* Patches from Debian, Mandrake Linux, Slackware * Beware new e-mail worm Beagle 2 * Microsoft's latest patch raises questions about its tools, and other interesting reading Today’s bug patches and security alerts:Debian patches netpbm-freeA number of the graphic conversion tools that make up netpbm-free have been found to create insecure temporary files. An attacker could exploit this to overwrite files on the affected machine with the privileges of the user running netpbm-free. For more, go to:https://www.debian.org/security/2004/dsa-426 Debian issues fix for mc flawA vulnerability in mc (Midnight Commander), a file management tool, could be exploited by using malicious code hidden inside a compressed file. This code could be run on the affected machine when the compressed file is opened by mc. For more, go to: https://www.debian.org/security/2004/dsa-424Debian releases patch for mod-auth-shadowDebian is warning of a vulnerability of mod-auth-shadow that could allow a user to gain access to the affected machine using an expired password. Mod-auth-shadow is an Apache module. For more, go to:https://www.debian.org/security/2004/dsa-421Debian reports flaw in jitterbugA flaw in jitterbug, a bug tracking system, could be exploited to run arbitrary commands on the affected machine. For more, go to: https://www.debian.org/security/2004/dsa-420**********Debian, EnGarde, OpenPKG patch tcpdumpA flaw in the ISAKMP message handling function of tcpdump, a network monitoring utility, could be exploited to send the tool into an endless loop. For more, go to: Debian:https://www.debian.org/security/2004/dsa-425EnGarde:https://www.nwfusion.com/go2/0119bug1a.htmlOpenPKG:https://www.openpkg.org/security/OpenPKG-SA-2004.002-tcpdump.html**********Mandrake Linux patches KDEA buffer overflow in KDE’s VCF file reader could be exploited by an attacker to run arbitrary code on the affected machine. For more, go to:https://www.nwfusion.com/go2/0119bug1b.html**********Slackware patches INNA buffer overflow has been found in inn 2.4.0 implemented by Slackware. The flaw could be exploited remotely to allow an attacker to run arbitrary code on the affected machine. For more, go to:https://www.nwfusion.com/go2/0119bug1c.html**********Today’s roundup of virus alerts:New e-mail worm spreading worldwideBeagle 2, the European Space Agency’s Mars explorer, did not have much success with its mission of exploring the surface of the Red Planet. But a new e-mail worm with the same name is apparently having better luck exploring the Internet, according to warnings issued Monday by leading anti-virus software companies. The new worm, known as W32.Beagle and W32.Bagle, appeared on Sunday. IDG News Service, 01/19/04.https://www.nwfusion.com/news/2004/0119newemai.html?nlTroj/Proxin-A – A backdoor Trojan that infects Windows PCs. No word on how it spreads. (Sophos)Exploit/URLSpoof – Not a virus but a means of disguising a URL so it looks as if clicking it will bring you to one site, but in reality you’re delivered to another (most likely malicious). (Panda Software)Troj/Divix-A – A Trojan that uses mIRC to gain unauthorized access to the infected machine. (Sophos)Troj/Weasyw-A – Another Trojan horse virus. This one attempts to redirect Internet Explorer to a number of pre-defined sites. (Sophos)W32/SdBot-DC – Yet another backdoor Trojan horse. This one spreads via weakly protected network shares. (Sophos)**********From the interesting reading department:Microsoft’s latest patch raises questions about its toolsQuestions are being raised about how well Microsoft’s own tools for scanning and patching are working to apply its most recent patch, MS04-003, to correct security vulnerabilities associated with what’s called the Microsoft Data Access Component. Network World Fusion, 01/16/04.https://www.nwfusion.com/news/2004/0116mspatch.html?nlNetScaler beefs up Web switchNetScaler this week is set to launch two high-end versions of its Web switch/security gateway products that could help Web-based companies accelerate the processing, encryption and filtering of Web-based traffic for sites that receive millions of hits per day. Network World, 01/19/04.https://www.nwfusion.com/news/2004/0119netscaler.html?nlFlaw in standard puts VoIP gear at riskVoice over IP is making it easier to wage cyberwar, an analyst reported last week, just as flaws that make some VoIP products vulnerable were revealed. Network World, 01/19/04.https://www.nwfusion.com/news/2004/0119voipflaw.html?nlISS backs new IPS offering with cash-or-credit guaranteeInternet Security Systems is so confident that the managed security offering it is announcing next week will automatically block certain network attacks that it pledges to pay customers thousands of dollars in credit or cash if the service fails. Network World, 01/19/04.https://www.nwfusion.com/news/2004/0119iss.html?nlAMD chips include buffer overflow protectionAdvanced Micro Devices’ Opteron and Athlon 64 processors can detect a commonly used attack against PCs connected to the Internet and render it harmless by blocking malicious code from executing, AMD said this week. IDG News Service, 01/14/04.https://www.nwfusion.com/news/2004/0114amdchips.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe