* Patches from Conectiva, Mandrake Linux, HP, others * Beware new Bagle variant * Users, vendors treating healthcare patching ills, and other interesting reading Today’s bug patches and security alerts:PHP patches availableA flaw in the popular PHP server-side scripting language could be exploited remotely to cause a “memory_limit request termination” on the affected machine. An attacker could exploit this to take control of the machine and run any code they wanted. For more, go to:Conectiva: https://www.nwfusion.com/go2/0719bug1a.htmlGentoo: https://forums.gentoo.org/viewtopic.php?t=198236Mandrake Linux:https://www.nwfusion.com/go2/0719bug1b.htmlSuSE:https://www.suse.com/de/security/2004_21_php4.html********** Conectiva patches WebminA flaw in Webmin, a Web-based administration tool for Unix/Linux, could be exploited by an attacker to bypass authentication and gain read access rights to the module’s configuration information. For more, go to:https://www.nwfusion.com/go2/0719bug1c.html********** Conectiva, Gentoo update respective kernelsA new version of the Conectiva and Gentoo Linux kernels are available. The update fixes a number of bugs and security issues found in previous releases. For more, go to:Conectiva:https://www.nwfusion.com/go2/0719bug1d.htmlGentoo:https://forums.gentoo.org/viewtopic.php?t=197969**********Mandrake Linux patches ipsec-toolsTwo vulnerabilities have been found in racoon, an ipsec implementation. One could allow a remote attacker to launch a denial-of-service attack against the affected machine. Another could be exploited in a man-in-the-middle attack that’s used to create an unauthorized connection. For more, go to:https://www.nwfusion.com/go2/0719bug1e.htmlMandrake Linux releases freeswan updateAccording to an alert from Mandrake Linux, “Thomas Walpuski discovered a vulnerability in the X.509 handling of super-freeswan, openswan, strongSwan, and FreeS/WAN with the X.509 patch applied. This vulnerability allows an attacker to make up their own Certificate Authority that can allow them to impersonate the identity of a valid DN. As well, another hole exists in the CA checking code that could create an endless loop in certain instances.” For more, go to:https://www.nwfusion.com/go2/0719bug1f.html**********OpenPKG issues Apache updateA flaw in the mod_ssl module for OpenPKG’s Apache implementation has been patched. For more, go to:https://www.openpkg.org/security/OpenPKG-SA-2004.029-apache.txt**********HP patches wu-ftpdA flaw in the wu-ftp daemon (wu-ftpd) for HP-UX could be exploited by a local user to gain access to files they don’t have authorization to view. For more, go to:https://www.nwfusion.com/go2/0719bug1h.html**********Today’s roundup of virus alerts:New Bagle variant seen in the wildAnti-virus software companies late Thursday and early Friday began warning e-mail users that the persistent Bagle virus has re-emerged in a new version, Bagle.AF or Beagle.AB. IDG News Service, 07/16/04.https://www.nwfusion.com/news/2004/0716newbagle.html?nlW32/Agobot-KS – A typical Agobot variant that allows backdoor access via IRC and spreads via network shares with weak password protection. The virus installs itself as “SYSTEMCFG.EXE” in the Windows System folder. (Sophos)W32/Agobot-KT – Similar to Agobot KS, except this variant tries to exploit the Windows LSASS vulnerability reported a few months ago. Installs itself as “MSAWINDOWS.EXE” in the Windows System folder. (Sophos)W32/Agobot-KN – Like its cousins above, this Agobot variant allows backdoor access and attempts to steal user passwords. It infects the files RUNDLL.EXE or WIN.EXE in the Windows System directory. (Sophos)W32/Agobot-KW – The same as the Agobots above in that it uses IRC and network shares to spread. It infects the file “svchosts.exe”. (Sophos)W32/Rbot-DS – A Trojan that can be used for launching denial-of-service attacks against random targets. The virus infects network shares protected by weak passwords and infects the “CSASS.EXE” file in the Windows System directory. IRC is used to remotely control the infected machine. (Sophos)W32/Rbot-DT – Similar to Rbot-DS above, except it infects “WINCFG32.EXE” and may also try to delete certain common network share names. (Sophos)W32/Rbot-DY – Another Rbot variant that uses IRC as a remote control source. This variant infects the file “lmrss.exe” in the Windows System folder. (Sophos)W32/Rbot-DP – Like other Rbot variants, W32/Rbot-DP uses network shares and IRC backdoors to spread. (Sophos)W32/Atak-B – A mass-mailing work with reported ties to Al-Qaeda. It infects the files “svrhost.exe”, harvests e-mail addresses from the infected machines, shuts down security applications and launches a DoS attack against www.techtv.com. It also opens a TCP port to listen for more instructions. (Sophos)WinCE4.Dust – The first proof-of-concept virus for Windows CE devices. Doesn’t sound like it’s in the wild, it’s only been passed on to the anti-virus companies. (BitDefender, Sophos)**********From the interesting reading department:Microsoft releases Remove Hidden Data 1.1A new version of the Remove Hidden Data tool is now available from Microsoft. The tool strips comments, tracked changes and other hidden items that may be in an Office document.https://www.nwfusion.com/go2/0719bug1g.htmlUsers, vendors treating healthcare patching illsThere continues to be plenty of finger-pointing over who should fix the broken process for patching Windows-based patient-care systems, but some users and vendors are at least trying to deal with the problem directly. Network World, 07/19/04.https://www.nwfusion.com/news/2004/071904hospitalpatch.htmlReview: Security event management softwareNetIQ’s Security Manager 5.0 does an impressive job sorting through security. Network World, 07/19/04.https://www.nwfusion.com/reviews/2004/071904netiqrev.html?nlAventail goes small with SSL VPN applianceAventail is wheeling out a scaled-down, less-expensive version of its Secure Sockets Layer VPN security. Network World, 07/19/04.https://www.nwfusion.com/news/2004/071904aventail.html?nlMarriage of components called key to securityRegulatory and security pressures are fueling a rush to turn directory, identity and other network infrastructure services into components that provide a reusable security layer as part of a service-oriented architecture. Network World, 07/19/04.https://www.nwfusion.com/news/2004/071904catalyst.html?nlIPass beefing up policy enforcementGlobal service provider iPass is introducing security features this week aimed at enforcing the corporate security policies of its customers. Network World, 07/19/04.https://www.nwfusion.com/news/2004/071904carripass.html?nlHacker source code shop closes its doorsAn online shop that was selling the source code for two computer programs has abruptly suspended its operations, citing a “redesign” of its “business model.” IDG News Service, 07/15/04.https://www.nwfusion.com/news/2004/0715hackesourc.html?nlSecure Computing rejects CyberGuard takeover bidNetwork security firm Secure Computing has rejected an unsolicited buyout bid from rival CyberGuard, saying it did not believe it was in the best interest of shareholders. IDG News Service, 07/16/04.https://www.nwfusion.com/news/2004/0716securcompu.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe