* Patches from Gentoo, HP, Mandriva, others * Beware BlackWorm * Harvard and Oxford team with Consumer Reports on 'Badware', and other interesting reading Today’s bug patches and security alerts:VoIP vulnerability may be over-hyped, analyst saysThe surfacing of a pair of flaws in Cisco’s CallManager IP telephony servers last week raises the hot-button issue of how to secure enterprise VoIP networks from attacks. But one industry expert says the threat of an attacker or virus taking down a businesses IP PBX or VoIP network is more phantom than menace. NetworkWorld.com, 01/24/06.http://www.networkworld.com/news/2006/012406-cisco-flaw.html **********More KDE updates available As we reported earlier this week, a vulnerability in the KDE desktop environment could result in a critical hole in most Linux installations that use the platform. More related updates are available:Gentoo:http://security.gentoo.org/glsa/glsa-200601-11.xmlUbuntu:http://www.networkworld.com/go2/0123bug2e.html********** Gentoo patches TracAccording to a Gentoo advisory, “Trac is vulnerable to a cross-site scripting attack that could allow arbitrary JavaScript code execution.” For more, go to:https://security.gentoo.org/glsa/glsa-200601-12.xml********** HP patches HP-UX flawA vulnerability in the HP-UX operating system could be exploited by a local user to gain elevated privileges. For more, go to:https://www.securityfocus.com/archive/1/423125/30/0/threadedHP releases fix for Oracle for OpenViewAccording to the HP advisory, “Oracle has issued a Critical Patch Update which contains solutions for a number of potential security vulnerabilities. These vulnerabilities may be exploited locally or remotely to compromise the confidentiality, availability or integrity of Oracle for OpenView (OfO).” For more, go to:https://www.securityfocus.com/archive/1/423140/30/0/threaded**********Recent updates from Debian:lsh-utils (file description leak):https://www.debian.org/security/2006/dsa-956mailman (denial of service):https://www.debian.org/security/2006/dsa-955wine (code execution):https://www.debian.org/security/2006/dsa-954flyspray (script execution):https://www.debian.org/security/2006/dsa-953clamav (heap overflow):https://www.debian.org/security/2006/dsa-947**********New updates for FreeBSD:kmem (buffer overflow, password disclosure):http://www.networkworld.com/go2/0123bug2d.htmlpacket filter (system panic):http://www.networkworld.com/go2/0123bug2c.html**********Recent patches from Mandriva:ipsec-tools (denial of service):https://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:020mozilla-thunderbird (code execution):https://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:021**********Today’s roundup of virus alerts:BlackWorm SummaryOver the last week, “BlackWorm” infected more then 700,000 systems as measured using a counter Web site used by the worm to track itself. This worm is different and more serious then other worms for a number of reasons. In particular, it will overwrite a user’s files on February 3rd. ISC Handler’s Diary, 01/24/06.https://isc.sans.org/blackwormTroj/Haxdoor-AS — A backdoor Trojan that steals username and password data. It is installed as “satdll.dll” in the Windows System folder. (Sophos)W32/Sdbot-ALZ — Another new variant of the Sdbot worm that allows backdoor access through IRC. This one drops an infected copy of “svchosts.exe” in the Windows System folder. (Sophos)W32/Sdbot-AOS — A second Sdbot variant that exploits known Windows flaws as it spreads through network shares. It drops “win32ssr.exe” in the Window System folder. (Sophos)W32/Sdbot-AQH — The third Sdbot Trojan of the day is similar to the previous two, except it places “RpcCenter.exe” in the Windows System folder. (Sophos)W32/Doxpar-F — A Windows worm that spreads through network shares by exploiting known vulnerabilities. It drops a number of file on the host, including “Cokmgl32.dll” in the System directory. (Sophos)Troj/Mdrop-KZ — A Trojan that seems to just drop useless files on the infected host: “cache.exe” and “brun32.exe”, both in the current folder. (Sophos)Troj/VB-TC — A virus that steals information by popping up a dialog box claiming to from AOL asking for personal information. It uploads the captured data to a remote site via FTP. It copies itself to the Startup folder as “AOLUpdate.scr”. (Sophos)W32/Rbot-BSC — A new Rbot variant that spreads through network shares and allows backdoor access via IRC. It installs “snddrv.exe” in the Windows System directory. (Sophos)W32/Rbot-BKA — The second Rbot variant of the day uses the file “outlook.exe” in the Windows System directory as its infection point. It too allows backdoor access via IRC. (Sophos)W32/Rbot-BLC — A third new Rbot variant. This one exploits a number of known Windows flaws in its attempt to spread through network shares. It drops “Acrord32.exe” in the Windows System folder. (Sophos)W32/Feebs-E — An e-mail worm that arrives from a “Protected Message service” and through peer-to-peer networks. It drops “ms.exe” in the Windows System folder as well as “ms32.dll”. The virus pops up an HTML form that tries to collect information from the user. (Sophos)Troj/FeebDl-A — This Trojan attempts to download and decode a number of different executables, installing them as “userinit.exe” in the “recycled” directory. (Sophos)W32/Fasong-I — A virus that searches for running processes on the infected machine and copies itself into them to avoid detection. The code of the virus contains an SMTP engine that could be used for mailing out infected messages. (Sophos)Troj/Zlob-BC — A virus that attempts to download additional malicious executables from a remote site. It drops “mssearch.exe” in the Windows System folder and displays a number of fake error messages on the infected host. (Sophos)Troj/BagleDl-BJ — A Trojan that drops “im_1.exe” and “im_2.exe” in the Windows System folder of the infected host and tries to download additional malicious code from a number of predefined sites. (Sophos)Troj/GrayBrd-BN — A Windows Trojan that installs itself as “G_Server2.0.exe” in the Windows System folder. (Sophos)Troj/Dloadr-ADA — A downloader Trojan that can communicate with remote sites via HTTP. It drops “winupd.exe” in the Windows System directory. (Sophos)**********From the interesting reading department:Harvard and Oxford team with Consumer Reports on ‘Badware’Academic institutions Harvard University and Oxford University are teaming with Consumer Reports to launch a Web site called StopBadware.org to be an online ‘hall of shame’ for those trafficking in spyware or questionable forms of adware. Network World, 01/25/06.http://www.networkworld.com/go2/0123bug2b.htmlMost businesses don’t enforce mobile security policyEnterprises are doing a poor job of securing workers’ handheld devices, according to a report released Thursday by Orange and Quocirca. IDG News Service, 01/26/06.http://www.networkworld.com/news/2006/012606-mobile-security.htmlMicrosoft readies two-way firewall for VistaMicrosoft is readying a new highly configurable firewall for its upcoming Windows Vista operating system that is designed to give administrators much greater control over which applications are allowed to run on the systems they manage. IDG News Service, 01/25/06.http://www.networkworld.com/go2/0123bug2a.html Related content news analysis Cisco, AWS strengthen ties between cloud-management products Combining insights from Cisco ThousandEyes and AWS into a single view can dramatically reduce problem identification and resolution time, the vendors say. By Michael Cooney Nov 28, 2023 4 mins Network Management Software Network Management Software Networking opinion Is anything useful happening in network management? Enterprises see the potential for AI to benefit network management, but progress so far is limited by AI’s ability to work with company-specific network data and the range of devices that AI can see. By Tom Nolle Nov 28, 2023 7 mins Generative AI Network Management Software brandpost Sponsored by HPE Aruba Networking SASE, security, and the future of enterprise networks By Adam Foss, VicePresident Pre-sales Consulting, HPE Aruba Networking Nov 28, 2023 4 mins SASE news AWS launches Cost Optimization Hub to help curb cloud expenses At its ongoing re:Invent 2023 conference, the cloud service provider introduced several new and free updates that are expected to help enterprises optimize their AWS costs. By Anirban Ghoshal Nov 28, 2023 3 mins Amazon re:Invent Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe