* Patches from Cisco, Debian, Fedora, others * Beware Tilebot variant that tries to exploit a number of well-known Windows flaws Today’s bug patches and security alerts:Cisco patches Aironet Wireless Access PointsAccording to a Cisco advisory, “A vulnerability exists in Cisco Aironet Wireless Access Points (AP) running IOS which may allow a malicious user to send a crafted attack via IP address Resolution Protocol (ARP) to the Access point which will cause the device to stop passing traffic and/or drop user connections. Repeated exploitation of this vulnerability will create a sustained DoS (denial of service).” For more, go to:http://www.networkworld.com/go2/0116bug1a.html **********Recent updates from Debian: Petris (buffer overflow, code execution):http://www.debian.org/security/2006/dsa-929smstools (format string, code execution):http://www.debian.org/security/2006/dsa-930xpdf, kpdf (multiple buffer overflows):http://www.debian.org/security/2006/dsa-931 hylafax (code execution):http://www.debian.org/security/2006/dsa-933pound (multiple flaws):http://www.debian.org/security/2006/dsa-934 libapache2 (code execution):http://www.debian.org/security/2006/dsa-935unzip (race condition):http://www.debian.org/security/2005/dsa-903libextractor (multiple buffer overflows):http://www.debian.org/security/2006/dsa-936tetex-bin (multiple buffer overflows):http://www.debian.org/security/2006/dsa-937koffice (multiple buffer overflows):http://www.debian.org/security/2006/dsa-938fetchmail (programming error – aren’t the all?):http://www.debian.org/security/2006/dsa-939gpdf (multiple buffer overflows):http://www.debian.org/security/2006/dsa-940**********Recent patches from Fedora:gettext (file overwrite):http://www.networkworld.com/go2/0116bug1b.htmlhtdig (cross scripting, code execution):http://www.networkworld.com/go2/0116bug1c.htmlethereal (multiple flaws):http://www.networkworld.com/go2/0116bug1d.htmlmozilla (multiple flaws):http://www.networkworld.com/go2/0116bug1e.htmllesstif (multiple flaws):http://www.networkworld.com/go2/0116bug1f.html**********Recent fixes from FreeBSD:texinfo (temp files, privilege escalation):http://www.networkworld.com/go2/0116bug1g.htmlee (temp files, privilege escalation):http://www.networkworld.com/go2/0116bug1h.htmlcpio (multiple flaws):http://www.networkworld.com/go2/0116bug1i.htmlcore/ipfw (denial of service):http://www.networkworld.com/go2/0116bug1j.html**********New alerts from Gentoo:mod_auth_pgsql (multiple format string flaws):http://security.gentoo.org/glsa/glsa-200601-05.xmlClamAV (buffer overflow, code execution):http://security.gentoo.org/glsa/glsa-200601-07.xmlBlender (heap overflow):http://security.gentoo.org/glsa/glsa-200601-08.xmlWine (WMF handling):http://security.gentoo.org/glsa/glsa-200601-09.xml**********New updates from Mandriva:koffice (multiple flaws):http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:008apache2-mod_auth_pgsql (multiple format strings):http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:009cups (multiple overflows):http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:010**********Recent patches from NetBSD:Kernfs (kernel memory disclosure):http://www.networkworld.com/go2/0116bug1k.htmlsettimeofday (bug):http://www.networkworld.com/go2/0116bug1l.html**********New advisories for Ubuntu:libapache2-mod-auth-pgsql (multiple format strings):http://www.networkworld.com/go2/0116bug1m.htmlxpdf (multiple flaws):http://www.networkworld.com/go2/0116bug1n.htmlsudo (privilege escalation):http://www.networkworld.com/go2/0116bug1o.htmlbogofilter (buffer overflow):http://www.networkworld.com/go2/0116bug1p.htmlApache (multiple flaws):http://www.networkworld.com/go2/0116bug1q.html**********Today’s roundup of virus alerts:Troj/Stinx-K — A backdoor Trojan that drops “smsogx32.exe” in the Windows System folder. No word on what an attacker could do with the backdoor. (Sophos)W32/Sdbot-ALZ — Another backdoor worm that spreads through network shares and allows backdoor access through IRC. This variant installs itself as “svchosts.exe” in the Windows System folder. (Sophos)W32/Tilebot-CX — This Tilebot variant tries to exploit a number of well-known Windows flaws as it spreads through network shares. It drops “shell32.exe” in the Windows System directory and can allow remote access via HTTP. (Sophos)Troj/Bckdr-QF — This backdoor gives intruders access via IRC. It installs two files into the Windows System folder: “ctfmon.exe” and “userinit.exe”. (Sophos)W32/Rbot-BJR — An Rbot variant that exploits weak passwords and known Windows flaws to spread through network shares. It drops “Firewall-UpdateV9.exe” in the Windows System folder, allows backdoor access through IRC and attempts to steal registration information for popular games. (Sophos)W32/Rbot-BLC — Another Rbot variant. This one puts “Acrord32.exe” in the Windows System folder. (Sophos)W32/Codbot-K — An IRC backdoor worm with the ability to sniff packets and download additional malicious code. It is installed as “SCardClnt.exe” in the Windows System folder. (Sophos)W32/Antiman-A — A mass-mailing worm that spreads through a message written in Spanish. The infected attachment will have a “EXE” extension. It drops “funny.scr” to the Windows System folder and “startwin.exe” to the user’s Startup folder. (Sophos)W32/Bobax-N — Another e-mail worm. This one purports to have pictures of Osama Bin Laden or Saddam Hussein’s capture/death. The infected attachment will have a pif, exe, scr or zip extension. (Sophos)Troj/Bancban-NQ — A Trojan with the ability to send notification messages to a remote location. It places “system32x.exe” in the Startup and Windows System folders. (Sophos)Mitglieder.HE — A Trojan that needs to be spread manually. It can open port 9031 and act as a proxy server. (Panda Software)Spymaster.A — This virus spreads through e-mail with an attachment called “SERVER.EXE”. It can be used to steal passwords and monitor Web pages visited. (Panda Software)Troj/Paymite-B — A Trojan that changes the Internet Explorer start page. It places “paytime.exe” in the Windows System directory. (Sophos)Troj/Banload-IJ — A Windows Trojan that is used to download additional code. It’s installed as “spoolsv.exe” in the Windows folder. (Sophos)W32/Mytob-GO — This Mytob worm spreads through an e-mail message that looks like an account suspension warning. It can be used to harvest e-mail addresses from the infect host. It drops “svchosts.exe” in the Windows System folder. (Sophos) Related content news analysis Western Digital keeps HDDs relevant with major capacity boost Western Digital and rival Seagate are finding new ways to pack data onto disk platters, keeping them relevant in the age of solid-state drives (SSD). By Andy Patrizio Dec 06, 2023 4 mins Enterprise Storage Data Center news analysis Global network outage report and internet health check Cisco subsidiary ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz and Tim Greene Dec 06, 2023 286 mins Networking news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors Technology Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe