Virus Warnings from June 2001
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: June 24, 2001
Platform: Amiga
Alert About: Linkvirus Found (no name yet)
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: Virus Help Denmark reports they received a new virus, and
it is very tricky. Jan Erik Olausen, the programmer of VirusExecutor &
xvs.library, has decoded the virus, and is working on it right now.
There is "NO" cure for this virus right now.
* Click here for VHT-DK Virus Warning vht-dk102
* Subscribe online to the VHT-DK Virus Warnings Announcement list.
Date: June 10, 2001
Platform: Amiga
Update About: Bobek-2 Linkvirus Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: Virus Help Denmark reports "What we think is the
installer of the new linkvirus 'Bobek2' has been found. It was on
Aminet but has been removed now. But there just might be a few more
installers our there, so take care. Right now that is no cure for the
'Bobek2' virus."
* Click here for VHT-DK Virus Warning vht-dk101 Read Me
* Subscribe online to the VHT-DK Virus Warnings Announcement list.
Top of Page
Windows
Date: June 27, 2001
Platform: Microsoft
Warning About: Microsoft LDAP over SSL Password Vulnerability
Report From: CIAC Bulletins
* Release Note: An LDAP function fails to check the permissions of a
requestor when the directory principal=domain user and data
attribute=domain password. Solution: Apply the patch prescribed by
Microsoft.
* Click here for Bulletin Number L-101
Date: June 27, 2001
Platform: Microsoft Windows
Warning About: Perception LiteServe Script Source Code
Disclosure Vulnerability
Report From: Security Focus
* Release Note: Perception LiteServe is a commercial e-mail, web, and
FTP server for Microsoft Windows. Perception LiteServe's webserver
is subject to a vulnerability which will display the source code for
arbitrary CGI scripts to remote attackers.
* Click here for Advisory No. 2926
Date: June 27, 2001
Platform: Microsoft Windows (but not on WinNT/2000)
Warning About: W95/Linong@MM Virus
Aliases: W32.Liong (NAV)
Report From: Network Associates
* Release Note: This is a 32-bit mass-mailing worm which, when run,
sends itself to all recipients found in the Microsoft Outlook Address
Book. Removal Instructions are in the report.
* Click here for Report on W95/Linong@MM
Date: June 27, 2001
Platform: PC
Warning About: VBS/LoveLetter.cq@MM Virus
Aliases: VBS.LoveLetter.CQ (NAV)
Report From: Network Associates
* Release Note: Executing this VBScript worm copies files to your system,
and uses it to connect to other machines on the Internet to spread the
virus. Removal Instructions are in the report.
* Click here for Report on VBS/LoveLetter.cq@MM
Date: June 26, 2001
Platform: Microsoft
Advisory: New Scanning Activity (with W32-Leaves.worm)
Exploiting SubSeven Victims
Report From: NIPC Advisory
* Release Note: The NIPC and FedCIRC have recently received information
on attempts to locate, obtain control of and plant new malicious code
known as "W32-Leaves.worm" on computers previously infected with the
SubSeven Trojan. This new activity, currently under investigation,
further increases the importance that all users of Microsoft operating
systems take precautions against infection by SubSeven Trojan variants,
and, if infected, promptly implement the known procedures to remove the
SubSeven infection.
* Click here for NIPC Advisory 01-014
Date: June 26, 2001
Platform: PC
Report From: F-Secure
* Click here for Virus Report on Leave
Aliases: I-Worm.Leave, W32.Leave.Worm
Release Note: Leave is a Win32 worm that reportedly has backdoor
capabilities or utilizes them from SubSeven backdoor. The worm
reportedly spreads through e-mail and IRC servers.
Report From: Network Associates
* Click here for NAI Report on W32/Leave.worm
Date: June 26, 2001
Platform: RAD installed on IIS 4.0 or IIS 5.0 web servers
Warning About: FrontPage Sub-Component Vulnerability
Report From: CIAC Bulletins
* Release Note: Microsoft's Visual Studio Remote Application Deployment
(RAD) Support has a buffer overflow vulnerability. An attacker could
use the vulnerability to load and execute artibrary code on the server
Solution: Remove RAD from the server, or apply the patch as directed.
* Click here for Bulletin Number L-100
Date: June 26, 2001
Platform: Microsoft Windows 2000
Patch Available: Function Exposed via LDAP over SSL Could Enable
Passwords to be Changed
Report From: MicroSoft TechNet Security
* Release Note: An attacker could change another users password for
either of two purposes Recommendation: Customers who currently provide
LDAP over SSL sessions should apply the patch immediately.
* Click here for MS Security Bulletin MS01-036
Date: June 26, 2001
Platform: Microsoft
Patch Available: FrontPage Server Extension Sub-Component Contains
Unchecked Buffer
Report From: MicroSoft TechNet Security
* Release Note: An attacker could exploit this vulnerability against any
server with this sub-component installed by establishing a web session
on with the server and passing a specially malformed packet to the
server component. Recommendation: Customers who have installed Visual
Studio RAD Support should install the patch.
* Click here for MS Security Bulletin MS01-035
Date: June 26, 2001
Platform: Microsoft
Patch Available: Malformed Word Document Could Enable Macro
to Run Automatically
Report From: MicroSoft TechNet Security
* Release Note: A vulnerability results because it is possible to modify
a Word document in such a way as to prevent the security scanner from
recognizing an embedded macro while still allowing it to execute.
Recommendation: Customers using affected versions of Word should
apply the patch immediately.
* Click here for MS Security Bulletin MS01-034
Date: June 26, 2001
Platform: Windows
Report From: Security Focus
Warning About: Cerberus FTP Server Buffer Overflow DoS Vulnerability
Report From: Security Focus
Release Note: There is a buffer overflow in Cerberus FTP Server. This
vulnerability does not require any user authentication to exploit. It
may be possible for remote users to cause a denial of service or execute
arbitrary code on target hosts.
* Click here for Advisory No. 2901
Date: June 26, 2001
Platform: Windows
Warning About: Arcadia Internet Store Arbitrary File
Disclosure Vulnerability
Report From: Security Focus
Release Note: One of the components of this package, 'tradecli.dll',
allows users to specify a template file. As a result, remote users can
specify an arbitrary file on the same drive as the webserver by
'traversing' outside of the web root directory. This vulnerability may
disclose sensitive information to attackers.
* Click here for Advisory No. 2902
Date: June 26, 2001
Platform: Windows
Warning About: Arcadia Internet Store Show Path Vulnerability
Report From: Security Focus
Release Note: One of the components of this package, 'tradecli.dll',
allows users to specify a template file, the contents of which will be
output. If the requested file does not exist, the error message will
contain the absolute path of the application on the webserver. This
information may assist in further attacks.
* Click here for Advisory No. 2904
Date: June 26, 2001
Platform: Windows
Warning About: Arcadia Internet Store Denial of Service Vulnerability
Report From: Security Focus
Release Note: 1C: Arcadia Internet Store is a online shopping utility
for MS Windows NT/2000. Remote attackers can request dos devices, such as
'con', 'com1', 'com2', etc. When 'tradecli.dll' attempts to open these
files a denial of service may occur.
* Click here for Advisory No. 2905
Date: June 26, 2001
Platform: Windows
Warning About: MS Visual Studio RAD Support Buffer
Overflow Vulnerability
Report From: Security Focus
Release Note: Due to an unchecked buffer in a subcomponent of FrontPage
Server Extensions, a specially crafted request could allow a user to
execute arbitrary commands on a host running IIS 5.0 and IIS 4.0.
* Click here for Advisory No. 2906
Date: June 26, 2001
Platform: Windows
Warning About: Trend Micro InterScan WebManager RegGo.dll
Buffer Overflow Vulnerability
Report From: Security Focus
Release Note: A remotely exploitable buffer overflow exists in
RegGo.dll. This may lead to compromise of hosts running vulnerable
versions of WebManager.
* Click here for Advisory No. 2907
Date: June 26, 2001
Platform: Windows
Warning About: Microsoft IIS Unicode .asp Source Code
Disclosure Vulnerability
Report From: Security Focus
Release Note: A flaw exists in the handling of .asp requests.
* Click here for Advisory No. 2909
Date: June 26, 2001
Platform: Microsoft
Report From: Norton / Symantec Security Updates
* Click here for Report on W32.Leave.Worm
Release Note: This worm downloads components from Web sites and
contains code to accept commands from IRC.
* Click here for Report on SennaSpy Generator
Aliases: Constructor.SennaSpy.2001
Release Note: This is the Senna Spy Trojan Generator. It allows a user to
create variants of the Senna Spy Trojan horse.
* Click here for Report on W95.BlueCorners.2049
Release Note: This virus is a fairly simple fast infector. It will
infect only Windows 9x computers, and it will fail if run on Windows
NT computer. This virus carries a non-destructive payload that is
activated on specific dates.
* Click here for Report on PWSteal.Trojan.D
Release Note: PWSteal.Trojan.D is a Trojan that attempts to steal login
names and passwords. These passwords are sent to an anonymous email
address.
* Click here for Report on W97M.NSI.E
Aliases: W97M.NSI, W97M/Nsi.e
Release Note: This is a simple Microsoft Word macro virus that infects
Normal.dot and other open documents when you open an infected document
Date: June 21, 2001
Platform: PC
Warning About: Malicious Code in RTF Files
Report From: Kaspersky Lab
* Release Note: A Trojan program penetrates computers when reading RTF
files, and warns users about the discovery of the Trojan "Goga" that
steals and sends out from infected computers user details for Internet
access...
* Click here for Virus Alert on RTF Files
Date: June 21, 2001
Platform: MS Windows NT 4.0 with IIS 4.0 or IIS 5.0 enabled,
MS Windows 2000 and Beta versions of Microsoft Windows XP
Warning About: Buffer Overflow In IIS Indexing Service DLL
Report From: CERT
* Release Note: This vulnerability allows a remote intruder to run
arbitrary code on the victim machine.
* Click here for CERT CA-2001-13
Date: June 21, 2001
Platform: PC
Report From: CIAC Bulletins
Warning About: Microsoft Exchange Server Outlook Web Access Flaw
* Click here for Bulletin Number L-091
Warning About: Microsoft Predictable Name Pipes In Telnet
* Click here for Bulletin Number L-092
Warning About: BIND Inadvertent Local Exposure of HMAC-MD5 (TSIG) Keys
* Click here for Bulletin Number L-094
Warning About: Microsoft SQL Query Method Vulnerability
* Click here for Bulletin Number L--095
Warning About: Microsoft Index Server ISAPI Extension Buffer Overflow
* Click here for Bulletin Number L-098
Date: June 21, 2001
Platform: PC
Report From: F-Secure
* Click here for Report on Choke
Aliases: I-Worm.Choke, Win32.Choke, w32/Choke
Release Note: Choke is a worm that utilises MSN Messenger for
spreading. It sends itself using filenames like
'ShootPresidentBUSH.exe', 'choke.exe' and
'George.W.Bush@whitehouse.gov' as username.
* Click here for Report on NewsFlood
Aliases: Win32/NewsFlood.7168.A, Trojan.Win32.NewsFlood
Release Note: Newsflood is a trojan with the purpose of posting vast
amount of messages to certain usenet groups.
* Click here for Report on Lamerman
Release Note: F-Secure Anti-Virus had a false alarm on this virus on
June 15th, 2001. As a result, F-Secure Anti-Virus might have detected
"Lamerman.512.c" in master boot record or in file SUHDLOG.DAT on some
systems.
* Click here for Report on SHS
Aliases: Scrap Object Files, SHB
Release Note: There is no virus by this name. However, files with the
.SHS or .SHB extension can be used as trojans within Windows. If you
receive a file with the .SHS or .SHB extension via web or e-mail, do
not execute (double-click) it.
* Click here for Report on Gogga
Aliases: Trojan.PSW.Goga, Goga
Release Note: Goga is a trojan that is executed from a malicious Rich
Text Formatted (.rtf) document. Due a security vulnerability, macros
are able to execute from a template pointed by a RTF file without
notification to the user in Microsoft Word.
* Click here for Report on SUHDLOG.DAT
Release Note: There is no virus by this name. However, we occasionally
get queries about this file. SUHDLOG.DAT is created to the root
directory of drive C: during the setup of Windows.
* Click here for Report on Hadra
Aliases: I-Worm.Hydra
Release Note: This is Internet worm spreading with emails being
attached as EXE file.
Date: June 21, 2001
Platform: PC
Report From: MicroSoft TechNet Security
Patch Available: Unchecked Buffer in Index Server ISAPI Extension
Could Enable Web Server Compromise
* Click here for MS Security Bulletin MS01-033
Date: June 21, 2001
Platform: PC
Report From: MicroSoft TechNet Security
Patch Available: SQL Query Method Enables Cached Administrator
Connection to be Reused
* Click here for MS Security Bulletin MS01-032
Date: June 21, 2001
Platform: PC
Report From: Network Associates
* Click here for Report on Backdoor-QR
This is a remote access and keylogger trojan. When run, TCP/IP ports
12973, and 12975 are opened to allow an attacker to connect to your
system.
* Click here for Report on Backdoor-QO
This is a remote access trojan program. It is a UPX packed Delphi
executable. When run it acts as an FTP server, opening port 3332 on the
local machine.
* Click here for Report on Backdoor-QN
Aliases: Backdoor.Belio081 (AVX)
This threat is currently detected heuristically as New Backdoor.
This is a remote access trojan and IRC Bot.
* Click here for Report on DUNpws.ik
Aliases: DUNpws.ik.dr, Gogga (F-Secure) and W97M/Goga
This trojan has three parts. An .RTF document, a remote .DOT template,
and an application.
* Click here for Report on W32/Storm.worm
This worm arrives as a self-extracting ARJ archive 3342142 bytes long.
The archive contains a copy of a Java environment, plus several .CLA
files which perform the main worm functions.
* Click here for Report on W32/Hadra@M
Aliases: Hadra (F-Secure), I-Worm.Hydra (AVP), W32.Hyd@mm (NAV)
Win32.Hydra.12249 (CA)
This mailing worm sends itself to mail recipients when ordinary mail
is sent out via Microsoft Outlook.
Date: June 21, 2001
Platform: PC
Report From: Norton / Symantec Security Updates
Release Note: Read the complete report for Removal Instructions and
how to Restore Files if applicapable.
* Click here for Report on W97M.Gogaru.A
This is a macro which is coded to drop a password stealer Trojan onto
the victim's system, after first having been downloaded from an
Internet web address via an .RTF document.
* Click here for Report on VBS.Kidarcade.F
VBS.Kidarcade.F is a virus based on Visual Basic Script (VBS). It has
been put into an HTML page, and is on at least one Web site. The virus
installs a Backdoor Trojan that allows unauthorized access to the
infected computer.
* Click here for Report on IRC.Whacked.Worm
IRC.Whacked.Worm uses IRC to spread. Infected systems can be monitored
and manipulated to launch any file without your permission.
Date: June 08, 2001
Platform: MS Windows
Warning About: W32/Themba Virus
Aliases: W32.HLLP.Thembe (NAV)
Report From: Network Associates
* Release Note: This is an appending virus written in Visual Basic. When
run, it infects all files in the current directory that contain the
.EXE extension and other .EXE files that are run while an infected
program is in loaded into memory.
* Click here for Report on W32/Themba
Date: June 08, 2001
Platform: MS Windows 2000 Telnet service
Patch Available: Predictable Name Pipes Could Enable Privilege
Elevation via Telnet
Report From: MicroSoft TechNet Security
* Release Note: Impact of vulnerability: Privilege elevation, denial of
service, information disclosure. Recommendation: System owners using
the Telnet service should consider applying the patch.
* Click here for MS Security Bulletin MS01-031
Date: June 07, 2001
Platform: Microsoft Exchange 2000 Server Outlook Web Access
Patch Available: Incorrect Attachment Handling in Exchange 2000
OWA Can Execute Script
Report From: MicroSoft TechNet Security
* Release Note: Impact of vulnerability: Run code of attackers choice.
Recommendation: Customers with OWA implementations should install the
patch immediately.
* Click here for MS Security Bulletin MS01-030
Date: June 07, 2001
Platform: MS Windows
Warning About: W32/Choke.worm Virus
Aliases: I-Worm.Choke (AVP), Win32.Choke (CA)
Report From: Network Associates
* Release Note: This is the second known worm that spreads via MS's MSN
Messenger program. If MSN Messenger is not installed on the local
system, the worm will install itself, but fail to spread to others
from that system.
* Click here for NAI Report on W32/Choke.worm
Date: June 07, 2001
Platform: MS Windows
Warning About: MsWorld Worm
Aliases: I-Worm.MsWorld, W32/MWrld-mm, W32/MissWorld-mm
W32/MsWorld@MM
Report From: Kaspersky Lab, F-Secure, Network Associates and Symantec
* Release Note: MsWorld is written in Visual Basic programming language
with embedded Macromedia Flash modules. The worm spreads in attached
files via e-mail by using the widely-used MS Outlook e-mail program.
It initiates a mass mailing routine, modifies a .BAT, and then formats
all system disks. "MsWorld" also tries to delete the Windows system
registry files.
* Click here for Kaspersky Lab Report on MsWorld
* Click here for F-Secure Report on MissWorld
* Click here for NAI Report on W32/MsWorld@MM
* Click here for Symantec Report on W32.MsWorld@mm
Date: June 07, 2001
Platform: MS Windows
Warning About: LoveLetter.BE
Aliases: VBS/LoveLetter.BE@mm
Report From: F-Secure
* Release Note: This variant spreads in a message with the following
content:
Subject: fwd: Joke
Attachment: Joke.vbs
VBS/LoveLetter.BE@mm is quite similar with the original VBS/LoveLetter.A
This variant saves itself to the Windows System directory as "Jokes.vbs"
and "Jokes.htm".
* Click here for F-Secure Report on LoveLetter.BE
* Click here for info on original VBS/LoveLetter.A
Date: June 07, 2001
Platform: MS Windows
Warning About: DoS.Storm.Worm
Report From: Norton / Symantec Security Updates
* Release Note: DoS.Storm.Worm is a worm that seeks out MS Internet
Information Services (IIS) systems that have not applied the proper
security patches. Any such systems that it finds are then infected
with the worm. The payload of this worm performs a denial of service
attack on http://www.microsoft.com and an email bombing session is
started that sends email messages containing an obscene message to
gates@microsoft.com.
* Click here for Report on DoS.Storm.Worm
Date: June 05, 2001
Platform: MS Windows
Warning About: SPAM/Absolut
Report From: Network Associates
* Release Note: This is an email/chat SPAM tool used by someone to send
a message or messages to a large number of email addresses or AOL chat
rooms.
* Click here for Report on SPAM/Absolut
Date: June 02, 2001 * Updated
Platform: MS Windows
Hoax Alert: Updated: SULFNBK.EXE Warning HOAX
Report From: Symantec Security HOAX Updates
* Release Note: The file that is mentioned in the hoax, Sulfnbk.exe, is a
Microsoft Windows utility. The virus/worm W32.Magistr.24876@mm can
arrive as an attachment named Sulfnbk.exe. The Sulfnbk.exe file used by
Windows is located in the C:\Windows\Command folder. If the file is
located in any other folder, or arrives as an attachment to a email
message, then it is possible that the file is infected.
* Updated HOAX Report: How to restore the Sulfnbk.exe file
Date: June 02, 2001 * Updated
Platform: MS Windows
Warning About: VBS.Loveletter.CN@mm Virus
Aliases: VBS.Loveletter.CM@mm (AVX), VBS.Lopez.A@mm,
JENNIFERLOPEZ_NAKED.JPG.vbs
Report From: Norton / Symantec Security Updates
* Release Note: This is a minor variant of the LoveLetter virus family.
This virus may arrive in the following format by email:
Subject: Where are you?
Body: This is my pic in the beach!
Attachment: JENNIFERLOPEZ_NAKED.JPG.vbs
This virus also drops the file Cih_14.exe, which is a dropper for the
CIH virus, and attempts to run it. Read the complete report for Removal
Instructions and Additional Information if you are using Norton
AntiVirus 2001.
* Click here for Report on VBS.Loveletter.CN@mm
Date: June 02, 2001
Platform: MS Windows
Warning About: VBS.SystemColor.A Trojan Horse
Report From: Norton / Symantec Security Updates
* Release Note: VBS.SystemColor.A is a Trojan horse that is written in
Visual Basic Script. Once it is executed, it copies itself to
C:\Windows\Filemon.exe. It then starts to repeatedly copy Explorer.exe
as C:\Windows\System\Systemcolor\Color.. As a result, the computer may
run out of space on the hard disk and stop responding. You may not be
able to run Windows. Read the complete report for Removal Instructions.
* Click here for Report on VBS.SystemColor.A
Date: June 02, 2001
Platform: MS Windows
Warning About: IRC.Cuty Trojan Horse, Worm
Aliases: Elspy.a.worm
Report From: Norton / Symantec Security Updates
* Release Note: This is a IRC worm that does not send itself to others.
It only sends the CuteJany.doc file to IRC users. This worm is an
encrypted DOS executable file. When it is executed it decrypts itself.
It then creates the Cutyjant.bat file in the same folder as the worm,
and executes it. Read the complete report for Removal Instructions.
* Click here for Report on IRC.Cuty
Date: June 02, 2001
Platform: MS Windows
Warning About: VBS.NoMercy.A Virus
Aliases: VBS/NoMercy.a, VBS.NMVT
Report From: Norton / Symantec Security Updates
* Release Note: VBS.NoMercy.A is a Visual Basic script in an HTML file.
The virus infects .html, .htm, .shtml, .stm, and .asp files. Read the
complete report for Removal Instructions.
* Click here for Report on VBS.NoMercy.A
Date: June 02, 2001
Platform: MS Windows
Warning About: VBS.Sargo.A@mm.int Virus
Aliases: VBS.Nasara.A@mm, VBS/NastySarah@m
Report From: Norton / Symantec Security Updates
* Release Note: VBS.Sargo.A@mm.int is an intended virus, coded to run as
a mass-mailing worm that uses MAPI applications, Microsoft Outlook, or
Internet Information Server (IIS) to spread. It also attempts to modify
the Autoexec.bat file to delete the contents of drive C. Read the
complete report for Removal Instructions.
* Click here for Report on VBS.Sargo.A@mm.int
Date: June 02, 2001
Platform: MS Windows
Warning About: W32.Update.Worm Worm
Aliases: I-Worm.Mustard, W32.Mustard
Report From: Norton / Symantec Security Updates
* Release Note: W32.Update.Worm is a simple mass-mailing worm that can
spread using MS Outlook. The worm is written in a high-level language.
However, for the email spreading, the worm creates and executes a VBS
script. This worm also can also spread using mIRC. This worm may also
attempt to disable Norton AntiVirus. Read the complete report for
Removal Instructions.
* Click here for Report on W32.Update.Worm
Date: June 02, 2001
Platform: MS Windows
Warning About: W97M.Quest.A Virus
Report From: Norton / Symantec Security Updates
* Release Note: W97M.Quest.A is a macro virus that infects active MS Word
documents and the Normal.dot template. Read the complete report for
Removal Instructions.
* Click here for Report on W97M.Quest.A
Date: June 02, 2001 * Updated
Platform: MS Windows
Warning About: Noped Worm
Variant: Noped.A
Report From: F-Secure
* Release Note: VBS/Noped is encrypted and polymorphic worm written in
Visual Basic Script. This worm arrives is a messages saying they want
to end illegal child porn. It comes with an attachment. The worm also
changes the Internet Explorer title bar text to:
|.,.-*^*-.,.\ FUAHACKEDU@888.NU /.,.-*^*-.,.|
Next the worm sends itself to random recipients in the Outlook address
book. It also collects a list of files with extension ".jpg" or ".jpeg"
and sends this list to several fixed email addresses.
* Click here for Report on Noped
Date: June 02, 2001
Platform: MS Windows
Warning About: Bionet Backdoor
Aliases: Backdoor.Bionet
Report From: F-Secure
* Release Note: Bionet is a backdoor - hacker's remote access tool. It's
not so advanced as Sub7 or BackOrifice or Netbus backdoors. It consists
of server and client parts. To perform disinfection it is enough to
delete the server part of this backdoor from a system. It's better to
do it from pure DOS.
* Click here for Report on Bionet
Top of Page
Macintosh
Date: June 08, 2001
Platform: Macintosh
Warning About: MacSimpsons@mm AppleScript Virus
Report From: Norton / Symantec Security Updates
* Release Note: SARC has become aware of a new AppleScript worm
targetting the Macintosh platform called MacSimpsons@mm. It appears
to open Outlook Express or Entourage and send a copy of itself with
the original message to everyone in the user's address book. The
title of the script is "Simpsons Episodes". This virus does not appear
to be particularly malicious. Read the complete report for Removal
Instructions.
* Click here for Report on MacSimpsons@mm
Top of Page
Linux
Date: June 27, 2001
Platform: Red Hat
Updates To: samba
Report From: Linux Daily News
* Release Note: Red Hat has posted their update for the samba security
problems noted late last week.
* Click here for LWN Security Update To samba
Date: June 27, 2001
Platform: Caldera
Updates To: fetchmail and samba
Report From: Linux Daily News
* Release Note: Caldera has posted advisories for fetchmail, to address
the long header field problem, and samba, to address file overwrite
issues that could allow remote compromises.
* Click here for LWN Security Update To fetchmail
* Click here for LWN Security Update To samba
Date: June 26, 2001
Platform: IRIX, Linux: PCP suite versions 2.1.11-5 and before
Warning About: SGI PCP Pmpost Symlink Vulnerability
Report From: CIAC Bulletins
* Release Note: The pmpost command of the Performance Co-Pilot (PCP)
suite has a symlink handling vulnerability. If this runs in root
context (i.e., setuid root), this could result in root compromise.
Solution: Apply the described workaround.
* Click here for Bulletin Number L-099
Date: June 26, 2001
Platform: Red Hat
Updates To: XFree86
Report From: Linux Daily News
* Release Note: Red Hat has posted an update for the XFree86 packages in
their various distributions. This update addresses various security
issues as well as provides new and updated drivers.
* Click here for LWN Security Update To XFree86
Date: June 26, 2001
Platform: Samba
Updates To: Samba Security Fix
Report From: Linux Daily News
* Release Note: The Samba team has released patches for the macro
exploit.
* Click here for Samba Released Patches
Date: June 26, 2001
Platform: Conectiva
Updates To: Security Announcement for Samba
Report From: Linux Daily News
* Release Note: Conectiva has released a security update for samba.
* Click here for Conectiva Security Update for Samba
Date: June 26, 2001
Platform: Debian
Updates To: Security Advisory for Samba
Report From: Linux Daily News
* Release Note: Debian addresses the problems with samba that were
reported earlier this week.
* Click here for Debian Security Advisory for Samba
Date: June 26, 2001
Platform: Samba
Updates To: Urgent Security Advisory
Report From: Linux Daily News
* Release Note: The Samba team has sent out an urgent security advisory
regarding a remotely-exploitable hole in all versions of the code.
There is no new Samba release yet (it's promised within 24 hours), but
the advisory does contain a configuration file workaround which may be
used to close the hole. Anybody running Samba really needs to have a
look at this one.
* Click here for Samba Urgent Security Advisory
Date: June 26, 2001
Platform: Red Hat
Updates To: kernel 2.4
Report From: Linux Daily News
* Release Note: A kernel 2.4 advisory from Red Hat addresses potential,
though not default, configurations for FTP iptables.
* Click here for LWN Security Update To kernel 2.4
Date: June 26, 2001
Platform: Caldera
Updates To: fetchmail
Report From: Linux Daily News
* Release Note: A fetchmail advisory from Caldera addresses buffer
overflows in fetchmail that could be exploited remotely by sending
exceptionally long header field data.
* Click here for LWN Security Update To fetchmail
Date: June 26, 2001
Platform: Turbolinux
Updates To: gnupg
Report From: Linux Daily News
* Release Note: Turbolinux has issued an update for the gnupg package
found in a number of versions of their Linux distributions.
* Click here for LWN Security Update To gnupg
Date: June 26, 2001
Platform: Immunix
Updates To: ispell
Report From: Linux Daily News
* Release Note: Immunix has published an advisory to update the ispell
package in their distributions.
* Click here for LWN Security Update To ispell
Date: June 26, 2001
Platform: EnGarde Secure Linux
Updates To: Apache and fetchmail-ssl packages
Report From: Linux Daily News
* Release Note: EnGarde Secure Linux has posted an advisory for both
the Apache and fetchmail-ssl packages found in their distribution.
* Click here for LWN Security Update To Apache
* Click here for LWN Security Update To fetchmail-ssl
Date: June 26, 2001
Platform: Turbolinux
Updates To: esound
Report From: Linux Daily News
* Release Note: Turbolinux has issued a security advisory for esound,
addressing problems with world writable directories.
* Click here for LWN Security Update To esound
Date: June 26, 2001
Platform: Linux
Report From: Security Focus
Warning About: cfingerd Utilities Buffer Overflow Vulnerability
Release Note: A buffer overflow in cfingerd makes it possible for a
local user to gain elevated privileges.
* Click here for Advisory No. 2914
Date: June 26, 2001
Platform: Linux
Report From: Security Focus
Warning About: CFingerD Utilities Format String Vulnerability
Release Note: cfingerd is a secure implementation of the finger daemon.
Due to insufficient validation of input, it's possible to pass arbitrary
format strings through the program, allowing an attacker to write to
arbitrary sections of memory.
* Click here for Advisory No. 2915
Date: June 26, 2001
Platform: Linux
Warning About: eXtremail Remote Format String Vulnerability
Report From: Security Focus
Release Note: eXtremail is a freeware SMTP server available for Linux
and AIX. eXtremail runs with root privileges. By exploiting this
vulnerability, remote attackers can gain superuser access on the
underlying host.
* Click here for Advisory No. 2908
Date: June 21, 2001
Platform: Red Hat
Report From: CIAC Bulletins
Warning About: Red Hat LPRng Vulnerability
* Click here for Bulletin Number L-096
Date: June 21, 2001
Platform: Linux Mandrake
Updates To: rxvt, webmin, ispell and proftpd
Report From: Linux Daily News
* Click here for LWN Security Update To rxvt
Release Note: buffer overflow can allow elevated privileges if rxvt is
setgid.
* Click here for LWN Security Update To webmin
Release Note: administrative authorization is being carried by
environment variables to system daemons.
* Click here for LWN Security Update To ispell
Release Note: use of mktemp() makes ispell vulnerable to symlink
attacks.
* Click here for LWN Security Update To proftpd
Release Note: Linux proftpd not affected by recent CERT advisory
because Linux uses glob() function that is not vulnerable.
Date: June 08, 2001
Platform: Red Hat
Updates To: gnupg
Report From: Linux Daily News
* Release Note: Red Hat chimes in with their gnupg update. This one
affects Red Hat Linux 6.2, 7.0 and 7.1 on various hardware platforms.
* Click here for LWN Security Update To gnupg
Date: June 08, 2001
Platform: Conectiva
Updates To: gnupg
Report From: Linux Daily News
* Release Note: Conectiva has chimed in with their update to address
the recent problems reported with gnupg.
* Click here for LWN Security Update To gnupg
Date: June 05, 2001
Platform: SuSE
Updates To: gnupg
Report From: Linux Daily News
* Release Note: SuSE has also released a security update for the format
string vulnerability in gnupg.
* Click here for LWN Security Update To gnupg
* May 31st Issue of LWN explains format string vulnerability
Date: June 02, 2001
Platform: Caldera
Updates To: webmin
Report From: Linux Daily News
* Release Note: Caldera has posted a security advisory for the webmin
package to address a "root account leak".
* Click here for LWN Security Update To webmin
Date: June 02, 2001
Platform: Trustix
Updates To: gnupg
Report From: Linux Daily News
* Release Note: Trustix has posted their update for gnupg to address the
format string problem discovered last week.
* Click here for LWN Security Update To gnupg
Top of Page
Miscellaneous
Date: June 29, 2001
Platform: HP 9000 Servers running HP-UX releases 10.20 and 11.00
(only), Solaris releases 2.X, Windows NT4.X/Windows 2000
running NNM 6.1
Warning About: Security Vulnerability in HP OpenView
Network Node Manager
Report From: CIAC Bulletins
* Release Note: Vulnerability exists in HP Openview Network Node Manager
which allows a user to gain unauthorized privileges. Solution: Apply
the appropriate HP patches for your system.
* Click here for Bulletin Number L-102
Date: June 28, 2001
Platform: Cisco IOS systems
Warning About: Cisco IOS HTTP Server Authentication Vulnerability
Report From: CERT
* Release Note: A problem with HTTP server component of Cisco IOS system
software allows an intruder to execute privileged commands on Cisco
routers if local authentication databases are used.
* Click here for CERT CA-2001-14
Date: June 28, 2001
Platform: Oracle 8i Standard and Enterprise Editions Version 8.1.5,
8.1.6, 8.1.7 and previous versions for Windows, Linux,
Solaris, AIX, HP-UX and Tru64 Unix.
Updates To: Vulnerability in Oracle 8i TNS Listener
Report From: COVERT Labs at PGP Security
* Release Note: The Listener is vulnerable to a buffer overflow condition
that allows remote execution of arbitrary code that grants full control
of the database services and, on some platforms, full control of the
operating system. Oracle has produced a patch under bug number 1489683.
* Click here for COVERT Advisories No. 050
Date: June 28, 2001
Platform: Oracle 8i Standard and Enterprise Editions Version
8.1.5, 8.1.6, 8.1.7 and all previous versions for Windows,
Linux, Solaris, AIX, HP-UX and Tru64 Unix.
Updates To: Oracle 8i SQLNet Header Vulnerability
Report From: COVERT Labs at PGP Security
* Release Note: A vulnerability allows a remote user to mount a denial
of service attack against any Oracle service that relies upon the
protocol, including the TNS Listener, Oracle Name Service and Oracle
Connections Manager. Oracle has produced a patch under bug number
1656431.
* Click here for COVERT Advisories No. 049
Date: June 27, 2001
Platform: Misc
Warning About: Verification of Downloaded Software
Report From: CERT
* Release Note: When downloading software from online repositories, it
is important to consider the possibility that the site has been
compromised. We strongly encourage users to verify cryptographic
signatures (e.g. PGP) of all downloaded software. Cryptographic
signatures provide reasonable assurance that the files have not
been modified either on the server or in transit. They also allow
for verification of the signer's identity.
* Click here for CERT IN-2001-06
Date: June 26, 2001
Released: June , 2001
Platform: Misc
Hoax Report: Anticristo HOAX
Report From: Network Associates
* Release Note: Network Associates has released a report that says, this
email message is just a HOAX, currently we know of no other message
that the user will receive about the HOAs the initial email states.
AVERT has not received any report of a user's hard drive being erased
for opening the email.
* Click here for NAI Report on Anticristo HOAX
Date: June 26, 2001
Platform: Misc
Warning About: Juergen Schoenwaelder scotty ntping Buffer
Overflow Vulnerability
Report From: Security Focus
Release Note: A local attacker can supply a long string as a command
line argument to ntping. If the input is carefully constructed, a local
attacker can exploit this vulnerability to execute arbitrary code on the
target host.
* Click here for Advisory No. 2911
Date: June 26, 2001
Platform: Solaris
Warning About: Solaris PTExec Buffer Overflow Vulnerability
Report From: Security Focus
Release Note: A buffer overflow exists. It is possible for a local user
to overwrite stack memory, including the return address. This makes it
possible for a local user to gain elevated privileges, and potentially
full administrative access.
* Click here for Advisory No. 2898
Date: June 21, 2001
Platform: Misc
Report From: CIAC Bulletins
Warning About: HP-UX kmmodreg Vulnerability
* Click here for Bulletin Number L-093
Warning About: Cisco 6400 NRP2 telnet Vulnerability
* Click here for Bulletin Number L-097
Date: June 07, 2001
Platform: CSS 11000 series switches
Warning About: Cisco 11000 Series Switch, Web Management Vulnerability
Report From: CIAC Bulletins
* Release Note: The Cisco Content Service Switch (CSS) 11000 series
switches do not enforce the correct restrictions for accessing the web
management URL. A user can gain access to the web management interface
without being authenticated on the CSS 11000 series switch. Apply
workarounds and patches as described in vendor bulletin.
* Click here for Bulletin Number L-090
Date: June 07, 2001
Platform: Misc
Hoax Report: Gamma2 HOAX
Report From: F-Secure Hoax information
* Release Note: This hoax was circulated in June 2001. The hoax message
was made to look like a genuine F-Secure Corporation press release.
This press release is a fake and the message is a hoax. "Gamma2.exe"
virus does not exist. Please ignore this warning and do not pass it on.
* Click here for F-Secure Report on Gamma2 HOAX
Top of Page
Back to the Virus Archives page
