* Patches from Gentoo * Beware Korgo variant * Network World Fusion Radio: Designing network security, and other interesting reading Today’s bug patches and security alerts:Gentoo has released a number of updates over the past couple weeks, we recap them here for you:Horde-ChoraTwo vulnerabilities exist in the Horde-Chora package. First, a flaw in the diff viewer in Chora could be exploited to inject shell code. Second, a flaw in the Horde file upload capability could be used to upload malicious binary files to the affected server. For more, go to: https://forums.gentoo.org/viewtopic.php?t=186038Squirrelmail The SquirrelMail application does not properly “sanitize” user input, which could be exploit in a cross-scripting attack to access Webmail accounts on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=186037GalleryA flaw in the Gallery photo viewer application could be exploited by a malicious user to gain administrator privileges on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=186040Webmin Two security flaws in the Webmin Web-based administration tool for Linux could be exploited in a denial-of-service attack against the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=186339Horde-IMPA flaw in the Horde-IMP application for Gentoo could be exploited by a malicious user to run scripts on the affected machine. A target user would have to open an e-mail containing the code in order for the exploit to happen. For more, go to: https://forums.gentoo.org/viewtopic.php?t=186332SquidAccording to Gentoo, “If Squid is configured to use NTLM authentication, an attacker could exploit this vulnerability by sending a very long password. This could lead to arbitrary code execution with the permissions of the user running Squid.” For more, go to:https://forums.gentoo.org/viewtopic.php?t=186764AspellAspell, a spell checker application, uses word-list-compress files for checking custom words. A flaw in the way the word-list-compress files are handles could be exploited by a malicious user to run arbitrary scripts on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=187089UserminTwo flaws exist in the Gentoo usermin implementation. One flaw could be used to lock a legitimate user out of the affected machine. A second, more serious, flaw could be exploited by using a specially-crafted e-mail message containing malicious scripts. For more, go to:https://forums.gentoo.org/viewtopic.php?t=187326IPSec-ToolsA flaw in the racoon implementation of IPSec-Tools leaves the system vulnerable to a man-in-the-middle attack, which could be used to make unauthorized connection to the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=188869giFT-FastTrackA flaw in the giFT-FastTrack plug-in could be exploited in a remote denial-of-service attack against the giFT server daemon. For more, go to:https://forums.gentoo.org/viewtopic.php?t=189870GzipA flaw in the way temporary files are handled by gzip could result in arbitrary code being run on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=189767FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handlingAccording to a Gentoo alert, “With a carefully crafted certificate payload an attacker can successfully authenticate against FreeS/WAN, Openswan, strongSwan or Super-FreeS/WAN, or make the daemon go into an endless loop.” For more, go to:https://forums.gentoo.org/viewtopic.php?t=190289**********Today’s roundup of virus alerts:W32/Korgo-R – A Korgo variant that tries to exploit the Windows LSASS vulnerability. It infects the Windows System directory using a random filename and may download malicious code to the affected machine. (Sophos)W32/Korgo-S – Similar to Korgo-R with added fun of trying to delete the “FTPUPD.EXE” file and other Windows System utilities. (Sophos)W32/NetskyP-Dam – Fortunately, this is a damaged version of Netsky-P and does not seem to cause any real damage. (Sophos)**********From the interesting reading department:Network World Fusion Radio: Designing network securitySecurity challenges take center stage this week as Merike Kaeo, author of “Designing Network Security, Second Edition” and chief network security architect at Double Shot Security, joins us to discuss protecting corporate networks. Network World Fusion, 06/24/04.https://www.nwfusion.com/research/2004/0624radio.html?nlAkamai attack underscores DNS risksAn attack earlier this month aimed at DNS services for high-profile Akamai Technologies customers should be a wakeup call for enterprise users to ensure they have contingency plans to deal with a growing number of Internet threats, analysts say. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804akamaifolo.htmlSecurity appliance protects corp. gatewaysAttempting to give corporations a low-cost way to fight spam and viruses, WorkGroup Solutions last week released a new version of its security appliance with enhancements to its reporting and virus-detection capabilities and added a directory harvest defense mechanism. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804workgroup.html?nlVeriSign announces security, anti-phishing servicesVeriSign this week plans to announce two sets of services to combat spam as well as fraud caused when criminals set up phony Web sites that mimick legitimate ones to gain victims’ personal data. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804verisign.html?nlsAnti-phishing efforts need teethAs phishing quickly becomes the next big headache for consumers and businesses wanting to communicate with them via e-mail, a number of industry groups have emerged to combat the problem. However, until technology is implemented to authenticate e-mail sources, observers say little can be done to fight this form of electronic fraud. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804phishing.htmlEnterasys delivers switch-based securityEnterasys Networks this week is scheduled to announce capabilities on its LAN edge switches that will let administrators effectively cut off virus-infected or virus-vulnerable machines trying to access corporate resources. Network World, 06/28/04.https://www.nwfusion.com/news/2004/0628enterasys.html?nlJuniper SSL boxes ease net accessJuniper is adding support for Security Assertion Markup Language to its remote-access gear, technology that lets users sign on once to a Secure Sockets Layer remote-access gateway and reach network resources without further authentication. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804juniper.html?nlEarthquakes, fire and lightning: Must be a NEBS testAt NTS, telecom gear needs to survive the flame test and an earthquake simulator that tops 7 on the Richter scale, plus make it through chambers that determine whether equipment can handle extreme hot and cold temperatures as well as lightning strikes and high altitudes. Sometimes testers, armed with shotguns, even take boxes out back and try to shoot through their cabinets with No. 6 steel shot from 50 feet away. Network World, 06/28/04.https://www.nwfusion.com/news/2004/062804widernetnebs.html?nl Related content news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking news Gartner: Just 12% of IT infrastructure pros outpace CIO expectations Budget constraints, security concerns, and lack of talent can hamstring infrastructure and operations (I&O) professionals. By Denise Dubie Dec 07, 2023 4 mins Network Security Data Center Industry feature Data centers unprepared for new European energy efficiency regulations Regulatory pressure is driving IT teams to invest in more efficient servers and storage and improve their data-center reporting capabilities. By Maria Korolov Dec 07, 2023 7 mins Enterprise Storage Enterprise Storage Enterprise Storage news analysis AMD launches Instinct AI accelerator to compete with Nvidia AMD enters the AI acceleration game with broad industry support. First shipping product is the Dell PowerEdge XE9680 with AMD Instinct MI300X. By Andy Patrizio Dec 07, 2023 6 mins CPUs and Processors Generative AI Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe