Virus Warnings from August 2001
   ______________________________________________________________

           [Jump to Amiga] [Jump to Windows] [Jump to Mac]
                   [Jump to Linux] [Jump to Misc]
   ______________________________________________________________


   Amiga


    19 August 2001 - VHT-DK Warning: Trojan in Aminet file Muahaha.lha
   Virus Help Denmark says a new trojan has been found today. The trojan
   will delete every file that has the "key" in the name of the file. This
   trojan is just like the one that has found of the 15'th of August, named
   MZ-Makey trojan. But this trojan was found on Aminet, but removed now.
   The xvs.library package will be released very soon.
   Follow the above link for viruswarning - file is named vht-dk109.lha.
   * Click here for VHT-DK Virus Warning vht-dk109 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

    18 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 For Third Time
   Virus Help Denmark says here we go again, the 3rd installer of
   Hitch-Hiker has been found this weekend. The archive was uploaded to
   AmiNet, but it has been removed now. Again, there is "NO" cure for
   this virus right now.
   Follow the above link for viruswarning - file is named vht-dk108.lha.
   * Click here for VHT-DK Virus Warning vht-dk108 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

    17 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 UPDATE
   Virus Help Denmark says there might just be more installers of the
   'Hitch-Hiker 5.00' virus out there. The 'xvs.library' (external Virus
   Scanner library) will be updated as soon as possible. In the mean time,
   take care...
   Follow the above link for viruswarning - file is named vht-dk107.lha.
   * Click here for VHT-DK Virus Warning vht-dk107 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

    17 August 2001 - VHT-DK Warning: Hitch-Hiker v5.00 Virus Found
   Virus Help Denmark reports they have found the installer of the new
   'Hitch-Hiker 5.00' linkvirus. There is NO cure for this virus right now
   Follow the above link for viruswarning - file is named vht-dk106.lha.
   * Click here for VHT-DK Virus Warning vht-dk106 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

    15 August 2001 - VHT-DK Warning: New Trojan Found
   Virus Help Denmark reports a new trojan has been found today. This trojan
   says that it will make a key-file that will work with over 250 programs.
   Well, I guess that there are someone that will fall for this kind of
   program. The trojan will delete every file that has the "key" in the name
   of the file, in your S:, Libs:, Devs: and L:.
   Follow the above link for viruswarning - file is named vht-dk105.lha. 
   * Click here for VHT-DK Virus Warning vht-dk105 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

    01 August 2001 - VHT-DK Warning: Installer of SMEG 2 Virus Found
   Virus Help Denmark reports the installer of the new linkvirus SMEG 2a &
   SMEG 2b has been found. Follow the above link for viruswarning - file is
   named vht-dk104.lha. 
   * Click here for VHT-DK Virus Warning vht-dk104 Readme
   * Subscribe online to the VHT-DK Virus Warnings Announcement list.

   Top of Page


   Windows

    09 August 2001 - New Virus Travels In PDF Files
   ZDNet says 'Peachy' shows that Adobe's PDF file format may not be as
   immune to viruses as previously thought. Adobe's popular PDF file format
   has generally been considered immune to viruses. But a new virus carried
   by programs embedded in PDF files raises concerns that the format itself
   could become susceptible. Fortunately, those who are simply viewing a PDF,
   or Portable Document Format, file aren't vulnerable. The virus spreads
   only by way of Adobe's Acrobat software -- the program used to create PDF
   documents -- not through Acrobat Reader, the free program that is used to
   view the files. Updated virus descriptions released by McAfee next week
   will be able to detect Peachy, said Gullotto, senior director of McAfee's
   Avert group.

    09 August 2001 - Hotmail Attacked By Code Red II
   ZDNet says attack on Microsoft's own server software causes problems for
   free email service. Microsoft released a patch to protect servers from
   the Code Red virus six weeks ago, but its free email service was caught
   out by the more virulent successor to the worm, usually referred to as
   Code Red II, earlier this week.
   Microsoft has now released a patch to block the vulnerability that Code
   Red II exploits, and network administrators must remove the back door
   from their systems and reformat and reinstall all software.

    06 August 2001 - NIPC Advisory 01-017: "Code Red II"
   CodeRed II is a rewritten version of the original Code Red worm. It uses
   the same IIS hole to gain access on the web server and the continues to
   find new vulnerable systems. The NIPC considers Code Red II to be a
   serious threat because it spreads rapidly and installs a backdoor that
   can be accessed by anyone familiar with the exploit. Any intruder can use
   the backdoor compromise to make other system modifications at will.
   * NAI: Click here for Report on W32/CodeRed.c.worm
   To detect and remove the trojan, update to the 4152 DATs. If the trojan
   is detected it will be deleted, and the registry keys which allow a
   remote attacker to have access to the C: and D: drives, via a web
   browser, will be deleted as well.
   Virus Help Team Canada: There is a link to the updated 4152 DAT's on
   the news page.
   * F-Secure: Click here for Report on Code Red / Code Red II
   * Symantec: Click here for Report on CodeRed.v3
   Symantec is offering a free tool, Symantec Security Check, that you can
   use to determine if your computer is at risk. The tool is available in
   two forms, both of which are free. The first is an online scan and the
   second you can download the tool onto your computer.

   04 August 2001 - SirCam worm settles in for the long haul
   ZDNet says experts say the worm is likely to keep sending out recipes,
   confidential government documents and CVs for the forseeable future.
   Updated news stories and links on SirCam
   * Report: Worm nabs secret Ukrainian files
   Web site receives secret documents from Ukrainian president
   * SirCam tops virus charts for July
   Code Red may have grabbed the media attention, but the SirCam email worm
   has continued to top the charts

    04 August 2001 - Trend Micro Sircam Virus Vulnerability
   Trend Micro InterScan VirusWall is unable to filter or clean the
   TROJ_SIRCAM.A virus from attachments in electronic mail format (.eml).
   This vulnerability is due to a problem with InterScan's ability to
   decode certain attachment types.

    04 August 2001 - FAQ: The Code Red threat
   ZDNet UK answers common questions about the Code Red worm.

    04 August 2001 - F-Secure warns: Code Red is not dead
   F-Secure Media Release reminds us the worm has been programmed to spread
   only during the first 20 days of every month. As the widespread July
   infections started on the 19th of the month, the worm stopped spreading
   by itself almost as soon as it had become widespread. This time it won't.
   It will continue to spread for almost three weeks and might spread much
   more widely than in July, when it infected around 300,000 servers.
   Updated stories and links on this Code Red Worm
   * Train crash could be to blame for Internet derailment
   A train crash in the US cut Internet cables serving seven major ISPs.
   Was it this, and not Code Red, that derailed the Internet on 18 July?
   * Code Red not by any means dead
   Its impact so far having been contained mostly to the US, Code Red could
   well be spreading to the rest of the world
   * FBI accused over Code Red virus confusion
   * Microsoft takes heat for Code Red
   * Code Red worm stays cool

    01 August 2001 - Possible Internet Slowdown Due to Code Red Worm
   CNN has been updating the news for the Code Red worm almost hourly. They
   have said the slowdown may not show up for a day or two, or there may not
   even be any noticeable difference.  The fact remains, that users of the
   affected Micorsoft products, still have the responsibility to download and
   install the appropriate patch on their systems. The security personel that
   were highlighted on CNN on July 30th, said persons that do not even run a
   server may still have the server software installed on their systems when
   they installed their MS Operating System software. As such, they are also
   possibly vunerable, and to take the necessary precautions.
   Who Must Act?
   Every organization or person who has Windows NT or Windows 2000 systems
   AND the IIS web server software may be vulnerable. IIS is installed
   automatically for many applications. If you are using Windows 95,
   Windows 98, or Windows Me, there is no action that you need to take in
   response to  this alert.
   What To Do If You Are Vunerable?
      a. To rid your machine of the current worm, reboot your computer.
      b. To protect your system from re-infection: Install the patch as
         specified in the instructions.
   The security bulletin that describes the patch and the vulnerability
   it addresses is posted at:
   http://www.microsoft.com/technet/security/bulletin/MS01-033.asp
   Because of the importance of this threat, this alert is being made
   jointly by:  Microsoft, The National Infrastructure Protection Center
   (NIPC), Federal Computer Incident Response Center (FedCIRC), Information
   Technology Association of America (ITAA), CERT Coordination Center, SANS
   Institute, Internet Security Systems and Internet Security Alliance.
   Virus Help Team Canada Fast Links for Info on Code Red Worm
   * NAI Press release of online scan service
   * NAI/PGP OnLine Scan for Code Red Worm
     !! Read the directions carefully before requesting the scan !!
   * Patch: Windows NT 4.0 computers running Index Server 2.0
   * Patch: Windows 2000 computers running Internet Information Service 5.0
   * MS TechNet Security Tools including security and config checklists

   Top of Page


   Macintosh

   No warnings for August 2001

   Top of Page


   Linux

   Date: July 08, 2001
   Platform: Any Linux or BSD system running Samba
   Warning About: Samba Security Vulnerability
   Report From:   CIAC Bulletins
   * Release Note: A remote attacker can use a netbios name containing
     unix path characters which will then be substituted into the %m macro
     wherever it occurs in smb.conf. This can be used to cause Samba to
     create a log file on top of an important system file, which in turn
     can be used to compromise security on the server. Solution: Change
     smb.conf configuration file, or update to most recent release of Samba.
   * Click here for Bulletin Number L-105

   Date: July 08, 2001
   Platform:  Linux-Mandrake
   Updates To:    fetchmail and xinetd
   Report From:   Linux Daily News
   * Release Note: Linux-Mandrake has issued two new security advisories.
     The first is for fetchmail to address the problem with long header
     fields. The second is for xinetd to address default umask issues with
     xinetd.
   * Click here for LWN Security Update To fetchmail
   * Click here for LWN Security Update To xinetd

   Date: July 08, 2001
   Platform:  Immunix
   Updates To:    tetex
   Report From:   Linux Daily News
   * Release Note: Immunix has posted a security update for tetex to address
     temporary file handling problems that can lead to privilege elevation.
   * Click here for LWN Security Update To tetex

   Date: July 04, 2001
   Platform:  Caldera
   Updates To:    OpenSSH
   Report From:   Linux Daily News
   * Release Note: Caldera International has released a security update to
     OpenSSH fixing an interesting problem: an attacker can remove any file
     on the system, as long as it's called "cookies"...
   * Click here for LWN Security Update To OpenSSH

   Top of Page


   Miscellaneous

   10 July 2001 - Viri Warnings and Alerts for Today
   LOC HOAX (NAI)
     If you receive this email, delete the it and DO NOT pass it on.

   Date: July 08, 2001
   Platform: All releases of Cisco IOS(R) software starting with
             release 11.3 and later.
   Warning About: Cisco IOS HTTP Authorization Vulnerability
   Report From:   CIAC Bulletins
   * Release Note: The user will be able to exercise complete control over
     the device. All commands will be executed with the highest privilege
     (level 15). Solution: Upgrade or apply the workaround given in the
     Cisco advisory.
   * Click here for Bulletin Number L-106

   Date: July 08, 2001
   Platform: Oracle 8i
   Warning About: Oracle 8i contains buffer overflow in TNS listener
   Report From:   CERT
   * Release Note: A vulnerability in Oracle 8i allows remote intruders to
     assume control of database servers running on victim machines. If the
     Oracle server is running on a Windows system, an intruder may also be
     able to gain contol of the underlying operating system.
   * Click here for CERT CA-2001-016

   Date: July 04, 2001
   Platform: Misc
   Hoax Alert:    MusicPanel (MP3) Virus HOAX
   Report From:   Symantec Security HOAX Updates
   * Release Note: The following message is a hoax. This "virus" does not
     exist.
     Sample of hoax message:
        Music fans around the planet will receive a shocking surprise
        on their computers on American Independence Day,July 4, but only
        if they have downloaded unauthorised songs from Napster, Gnutella
        or other file swapping applications on the Internet.
     Please ignore any messages regarding this hoax and do not pass on
     messages. Passing on messages about the hoax only serves to further
     propagate it.
   * Click here for Symantec HOAX Report on MusicPanel
   * Click here for Vmyths HOAX Report on MusicPanel (MP3) virus
   * Click here for ZDNet HOAX Report on MusicPanel

   Date: July 04, 2001
   Platform: i386 Intel Platform
   Warning About: SuSE Linux, xinetd Buffer Overflow
   Report From:   CIAC Bulletins
   * Release Note: The buffer overflow vulnerability allows a remote
     attacker to execute arbitrary code at all privleges.
     Solution: Apply patches supplied by SuSE
   * Click here for Bulletin Number L-104

   Date: July 04, 2001
   Platform: Various version of SunOS
   Warning About: Sun ypbind Buffer Overflow Vulnerability
   Report From:   CIAC Bulletins
   * Release Note: This vulnerability may allow a local or remote user to
     gain root access and, therefore, complete control of the system.
     Solution: Apply the patches described below.
   * Click here for Bulletin Number L-103

   Top of Page


   Back to the Virus Archives page

[Home] - [About Us] - [News] - [Downloads] - [Warnings] - [Links]
[Archives] - [Non-Java Web Chat] - [PGP] - [Search Page] - [Feedback]

Virus Help Team Canada Site (c)2000-2012 by Charlene
VHT-CAN and our webhoster disclaimes any responsibility for software
obtained through this site. Contact VHT-Canada