 98, 98se and Windows ME
Warning About: Microsoft Plus! 98 Password Disclosure Vulnerability
Report From: Security Focus
* Release Note: Due to a flaw in the implementation of the Compressed
Folders feature in Microsoft Plus! 98 and Windows ME, the password
used to protect the compressed folder is stored on the user's machine
in plaintext. A user who gains access to a machine with this feature
installed may locate the file where the password is stored and use it
to access any compressed folder and the contents within the folder.
* Click here for Advisory on Microsoft Plus! 98 Vulnerability
Date: April 01, 2001
Platform: PC
Warning About: W97M.Mxc.A Virus
Report From: Norton / Symantec Security Updates
* Release Note: This Macro Virus is a simple macro virus that will infect
on opening an infected document. It will export its viral source code
to your c directory under the name tk.mxc. This virus will also disable
the Security setting under Office 2000.
* Click here for Report on W97M.Mxc.A Virus
Date: April 01, 2001
Platform: PC
Warning About: HLLC.Laufwerk.7040 Virus
Report From: Norton / Symantec Security Updates
* Release Note: HLLC.Laufwerk.7040 is a companion virus, which is written
in a high-level language. Using random file names, the virus makes
multiple copies of itself that are 7040 bytes in size. This virus only
replicates if you run one of these files, but does not infect or
modify any files on your computer.
* Click here for Report on HLLC.Laufwerk.7040 Virus
Date: April 01, 2001
Platform: PC
Warning About: Butterfly.302 Virus
Report From: Norton / Symantec Security Updates
* Release Note: Butterfly.302 is a small DOS-based, memory-resident
virus, that only infects .com files. When it is run, the virus infects
.com files in directory in which it resides.
* Click here for Report on Butterfly.302 Virus
Date: April 01, 2001
Platform: PC
Warning About: VBS/Breberka.A@MM Virus
Report From: Network Associates
* Release Note: This virus is detected generically under a different
name, VBS/Anjulie.gen@MM. This virus writes itself to the local
system in two places and then sends itself via Outlook email to
others.
* Click here for Report on VBS/Breberka.A@MM
Date: April 01, 2001
Released: April 01, 2001
Platform: Microsoft Internet Explorer 5.01 and 5.5
Patch Available: Incorrect MIME Header Can Cause IE to Execute
E-mail Attachment
Report From: MicroSoft TechNet Security
* Release Note: Impact of vulnerability: Run code of attackers choice.
Recommendation: Customers using IE should install the patch
immediately.
* Click here for MS Security Bulletin MS01-020
Top of Page
Macintosh
No virus warnings for April 2001
Top of Page
Linux
Date: April 29, 2001
Platform: Linux-Mandrake
Updates To: gftp and rpmdrake
Report From: Linux Daily News
* Release Note: Linux Mandrake has issued a security update for gftp,
which has a format string vulnerability in all versions of gftp prior
to version 2.0.8. There is also a temporary file vulnerability in
rpmdrake.
* Click here for LWN Security Update To gftp
* Click here for LWN Security Update To rpmdrake
Date: April 27, 2001
Platform: Red Hat Linux 7.0 that are running the LPRng service
Updates To: Linux-targeted worm: lpdw0rm, plus
Red Hat's patch for LPRng
Report From: Linux Daily News
* Release Note: SecurityFocus has released their analysis of a new worm,
lpdw0rm. This particular worm is targeted at systems running unpatched
versions of Red Hat Linux 7.0 that are running the LPRng service, one
of the vulnerabilities that previous worms have also targeted.
Installing Red Hat's patch for LPRng (made available back in October)
will prevent a system from being successfully attacked.
* Click here for SecurityFocus Analysis To lpdw0rm
* Click here for Red Hat's patch for LPRng
Date: April 27, 2001
Platform: Engarde
Updates To: ntp Advisory
Report From: Linux Daily News
* Release Note: Engarde has an updated version of their ntp advisory
* Click here for LWN Update To ntp Advisory
Date: April 27, 2001
Platform: Debian
Updates To: NEdit
Report From: Linux Daily News
* Release Note: Debian's new packages to fix the security vulnerability
reported in NEdit
* Click here for LWN Security Update To NEdit
* Click here for NEdit at http://nedit.org/
Date: April 27, 2001
Platform: Progeny
Updates To: ftpd and bsdftp
Report From: Linux Daily News
* Release Note: Progeny report on which ftp packages are vulnerable to
the off-by-one and recent globbing vulnerabilities, plus package
updates for those that are (ftpd and bsdftp).
* Click here for LWN Security Update To ftpd and bsdftp
Date: April 27, 2001
Platform: Red Hat
Updates To: gftp
Report From: Linux Daily News
* Release Note: gftp is a multi-threaded X-based ftp client. Red Hat has
issued updated packages for gftp that fix a format string vulnerability
in the package.
* Click here for LWN Security Update To gftp updated packages
* Click here for gftp at http://gftp.seul.org/
Date: April 26, 2001
Platform: Linux
Warning About: Kork Worm
Aliases: Linux/Kork, Unix/Kork, Worm.Linux.Kork
Variant: Kork.A
Report From: F-Secure
* Release Note: Kork is a worm that uses the known vulnerability in lpd
service to propagate from a vulnerable Linux system to another. This
service is part of the default installation of Red Hat Linux 7.0.
* Click here for Report on Kork Worm
Date: April 26, 2001
Platform: Debian
Updates To: Zope
Report From: Linux Daily News
* Release Note: The Debian Project has issued a new security update to
Zope. There are no new problems with Zope itself, but apparently the
previous version of this update had some, um, problems. People running
Debian's Zope package should probably apply this update.
* Click here for LWN Security Update To Zope
Date: April 25, 2001
Platform: Red Hat Linux 6.2 and 7.0
Warning About: Red Hat Ptrace and Exec Race Conditions
Report From: CIAC Bulletins
* Release Note: A race condition exists in ptrace, exec, and other suid
utilities that can result in a local denial of service or local root
compromise.
* Click here for Bulletin Number L-076
Date: April 25, 2001
Platform: Debian
Updates To: Netscape GIF comment issue
Report From: Linux Daily News
* Release Note: Debian has made available Netscape 4.77 in .deb format
to address problems found with the way earlier versions handled GIF
comments.
* Click here for LWN Security Update To Netscape GIF comment issue
Date: April 25, 2001
Platform: Red Hat
Updates To: mgetty
Report From: Linux Daily News
* Release Note: Red Hat has issed an advisory for mgetty to address
packaging errors in previous updates for that package.
* Click here for LWN Security Update To mgetty
Date: April 25, 2001
Platform: Progeny
Updates To: sendfile
Report From: Linux Daily News
* Release Note: Progeny has issed an advisory for sendfile to address
local root vulnerabilities in that package.
* Click here for LWN Security Update To sendfile
Date: April 20, 2001
Platform: Progeny
Updates To: Netscape Javascript Vulnerabilities
Report From: Linux Daily News
* Release Note: Progeny posted their advisory for the Netscape Javascript
vulnerabilities that were recently uncovered.
* Click here for LWN Advisory for Netscape Javascript
Date: April 20, 2001
Platform: SuSE
Updates To: Hylafax server
Report From: Linux Daily News
* Release Note: SuSE posted a security advisory for the Hylafax server
side program to address potential root vulnerabilities.
* Click here for LWN Security Advisory for Hylafax server
Date: April 20, 2001
Platform: Debian
Updates To: sendfile
Report From: Linux Daily News
* Release Note: Debian posted an advisory for sendfile addressing
improper priviledge dropping issues.
* Click here for LWN Advisory To sendfile
Date: April 20, 2001
Platform: Conectiva
Updates To: kernel and Samba
Report From: Linux Daily News
* Release Note: Conectiva has issued advisories for kernels prior to
2.2.19 and for Samba.
* Click here for LWN Security Update To kernel
* Click here for LWN Security Update To Samba
Date: April 20, 2001
Platform: Red Hat
Advisory For: update to FTP iptables in 2.4 kernel
Report From: Linux Daily News
* Release Note: Red Hat has issued a security advisory for the 2.4 kernel
to address vulnerabilities in the FTP iptables. The problem does not
affect the default configuration of Red Hat Linux, but can affect some
custom configurations of Red Hat Linux 7.1 only and is specific to the
Linux 2.4 kernel series.
* Click here for LWN Security Advisory To FTP iptables
Date: April 20, 2001
Platform: Caldera
Updates To: Samba
Report From: Linux Daily News
* Release Note: Caldera joins the list of responders to the recent Samba
vulnerability report.
* Click here for LWN Security Update To Samba
Date: April 20, 2001
Platform: Progeny
Updates To: Samba
Report From: Linux Daily News
* Release Note: Progeny joins the list of responders to the recent Samba
vulnerability report.
* Click here for LWN Security Update To Samba
Date: April 20, 2001
Platform: SuSE
Updates To: nedit and sudo
Report From: Linux Daily News
* Release Note: SuSE has issued a security update to nedit, fixing a
temp file vulnerability in that package. Also out is an update to sudo
fixing a buffer overflow problem (which was discussed in the March 1 LWN
LWN security page).
* Click here for LWN Security Update To nedit
* Click here for LWN Security Update To sudo
* Click here for LWN March 1 Security Page for sudo
Date: April 18, 2001
Platform: Various Linux Distributions
Warning About: Network Time Protocol (NTP) Vulnerabilities
Report From: CIAC Bulletins
* Release Note: A remote intruder can use the buffer overflow to cause
the NTP code to crash. It is possible that the buffer overflow can be
used to execute arbritrary code.
* Click here for Bulletin Number L-071
Date: April 18, 2001
Platform: Linux
Updates To: Samba 2.0.8 Security Issue
Report From: Linux Daily News
* Release Note: Andrew Tridgell posted a note to BugTraq that Samba 2.0.8
has been released to address a significant security vulnerability that
allows local users to corrupt local devices (such as raw disks).
* Click here for LWN Security Issue for Samba 2.0.8
Date: April 18, 2001
Platform: Trustix Secure Linux
Updates To: Samba 2.0.8 Advisory
Report From: Linux Daily News
* Release Note: Distribution update posted from Trustix Secure Linux
* Click here for LWN Security Advisory To Samba 2.0.8
Date: April 18, 2001
Platform: Debian
Updates To: Samba 2.0.8 Advisory
Report From: Linux Daily News
* Release Note: Distribution update posted from Debian
* Click here for LWN Security Advisory To Samba 2.0.8
Date: April 18, 2001
Platform: Immunix OS
Updates To: Samba 2.0.8 Advisory
Report From: Linux Daily News
* Release Note: Distribution update posted from Immunix OS
* Click here for LWN Security Advisory To Samba 2.0.8
Date: April 18, 2001
Platform: Linux Mandrake
Updates To: kernel update Advisory
Report From: Linux Daily News
* Release Note: Linux Mandrake released a security advisory to update
kernels in their distributions ranging from 6.0 to 7.2 and the
Corporate Server 1.0.1. According to the advisory, a number of
security problems have been found in the Linux kernels prior to the
latest 2.2.19 kernel.
* Click here for LWN Security Advisory To kernel update
Date: April 18, 2001
Platform: Conectiva
Updates To: Netscape
Report From: Linux Daily News
* Release Note: Another netscape security update has been posted, this
time from Brazilian Linux distributor Conectiva.
* Click here for LWN Security Update To Netscape
Date: April 18, 2001
Platform: Immunix
Updates To: pine and netscape
Report From: Linux Daily News
* Release Note: Immunix has posted security advisories for the pine and
netscape packages provided as part of their distribution.
* Click here for LWN Security Update To Pine
* Click here for LWN Security Update To Netscape
Date: April 18, 2001
Platform: Red Hat
Updates To: 7.1 update for Netscape, kernel patches for 6.2, 7
Report From: Linux Daily News
* Release Note: Red Hat has posted a security update for the just
released 7.1 distribution for the Netscape packages. This is just an
update for previous notices in order to make the updated Netscape
packages available for 7.1. Red Hat has also issued updates for their
Red Hat Linux 6.2 and Red Hat Linux 7 distributions to make kernel
2.2.19 available for those distributions.
* Click here for LWN Security Update To 7.1 Netscape package
* Click here for LWN Security Update To kernel 2.2.19
Date: April 16, 2001
Platform: Debian
Updates To: kernel
Report From: Linux Daily News
* Release Note: The Debian Project has released a security update to the
kernel fixing the numerous problems that existed in kernels prior to
2.2.19. Also out from Debian is a set of instructions and packages for
those wanting to run the 2.4 kernel on Debian 2.2 systems.
* Click here for LWN Security Update To kernel
* Click here for LWN Set of Instructions
Date: April 16, 2001
Platform: Debian
Advisory for: exuberant-ctags
Report From: Linux Daily News
* Release Note: Colin Phipps discovered that the exuberant-ctags packages
as distributed with Debian GNU/Linux 2.2 creates temporary files
insecurely. This has been fixed in version 1:3.2.4-0.1 of the Debian
package, and upstream version 3.5.
* Click here for LWN Security Advisory for exuberant-ctags
Date: April 16, 2001
Platform: Red Hat
Updates To: Netscape and pine
Report From: Linux Daily News
* Release Note: Red Hat has issued security advisories for Netscape and
pine. Both advisories are applicable to RH 6.2 and 7, while the pine
advisory is also applicable to RH 5.2.
* Click here for LWN Security Update To Netscape
* Click here for LWN Security Update To pine
Date: April 12, 2001
Platform: Linux
Warning About: Linux/Adore.worm
Aliases: Linux/Red
Report From: Network Associates
* Release Note: The Linux/Adore package, containing "Elf" binary files
as well as script files, targets to scan the internet to look for
vulnerable Linux systems to exploit.
* Click here for Report on Linux/Adore.worm
Date: April 09, 2001
Platform: Red Hat
Updates To: xntp
Report From: Linux Daily News
* Release Note: Red Hat updates are now available.
* Click here for LWN Security Update To xntp
Date: April 09, 2001
Platform: Trustix
Updates To: xntp
Report From: Linux Daily News
* Release Note: Trustix updates are now available.
* Click here for LWN Security Update To xntp
Date: April 09, 2001
Platform: Slackware
Updates To: xntp
Report From: Linux Daily News
* Release Note: Everyone is on the ball with this patch, with Slackware
being the latest distribution to release a fix for xntp.
* Click here for LWN Security Update To xntp
Date: April 09, 2001
Platform: Red Hat
Updates To: Unofficial xntp fix
Report From: Linux Daily News
* Release Note: Dan Anderson has provided an unofficial patch for Red Hat
systems package xntp3-5.93-14.
* Click here for LWN Security Update To Unofficial xntp fix
Date: April 09, 2001
Platform: Caldera
Updates To: ntp and xntp3
Report From: Linux Daily News
* Release Note: Caldera has issued this security update for the recently
reported vulnerabilites for ntp and xntp3.
* Click here for LWN Security Update To ntp and xntp3
Date: April 09, 2001
Platform: Immunix
Updates To: ntp and xntp3
Report From: Linux Daily News
* Release Note: Immunix have posted security updates for the recently
reported vulnerabilites for ntp and xntp3.
* Click here for LWN Security Update To ntp and xntp3
Date: April 09, 2001
Platform: Linux Mandrake
Updates To: ntp and xntp3
Report From: Linux Daily News
* Release Note: Linux Mandrake have posted security updates for the
recently reported vulnerabilites for ntp and xntp3.
* Click here for LWN Security Update To ntp and xntp3
Date: April 09, 2001
Platform: Debian
Updates To: NTP
Report From: Linux Daily News
* Release Note: The Debian Project has released a security update to
NTP fixing the remotely-exploitable buffer overflow problem in that
package.
* Click here for LWN Security Update To NTP
Date: April 09, 2001
Platform: Trustix
Updates To: Releases 1.5 beta and kernel update
Report From: Linux Daily News
* Release Note: Trustix has announced the release of Trustix Secure Linux
1.4.80, a beta release toward the 1.5 stable version. It is nicknamed
"Ooops," and is incompatible with 1.2 in a number of ways; read the
announcement closely. Also released is a security update to the kernel
which brings it up to 2.2.19 and fixes the security holes there.
* Click here for LWN Trustix Releases 1.5 beta
* Click here for LWN Trustix kernel update
Date: April 05, 2001
Platform: Linux
Warning About: Adore Worm
Aliases: Unix/Adore, Red worm, Linux/Adore
Report From: F-Secure
* Release Note: Adore is a worm, that spreads in Linux systems using four
diffrent, known vulnerabilities already used by Ramen and Lion worms.
All four vulnerabilities have been already fixed by different Linux
vendors. Read the report for further information.
* Click here for Report on Adore Worm
Date: April 04, 2001
Platform: Linux on x86 platforms with unpatched BIND services but could
be expanded to other UNIX platforms
Warning About: The Lion Internet Worm DDOS Risk
Report From: CIAC Bulletins
* Release Note: Further analysis of the Lion Internet worm by the NIPC
indicates that it has the potential for causing much more damage than
originally expected.
* Click here for Bulletin Number L-064
Date: April 04, 2001
Platform: Caldera
Updates To: kernel fixes
Report From: Linux Daily News
* Release Note: Caldera has posted a security advisory to announce that
patches for kernel problems that are now available in 2.2.19 have been
backported to kernels in some of their previous releases.
* Click here for LWN Security Update To kernel
Date: April 04, 2001
Platform: Linux
Warning About: New Linux worm Adore
Report From: Linux Daily News
* Release Note: The SANS Institute has issued a warning regarding a new
variant of the Ramen and Lion worms. The warning includes tools for
detection and removal of the worm.
* Click here for LWN Warning about Adore Worm
Date: April 04, 2001
Platform: Linux
Updates To: RSBAC 1.1.1 released
Report From: Linux Daily News
* Release Note: Version 1.1.1 of the Rule Set Based Access Control (RSBAC)
system has been released. RSBAC is a set of kernel patches which add a
general security mechanism, allowing for a large number of different
security policies to be implemented. It's a comprehensive implementation,
with several policy modules available; it has also been in production for
some time. Worth a look for those interested in building secure systems.
* Click here for LWN Security Update To RSBAC 1.1.1
Date: April 01, 2001
Platform: Trustix
Updates To: OpenSSH
Report From: Linux Daily News
* Release Note: Here is a security advisory for Trustix Secure Linux on
its update to OpenSSH-2.5.2p2.
* Click here for LWN Security Update To OpenSSH
Date: April 01, 2001
Platform: Red Hat
Updates To: OpenSSH
Report From: Linux Daily News
* Release Note: Red Hat has issued a security update to OpenSSH which
picks up the latest passive analysis defenses.
* Click here for LWN Security Update To OpenSSH
Top of Page
Miscellaneous
Date: April 29, 2001
Platform: Misc
Hoax Report: E-Mail Tax HOAX Resurfaces In Australia
Report From: Infowar.Com
* Release Note: Infowar.Com News says Australia Post has had to publicly
refute an e-mail message circulating around the Australian Internet
after the old hoax has continued to spiral out of control Down Under
in spite of the efforts of the media and the Australian government to
put it to death.
* Click here for E-Mail Tax HOAX Resurfaces In Australia
Date: April 27, 2001
Platform: Misc
Hoax Alert: Playboy Girls HOAX
Aliases: Meninas da Playboy, bancoc.vbs
Report From: Symantec Security HOAX Updates
* Release Note: This information is a hoax and should be ignored. Sample
of hoax message located at the Inside Information Systems webite at
http://mail.iis.com.br/ The english translation of the MS announcement
is available in Symantec hoax report.
* Click here for Symantec HOAX Report on Playboy Girls
Date: April 27, 2001
Platform: Misc
Warning To: U.S. warns about China hacking
Report From: MSNBC Tech News
* Release Note: Federal authorities and security companies are warning
American businesses to protect themselves next week during a planned
Labor Day Strike from Chinese hackers upset over the recent spy plane
incident.
* Click here for U.S. warns about China hackingpdate To
Date: April 26, 2001
Platform: None
Hoax Report: Nokia Cellphone Radiation HOAX
Aliases: Nokia 3310,6210 radiation hoax
Report From: F-Secure Hoax information
* Release Note: This hoax is about some new Nokia models giving out much
higher amounts of radiation compared to previous ones. This is a typical
cancer or radiation warning hoax, there's no truth in the story. No
deaths or injuries caused by mobile phone radiation have been reported.
F-Secure asks that you please ignore these messages and don't spread them
any further.
* Click here for F-Secure Report on Nokia Cellphone Radiation HOAX
Date: April 26, 2001
Platform: None
Hoax Alert: SULFNBK.EXE Warning HOAX
Report From: Symantec Security HOAX Updates
* Release Note: This email hoax has been reported in Brazil. The original
email is in Portuguese. Symantec has the original and also followed by
an English translation. They ask that you please ignore any messages
regarding this hoax and do not pass on messages. Passing on messages
about the hoax only serves to further propagate it.
* Click here for Symantec HOAX Report on SULFNBK.EXE Warning
Date: April 25, 2001
Platform: Versions of FreeBSD
Warning About: FreeBSD IPFilter May Incorrectly Pass Packets
Report From: CIAC Bulletins
* Release Note: The IPFilter package is used to implement the FreeBSD
firewall function. A vulnerability may allow packets to bypass the
filter.
* Click here for Bulletin Number L-075
Date: April 19, 2001
Platform: 5000 series switches and Some Models
Warning About: Cisco Catalyst 5000 Series 802.1x Vulnerability
Report From: CIAC Bulletins
* Release Note: A 802.1x frame received on a STP blocked port causes a
network storm in the immediate network.
* Click here for Bulletin Number L-072
Date: April 12, 2001
Platform: Alcatel Speed Touch Home ADSL Modem and
Alcatel 1000 ADSL Network Termination Device
Warning About: Multiple Vulnerabilities in Alcatel ADSL Modems
Report From: CERT
* Release Note: The San Diego Supercomputer Center (SDSC) has recently
discovered several vulnerabilities in the Alcatel Speed Touch
Asymmetric Digital Subscriber Line (ADSL) modem. These vulnerabilities
are the result of weak authentication and access control policies.
* Click here for CERT CA-2001-08
Date: April 12, 2001
Platform: FTP servers on various platforms
Warning About: File Globbing Vulnerabilities in Various FTP Servers
Report From: CERT, CIAC Bulletins and COVERT Labs at PGP Security
* Release Note: A variety of FTP servers incorrectly manage buffers in a
way that can lead to remote intruders executing arbitrary code on the
FTP server.
* Click here for CERT CA-2001-07
* Click here for CIAC Bulletin Number L-070
* Click here for COVERT Advisories No. 048
Date: April 12, 2001
Platform: FreeBSD, NetBSD, OpenBSD and SGI IRIX
Warning About: Multiple Vendor BSD ftpd glob() Buffer Overflow
Vulnerabilities
Report From: Security Focus
* Release Note: The BSD ftp daemon and derivatives contain a number of
buffer overflows that may lead to a compromise of root access to
malicious users.
* Click here for Advisory on BSD ftp daemon
Date: April 12, 2001
Platform: Sun Solaris
Warning About: Solaris ftpd glob() Expansion LIST Heap Overflow
Vulnerability
Report From: Security Focus
* Release Note: The Solaris ftp daemon contains a heap-based buffer
overflow condition. The overflow occurs when the LIST command is issued
with an argument that expands into an oversized string after being
processed by glob().
* Click here for Advisory on Solaris ftp daemon
Date: April 12, 2001
Platform: HP HP-UX 10.0 - 11.0
Warning About: HP-UX ftpd glob() Expansion STAT Buffer Overflow
Vulnerability
Report From: Security Focus
* Release Note: Hewlett Packard's HP-UX ftp daemon contains a stack-based
buffer overflow condition. The overflow occurs when the STAT command is
issued with an argument that expands into an oversized string after
being processed by glob().
* Click here for Advisory on HP HP-UX ftp daemon
Date: April 09, 2001
Platform: Cisco VPN 3000 series
Warning About: Cisco VPN3000 Concentrator TELNET Vulnerability
Report From: CIAC Bulletins
* Release Note: The SSL and telnet connections are not handled properly
for failed logon attempts. A flood of data sent to either the SSL or
telnet port can cause Cisco VPN 3000 series concentrators to reboot.
* Click here for Bulletin Number L-068
Date: April 09, 2001
Platform: Cisco CSS 11050, CSS 11150, and CSS 11800 units
Warning About: Cisco Content Services Switch User Account Vulnerability
Report From: CIAC Bulletins
* Release Note: The Cisco Content Services (CSS) switch product, also
known as Arrowpoint, has a security vulnerability which allows privilege
escalation. Follow the Cisco advice in the bulletin for establishing
access control lists or apply the patch.
* Click here for Bulletin Number L-069
Date: April 05, 2001
Platform: Palm OS PDA Operating System
Warning About: Phage Virus
Aliases: PalmOS/Phage, Palm virus
Report From: F-Secure
* Release Note: Phage can spread from one Palm to another if infected
files are shared via beaming or installed via a docking station.
* Click here for Report on Phage Virus
Date: April 05, 2001
Platform: Misc
Hoax Report: ERICELL enginer HOAX
Aliases: DIGIPHONE hoax
Report From: F-Secure Hoax information
* Release Note: This is English translation of a Swedish hoax about
someone posing as telecom engineer. F-Secure asks that you please
ignore these messages and don't spread them any further.
* Click here for F-Secure Report on ERICELL enginer HOAX
Date: April 04, 2001
Platform: Any machine running Solaris 2.6, 7, or 8 with snmpXdmid
installed and enabled.
Warning About: Solaris Exploitation of snmpXdmid
Report From: CIAC Bulletins
* Release Note: A buffer overflow exists in the snmpXdmid code. Local
and remote users can exploit the buffer overflow.
* Click here for Bulletin Number L-065
Date: April 04, 2001
Platform: Misc
Hoax Alert: Foot N Mouth Virus Warning HOAX
Report From: Symantec Security HOAX Updates
* Release Note: Please ignore any messages regarding this hoax and do not
pass on messages.
* Click here for Symantec HOAX Report on Foot N Mouth Virus Warning
Date: April 01, 2001
Platform: Solaris 2.6, 7, or 8
Warning About: Exploitation of snmpXdmid
Report From: CERT
* Release Note: Exploitation of this vulnerability allows an intruder to
gain privileged (root) access to the system.
* Click here for CERT CA-2001-05
Date: April 01, 2001
Platform: Such as Sun Solaris 8.0, SGI IRIX 6.5 and Linux/UNIX
Warning About: Apache Tomcat 3.0 Directory Traversal Vulnerability
Report From: Security Focus
* Release Note: Apache Tomcat in a Windows NT environment could be led
to traverse the normal directory structure and return requested files
from outside of the document root.
* Click here for Advisory on Apache Tomcat Vulnerability
Date: April 01, 2001
Platform: Sun Solaris 8.0_x86 plus other versions
Warning About: Solaris tip Buffer Overflow Vulnerability
Report From: Security Focus
* Release Note: tip is a utility included with Sun Microsystems Solaris
Operating Environment. tip allows a user to establish a full duplex
terminal connection with a remote host. Due to the improper handling
of environment variables by tip, it is possible to overflow a buffer
in the program, and execute arbitrary code.
* Click here for Advisory on Solaris tip Vulnerability
Top of Page
Back to the Virus Archives page
