* Patches from Red Hat, Apple, Gentoo, others * Beware another version of the Sober worm * Companies mull commercial vs. freeware SSH, and other interesting reading We’re back from the holiday break. Happy New Year to all our faithful readers!Today’s bug patches and security alerts:Red Hat issues kernel updatesRed Hat has issued two kernel updates. One for Version 2.4 of its kernel is a general bug fix release. A second update fixes a flaw that could allow unauthorized root access to the infected machine. For more, go to: Updated kernel resolves security vulnerability:https://rhn.redhat.com/errata/RHSA-2003-417.html General kernel update:https://rhn.redhat.com/errata/RHBA-2003-394.htmlRed Hat patches Apache flawsA minor buffer overflow vulnerability has been found in Red Hat’s implementation of the popular Apache Web server software. A fix is available. For more, go to:https://rhn.redhat.com/errata/RHSA-2003-320.html********** Apple patches Jaguar and PantherUpdates are available for Apple’s Jaguar (Mac OS X 10.2.8 and Mac OS X Server 10.2.8) and Panther (Mac OS X 10.3.2 and Mac OS X Server 10.3.2) operating systems. These updates fix a number of minor security vulnerabilities. For more, go to:Jaguar:https://www.info.apple.com/kbnum/n120291 Panther:https://www.info.apple.com/kbnum/n120292**********Updated Flash player fixes flawA flaw in the way the Macromedia Flash Player works with Opera and Internet Explorer could be exploited to gain access to information stored on the affected machine. Version (7.0.19.0) of the player can be downloaded to fix the problem. For more, go to:https://www.nwfusion.com/go2/0105bug1a.html**********SGI releases Advanced Linux Environment security update #7A new security update is available from SGI that includes “updated RPMs for SGI ProPack v2.3 for the Altix family of systems.” For more, go to:https://www.nwfusion.com/go2/0105bug1b.html**********Gentoo patches lftpAccording to an alert from Gentoo, “Two buffer overflow problems have been found in lftp, a multithreaded command-line based FTP client. A specially created directory on a web server could be used to execute arbitrary code on the connecting machine. The user’s machine has to connect to a malicious web server using HTTP or HTTPS, then issue an “ls” or “rels” command.” For more, go to:https://forums.gentoo.org/viewtopic.php?t=116668Gentoo issues cvs updateA new version of cvs is available (1.11.11) that fixes a flaw that could allow the cvs server to use root privileges. An attacker could exploit this to run arbitrary code on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=114012**********Mandrake Linux issues fix for XFree86A flaw in the XDM display manager that comes with XFree86 could result in root privileges being granted to anyone with a valid login credential. For more, go to:https://www.nwfusion.com/go2/0105bug1c.htmlMandrake Linux releases patch for proftpdA flaw in the way proftpd handles ASCII translation could be exploited by an attacker to create a root shell on the affected machine. For more, go to:https://www.nwfusion.com/go2/0105bug1d.htmlMandrake Linux patches irssiVersions of irssi prior to 0.8.9 could be exploited by a user to crash another user’s irssi client. For more, go to:https://www.nwfusion.com/go2/0105bug1e.html**********Today’s roundup of virus alerts:W32/Sober-C – Yet another version of the Sober worm that spreads via e-mail and peer-to-peer networks. The infected file is allegedly a tool to protect against such viruses. Sober can overwrite a number of popular file types, including executables. (Sophos, Panda Software)Duster.B – A Trojan horse that spreads via Kazaa and network shares. Once it infects a machine, the virus connects to an IRC server to await further instructions. (Panda Software)Wincap.B – A password-stealing virus that attempts to capture the passwords used to log on to specific financial Web sites. (Panda Software)W32/Bodiru-A – This worm spreads via peer-to-peer networks and is used to launch a denial-of-service attack against symantec.com. It also terminates anti-virus related processes on the infected machine. (Sophos)Troj/Tofger-L – A key logging Trojan horse that send captured information to a remote Web site. (Sophos)W32/Opaserv-S – This worm attempts to take advantage of weak network shares used by Windows 95 and 98. The virus also tried to update itself from a remote Web site. (Sophos)Firedaemon.A – A hacking tool that can setup services to run on the infected Windows 2003/XP/2000/NT machines. This virus itself is not malicious but could be exploited by other “malware.” (Panda Software)Memwatcher.B – An adware program that displays banners in Internet Explorer and generates traffic for two URLs. (Panda Software)**********From the interesting reading department:Technology Update: New IDS tool fends off false positivesPassive fingerprinting improves intrusion detection. Network World, 01/05/04.https://www.nwfusion.com/news/tech/2004/0105techupdate.html?nlManagement Strategies: How to quantify downtimeCalculating downtime’s drag on productivity and profit can help make the case for network improvements. Network World, 01/05/04.https://www.nwfusion.com/careers/2004/0105man.html?nlCompanies mull commercial vs. freeware SSHIt’s a battle going on across many large corporations: should they manage remote servers via Open Secure Shell freeware or commercial SSH products? Network World, 01/05/04.https://www.nwfusion.com/news/2004/0105ssh.html?nlNokia upgrades its SSL remote-access softwareNokia has upgraded its Secure Sockets Layer remote-access gear to better handle key popular applications such as Microsoft Exchange and Lotus Notes. Network World, 01/05/04.https://www.nwfusion.com/news/2004/0105nokia.html?nlIT vs. the mischief makersAs cyberpunks crank up their games, network executives fight back by building security-aware corporate cultures. Network World, 12/22/03.https://www.nwfusion.com/power/2003/1222mischief.html?nlMitnick offers cash for hacking talesNoted computer hacker Kevin Mitnick is offering cash in exchange for tales of hacking escapades to fill a new book he is writing for publisher John Wiley & Sons. IDG News Service, 12/30/03.https://www.nwfusion.com/news/2003/1230mitnioffer.html?nlGuide for Mapping Types of Information and Information Systems to Security CategoriesNIST has completed the first draft of NIST Special Publication 800-60, Guide for Mapping Types of Information and Information Systems to Security Categories. The purpose of the draft guideline is to assist Federal government agencies in identifying information types and information systems and assigning impact levels for confidentiality, integrity, and availability. National Institute of Standards and Technology.https://csrc.nist.gov/publications/drafts.html Related content news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Network Security Networking news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe