Virus Warnings from May 2001 ______________________________________________________________ [Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Linux] [Jump to Misc] ______________________________________________________________ Amiga No virus warnings for May 2001 Top of Page Windows Date: May 31, 2001 Platform: MS Win ME / 9.x, Various Linux OS with various versions of Gnu GNU Privacy Guard Warning About: GnuPG Format String Vulnerability Report From: Security Focus * Release Note: GnuPG is a popular open source public/private key encryption system. It is possible for attackers to create an encrypted document that will exploit a format string vulnerability in the GnuPG client when the document is decrypted. This vulnerability may lead to remote attackers gaining access to client hosts. * Click here for Advisory No. 2797 Date: May 31, 2001 Platform: MS Win ME / 9.x, Various Linux OS with various versions of Gnu GNU Privacy Guard Warning About: GnuPG Format String Vulnerability Report From: Security Focus * Release Note: GnuPG is a popular open source public/private key encryption system. It is possible for attackers to create an encrypted document that will exploit a format string vulnerability in the GnuPG client when the document is decrypted. This vulnerability may lead to remote attackers gaining access to client hosts. * Click here for Advisory No. 2797 Date: May 31, 2001 Platform: MS Windows Warning About: LoveLetter.CM@mm Worm Report From: F-Secure * Release Note: This variant is very similar to the original VBS/LoveLetter.A@mm. There is, however, two differences: - This variant replaces all files with ".com" and ".exe" extensions. Files with ".jpg" or ".jpeg" extension are not affected. - This variant hides files with ".dll" extension. Files with ".mp2" extension are not affected. * Click here for Report on LoveLetter.CM@mm * Click here for Information about the original VBS/LoveLetter.A Date: May 30, 2001 Platform: MS Windows and Misc Mail users Warning About: VBS.Nasara.A@mm Worm Aliases: VBS/NastySarah@m Report From: Norton / Symantec Security Updates * Release Note: VBS.Nasara.A@mm is a mass-mailing worm that uses MAPI applications, Microsoft Outlook, or Internet Information Server (IIS) to spread. It also modifies the Autoexec.bat file to delete the contents of drive C. Name of attachment: NastySarah.jpg.vbs If the worm cannot find any of these programs, it displays following message and quits: Hey! Haven't you heard! There's a VBS worm spreading by this very filename! You're lucky you didn't get hit! Forward this warning on to all of your contacts, so they won't get hit by the bug! If the worm does find one of these programs, it deletes any email message that includes the word "NASTYSARAH" in the subject or message. It then spreads by automatically replying to messages that you received previously. * Click here for Report on VBS.Nasara.A@mm Date: May 30, 2001 Platform: MS Windows Warning About: VBS.Devolve.A Virus Aliases: VBS.Devolove Report From: Norton / Symantec Security Updates * Release Note: VBS.Devolve.A is a Visual Basic Script in an HTML file. The virus infects HTML files, and it modifies the Autoexec.bat file to repeatedly display a message. On the 15th or 30th of every month, the virus modifies the Autoexec.bat file to repeatedly display the following message: this computer waz infected from dr[kazoy]... * Click here for Report on VBS.Devolve.A Date: May 30, 2001 Platform: MS Windows Warning About: W97M.Thus.CV Macro Virus Aliases: W97M/Thus.CV Report From: Norton / Symantec Security Updates * Release Note: W97M.Thus.CV is a macro virus that infects active MS Word documents and the Normal.dot template. The virus attempts to encrypt randomly chosen .exe and .vdb files. Any .exe and .vdb files that were encrypted by the virus will have to be restored from backup or reinstalled. * Click here for Report on W97M.Thus.CV Date: May 30, 2001 Platform: MS Windows Warning About: BAT.Black Trojan Horse, Virus Report From: Norton / Symantec Security Updates * Release Note: This is a batch file virus that appends itself to the C:\Autoexec.bat file and prepends itself to the C:\Windows\Win.ini file. The file name of the batch file is BlackDay.bat. Due to bugs in the virus code, some parts are not executed. If the virus has executed, you may first have to reinstall Windows. * Click here for Report on BAT.Black Date: May 30, 2001 Platform: MS Windows Warning About: W97M.Wrath Virus Report From: Norton / Symantec Security Updates * Release Note: This macro virus infects the Normal.dot template, and uses that template to spread. It has a module named "Wrath" that contains the viral code. Its payload deletes files if the date is July 4 through July 8. * Click here for Report on W97M.Wrath Date: May 30, 2001 Platform: MS Windows Warning About: Hooker Password and Data Stealing Trojan Aliases: Trojan.PSW.Hooker Report From: F-Secure * Release Note: Hooker is a password and data stealing trojan. Being run it installs itself in System directory and modifies RunOnce key in the Registry. After initial installation the trojan drops a keylogging DLL from inside its body and registers itself as a service process. This way its task is not visible in Task Manager. * Click here for Report on Hooker Date: May 30, 2001 Platform: MS Windows Warning About: Fever Worm Aliases: Yellow Fever, W32.Yellow.worm, W32/Fever Report From: F-Secure * Release Note: Fever is an Internet worm that spreads itself as an attachment to email messages. When the worm attachment is opened, it activates and manipulates a few things. As a result of the manipula- tions, Windows will launch the worm's file automatically at every startup. * Click here for Report on Fever Date: May 28, 2001 Platform: MS Windows with Windows Media Player 6.4 and 7 Warning About: Windows Unchecked Buffer in Media Player .ASX Processor Report From: CIAC Bulletins * Release Note: This bulletin discusses two security vulnerabilities. Damage: Unauthorized disclosure, and/or limited executing code of choice. Solution: Apply the patches as described in bulletin. * Click here for Bulletin Number L-089 Date: May 25, 2001 Platform: MS Windows Warning About: W32/Hlam@MM Virus Aliases: W32.HLLP.Chlamydia, W97M.Hlam.A (NAV), W97M/Hlam@MM Report From: Network Associates * Release Note: This is a multipartite virus which infects executable files and Microsoft Word 97 (or greater) documents and templates. It is also a mass-mailer, and IRC worm. * Click here for Report on W32/Hlam@MM Date: May 25, 2001 Platform: MS Windows Warning About: HTML.Bother.3180 Virus Aliases: HTML.Bother.3180.dr Report From: Norton / Symantec Security Updates * Release Note: HTML.Bother.3180 is script that uses ActiveX controls to perform malicious actions on your computer. * Click here for Report on HTML.Bother.3180 Date: May 25, 2001 Platform: MS Windows Warning About: VBS.Noped.A@mm Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Noped.A@mm is an encrypted mass-mailing worm. It opens Notepad and displays a text file. It also changes the home page in Internet Explorer and searches all hard drives and mapped drives for specific .jpg or .jpeg file names. If found, the worm sends a message to one random recipient from a list of government agencies. * Click here for Report on VBS.Noped.A@mm Date: May 24, 2001 Platform: MS Windows Media Player 6.4 / Media Player 7 Patch Available: Windows Media Player .ASX Processor Contains Unchecked Buffer Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Potentially run code of attackers choice. Windows Media 6.4 customers should install the patch immediately. Users of Windows Media Player 7 should install the latest Windows Media Player 7.1 version immediately. * Click here for MS Security Bulletin MS01-029 Date: May 23, 2001 Platform: MS Windows Warning About: W32/Fever@M Virus Aliases: W32/Fever (Sophos) Report From: Network Associates * Release Note: This mailer worm has been distributed on a game developers mailing list. When run, it saves a copy of itself to the WINDOWS SYSTEM directory as ed32.exe and creates a registry run key to load the worm at startup. * Click here for Report on W32/Fever@M Date: May 23, 2001 Platform: MS Windows Warning About: W97M.RV.A Virus Aliases: W97M/RV, Macro.Word97.Rv Report From: Norton / Symantec Security Updates * Release Note: W97M.RV.A is a macro virus that infects active MS Word documents and the Normal.dot template. The virus deletes other macros in the active document and Normal.dot before infection. * Click here for Report on W97M.RV.A Date: May 23, 2001 Platform: MS Windows Warning About: Trojan.Eurosol Trojan Horse Aliases: Trojan.Win32.Eurosol Report From: Norton / Symantec Security Updates * Release Note: Trojan.Eurosol installs itself on an infected system so that it is run at startup. This Trojan will also attack installations of the ATGuard firewall if it is present on the infected computer. * Click here for Report on Trojan.Eurosol Date: May 22, 2001 Platform: MS Windows Warning About: Virus Hiding In A SULFNBK.EXE HOAX Report From: Kaspersky Lab * Release Note: Warnings about a pseudo-virus began spreading towards the end of last week, causing a real scare amongst users. Contrary to this report, the SULFNBK.EXE file is absolutely safe, and moreover is a part of the operating system included in the Windows delivery. * Click here for Report: Virus HOAX Coaxes Users to Delete Files Date: May 22, 2001 Platform: MS Windows with versions of Word Patch Available: RTF document linked to template can run macros without warning Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Run macros without warning Recommendation: Customers using affected versions of Word should apply the patch immediately. * Click here for MS Security Bulletin MS01-028 Date: May 20, 2001 Platform: Microsoft IIS 4.0 / 5.0 Warning About: Microsoft CGI Filename Decode Error Vulnerability in IIS Report From: CIAC Bulletins * Release Note: An intruder could get around security checks or be able to run arbitrary system commands. This could result in code execution or unauthorized file disclosure. Solution: Apply the patch * Click here for Bulletin Number L-083 Date: May 20, 2001 Platform: MS Windows Warning About: W97M.Hlam.A Virus Aliases: Bloodhound.WordMacro Report From: Norton / Symantec Security Updates * Release Note: W97M.Hlam.A is a multipartite macro virus. It replicates by infecting active documents and the Normal.dot template file with a viral macro code. A document infected with W97M.Hlam.A may have an executable file appended (not embedded), which is detected as W32.Hlam@mm. * Click here for Report on W97M.Hlam.A Date: May 17, 2001 Platform: MS Windows Warning About: Mawanella Worm Aliases: VBSWG.Z@mm, VBS/VBSWG.Z@MM, VBS.VBSWG.Z (CA) VBS.VBSWG2.Z@MM (NAV), VBS_VBSWG.Z (Trend) VBSWG.Z@MM (F-Secure) Variant: VBSWG.Z Report From: Kaspersky Lab, F-Secure, Network Associates and Symantec * Release Note: Mawanella, was created by someone utilizing the virus writing kit VBS Worm Generator, which is better known as having been used to spawn the "Kournikova" virus epidemic at the beginning of this year. Manwanella arrives to a computer in the form of an e-mail. VBSWG.Z worm spreads messages that look as follows: Subject: Mawanella Body: Mawanella is one of the Sri Lanka's Muslim Village Attachment: Mawanella.vbs When the attached file is executed, the worm mass mails itself to each recipient in every address book and shows a message, that is outlined in the virus reports. * Click here for KLabs Virus Alert on Mawanella * Click here for F-Secure Report on Mawanella * Click here for NAI Report on VBS/VBSWG.Z@MM * Click here for Symantec Report on VBS.Vbswg2.Z@mm Date: May 17, 2001 Platform: PC Warning About: LoveLetter worm variant dubbed "VBS/LoveLet-CL" Report From: Hackers ZDNet * Release Note: A new email worm, dubbed "VBS/LoveLet-CL" by UK antivirus company, Sophos, sends out messages from a victim's PC containing a list of words designed to trigger surveillance systems such as Echelon, which is the surveillance network that allegedly can scan e-mails and wireless communications for particular content. * Click here for ZDNet Report on LoveLetter worm variant Date: May 17, 2001 Platform: Microsoft Internet Explorer 5.01 and 5.5 Patch Available: Flaws in Web Server Certificate Validation Could Enable Spoofing Report From: MicroSoft TechNet Security * Release Note: A patch is available to eliminate two newly discovered vulnerabilities affecting Internet Explorer, both of which could enable an attacker to spoof trusted web sites. * Click here for MS Security Bulletin MS01-027 Date: May 17, 2001 Platform: MS Windows Warning About: VBS.Nightflight@mm Worm Aliases: Bloodhound.VBS.Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.Nightflight@mm is a polymorphic mass mailing worm written in the Visual Basic Scripting (VBS) language. The worm can email itself to all contacts in the Microsoft Outlook Address Book. It can also spread by network drives and it contains functionality such as changing the desktop wallpaper, spreading by mIRC, changing the Windows user information, and lowering security settings on the computer. Payload Trigger: On Fridays and Saturdays * Click here for Report on VBS.Nightflight@mm Date: May 17, 2001 Platform: MS Windows Warning About: W97M.Tenda.A Virus Aliases: W97M/Generic Report From: Norton / Symantec Security Updates * Release Note: W97M.Tenda.A is an encrypted macro virus that infects active documents and the Normal.dot template file. * Click here for Report on W97M.Tenda.A Date: May 17, 2001 Platform: MS Windows Warning About: VBS.VBSWG2.Y@mm Worm Aliases: VBS.VBSWG2, VBS.HomePage, I-Worm.Homepage Report From: Norton / Symantec Security Updates * Release Note: VBS.VBSWG2.Y@mm is an encrypteBScript worm that uses a known exploit to send itself to all recipients in your MS Outlook address book. It also has a payload that starts your default Web browser and then opens a government Web site. * Click here for Report on VBS.VBSWG2.Y@mm Date: May 17, 2001 Platform: MS Windows Warning About: VBS.HStuff.A@m Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.HStuff.A@mm is a Visual Basic Script (VBS) worm that spreads using Microsoft Outlook. It displays a political message and uses MS Internet Explorer to connect to specific Web sites. * Click here for Report on VBS.HStuff.A@m Date: May 16, 2001 Platform: Microsoft IIS Warning About: Superfluous Decoding Vulnerability in IIS Report From: CERT * Release Note: A serious vulnerability in Microsoft IIS may allow remote intruders to execute commands on an IIS web server. Solutions: Apply a patch from your vendor * Click here for CERT CA-2001-12 Date: May 16, 2001 Platform: MS Windows Warning About: VBS.HStuff.A@m Worm Report From: Norton / Symantec Security Updates * Release Note: VBS.HStuff.A@mm is a Visual Basic Script (VBS) worm that spreads using Microsoft Outlook. It displays a political message and uses MS Internet Explorer to connect to specific Web sites. * Click here for Report on VBS.HStuff.A@m Date: May 16, 2001 Platform: MS Windows Warning About: MDMA.5460 Virus Report From: Norton / Symantec Security Updates * Release Note: MDMA.5460 is a small memory-resident virus that infects only .com files (including Command.com). Infected files have their file size increased by 5460 bytes. * Click here for Report on MDMA.5460 Date: May 16, 2001 Platform: MS Windows Warning About: PHP.Carac Virus Report From: Norton / Symantec Security Updates * Release Note: PHP.Carac is a parasitic infector of .htm, .html, and .php files. It drops an IRC script that replicates it to others who join the channel that an infected computer is using. * Click here for Report on PHP.Carac Virus Date: May 16, 2001 Platform: MS Windows Warning About: VBS.Gum.A@m Worm Aliases: VBS.Gum, VBS/Gum Report From: Norton / Symantec Security Updates * Release Note: VBS.Gum.A@m is a VBS worm that spreads using mIRC. It arrives as a script inside the HTML page Gum.html. * Click here for Report on VBS.Gum.A@m Date: May 16, 2001 Platform: MS Windows Warning About: JS.Olvort.A@mm Report From: Norton / Symantec Security Updates * Release Note: JS.Olvort.A@mm is a JScript encrypted worm. It arrives as an attachment with a variable name, which may be displayed as HTML file. * Click here for Report on JS.Olvort.A@mm Date: May 16, 2001 Platform: MS Windows Warning About: Staple Worm Variant: Staple.A, Staple.B Report From: F-Secure * Release Note: VBS/Staple is a mass mailing worm written in Visual Basic Script. This worm arrives in a email message with an Attachment: injustice.TXT.vbs or Attachment: hotstuff.gif.vbs * Click here for Report on Staple Date: May 14, 2001 Platform: PC Warning About: Futs Trojan Aliases: Trojan.Futs Report From: F-Secure * Release Note: Anti-virus software developer Sophos reports the detection of the latest Trojan, Trojan.Futs, that is designed to integrate with Novell Netware. Occasionally the virus displays a message, and attempts to format the hard drive, or causes the computer to beep constantly until it is rebooted. * Click here for Report on Futs Date: May 14, 2001 Platform: MS Internet Information Server 4.0 and MS Internet Information Services 5.0 Patch Available: Superfluous Decoding Operation Could Allow Command Execution via IIS Report From: MicroSoft TechNet Security * Release Note: Three vulnerabilities: Code execution, denial of service, information disclosure. Read the bulletin for download locations for this patch. * Click here for MS Security Bulletin MS01-026 Date: May 14, 2001 Platform: Indexing Service for Windows 2000, Index Server 2.0 Warning About: Microsoft Index Server Search Function Buffer Overflow Report From: CIAC Bulletins * Release Note: An unchecked buffer exists in software processing search requests. This causes several potential vulenrabilities, depending on the format of an attacker's search request. Apply the patch described in bulletin. * Click here for Bulletin Number L-081 Date: May 14, 2001 Platform: MS Windows 2000 Server/Advanced Server and MS Windows 2000 Datacenter Server Warning About: Microsoft Domain Controller Core Service Memory Leak Report From: CIAC Bulletins * Release Note: A Windows 2000 domain controller core service contains a memory leak, triggered when attempting to process a certain invalid service request. Repeatedly sending such a request could deplete the available memory on the server. Apply the patches described in bulletin. * Click here for Bulletin Number L-079 Date: May 14, 2001 * Added F-Secure Report link Platform: MS Windows Warning About: VBS.Hard.A@mm Script Worm Aliases: VBS/Hard-A, VBS/Hard@mm, HardHead Variant: Hard.A Report From: Symantec Security, Network Associates and F-Secure * Release Note: VBS.Hard.A@mm is a Visual Basic Script (VBS) worm that uses MS Outlook Express. It arrives with an attachment named "www.symantec.com.vbs" and a subject line of "FW: Symantec Anti-Virus Warning". The intent is to imply the email originated with the Symantec AntiVirus Research Center. Write-up by: Raul Elnitiarta * Click here for Symantec Report on VBS.Hard.A@mm * Click here for NAI Report on VBS/Hard@MM * Click here for F-Secure Report on Hard Date: May 13, 2001 Platform: MS Windows Warning About: VBS.Hard.A@mm Script Worm Aliases: VBS/Hard-A, VBS/Hard@mm Report From: Norton / Symantec Security Updates amd Network Associates * Release Note: VBS.Hard.A@mm is a Visual Basic Script (VBS) worm that uses MS Outlook Express. It arrives with an attachment named "www.symantec.com.vbs" and a subject line of "FW: Symantec Anti-Virus Warning". The intent is to imply the email originated with the Symantec AntiVirus Research Center. Write-up by: Raul Elnitiarta * Click here for Symantec Report on VBS.Hard.A@mm * Click here for NAI Report on VBS/Hard@MM Date: May 13, 2001 Platform: MS Windows Warning About: NoNo Macro Virus Variant: NoNo.A Report From: F-Secure * Release Note: W97M/Nono is a macro virus that uses different module names depending on the user's initials. This virus gets control when an infected document is opened. It then disables the Word's built-in macro virus protection. * Click here for Report on NoNo Date: May 11, 2001 * Revised Platform: Systems running unpatched versions of Microsoft IIS Systems running unpatched versions of Solaris up to, and including, Solaris 7 (Sun Microsystems) Warning About: sadmind/IIS Worm Aliases: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm, Worm.PoizonBox, Backdoor.Sadmind (NAV), Sadmin-iis (Panda), Unix/Sadmind (Sophos) Variant: Sadmind.A Report From: CERT, F-Secure, Network Associates and Symantec * CERT Release Note: Revised Advisory * F-Secure Release Note: Sadmind is a worm, that propagates from a Sun Solaris machine to another. It also compromises Windows NT/2000 servers running Internet Information Server 4.0 or 5.0. * NAI Release Note: It uses the PERL/WSFT-Exploit trojan in order to attack unpatched Microsoft IIS Web Servers. * Click here for Revised CERT CA-2001-11 * Click here for F-Secure Report on Sadmind * Click here for NAI Report on Solaris/Sadmind.worm * Click here for Symantec Report on Backdoor.Sadmind Date: May 11, 2001 Platform: MS Windows Warning About: Pinkpick Aliases: X97M/Pinkpick, X97M.Pink.A.Gen Variant: Pinkpick.A Report From: F-Secure * Release Note: Pinkpick is an Excel macro virus. * Click here for Report on Pinkpick Date: May 11, 2001 Platform: MS Index Server 2.0, and Indexing Service in MS Windows 2000 Patch Available: Index Server Search Function Contains Unchecked Buffer Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Run code of attacker's choice. * Click here for MS Security Bulletin MS01-025 Date: May 11, 2001 Platform: Microsoft IIS Webs Servers Warning About: PERL/WSFT-Exploit Trojan Report From: Network Associates * Release Note: This trojan is used by the Solaris/Sadmind.worm to deface unpatched Microsoft IIS Webs Servers by overwriting the index/default page in the WWWROOT folder with the following text: * Click here for Report on PERL/WSFT-Exploit Date: May 11, 2001 Platform: MS Windows Warning About: W32.HLLC.Danny Virus Report From: Norton / Symantec Security Updates * Release Note: W32.HLLC.Danny is a simple Win32 virus that overwrites .exe files. The virus saves a copy of the original file before overwriting it. When the virus is executed, it displays a message containing a quote from Shakespeare's Hamlet. * Click here for Report on W32.HLLC.Danny Date: May 11, 2001 Platform: MS Windows Warning About: VBS.Noarn.A Virus Report From: Norton / Symantec Security Updates * Release Note: VBS.Noarn.A is a Visual Basic Script virus in an HTML file. * Click here for Report on VBS.Noarn.A Date: May 10, 2001 Platform: MS Windows Warning About: W32/Roach@MM Worm Virus Report From: Network Associates * Release Note: W32/Roach@MM is detected heuristically with the current engine and DAT files as "New Win32". This is new file-infecting, mass-mailing, worm virus which utilizes encryption and polymorphic techniques. * Click here for NAI Report on W32/Roach@MM Worm Date: May 10, 2001 Platform: MS Windows Warning About: JS.Blink.A@m Worm Report From: Norton / Symantec Security Updates * Release Note: JS.Blink.A@m is a JScript encrypted worm, which spreads using mIRC and PIRCH. * Click here for Symantec Report on JS.Blink.A@m Date: May 09, 2001 Platform: MS Windows Warning About: VBSWG.X@mm Worm Aliases: Homepage, Home Page, VBS/VBSWG.X, VBS.VBSWG2.X@mm, VBS.HomePage Variant: VBSWG.X Report From: F-Secure Website, F-Secure Press Release, NAI and Symantec * Release Note: This is an encrypted worm generated with VBSWG virus kit. It is similar to the widely spread worm at February 2001 - VBS/Onthefly (also known as Anna Kournikova worm). VBSWG.X worm spreads using Outlook Application. It sends messages with the following content: Subject: Homepage Body: You've got to see this page! It's really cool ;O) Attachment: homepage.HTML.vbs * Click here for F-Secure Report on VBSWG.X@mm * Click here for NAI Report on VBS/SST.gen@MM * Click here for Symantec Report on VBS.VBSWG2.D@mm Date: May 09, 2001 Platform: MS Windows 2000 Server, Windows 2000 Advanced Server and Windows 2000 Datacenter Server Patch Available: Malformed Request to Domain Controller can Cause Memory Exhaustion Report From: MicroSoft TechNet Security * Release Note: A core service running on all Windows 2000 domain controllers (but not on any other machines) contains a memory leak, which can be triggered when it attempts to process a certain type of invalid service request. * Click here for MS Security Bulletin MS01-024 * Click here for Questions or Comments about the Bulletin Date: May 08, 2001 Platform: Systems running unpatched versions of Microsoft IIS Systems running unpatched versions of Solaris up to, and including, Solaris 7 (Sun Microsystems) Warning About: sadmind/IIS Worm Report From: CERT * Release Note: The CERT/CC has received reports of a new piece of self-propagating malicious code (referred to here as the sadmind/IIS worm). The worm uses two well-known vulnerabilities to compromise systems and deface web pages. * Click here for CERT CA-2001-11 Date: May 08, 2001 Platform: MS Windows Warning About: Happytime Worm Variant: Happytime.A Report From: F-Secure * Release Note: VBS/Happytime is a VBS worm that propagates in two different ways - as a slow worm similar to JS/Kak, and as a fast worm - mass mailer. * Click here for Report on Happytime Date: May 08, 2001 Platform: MS Windows Warning About: W97M.Fool.J.Gen Virus Aliases: Macro.Word97.Fool.b, W97M/Fool.gen Report From: Norton / Symantec Security Updates * Release Note: W97M.Fool.J.Gen is a Microsoft Word macro virus that spreads by infecting the active Microsoft Word document and the global template, Normal.dot. * Click here for Report on W97M.Fool.J.Gen Date: May 08, 2001 Platform: MS Windows Warning About: VBS.Svinta.A Virus Report From: Norton / Symantec Security Updates * Release Note: VBS.Svinta.A is a Visual Basic Script (VBS) in an HTML file. If an infected HTML file is opened, the Autoexec.bat file is modified, and HTML files that are in specific folders are infected. * Click here for Report on VBS.Svinta.A Date: May 05, 2001 Platform: MS Windows Warning About: JS.Disturbed.A@m Worm Report From: Norton / Symantec Security Updates * Release Note: JS.Disturbed.A@m is a worm that uses Microsoft Outlook and Outlook Express to spread itself. This worm inserts its code into every email message that you send. * Click here for Report on JS.Disturbed.A@m Date: May 05, 2001 Platform: MS Windows Warning About: W32.HLLC.Pers Virus Report From: Norton / Symantec Security Updates * Release Note: W32.HLLC.Pers is a simple companion virus. It searches for .exe files that are in the same folder as the virus, renames them with the .Lsx extension, and then copies itself as the original .exe file names. * Click here for Report on W32.HLLC.Pers Date: May 05, 2001 Platform: MS Windows Warning About: VBS.Lumorg Trojan Aliases: VBS.Lucky2 Report From: Norton / Symantec Security Updates * Release Note: VBS.Lumorg is a Visual Basic Script Trojan horse. If the virus is executed, it overwrites all files that are located in the same folder as itself. It also adds a link to Internet Explorer's Favorites menu. * Click here for Report on VBS.Lumorg Date: May 05, 2001 Platform: MS Windows Warning About: JS/Yama.gen@M Virus Aliases: Alan Peru, I-Worm.Yama (AVP) and JS.Disturbed.A@m (NAV) Report From: Network Associates * Release Note: This is a generic detection of several JS/Yama variants. There are several common elements to the variants seen by AVERT. In addition to JavaScript, t worm also uses VBScript and is therefore dependant on the Windows Scripting Host. * Click here for Report on JS/Yama.gen@M Date: May 05, 2001 Platform: MS Windows Warning About: VBS/Haptime@MM Virus Aliases: VBS.Happytime.A (CA), VBS/Help (Panda), VBS_Haptime.A (Trend) Report From: Network Associates * Release Note: This Visual Basic Script virus will append itself to files, delete files, and can spread via embedded VBScript, contained in the body of HTML formatted email messages. * Click here for Report on VBS/Haptime@MM Date: May 02, 2001 Platform: Windows 2000 and IIS 5.0 Server Software MS Bulletin: Unchecked Buffer in ISAPI Extension Could Enable Compromise of IIS 5.0 Server Report From: MicroSoft TechNet Security * Release Note: The vulnerability results because the Internet Printing ISAPI extension in Windows 2000 contains an unchecked buffer. This is an extremely serious vulnerability, and Microsoft recommends that all IIS 5.0 web server administrators apply the patch immediately. * Click here for MS Security Bulletin MS01-023 * Click here for Questions or Comments about the Bulletin Date: May 02, 2001 Platform: MS Windows 2000 and Internet Information Server 5.0 Security Bug: Security Hole in Web Server Software Report From: MSNBC Tech News, Hackers ZDNet and Microsoft Security * Release Note: Microsoft Corp. issued a widespread warning Tuesday about a security vulnerability that puts millions of Web sites at immediate risk. Hackers ZDNet says a hole in IIS 5.0, described as serious, could give system level access to a hacker. * Click here for MSNBC Report on Serious Security Flaw * Click here for Hackers ZDNet Report on Security Hole * Click here for MS Security Bulletin MS01-023 and patch Date: May 02, 2001 Platform: PC Warning About: W97M.Rendra.D.Gen Aliases: Macro.Word.97.Rendra.b, W97M/Rendra.gen Report From: Norton / Symantec Security Updates * Release Note: W97M.Rendra.D.Gen is a macro virus that infects active documents and the Normal.dot template file. * Click here for Report on W97M.Rendra.D.Gen Date: May 02, 2001 Platform: MS Windows Warning About: X97M.Pink.A.Gen Variant: X97M/Laroux Report From: Norton / Symantec Security Updates * Release Note: X97M.Pink.A.Gen infects active workbooks and inserts an infected workbook into the \XLStart folder. * Click here for Report on X97M.Pink.A.Gen Date: May 02, 2001 Platform: Windows Security Bug: Virus protection for Intuit QuickBooks 2001 Report From: MSNBC Bug Of The Day * Release Note: If the reported error pops up in QuickBooks 2001 when attempting to access Common Payroll Setup, a Visual Basic Script e-mail virus may be to blame. Read the bug report for the error message and a workaround. * Click here for Bug Report on Intuit QuickBooks 2001 Date: May 01, 2001 Platform: PC Warning About: SadCase.Trojan Report From: Norton / Symantec Security Updates * Release Note: When run, SadCase.Trojan deletes as many files as possible from drive C. While doing so, two messages are displayed. * Click here for Report on SadCase.Trojan Top of Page Macintosh Date: May 22, 2001 Platform: Macintosh with MS Word 98 / 2001 for the Mac Patch Available: RTF document linked to template can run macros without warning Report From: MicroSoft TechNet Security * Release Note: Impact of vulnerability: Run macros without warning Recommendation: Customers using affected versions of Word should apply the patch immediately. * Click here for MS Security Bulletin MS01-028 Top of Page Linux Date: May 31, 2001 Platform: MS Win ME / 9.x, Various Linux OS with various versions of Gnu GNU Privacy Guard Warning About: GnuPG Format String Vulnerability Report From: Security Focus * Release Note: GnuPG is a popular open source public/private key encryption system. It is possible for attackers to create an encrypted document that will exploit a format string vulnerability in the GnuPG client when the document is decrypted. This vulnerability may lead to remote attackers gaining access to client hosts. * Click here for Advisory No. 2797 Date: May 31, 2001 Platform: Linux Updates To: format string problem with gnupg Report From: Linux Daily News * Release Note: The format string problem with gnupg was covered on this week's security page. * Click here for LWN Security Update To format string problem Date: May 31, 2001 Platform: Linux-Mandrake Updates To: gnupg Report From: Linux Daily News * Release Note: Linux-Mandrake has this update to the format string problem with gnupg. * Click here for LWN Security Update To gnupg Date: May 31, 2001 Platform: Immunix Updates To: gnupg Report From: Linux Daily News * Release Note: Immunix has this update to the format string problem with gnupg. * Click here for LWN Security Update To gnupg Date: May 31, 2001 Platform: Immunix Updates To: kerberos Report From: Linux Daily News * Release Note: Immunix has this update to kerberos fixing a buffer overflow problem. * Click here for LWN Security Update To kerberos Date: May 31, 2001 Platform: Immunix Updates To: man buffer overflow Report From: Linux Daily News * Release Note: Immunix has this fix for the man buffer overflow. * Click here for LWN Security Update To man buffer overflow Date: May 30, 2001 Platform: SuSE Updates To: "man" package Report From: Linux Daily News * Release Note: SuSE has posted and a security advisory for the man package distributed with SuSE distributions stretching back to 6.0 and running through 7.1. * Click here for LWN Security Update To man Date: May 30, 2001 Platform: WireX Updates To: FormatGuard Report From: Linux Daily News * Release Note: WireX has released a new tool called FormatGuard. Its purpose is to protect programs against format string attacks. It's an extension to the C library, and is released under the LGPL. * Click here for LWN Security Update To FormatGuard Date: May 28, 2001 Platform: Linux-Mandrake Updates To: ncurses Report From: Linux Daily News * Release Note: MandrakeSoft has issued a security update to ncurses fixing a buffer overflow problem in that package. Linux-Mandrake 8.0 appears not to be vulnerable; only users of 7.x need apply the update. * Click here for LWN Security Update To ncurses Date: May 28, 2001 Platform: Turbolinux Updates To: vim, pmake, and openssl Report From: Linux Daily News * Release Note: Turbolinux continues to catch up on the security front. Recent updates include this fix to vim dealing with the statusline command vulnerability, this update to pmake fixing the setuid vulnerability in that package, and a big fix to openssl that takes care of four separate problems. * Click here for LWN Security Update To vim * Click here for LWN Security Update To pmake * Click here for LWN Security Update To openssl Date: May 28, 2001 Platform: Linux-Mandrake Updates To: kdelibs Report From: Linux Daily News * Release Note: Linux-Mandrake has issued an advisory for kdelibs to address a problems in kdesu where world readable files are used for authentication processing. * Click here for LWN Security Update To kdelibs Date: May 25, 2001 Platform: Red Hat Security Bug: Security holes in Linux 6 through 7 Report From: MSNBC Bug Of The Day * Release Note: Several security holes have been found in the kernel. Red Hat has released an update package for Red Hat Linux 6 through 7. Additional information and links to architecture specific RPMs are available at http://www.redhat.com/support/errata/RHSA-2001-013.html * Click here for Bug Report on Security holes Date: May 25, 2001 Platform: Trustix Linux Updates To: samba and bind Report From: Linux Daily News * Release Note: Trustix has posted security advisories for samba and bind. * Click here for LWN Security Update To samba * Click here for LWN Security Update To bind Date: May 25, 2001 Platform: Turbolinux Updates To: vixie-cron Report From: Linux Daily News * Release Note: Turbolinux has issued a security announcement for vixie-cron to address the previouly reported problems with editing crontab files. * Click here for LWN Security Update To vixie-cron Date: May 25, 2001 Platform: EnGarde Updates To: pine Report From: Linux Daily News * Release Note: EnGarde Secure Linux has issued an update for pine to address temporary file handling problems. * Click here for LWN Security Update To pine Date: May 24, 2001 Platform: EnGarde Secure Linux Updates To: pine Report From: Linux Daily News * Release Note: EnGarde Secure Linux has issued an update for pine to address temporary file handling problems. * Click here for LWN Security Update To pine Date: May 23, 2001 Platform: Linux Warning About: Linux.Cheese.Worm Worm Report From: Norton / Symantec Security Updates * Release Note: This worm attempts to spread itself to machines that have been compromised by Linux.Lion.Worm, and remove the security hole that allowed the replication to occur. It is not considered harmful, but is a misguided attempt to address a security issue. * Click here for Report on Linux.Cheese.Worm Date: May 23, 2001 Platform: Red Hat Updates To: man, mktemp Report From: Linux Daily News * Release Note: Red Hat has issued seperate security updates for man to address heap overruns and for mktemp which does not support making temporary directories in certain versions of their distributions. * Click here for LWN Security Update To man * Click here for LWN Security Update To mktemp Date: May 22, 2001 Platform: Linux 6.2 and 7.x Warning About: Linux.Hijacker.Worm Report From: Norton / Symantec Security Updates * Release Note: This worm searches the Internet for Linux systems that have been compromised by a backdoor trojan that may have gained root access. It then remotely launches a module that starts a shell script named w0rmstart.sh. * Click here for Report on Linux.Hijacker.Worm Date: May 22, 2001 Platform: Versions of Red Hat Linux Warning About: Red Hat Samba Package /tmp Race Condition Report From: CIAC Bulletins * Release Note: A malicious local user could create a symbolic link in /tmp and overwrite any file on the system. Solution: Apply software upgrades as noted in bulletin. * Click here for Bulletin Number L-084 Date: May 22, 2001 Platform: Linux-Mandrake Updates To: samba and openssh Report From: Linux Daily News * Release Note: Linux-Mandrake has issued updates for samba and openssh. * Click here for LWN Security Update To samba * Click here for LWN Security Update To openssh Date: May 20, 2001 Platform: Turbolinux Updates To: xemacs, kernel and mgetty Report From: Linux Daily News * Release Note: Turbolinux has released security updates for xemacs (all versions prior to xemacs-21.1.14-1), kernel (all Turbolinux versions previous to 2.2.18-2), and mgetty (all Turbolinux versions prior to 1.1.22). * Click here for LWN Security Update To xemacs * Click here for LWN Security Update To kernel * Click here for LWN Security Update To mgetty Date: May 20, 2001 Platform: Caldera Updates To: Samba Report From: Linux Daily News * Release Note: Caldera has issued an update for Samba to address problems that remained from a previous update. * Click here for LWN Security Update To Samba Date: May 20, 2001 Platform: Immunix Updates To: minicom Report From: Linux Daily News * Release Note: Immunix posted an advisory late yesterday to address format string problems in minicom. * Click here for LWN Security Update To minicom Date: May 20, 2001 Platform: SuSE Advisory for: 2.2 kernel Report From: Linux Daily News * Release Note: SuSE released an advisory for the 2.2 kernel in many of their distributions to address multiple vulnerabilities that could potentially allow remote attackers to gain root access. * Click here for LWN Advisory for 2.2 kernel Date: May 20, 2001 Platform: Caldera Updates To: gnupg Report From: Linux Daily News * Release Note: Caldera has posted an update to gnupg to address a private key retrieval vulnerability. * Click here for LWN Security Update To gnupg Date: May 17, 2001 Platform: Linux Warning About: Cheese worm Report From: Hackers ZDNet and MSNBC Tech News * Release Note: System administrators, worldwide reported signs on Wednesday that another self-spreading program -- or worm -- had started to infect Linux systems. * Click here for ZDNet Report on Cheese worm * Click here for MSNBC Report: 'Benevolent' worm hits Linux boxes Date: May 17, 2001 Platform: Red Hat Updates To: Kerberos and gnupg Report From: Linux Daily News * Release Note: Red Hat has issued security advisories for Kerberos 5 and gnupg. The former addresses a potential vulnerability in the gssapi-aware ftpd daemon and the latter covers potential secret key vulnerabilities. * Click here for LWN Security Update To Kerberos * Click here for LWN Security Update To gnupg Date: May 16, 2001 Platform: Linux-Mandrake Advisory To: pine Report From: Linux Daily News * Release Note: Linux-Mandrake has issued a security advisory for pine to address temporary file creation vulnerabilities. * Click here for LWN Security Advisory for pine Date: May 16, 2001 Platform: Progeny Debian distribution Advisory To: kernel image 2.4.2 Report From: Linux Daily News * Release Note: Progeny Linux has issued a security advisory for kernel image 2.4.2 in their Progeny Debian distribution. * Click here for LWN Security Advisory for kernel image 2.4.2 Date: May 16, 2001 Platform: Red Hat Updates To: samba, Zope Report From: Linux Daily News * Release Note: Red Hat issued an update for a security fix for samba they had previously released that addresses /tmp vulnerabilities. They also issued a new update for the Zope vulnerability with ZClasses. * Click here for LWN Security Update To samba * Click here for LWN Security Update To Zope Date: May 15, 2001 Platform: SuSE Updates To: crontab Report From: Linux Daily News * Release Note: SuSE has issued an update for the cron package to address problems related to dropping permissions when editing a crontab file. * Click here for LWN Security Update To crontab Date: May 11, 2001 Platform: Linux Mandrake Updates To: minicom, vixie-cron, Zope, and cups Report From: Linux Daily News * Release Note: Linux-Mandrake posted security announcements for 4 packages late yesterday. They cover minicom - format string issues. vixie-cron - fixes recent problem when invoking the editor. Zope - ZClasses update and cups - bug fix release, with unspecified security updates. * Click here for Security Announcement for minicom * Click here for Security Announcement for vixie-cron * Click here for Security Announcement for Zope * Click here for Security Announcement for cups Date: May 09, 2001 Platform: Immunix Updates To: Samba security updates Report From: Linux Daily News * Release Note: In response to the release of Samba 2.0.9, security updates for Samba have been released by Immunix. * Click here for LWN Security Update To Samba Date: May 09, 2001 Platform: Debian Updates To: Samba security updates Report From: Linux Daily News * Release Note: In response to the release of Samba 2.0.9, security updates for Samba have been released by Debian. * Click here for LWN Security Update To Samba Date: May 09, 2001 Platform: Turbolinux Updates To: squid, dhcp, cvsweb, dialog, vixie-cron, xntp3, netscape, and analog Report From: Linux Daily News * Release Note: Turbolinux seems to have decided to catch up on its security fixes, and has sent out a whole pile of updates. Many of them fix problems that have been outstanding for months. Available updates include squid, dhcp, cvsweb, dialog, vixie-cron, xntp3, netscape, and analog. * Click here for LWN Security Update To squid * Click here for LWN Security Update To dhcp * Click here for LWN Security Update To cvsweb * Click here for LWN Security Update To dialog * Click here for LWN Security Update To vixie-cron * Click here for LWN Security Update To xntp3 * Click here for LWN Security Update To netscape * Click here for LWN Security Update To analog Date: May 09, 2001 Platform: Samba Updates To: Samba 2.0.9 released (security fix) Report From: Linux Daily News * Release Note: Andrew Tridgell has released Samba 2.0.9, which fixes the security bug that he had thought was fixed in 2.0.8. If you're running a 2.0 version of Samba, an upgrade is recommended; look for one from your favorite distributor soon. 2.2.0 users are not affected by this problem. * Click here for LWN Security Update To Samba 2.0.9 Date: May 09, 2001 Platform: Turbolinux Reports On: squid security problem Report From: Linux Daily News * Release Note: Turbolinux has released this report concerning a /tmp file problem with squid. * Click here for LWN Report on squid security problem Date: May 09, 2001 Platform: EnGarde Reports On: glibc vulnerability Report From: Linux Daily News * Release Note: The EnGarde Secure Linux distribution reports on a libc local vulnerability and has an upgraded version of libc available to fix the problem. * Click here for LWN Security Report on glibc vulnerability Date: May 08, 2001 Platform: Turbolinux Updates To: ncurses Report From: Linux Daily News * Release Note: Turbolinux has issued an update to ncurses fixing the buffer overflow problem that most distributions dealt with back in October, 2000. * Click here for LWN Security Update To ncurses Date: May 08, 2001 Platform: Debian Project Updates To: man-db and gftp Report From: Linux Daily News * Release Note: The Debian Project has an update to man-db fixing a symlink vulnerability there. Also from Debian is this update to gftp which fixes a format string vulnerability. * Click here for LWN Security Update To man-db * Click here for LWN Security Update To gftp Date: May 08, 2001 Platform: MandrakeSoft Updates To: pine Report From: Linux Daily News * Release Note: MandrakeSoft has put out an update to pine, which also has a symlink vulnerability. * Click here for LWN Security Update To pine Date: May 08, 2001 Platform: Turbolinux Updates To: ed Report From: Linux Daily News * Release Note: Turbolinux has issued a security advisory for the ed package. Ed creates temporary files insecurely. If you have TL 6.1 WorkStation, or Turbolinux versions 6.0.5 and earlier, you should update your package. * Click here for LWN Security Update To ed package Date: May 08, 2001 Platform: Debian Updates To: Zope Report From: Linux Daily News * Release Note: The Debian Project has issued a security update to Zope fixing the recently-reported zclass vulnerability. * Click here for LWN Security Update To Zope * Click here for reported zclass vulnerability Date: May 08, 2001 Platform: Debian Updates To: cron Report From: Linux Daily News * Release Note: Debian has issued a security advisory for the cron package. Local root exploits are possible in older versions. This has been fixed in version 3.0pl1-57.3 (or 3.0pl1-67 for unstable). No exploits are known to exist, but it is recommended that you upgrade your cron packages immediately. * Click here for LWN Security Update To cron package Date: May 05, 2001 Platform: Linux-Mandrake Updates To: gnupg 1.0.5 and kdelibs 2.1.2 packages Report From: Linux Daily News * Release Note: Linux-Mandrake has issued gnupg 1.0.5 packages, which include fixes for multiple security issues. Check the gnupg 1.0.5 announcment for more details. Also from Linux-Mandrake come new kdelibs 2.1.2 packages, fixing a temporary file link vulnerability there. * Click here for LWN Security Update To gnupg 1.0.5 * Click here for gnupg.org's Whats New File * Click here for LWN Security Update To kdelibs 2.1.2 Date: May 05, 2001 Platform: Turbolinux Updates To: glibc package Report From: Linux Daily News * Release Note: Turbolinux has issued updated glibc packages which update them to glibc-2.1.3-33. * Click here for LWN Security Update To glibc Date: May 05, 2001 Platform: SuSE Updates To: sgmltool package Report From: Linux Daily News * Release Note: SuSE has issued updated sgmltool packages, fixing a temporary file link problem in an underlying SGML perl script. * Click here for LWN Security Update To sgmltool Date: May 02, 2001 Platform: Immunix Updates To: GnuPG Report From: Linux Daily News * Release Note: Wirex has issued an Immunix security update to GnuPG fixing a number of security problems in that package. * Click here for LWN Security Update To GnuPG Date: May 01, 2001 Platform: Misc Versions of Linux / Unix Update About: Network Scanning and Probing Activity at Ports 515 and 111 Report From: National Infrastructure Protection Center (NIPC) * Release Note: "Significant Increase in Unix-based Network Scanning and Probing Activity at Ports 515 and 111 Directed at lpd/LPRng and RPC Services" * Click here for NIPC Alert 01-010 Date: May 01, 2001 Platform: Red Hat Updates To: kdelibs Report From: Linux Daily News * Release Note: Red Hat has issued a security update to kdelibs fixing a temporary file vulnerability in that package. * Click here for LWN Security Update To kdelibs Date: May 01, 2001 Platform: Immunix Updates To: gftp Report From: Linux Daily News * Release Note: Here's an update for gftp from Immunix. * Click here for LWN Security Update To gftp Top of Page Miscellaneous Date: May 31, 2001 Platform: Misc Warning About: Reminder: SULFNBK.EXE is a Virus HOAX! Report From: Kaspersky Lab * Release Note: As Kaspersky Lab reported earlier last week, the virus hoax SULFNBK has been making the rounds as also witnessed by other anti-virus developers sending out a warning beacon. It is necessary to convince users that this type of virus does not actually exist, and we classify this as a VIRUS HOAX. * Click here for Reminder: SULFNBK.EXE is a Virus HOAX! Date: May 30, 2001 Platform: SourceForge Site Users Security Post: SourceForge Server Compromised In Attack Report From: Infowar.Com * Release Note: Open-source software development site SourceForge.net is warning many of its users to change their passwords following an attack early last week in which intruders compromised one of the site's servers. * Click here for Bug Report on SourceForge Server Compromise Date: May 30, 2001 Platform: MS Windows and Misc Mail users Warning About: VBS.Nasara.A@mm Worm Aliases: VBS/NastySarah@m Report From: Norton / Symantec Security Updates * Release Note: VBS.Nasara.A@mm is a mass-mailing worm that uses MAPI applications, Microsoft Outlook, or Internet Information Server (IIS) to spread. It also modifies the Autoexec.bat file to delete the contents of drive C. Name of attachment: NastySarah.jpg.vbs If the worm cannot find any of these programs, it displays following message and quits: Hey! Haven't you heard! There's a VBS worm spreading by this very filename! You're lucky you didn't get hit! Forward this warning on to all of your contacts, so they won't get hit by the bug! If the worm does find one of these programs, it deletes any email message that includes the word "NASTYSARAH" in the subject or message. It then spreads by automatically replying to messages that you received previously. * Click here for Report on VBS.Nasara.A@mm Date: May 30, 2001 Platform: Sun Solaris 8.0 Warning About: Solaris mailtool Buffer Overflow Vulnerability Report From: Security Focus * Release Note: The mailtool program included with OpenWindows in Solaris, contains a buffer overflow vulnerability which may allow local users to execute arbitrary code/commands with group 'mail' privileges. * Click here for Advisory 2787 Date: May 30, 2001 Platform: Misc versions of TWIG Warning About: TWIG Webmail SQL Query Modification Vulnerability Report From: Security Focus * Release Note: TWIG Webmail contains a vulnerability which may allow for users to modify SQL queries. These modified queries may then perform unauthorized operations. * Click here for Advisory 2791 Date: May 30, 2001 Platform: Cosmicperl Directory Pro 2.0 Warning About: Directory Pro Arbitrary File Disclosure Vulnerability Report From: Security Focus * Release Note: Webdirectory Pro is a web application used to create a searchable directory of links developed by Cosmicperl. Webdirectory Pro contains an input validation vulnerability which may lead to disclosure of sensitive information to attackers. * Click here for Advisory 2793 Date: May 28, 2001 Platform: Cisco IOS software version 12.1(2)T and 12.1(3)T: limited deployment of these releases. Warning About: Cisco IOS Reload after Scanning Vulnerability Report From: CIAC Bulletins * Release Note: Security Scanning software can trigger a memory error in Cisco IOS Software, causing unexpected reload of the router. Damage: Denial of service. Solution: Upgrade to unvulnerable versions as soon as possible. * Click here for Bulletin Number L-088 Date: May 24, 2001 Platform: Cisco 600 series routers (CBOS Software) Warning About: Cisco Multiple Vulnerabilities in CBOS Report From: CIAC Bulletins * Release Note: Problems are several: TCP Sequence Prediction, echo request denial of service vulnerabilities, NVRAM password stored cleartext. Solution: Upgrade to releases not vulnerable, as described in bulletin. * Click here for Bulletin Number L-086 Date: May 22, 2001 Platform: CSS 11000 series switches Warning About: Cisco Content Service Switch FTP Vulnerability Report From: CIAC Bulletins * Release Note: Any user with a valid account can read or write any file on the system. Users can gain unauthorized access to data. Solution: Apply software upgrades as noted in bulletin. * Click here for Bulletin Number L-085 Date: May 20, 2001 Platform: Misc Warning About: Eurosol Trojan Report From: Kaspersky Lab * Release Note: This Trojan steals a users personal account information from the international finance system "WebMoney." * Click here for KLabs Virus Alert on Eurosol Trojan Date: May 16, 2001 Platform: Configurations including BGP4 Prefix Filtering with Inbound Route Maps are vulnerable. This may include certain Cisco devices and Cisco routers. Warning About: Cisco IOS BGP Attribute Corruption Vulnerability Report From: CIAC Bulletins * Release Note: A memory corruption issue can cause the Network Layer Reachability Information (NLRI) and attributes within some Border Gateway Protocol (BGP) UPDATEs to be inaccurate therefore causing failure. Solution: Upgrade the affected Cisco device software. There is no known workaround. * Click here for Bulletin Number L-082 Date: May 14, 2001 Platform: IRIX 6.5.5 through IRIX 6.5.8 are vulnerable Warning About: SGI IRIX rpc.espd Buffer Overflow Report From: CIAC Bulletins * Release Note: An exploitable buffer overflow has been discovered in the Embedded Support Partner (ESP) daemon rpc.espd. Apply the patches described in bulletin. * Click here for Bulletin Number L-080 Date: May 14, 2001 Platform: Misc Hoax Report: Follow Links below Report From: F-Secure Hoax information * Release Note: F-Secure asks that you please ignore these messages and don't spread them any further. There was quite a list for today. Here is the list. * Pay-at-the-pump gas station incident HOAX * Bill 602P HOAX * Money Transfer HOAX * Champagne Lovers chain letter HOAX * Gas Out chain letter HOAX * NEWYORK BIG DIRT and THE FUCKER message HOAX * Cancer chain letter HOAX * Sulfnbk.exe virus HOAX Date: May 11, 2001 * Revised Platform: Systems running unpatched versions of Microsoft IIS Systems running unpatched versions of Solaris up to, and including, Solaris 7 (Sun Microsystems) Warning About: sadmind/IIS Worm Aliases: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm, Worm.PoizonBox, Backdoor.Sadmind (NAV), Sadmin-iis (Panda), Unix/Sadmind (Sophos) Variant: Sadmind.A Report From: CERT, F-Secure, Network Associates and Symantec * CERT Release Note: Revised Advisory * F-Secure Release Note: Sadmind is a worm, that propagates from a Sun Solaris machine to another. It also compromises Windows NT/2000 servers running Internet Information Server 4.0 or 5.0. * NAI Release Note: It uses the PERL/WSFT-Exploit trojan in order to attack unpatched Microsoft IIS Web Servers. * Click here for Revised CERT CA-2001-11 * Click here for F-Secure Report on Sadmind * Click here for NAI Report on Solaris/Sadmind.worm * Click here for Symantec Report on Backdoor.Sadmind Date: May 11, 2001 Platform: Misc Warning About: W32.Efortune.31384@mm Virus Aliases: W32/Roach@MM Report From: Norton / Symantec Security Updates * Release Note: W32.Efortune.31384@mm is a polymorphically encrypted massmailer with backdoor capabilities by IRC. * Click here for Report on W32.Efortune.31384@mm Date: May 11, 2001 Platform: Misc Hoax Report: SULFNBK HOAX Report From: Network Associates * Release Note: Network Associates has released a report on a hoax that says "McAfee AVERT Labs would like to inform you of a new email HOAX." NAI says this email message is just a HOAX. Although, the SULFNBK.EXE file may become infected by a number of valid viruses, the details of this message are not based on actual events. * Click here for NAI Report on SULFNBK Hoax Date: May 08, 2001 Platform: Networks Advisory: Ongoing DDoS Disruption Attempts Report From: NIPC * Release Note: The NIPC has received reliable information indicating ongoing attempts to disrupt web access to several sites. The activity has been seen from several networks, and consists entirely of fragmented large UDP packets directed at port 80. * Click here for NIPC Advisory 01-012 * Click here for Infowar.com Report on DDoS attacks Date: May 08, 2001 Platform: Systems running unpatched versions of Microsoft IIS Systems running unpatched versions of Solaris up to, and including, Solaris 7 (Sun Microsystems) Warning About: sadmind/IIS Worm Report From: CERT * Release Note: The CERT/CC has received reports of a new piece of self-propagating malicious code (referred to here as the sadmind/IIS worm). The worm uses two well-known vulnerabilities to compromise systems and deface web pages. * Click here for CERT CA-2001-11 Date: May 03, 2001 Platform: Dell Computers (Inspiron 5000 / 5000e consumer notebooks) Warning About: Flaming Batteries Cause Dell Recall Woe Report From: VNUNet Bugs and Fixes Department * Release Note: Dell warned that "the batteries are subject to overcharge, potentially causing them to overheat, release smoke and possibly catch fire". * Click here for VNUNet report on Dell Battery Recall Date: May 02, 2001 Platform: a) Systems using TCP stacks which have not incorporated RFC1948 or equivalent improvements b) Systems not using cryptographically-secure network protocols like IPSec Warning About: Statistical Weaknesses in TCP/IP Initial Sequence Numbers Report From: CERT Advisory * Release Note: A new vulnerability has been identified which is present when using random increments to constantly increase TCP ISN values over time. * Click here for CERT CA-2001-09 Top of Page Back to the Virus Archives page