Enron Mail

From:vince.kaminski@enron.com
To:vkaminski@aol.com
Subject:Palm virus reported
Cc:
Bcc:
Date:Wed, 6 Sep 2000 01:18:00 -0700 (PDT)

---------------------- Forwarded by Vince J Kaminski/HOU/ECT on 09/06/2000
08:24 AM ---------------------------


"NW Security and Bug Patch Alert" <Security-BugPatch@bdcimail.com< on
09/06/2000 12:21:41 AM
Please respond to "Security and Bug Patch Alert Help" <NWReplies@bellevue.com<
To: <vkamins@enron.com<
cc:
Subject: Palm virus reported


NETWORK WORLD FUSION FOCUS: JASON MESERVE on
SECURITY AND BUG PATCH ALERT
TODAY'S FOCUS: Palm virus reported
09/04/00

Dear Wincenty Kaminski,

~~~~~~~ This newsletter sponsored by
LUCENT TECHNOLOGIES ~~~~~~

Voted "Best in Test" and a "Good Buy" for carrier/ISP
applications, Lucent Technologies' Secure VPN Solutions
garnered top ratings by Mier Communications' recent
Independent Lab Test Report. The products, which included
Lucent's VPN Firewall Brick, Lucent Security Management
Server, and the Lucent IPSec Client, were lab-tested using
a methodology and test bed for evaluating VPNs in
carrier-class applications. To obtain a copy of the report
and for more information on Lucent Secure VPN Solutions,
visit http://nww1.com/go/1715947a.html
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

11 FREE Newsletter Additions from Network World!
Sign up Today at http://www.nwwsubscribe.com/foc35
Wireless in the Enterprise, Servers, Optical Networking,
The Network Channel, The Edge, Net Worker, Convergence,
Free Stuff, Mobile Computing, The Network World 200, and
Technology Executive
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Today's Focus: Palm virus reported
---------------------------------------------------------------
By Jason Meserve (write me at jmeserve@nww.com)


Before I get into the more serious topics of the day, I thought
I'd share a funny "virus alert" that one of my friends
forwarded to me. The e-mail, entitled "Virus Alert!!!!!!"
contained the following message:

Alert

I'm too lazy to program a real virus, so this virus works
on the honor system-

Please delete all the files on your hard drive...

Now, please forward this message to everyone you know...

Thank you for your cooperation......


Okay, now on with the serious stuff.

A number of the antivirus vendors have issued alerts about the
Liberty virus that allegedly infects PalmOS machines. The
Trojan is said to come disguised as an update to a legitimate
Palm application, Gambit Studios LLC's Liberty GameBoy
emulation software.

However, when executed, the program attempts to delete all
applications on the Palm. Computer Associates, Symantec and
Trend Micro all say they're the first to release protection for
the virus.

For more information on the Palm Liberty virus, see:
http://www.nwfusion.com/news/2000/0829palmvirus.html

One last thing on the PGP issue we wrote about last week before
we get to the alerts. Phil Zimmerman, the man behind PGP, has
issued a response to the problem. Some are claiming the issue
is the result of a backdoor. Zimmerman explains that this is
not the case. Read his response at:
http://www.nwfusion.com/news/2000/0904pgpzimm.html


Today's alerts and patches:


Allaire issues two security bulletins:

Workaround available for administrative interface security
issue

The Allaire Spectra 1.01 product comes with a utility for
configuring the Spectra applications and was accidentally
included in some commercial releases of the product. The tool
could be used by a malicious user to view sensitive data files
used for configuring and administering the Spectra system. For
a workaround:
http://www.allaire.com/handlers/index.cfm?ID=17372&;Method=Full


Patch available for Spectra Container Editor preview-object
security issue

The Spectra Contain Editor runs objects with no security under
preview mode. This means an object can invoke any method
without proper permissions. For more information and to
download a patch:
http://www.allaire.com/handlers/index.cfm?ID=15411&;Method=Full
**********


Caldera warns of /tmp file race in faxrunq

According to a Caldera alert, the mgetty package contains a
number of tools for sending and receiving facsimiles. One of
the tools, faxrunq, uses a marker file in a world-writable
directory in an unsecured fashion. This bug allows malicious
users to clobber files on the system owned by the user invoking
faxrunq. For new packages:
ftp://ftp.calderasystems.com/pub/updates/OpenLinux/2.3/current/RPMS/
**********


Conectiva warns of symlink attack possibility in mgetty

Conectiva is warning its user of a condition in the mgetty
utility that could allow any files on the system to be
overwritten. Versions prior to 1.1.22 are affected. For source
downloads:
ftp://atualizacoes.conectiva.com.br/4.0/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.0es/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/mgetty-1.1.22-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/SRPMS/mgetty-1.1.22-
1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/SRPMS/mgetty-1.1.22-1
cl.src.rpm
**********


Microsoft releases patch for "Local Security Policy Corruption"
vulnerability

A problem in Windows 2000 could allow a user to disrupt
operation of the server and possibly the entire network on
which the server sits. Windows 2000 Service Pack 1 fixed the
problem. This is a patch for those that have not applied the
service pack. For more:
http://www.microsoft.com/technet/security/bulletin/fq00-062.asp
**********


Ipswitch releases fix for Imail 6.0

Ipswitch's Imail e-mail server product for Windows NT contains
a vulnerability that could allow an external user to attach a
file that runs on the server. Download the latest version of
6.0 to fix the problem:
ftp://ftp.ipswitch.com/Ipswitch/Product_Support/Imail/imailwebpatch604c.exe
**********


Debian upgrades Xchat, ntop to fix bugs

Debian has released a new version of its Xchat packages to fix
a problem with URL handling. For source downloads:
http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3-0.1.di
ff.gz
http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3-0.1.ds
c
http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3.orig.t
ar.gz


Debian has reissued a patch for ntop after the original patch
released August 5 was deemed ineffective. The patch fixes a
problem in ntop that could allow a malicious user to run
arbitrary code on the affected system. For source downloads:
http://security.debian.org/dists/stable/updates/main/source/ntop_1.2a7-11.diff
.gz
http://security.debian.org/dists/stable/updates/main/source/ntop_1.2a7-11.dsc
http://security.debian.org/dists/stable/updates/main/source/ntop_1.2a7.orig.ta
r.gz
**********


TurboLinux upgrades Netscape/Java packages

New Netscape packages are available to TurboLinux users.
Netscape 7.47 and prior were susceptible to attack from Brown
Orifice, a data-stealing Java applet. TurboLinux has also added
a fix for Netscape's handling of certain JPEG files, which
could cause a buffer overflow. To download the new package:
ftp://ftp.turbolinux.com/pub/updates/6.0/security/netscape-communicator-4.75-1
.i386.rpm
**********


Patch available for GoodTech FTP Server

The GoodTech FTP server is vulnerable to denial-of-service
attacks. Certain commands will stop the listening threads from
operating correctly. If enough commands are sent, all available
sockets will be closed. For a patch:
http://www.goodtechsys.com/predownload.asp
**********


Linux-Mandrake releases patch for xpdf, Xchat and glibc

According to the Linux-Mandrake alert, there is a potential
race condition when using tmpnam() and fopen() in xpdf versions
prior to 0.91. This exploit can be only used as root to
overwrite arbitrary files if a symlink is created between the
calls to tmpname() and fopen(). For updates:
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates


The Xchat patch fixes a problem with the way the IRC program
handles URLs. A malicious URL could be used to run arbitrary
commands on the affected system. For more information:
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates


The glibc program contains a vulnerability in the ld.so module
that could allow a local user to obtain root access. For
patches:
ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates
**********


Red Hat updates usermode packages

Usermode allows the local user to execute reboot and other
system commands without root privileges. One of those commands
was to shut the system down. This patch removes that
functionality.
Sources for 6.0 and 6.1:
ftp://updates.redhat.com/6.2/SRPMS/usermode-1.35-1.src.rpm
ftp://updates.redhat.com/6.2/SRPMS/SysVinit-2.78-5.src.rpm

Source for 6.2:
ftp://updates.redhat.com/6.2/SRPMS/usermode-1.35-1.src.rpm
**********


FreeBSD issues a batch of alerts:

Netscape - The company has fixed the Brown Orifice and JPEG
vulnerabilities. New packages can be downloaded from:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/www/
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/www/
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/www/
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/www/
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/www/

Mopd - The mopd module is used for rebooting older DEC
machines. A vulnerability in the package could allow a user to
execute arbitrary commands as root. For upgrades:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/net/mopd-1.2b.t
gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/net/mopd-1.2b.t
gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/net/mopd-1.2b.
tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/net/mopd-1.2b.
tgz
ftp://ftp.FreeBSD.org/pub/FrreeBSD/ports/alpha/packages-5current/net/mopd-1.2b
.tgz

Linux binary problem - FreeBSD is Linux compatible through a
set of "shadow" binaries. These binaries contain a
vulnerability that could allow a local user to gain root access
under certain specific conditions. To download the patch:
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:42/linux.patch

Brouted - According to FreeBSD, The brouted port is incorrectly
installed setgid kmem, and contains several exploitable buffer
overflows in command-line arguments. An attacker exploiting
these to gain kmem privilege can easily upgrade to full root
access by manipulating kernel memory. For updates:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/net/brouted-1.2
b.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/net/brouted-1.2
b.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/net/brouted-1.
2b.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/net/brouted-1.
2b.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/net/brouted-1
.2b.tgz

Xlockmore - The system is used to lock access to X terminal. A
problem could allow an attacker to steal the hashed password
information from memory. For fixes:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/x11/xlockmore-4
.17.1.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/x11/xlockmore-4
.17.1.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-stable/x11/xlockmore-
4.17.1.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/x11/xlockmore-
4.17.1.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-5-current/x11/xlockmore
-4.17.1.tgz
**********


Today's round up of virus alerts:

Win32/MTX.A.Worm - This Trojan virus infects the Windows
directory and attempts to download files from a Web site. It
then sends itself out as randomly named attachments. (Computer
Associates)

WM97/Verlor-I - Makes changes to the WINl.INI file and global
Word template. (Sophos)

WM97/Piper-A - This virus animates the Office Assistant when
documents are opened, closed, created and saved in Word.
(Sophos)

WM97/Footer-O - This Word macro virus does nothing but
replicate itself. (Sophos)

W32/Apology - Sends an attachment of itself to anyone that an
infected user e-mails. (Sophos)

VBS/Lovelet-BF - Another Love Letter variant. This one comes
with the subject "True Story...." and contains an attachment
called MYLINONG.TXT.SHS. (Sophos)
**********


From the interesting reading category:

The Encyclopaedia of Computer Security

I got an e-mail from the publisher of this British-born site.
The editor claims there are some 6,000 pages of information on
the site and it's growing daily. Check it out at:
http://www.itsecurity.com


Sun admits to memory problem

Problems with a memory component that Sun has been quietly
trying to fix for the past several months are continuing to
plague some large users of Sun's Ultra Enterprise Unix servers.
And Sun has gone to extraordinary lengths to keep its customers
quiet about the issue. Computerworld, 08/28/00.
http://www.nwfusion.com/news/2000/0828sun.html


Microsoft Word documents can be tracked on Web

Creators of Microsoft Word documents can use the application's
ability to include Web hyperlinks to remotely track who is
reading a document, according to a study by the Denver Privacy
Foundation published Wednesday. Network World, 08/31/00.
http://www.nwfusion.com/news/2000/0831wordtrack.html
**********


Miss an issue?
We keep all of our newsletters in an archive (thanks to Marlo
and Chris) back on NW Fusion. Check out:
http://www.nwfusion.com/newsletters/bug/


To contact Jason Meserve:
-------------------------
Jason Meserve is a staff writer with Network World, covering
search engines, portals, videoconferencing, IP Multicast and
document management. He also oversees the "Security Alerts"
page on Fusion http://www2.nwfusion.com/security/bulletins.html.
Jason can be reached at mailto:jmeserve@nww.com.
-------------------------

Got a security alert or bug patch question related to your
corporate network? Post it at Experts Exchange on Fusion at
http://nwfusion.experts-exchange.com/. Another network
professional may have the solution to your problem.

May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.nwwsubscribe.com/nl

*********************************************************
Subscription Services

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
http://www.nwwsubscribe.com/news/scripts/notprinteditnews.asp

To change your email address, go to:
http://www.nwwsubscribe.com/news/scripts/changeemail.asp

Subscription questions? Contact Customer Service by replying to
this message.

Other Questions/Comments

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: mailto:jcaruso@nww.com

For advertising information, write Jamie Kalbach, Account
Executive, at: mailto:jkalbach@nww.com

Network World Fusion is part of IDG.net, the IDG Online
Network. IT All Starts Here:
http://www.idg.com

Copyright Network World, Inc., 2000