Virus Warnings from August 2001 ______________________________________________________________ [Jump to Amiga] [Jump to Windows] [Jump to Mac] [Jump to Linux] [Jump to Misc] ______________________________________________________________ Amiga 19 August 2001 - VHT-DK Warning: Trojan in Aminet file Muahaha.lha Virus Help Denmark says a new trojan has been found today. The trojan will delete every file that has the "key" in the name of the file. This trojan is just like the one that has found of the 15'th of August, named MZ-Makey trojan. But this trojan was found on Aminet, but removed now. The xvs.library package will be released very soon. Follow the above link for viruswarning - file is named vht-dk109.lha. * Click here for VHT-DK Virus Warning vht-dk109 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. 18 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 For Third Time Virus Help Denmark says here we go again, the 3rd installer of Hitch-Hiker has been found this weekend. The archive was uploaded to AmiNet, but it has been removed now. Again, there is "NO" cure for this virus right now. Follow the above link for viruswarning - file is named vht-dk108.lha. * Click here for VHT-DK Virus Warning vht-dk108 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. 17 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 UPDATE Virus Help Denmark says there might just be more installers of the 'Hitch-Hiker 5.00' virus out there. The 'xvs.library' (external Virus Scanner library) will be updated as soon as possible. In the mean time, take care... Follow the above link for viruswarning - file is named vht-dk107.lha. * Click here for VHT-DK Virus Warning vht-dk107 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. 17 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 Virus Found Virus Help Denmark reports they have found the installer of the new 'Hitch-Hiker 5.00' linkvirus. There is NO cure for this virus right now Follow the above link for viruswarning - file is named vht-dk106.lha. * Click here for VHT-DK Virus Warning vht-dk106 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. 15 August 2001 - VHT-DK Warning: New Trojan Found Virus Help Denmark reports a new trojan has been found today. This trojan says that it will make a key-file that will work with over 250 programs. Well, I guess that there are someone that will fall for this kind of program. The trojan will delete every file that has the "key" in the name of the file, in your S:, Libs:, Devs: and L:. Follow the above link for viruswarning - file is named vht-dk105.lha. * Click here for VHT-DK Virus Warning vht-dk105 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. 01 August 2001 - VHT-DK Warning: Installer of SMEG 2 Virus Found Virus Help Denmark reports the installer of the new linkvirus SMEG 2a & SMEG 2b has been found. Follow the above link for viruswarning - file is named vht-dk104.lha. * Click here for VHT-DK Virus Warning vht-dk104 Readme * Subscribe online to the VHT-DK Virus Warnings Announcement list. Top of Page Windows 09 August 2001 - New Virus Travels In PDF Files ZDNet says 'Peachy' shows that Adobe's PDF file format may not be as immune to viruses as previously thought. Adobe's popular PDF file format has generally been considered immune to viruses. But a new virus carried by programs embedded in PDF files raises concerns that the format itself could become susceptible. Fortunately, those who are simply viewing a PDF, or Portable Document Format, file aren't vulnerable. The virus spreads only by way of Adobe's Acrobat software -- the program used to create PDF documents -- not through Acrobat Reader, the free program that is used to view the files. Updated virus descriptions released by McAfee next week will be able to detect Peachy, said Gullotto, senior director of McAfee's Avert group. 09 August 2001 - Hotmail Attacked By Code Red II ZDNet says attack on Microsoft's own server software causes problems for free email service. Microsoft released a patch to protect servers from the Code Red virus six weeks ago, but its free email service was caught out by the more virulent successor to the worm, usually referred to as Code Red II, earlier this week. Microsoft has now released a patch to block the vulnerability that Code Red II exploits, and network administrators must remove the back door from their systems and reformat and reinstall all software. 06 August 2001 - NIPC Advisory 01-017: "Code Red II" CodeRed II is a rewritten version of the original Code Red worm. It uses the same IIS hole to gain access on the web server and the continues to find new vulnerable systems. The NIPC considers Code Red II to be a serious threat because it spreads rapidly and installs a backdoor that can be accessed by anyone familiar with the exploit. Any intruder can use the backdoor compromise to make other system modifications at will. * NAI: Click here for Report on W32/CodeRed.c.worm To detect and remove the trojan, update to the 4152 DATs. If the trojan is detected it will be deleted, and the registry keys which allow a remote attacker to have access to the C: and D: drives, via a web browser, will be deleted as well. Virus Help Team Canada: There is a link to the updated 4152 DAT's on the news page. * F-Secure: Click here for Report on Code Red / Code Red II * Symantec: Click here for Report on CodeRed.v3 Symantec is offering a free tool, Symantec Security Check, that you can use to determine if your computer is at risk. The tool is available in two forms, both of which are free. The first is an online scan and the second you can download the tool onto your computer. 04 August 2001 - SirCam worm settles in for the long haul ZDNet says experts say the worm is likely to keep sending out recipes, confidential government documents and CVs for the forseeable future. Updated news stories and links on SirCam * Report: Worm nabs secret Ukrainian files Web site receives secret documents from Ukrainian president * SirCam tops virus charts for July Code Red may have grabbed the media attention, but the SirCam email worm has continued to top the charts 04 August 2001 - Trend Micro Sircam Virus Vulnerability Trend Micro InterScan VirusWall is unable to filter or clean the TROJ_SIRCAM.A virus from attachments in electronic mail format (.eml). This vulnerability is due to a problem with InterScan's ability to decode certain attachment types. 04 August 2001 - FAQ: The Code Red threat ZDNet UK answers common questions about the Code Red worm. 04 August 2001 - F-Secure warns: Code Red is not dead F-Secure Media Release reminds us the worm has been programmed to spread only during the first 20 days of every month. As the widespread July infections started on the 19th of the month, the worm stopped spreading by itself almost as soon as it had become widespread. This time it won't. It will continue to spread for almost three weeks and might spread much more widely than in July, when it infected around 300,000 servers. Updated stories and links on this Code Red Worm * Train crash could be to blame for Internet derailment A train crash in the US cut Internet cables serving seven major ISPs. Was it this, and not Code Red, that derailed the Internet on 18 July? * Code Red not by any means dead Its impact so far having been contained mostly to the US, Code Red could well be spreading to the rest of the world * FBI accused over Code Red virus confusion * Microsoft takes heat for Code Red * Code Red worm stays cool 01 August 2001 - Possible Internet Slowdown Due to Code Red Worm CNN has been updating the news for the Code Red worm almost hourly. They have said the slowdown may not show up for a day or two, or there may not even be any noticeable difference. The fact remains, that users of the affected Micorsoft products, still have the responsibility to download and install the appropriate patch on their systems. The security personel that were highlighted on CNN on July 30th, said persons that do not even run a server may still have the server software installed on their systems when they installed their MS Operating System software. As such, they are also possibly vunerable, and to take the necessary precautions. Who Must Act? Every organization or person who has Windows NT or Windows 2000 systems AND the IIS web server software may be vulnerable. IIS is installed automatically for many applications. If you are using Windows 95, Windows 98, or Windows Me, there is no action that you need to take in response to this alert. What To Do If You Are Vunerable? a. To rid your machine of the current worm, reboot your computer. b. To protect your system from re-infection: Install the patch as specified in the instructions. The security bulletin that describes the patch and the vulnerability it addresses is posted at: http://www.microsoft.com/technet/security/bulletin/MS01-033.asp Because of the importance of this threat, this alert is being made jointly by: Microsoft, The National Infrastructure Protection Center (NIPC), Federal Computer Incident Response Center (FedCIRC), Information Technology Association of America (ITAA), CERT Coordination Center, SANS Institute, Internet Security Systems and Internet Security Alliance. Virus Help Team Canada Fast Links for Info on Code Red Worm * NAI Press release of online scan service * NAI/PGP OnLine Scan for Code Red Worm !! Read the directions carefully before requesting the scan !! * Patch: Windows NT 4.0 computers running Index Server 2.0 * Patch: Windows 2000 computers running Internet Information Service 5.0 * MS TechNet Security Tools including security and config checklists Top of Page Macintosh No warnings for August 2001 Top of Page Linux Date: July 08, 2001 Platform: Any Linux or BSD system running Samba Warning About: Samba Security Vulnerability Report From: CIAC Bulletins * Release Note: A remote attacker can use a netbios name containing unix path characters which will then be substituted into the %m macro wherever it occurs in smb.conf. This can be used to cause Samba to create a log file on top of an important system file, which in turn can be used to compromise security on the server. Solution: Change smb.conf configuration file, or update to most recent release of Samba. * Click here for Bulletin Number L-105 Date: July 08, 2001 Platform: Linux-Mandrake Updates To: fetchmail and xinetd Report From: Linux Daily News * Release Note: Linux-Mandrake has issued two new security advisories. The first is for fetchmail to address the problem with long header fields. The second is for xinetd to address default umask issues with xinetd. * Click here for LWN Security Update To fetchmail * Click here for LWN Security Update To xinetd Date: July 08, 2001 Platform: Immunix Updates To: tetex Report From: Linux Daily News * Release Note: Immunix has posted a security update for tetex to address temporary file handling problems that can lead to privilege elevation. * Click here for LWN Security Update To tetex Date: July 04, 2001 Platform: Caldera Updates To: OpenSSH Report From: Linux Daily News * Release Note: Caldera International has released a security update to OpenSSH fixing an interesting problem: an attacker can remove any file on the system, as long as it's called "cookies"... * Click here for LWN Security Update To OpenSSH Top of Page Miscellaneous 10 July 2001 - Viri Warnings and Alerts for Today LOC HOAX (NAI) If you receive this email, delete the it and DO NOT pass it on. Date: July 08, 2001 Platform: All releases of Cisco IOS(R) software starting with release 11.3 and later. Warning About: Cisco IOS HTTP Authorization Vulnerability Report From: CIAC Bulletins * Release Note: The user will be able to exercise complete control over the device. All commands will be executed with the highest privilege (level 15). Solution: Upgrade or apply the workaround given in the Cisco advisory. * Click here for Bulletin Number L-106 Date: July 08, 2001 Platform: Oracle 8i Warning About: Oracle 8i contains buffer overflow in TNS listener Report From: CERT * Release Note: A vulnerability in Oracle 8i allows remote intruders to assume control of database servers running on victim machines. If the Oracle server is running on a Windows system, an intruder may also be able to gain contol of the underlying operating system. * Click here for CERT CA-2001-016 Date: July 04, 2001 Platform: Misc Hoax Alert: MusicPanel (MP3) Virus HOAX Report From: Symantec Security HOAX Updates * Release Note: The following message is a hoax. This "virus" does not exist. Sample of hoax message: Music fans around the planet will receive a shocking surprise on their computers on American Independence Day,July 4, but only if they have downloaded unauthorised songs from Napster, Gnutella or other file swapping applications on the Internet. Please ignore any messages regarding this hoax and do not pass on messages. Passing on messages about the hoax only serves to further propagate it. * Click here for Symantec HOAX Report on MusicPanel * Click here for Vmyths HOAX Report on MusicPanel (MP3) virus * Click here for ZDNet HOAX Report on MusicPanel Date: July 04, 2001 Platform: i386 Intel Platform Warning About: SuSE Linux, xinetd Buffer Overflow Report From: CIAC Bulletins * Release Note: The buffer overflow vulnerability allows a remote attacker to execute arbitrary code at all privleges. Solution: Apply patches supplied by SuSE * Click here for Bulletin Number L-104 Date: July 04, 2001 Platform: Various version of SunOS Warning About: Sun ypbind Buffer Overflow Vulnerability Report From: CIAC Bulletins * Release Note: This vulnerability may allow a local or remote user to gain root access and, therefore, complete control of the system. Solution: Apply the patches described below. * Click here for Bulletin Number L-103 Top of Page Back to the Virus Archives page