* Patches from Conectiva, Red Hat, Debian, others * Top 10 virus reported in December 2003 * Microsoft upgrades security tool that verifies system configuration, and other interesting reading Today’s bug patches and security alerts:Cisco warns of voice product flaws on IBM serversAccording to an alert from Cisco, “The default installation of Cisco voice products on the IBM platform will install the Director Agent in an unsecure state, leaving the Director services vulnerable to remote administration control and/or Denial of Service attacks.” For more, go to:https://www.nwfusion.com/go2/0119bug2a.html **********Conectiva patches screen A buffer overflow in screen could be exploited by an attacker that sends 2 gigabytes of data to the affected machine. A fix is available that also patches a problem with window sizing. For more, go to:https://www.nwfusion.com/go2/0119bug2b.htmlConectiva releases patch for kdepimA buffer overflow in KDE’s VCF file reader could be exploited by an attacker to run arbitrary code on the affected machine. For more, go to:https://www.nwfusion.com/go2/0119bug2c.htmlConectiva issues fix for cvs flaw A flaw in the account management for the CVS pserver could allow anyone with access to the server to modify the CVSROOT/passwd file to give themselves root access to the affected machine. For more, go to:https://www.nwfusion.com/go2/0119bug2d.html**********Red Hat patches mc A vulnerability in mc (Midnight Commander), a file management tool, could be exploited by using malicious code hidden inside a compressed file. This code could be run on the affected machine when the compressed file is opened by mc. For more, go to:https://rhn.redhat.com/errata/RHSA-2004-034.html**********Debian, Trustix release patch for slocateA buffer overflow vulnerability in slocate, a secure version of the file search utility locate, could be exploited by a malicious user to gain the group privilege of slocate. The attacker could use this to view all data in the slocate database. For more, go to:Debian:https://www.debian.org/security/2004/dsa-428Trustix:https://www.nwfusion.com/go2/0119bug2e.html**********Flaw found in honeydA flaw in honeyd, a virtual honeypot daemon, could allow an attacker to detect the IP addresses being simulated by the application. A fix is available:https://www.citi.umich.edu/u/provos/honeyd/Gentoo patch for honeyd:https://forums.gentoo.org/viewtopic.php?t=126976**********Today’s roundup of virus alerts:Nothing new to report today, so we bring you the top 10 viruses reported in December 2003, according to Sophos:1. W32/Sober-C2. W32/Mimail-K3. W32/Dumaru-A4. W32/Mimail-J5. W32/Mimail-C6. W32/Gibe-F7. W32/Mimail-I8. W32/Klez-H9. W32/Torvil-A10. W32/Mimail-F**********From the interesting reading department:Microsoft upgrades security tool that verifies system configurationAs part of the overhaul of its patch management tools, Microsoft on Tuesday released the next version of a tool that detects bad configurations that could leave users open to security vulnerabilities. Network World Fusion, 01/20/04.https://www.nwfusion.com/news/2004/0120microbase.html?nlWireless Wizards: How can WPA be more secure than WEP?While it is true that both Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP) have a pre-shared key as the basis for encryption, they actually use the pre-shared key in very different ways. Network World, 01/19/04.https://www.nwfusion.com/columnists/2004/0119wizards.html?nlSlammer: One year laterCash machines froze. Airlines and hospitals dusted off paper forms to schedule reservations and track patients. This was the scene on Jan. 25, 2003, shortly after the Slammer worm appeared and quickly began spreading around the world, flooding computer networks with worm-generated traffic and knocking vital database servers offline. IDG News Service, 01/20/04.https://www.nwfusion.com/news/2004/0120slammoney.html?nlLinuxWorld: SuSE, IBM gain higher security certificationRaising the security bar one notch higher, SuSE Linux AG and IBM Wednesday said they have achieved a more rigorous security certification for Linux operating system software running on Big Blue servers. With the higher-level security evaluation, the two companies hope to attract governments and organizations with critical operations to open source Linux software. IDG News Service, 01/21/04.https://www.nwfusion.com/news/2004/0121linuxsus.html?nlExperts challenge U.S. online voting systemCiting concerns over security, four computer experts are urging the U.S. government to drop plans to allow U.S. civilians who reside oversees to cast their votes online. IDG News Service, 01/22/04.https://www.nwfusion.com/news/2004/0122experchall.html?nlWhite paper: Is finding security holes a good idea?A large amount of effort is expended every year on finding and patching security holes. The underlying rationale for this activity is that it increases welfare by decreasing the number of bugs available for discovery and exploitation by bad guys, thus reducing the total cost of intrusions. RTFM.com, 01/21/04.https://www.rtfm.com/bugrate.pdf Related content news Dell provides $150M to develop an AI compute cluster for Imbue Helping the startup build an independent system to create foundation models may help solidify Dell’s spot alongside cloud computing giants in the race to power AI. By Elizabeth Montalbano Nov 29, 2023 4 mins Generative AI news DRAM prices slide as the semiconductor industry starts to decline TSMC is reported to be cutting production runs on its mature process nodes as a glut of older chips in the market is putting downward pricing pressure on DDR4. By Sam Reynolds Nov 29, 2023 3 mins Flash Storage Technology Industry news analysis Cisco, AWS strengthen ties between cloud-management products Combining insights from Cisco ThousandEyes and AWS into a single view can dramatically reduce problem identification and resolution time, the vendors say. By Michael Cooney Nov 28, 2023 4 mins Network Management Software Cloud Computing opinion Is anything useful happening in network management? Enterprises see the potential for AI to benefit network management, but progress so far is limited by AI’s ability to work with company-specific network data and the range of devices that AI can see. By Tom Nolle Nov 28, 2023 7 mins Generative AI Network Management Software Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe