Virus Warnings from July 2001
______________________________________________________________
[Jump to Amiga] [Jump to Windows] [Jump to Mac]
[Jump to Linux] [Jump to Misc]
______________________________________________________________
Amiga
Date: July 01, 2001
Platform: Amiga
Update About: Bobek2 Infected Archive Found
Report From: Virus Help Team Denmark (VHT-DK)
* Release Note: Virus Help Denmark reports another archive that is
infected with the 'Bobek2' linkvirus has been found. It was on Aminet
for a short time, but is has been removed now. But there just might be
a few more archives our there, so take care.. Use VirusExecutor, VirusZ
& VirusChecker, with (and this is very important) the xvs.library
v33.26 to remove the virused from Devoprefs file.
* Click here for VHT-DK Virus Warning vht-dk103 Read Me
* Subscribe online to the VHT-DK Virus Warnings Announcement list.
Top of Page
Windows
31 July 2001 - NAI/PGP OnLine Scan for Code Red Worm
PGP Security & McAfee are offering their CyberCop Worm-Scan for online
vulnerability assessment for the Code Red Worm. You will need javascript
enabled in your browser, plus you will need to provide some personal info
such as name, email address and a password. The passowrd is required in
order to provide secure access to your CyberCop report that will be
mailed to your email address.
* Click here for NAI Press release of online scan service
31 July 2001 - Code Red Worm Still Present Threat to the Internet
Microsoft Corporate Summary: The Code Red Worm and mutations of the worm
pose a continued and serious threat to Internet users. Immediate action
is required to combat this threat. Users who have deployed software that
is vulnerable to the worm (Microsoft IIS Versions 4.0 and 5.0) must
install, if they have not done so already, a vital security patch.
Who Must Act?
Every organization or person who has Windows NT or Windows 2000 systems
AND the IIS web server software may be vulnerable. IIS is installed
automatically for many applications. If you are using Windows 95,
Windows 98, or Windows Me, there is no action that you need to take in
response to this alert.
What To Do If You Are Vunerable?
a. To rid your machine of the current worm, reboot your computer.
b. To protect your system from re-infection: Install the patch as
specified in the instructions.
The security bulletin that describes the patch and the vulnerability
it addresses is posted at:
http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
Because of the importance of this threat, this alert is being made
jointly by: Microsoft, The National Infrastructure Protection Center
(NIPC), Federal Computer Incident Response Center (FedCIRC), Information
Technology Association of America (ITAA), CERT Coordination Center, SANS
Institute, Internet Security Systems and Internet Security Alliance.
Virus Help Team Canada Suggests the Following Links for fast info
* Patch: Windows NT 4.0 computers running Index Server 2.0
* Patch: Windows 2000 computers running Internet Information Service 5.0
* MS TechNet Security Tools including security and config checklists
31 July 2001 - Frisk Software International Code Red Summary
Code Red is the first worm that doesn't reproduce itself by copying
itself into files or by infecting files but runs in memory only and
reproduces by streaming communications between systems. Antivirus
software will not be of use to prevent infections or damage done by
the worm. Users of the IIS web server are required to get an update of
the server from Microsoft's website:
http://www.microsoft.com/windows2000/downloads/critical/q300972/default.asp
26 July 2001 - F-Secure Warns of Sircam Worm
F-Secure Corporation is alerting computer users worldwide about a new,
rapidly spreading e-mail worm called Sircam. Sircam is a mass mailing
e-mail worm with the ability to spread through Windows Network shares.
F-Secure anti-virus detects and disinfects the worm. This is the first
e-mail worm that is not Windows Outlook-specific. Instead, this worm
makes use of any e-mail system. This makes it much more liable to spread.
* Click here for Symantec Report on W32.Sircam.Worm@mm
* Click here to obtain Symantec's W32.Sircam.Worm@mm removal tool
21 July 2001 - Advisory 01-015: "Ida Code Red Worm"
National Infrastructure Protection Center (NIPC) Advisory says Internet
backbone providers have notified the NIPC they are witnessing large-scale
victimized web servers scanning for Microsoft Internet Information Server
(IIS) vulnerabilities.
13 July 2001 - Viri Warnings and Alerts for Today
VBS.Blank.A (Symantec)
W32.HLLC.Abessive (Symantec)
W32.Malot.int (Symantec)
12 July 2001 - Viri Warnings and Alerts for Today
Backdoor-QZ (NAI)
Leave (Updated) (F-Secure)
Marijuana (F-Secure)
11 July 2001 - Viri Warnings and Alerts for Today
Bogus Patch "leaves" Backdoor Open (Kaspersky Lab)
An Internet Worm "Leave" Spreads in the Form of Security Patch to
Windows Kaspersky Lab, an international data-security software
development company, warns users of the discovery of a new version
of the Internet worm...
(more on Leave) (F-Secure)
(more on W32.Leave.B.Worm) (Symantec)
HTML.Reality.B (Symantec)
10 July 2001 - Viri Warnings and Alerts for Today
Nymph (F-Secure)
Linong (F-Secure)
Backdoor-QV (NAI)
Evem (NAI)
VBS/PWStroy (NAI)
W32.Leave.B.Worm (Symantec)
W97M.Claud.Gen (Symantec)
Date: July 08, 2001
Platform: MS Windows 2000
Patch Available: Authentication Error in SMTP Service Could
Allow Mail Relaying
Report From: MicroSoft TechNet Security
* Release Note: Customers who need SMTP services should apply the patch.
All others should disable the SMTP service.
* Click here for MS Security Bulletin MS01-037
Date: July 08, 2001
Platform: MS Windows
Report From: Norton / Symantec Security Updates
* Click here for Report on Backdoor.Bionet.40a
Release Note: Backdoor.Bionet.40a is a malicious backdoor Trojan. Its
actions are similar to SubSeven, Netbus, and BackOrifice in that it
allows unauthorized access to an infected computer.
* Click here for Report on W32.Lad.1916
Release Note: W32.Lad.1916 is a direct infector, and it infects MS
Portable Executable (PE) files. When executed, the virus does not go
memory resident. Instead, the virus attempts to infect files in the
Windows folders, and in the same folder as the virus. Its payload is
executed on the 19th of every month, and it displays a short message.
Date: July 08, 2001
Platform: MS Windows
Report From: Network Associates
* Click here for Report on Backdoor-QT
Aliases: Backdoor-QT.cfg, Backdoor-QT.cli, Backdoor-QT.svr,
BackDoor.Muska (AVP) and MuSka52
Release Note: This is a remote access trojan written in Visual Basic 5.
When run, it copies itself to the WINDOWS SYSTEM directory as UT3.EXE
and creates a WIN.INI entry to load a program at startup
* Click here for Report on W32/Funso@M
Aliases: AOL.PWSteal.86016 (NAV) and I-Worm.Menace (AVP)
Release Note: This is an AOL password stealing trojan and email worm
virus written in Visual Basic 6. When run, the program will display a
message box plus various other things.
* Click here for Report on VBS/Jolin@MM
Aliases: VBS.Jolin@mm (NAV) and VBS/Niloj-A (Sophos)
Release Note: At the present time, this VBScript contains bugs which
prevent it from functioning properly.
Date: July 08, 2001
Platform: MS Windows
Warning About: Nymph Worm
Aliases: Roach, Roach.b, W32/Roach, I-Worm.Roach.b
Report From: F-Secure
* Release Note: Nymph is a mass-mailer with backdoor capabilities created
by ASM/iKX group. It is one of the first worms that uses search engine
of a webserver to find victim's e-mail addresses.
* Click here for Report on Nymph
Date: July 08, 2001
Platform: Microsoft Windows 2000
Warning About: Microsoft Authentication Error in SMTP Service
Report From: CIAC Bulletins
* Release Note: The vulnerability could allow an unauthorized user to
successfully authenticate to the service using incorrect credentials.
The unauthorized user could gain user-level privileges on the SMTP
service. Solution: Apply the patch provided by Microsoft.
* Click here for Bulletin Number L-107
Date: July 08, 2001
Platform: Microsoft Windows (all versions)
Warning About: W32/Leaves: Exploitation of previously installed
SubSeven Trojan Horses
Report From: CERT
* Release Note: The CERT/CC has received an increasing number of reports
regarding the compromise of home user machines running MS Windows. Most
of these reports surround the intruder tool SubSeven. SubSeven is often
used as a Trojan horse, which allows an intruder to deliver and
execute any custom payload and run arbitrary commands on the affected
machine.
* Click here for CERT IN-2001-07
Top of Page
Macintosh
No warnings for July 2001
Top of Page
Linux
Date: July 08, 2001
Platform: Any Linux or BSD system running Samba
Warning About: Samba Security Vulnerability
Report From: CIAC Bulletins
* Release Note: A remote attacker can use a netbios name containing
unix path characters which will then be substituted into the %m macro
wherever it occurs in smb.conf. This can be used to cause Samba to
create a log file on top of an important system file, which in turn
can be used to compromise security on the server. Solution: Change
smb.conf configuration file, or update to most recent release of Samba.
* Click here for Bulletin Number L-105
Date: July 08, 2001
Platform: Linux-Mandrake
Updates To: fetchmail and xinetd
Report From: Linux Daily News
* Release Note: Linux-Mandrake has issued two new security advisories.
The first is for fetchmail to address the problem with long header
fields. The second is for xinetd to address default umask issues with
xinetd.
* Click here for LWN Security Update To fetchmail
* Click here for LWN Security Update To xinetd
Date: July 08, 2001
Platform: Immunix
Updates To: tetex
Report From: Linux Daily News
* Release Note: Immunix has posted a security update for tetex to address
temporary file handling problems that can lead to privilege elevation.
* Click here for LWN Security Update To tetex
Date: July 04, 2001
Platform: Caldera
Updates To: OpenSSH
Report From: Linux Daily News
* Release Note: Caldera International has released a security update to
OpenSSH fixing an interesting problem: an attacker can remove any file
on the system, as long as it's called "cookies"...
* Click here for LWN Security Update To OpenSSH
Top of Page
Miscellaneous
10 July 2001 - Viri Warnings and Alerts for Today
LOC HOAX (NAI)
If you receive this email, delete the it and DO NOT pass it on.
Date: July 08, 2001
Platform: All releases of Cisco IOS(R) software starting with
release 11.3 and later.
Warning About: Cisco IOS HTTP Authorization Vulnerability
Report From: CIAC Bulletins
* Release Note: The user will be able to exercise complete control over
the device. All commands will be executed with the highest privilege
(level 15). Solution: Upgrade or apply the workaround given in the
Cisco advisory.
* Click here for Bulletin Number L-106
Date: July 08, 2001
Platform: Oracle 8i
Warning About: Oracle 8i contains buffer overflow in TNS listener
Report From: CERT
* Release Note: A vulnerability in Oracle 8i allows remote intruders to
assume control of database servers running on victim machines. If the
Oracle server is running on a Windows system, an intruder may also be
able to gain contol of the underlying operating system.
* Click here for CERT CA-2001-016
Date: July 04, 2001
Platform: Misc
Hoax Alert: MusicPanel (MP3) Virus HOAX
Report From: Symantec Security HOAX Updates
* Release Note: The following message is a hoax. This "virus" does not
exist.
Sample of hoax message:
Music fans around the planet will receive a shocking surprise
on their computers on American Independence Day,July 4, but only
if they have downloaded unauthorised songs from Napster, Gnutella
or other file swapping applications on the Internet.
Please ignore any messages regarding this hoax and do not pass on
messages. Passing on messages about the hoax only serves to further
propagate it.
* Click here for Symantec HOAX Report on MusicPanel
* Click here for Vmyths HOAX Report on MusicPanel (MP3) virus
* Click here for ZDNet HOAX Report on MusicPanel
Date: July 04, 2001
Platform: i386 Intel Platform
Warning About: SuSE Linux, xinetd Buffer Overflow
Report From: CIAC Bulletins
* Release Note: The buffer overflow vulnerability allows a remote
attacker to execute arbitrary code at all privleges.
Solution: Apply patches supplied by SuSE
* Click here for Bulletin Number L-104
Date: July 04, 2001
Platform: Various version of SunOS
Warning About: Sun ypbind Buffer Overflow Vulnerability
Report From: CIAC Bulletins
* Release Note: This vulnerability may allow a local or remote user to
gain root access and, therefore, complete control of the system.
Solution: Apply the patches described below.
* Click here for Bulletin Number L-103
Top of Page
Back to the Virus Archives page
