* Patches from Microsoft, Red Hat, SuSE, others * Beware the latest variety of IRC Trojans * Attacks at universities raise security concerns, and other interesting reading Today’s bug patches and security alerts:Four new security updates from MicrosoftApril showers bring Microsoft patches, in this case four of them that patch some 20 various flaws. Three of the advisories/patches have been labeled “critical” (meaning potential code execution on an exploited machine) and the other is “important.” More here:Microsoft issues flood of critical patches, IDG News Service, 04/13/04 https://www.nwfusion.com/news/2004/0413microissue.html?nlMicrosoft advisories: Security Update for Microsoft Windowshttps://www.microsoft.com/technet/security/bulletin/ms04-011.mspxCumulative Update for Microsoft RPC/DCOMhttps://www.microsoft.com/technet/security/bulletin/ms04-012.mspxCumulative Security Update for Outlook Expresshttps://www.microsoft.com/technet/security/bulletin/ms04-013.mspx Vulnerability in the Microsoft Jet Database Engine Could Allow Code Executionhttps://www.microsoft.com/technet/security/bulletin/ms04-014.mspxRelated advisories:iDefense advisory: Microsoft Help and Support Center Argument Injection Vulnerability https://www.nwfusion.com/go2/0412bug2a.htmlISS alert: Multiple Vulnerabilities in Microsoft Productshttps://xforce.iss.net/xforce/alerts/id/169Foundstone: Microsoft ASN.1 Double Free Heap Memory Corruptionhttps://www.foundstone.com/products/sa/fs-sa-04-13-04.pdfFoundstone: Microsoft Releases Bulletins for Numerous Vulnerabilities in Windows, RPC DCOM, Outlook Express, and Jet:https://www.foundstone.com/products/sa/fs-sa-04-13-04-ms.pdf**********Red Hat, SuSE patch cvsA flaw in CVS, a version control system for Linux, could be exploited by an attacker to overwrite arbitrary files on the affected machine. For more, go to:Red Hat:https://rhn.redhat.com/errata/RHSA-2004-154.htmlSuSE:https://www.suse.com/de/security/2004_08_cvs.html**********SGI Advanced Linux Environment security update #17The “SGI Advanced Linux Environment security update #17, which includes updated RPMs for SGI ProPack v2.3 and SGI ProPack v2.4 for the SGI Altix family of systems” fixes problems in Ethereal and Mozilla. For more, go to:https://www.nwfusion.com/go2/0412bug2b.html**********Red Hat patches subversionNo, it’s not a spy tool, but a version control system. A flaw in subversion could allow a remote user to run arbitrary code on the affected machine. For more, go to:https://rhn.redhat.com/errata/RHSA-2004-159.html**********Conectiva issues squid patchA flaw in the way access control lists are handled by the squid proxy application could allow a user to gain access to pages they normally wouldn’t have access to. For more, go to:https://www.nwfusion.com/go2/0412bug2c.htmlConectiva patches mod_pythonA flaw in mod_python could be exploited in a denial-of-service attack against the affected machine. For more, go to:https://www.nwfusion.com/go2/0412bug2d.html**********Debian updatesDebian has released a handful of updates for its kernel:Kernel-image-2.4.17-hppa:https://www.debian.org/security/2004/dsa-475Kernel-image-2.4.17-hppa, kernel-image-2.4.18-hppa:https://www.debian.org/security/2004/dsa-480Kernel-source-2.4.17, kernel-patch-2.4.17-apus, kernel-patch-2.4.17-s390, kernel-image-2.4.17-s390:https://www.debian.org/security/2004/dsa-482Linux-kernel-2.4.17-ia64:https://www.debian.org/security/2004/dsa-481Linux-kernel-2.4.18-alpha+i386+powerpc:https://www.debian.org/security/2004/dsa-479Debian patches sysstatThe isag utility in sysstat does not properly create temporary files, which could be exploited by a local attacker to overwrite files on the affected system. For more, go to:https://www.debian.org/security/2004/dsa-460Debian issues patch for interchangeAccording to Debian, “A vulnerability was discovered recently in Interchange, an e-commerce and general HTTP database display system. This vulnerability can be exploited by an attacker to expose the content of arbitrary variables. An attacker may learn SQL access information for your Interchange application and use this information to read and manipulate sensitive data.” For more, go to:https://www.debian.org/security/2004/dsa-471**********Gentoo patches GNU automakeAutomake, which generates ‘makefile.in’ files, could be vulnerable to a symbolic link attack. A user could exploit this to gain elevated privileges on the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=158992Gentoo makes Heimdal fix availableAccording to an alert from Gentoo, “Heimdal contains cross-realm vulnerability allowing someone with control over a realm to impersonate anyone in the cross-realm trust path.” Sounds like a plot from the Matrix. For more, go to:https://forums.gentoo.org/viewtopic.php?t=159355′Scorched 3D server patches by GentooA flaw in the Scorched 3D game server could be exploited in a denial-of-service attack against the affected machine. For more, go to:https://forums.gentoo.org/viewtopic.php?t=159415**********Today’s roundup of virus alerts:W32/Agobot-FZ – An IRC Trojan that spreads to machines via weakly protected network shares. It also attempts to disable various security-related applications running on the infected machine. (Sophos)Troj/Webber-H – A two-part Trojan that uses a mass-mailer to spread and then downloads a password stealing application. (Sophos)Troj/LdPinch-L – A password-stealing Trojan horse that also attempts to download malicious code from a remote site. (Sophos)W32/Sdbot-HL – Yet another IRC Trojan that allows attackers access to the infected machine. It spreads via weakly-protected network shares. (Sophos)W32/Agobot-GG – Like Agobot-FZ mentioned above, the virus uses IRC channels to allow attackers into the infected machine and attempts to disable security related applications. (Sophos)**********From the interesting reading department:Attacks at universities raise security concernsMalicious hackers in recent weeks have infiltrated computer systems at universities in the U.S. and worldwide, leading to questions about the security of scientific research data, according to an official at the National Science Foundation. IDG News Service, 04/14/04.https://www.nwfusion.com/news/2004/0414attack.html?nlCompany warns of bugged spam messagesHidden code in e-mail messages is increasingly being used to track the success of unsolicited commercial (“spam”) e-mail campaigns, according to a warning by an anti-spam technology company Tuesday. IDG News Service, 04/13/04.https://www.nwfusion.com/news/2004/0413bugged.html?nlCisco releases WLAN security protocolCisco announced the availability of a protocol that’s designed to defeat brute-force dictionary attacks that capture users’ passwords in its wireless LAN products. The company urged end users and systems administrators to download the related patch from its Web site. Computerworld, 04/13/04.https://www.nwfusion.com/news/2004/0413ciscorelea.html?nlOn Security: Let’s end pass-the-buck securityAt InfowarCon in 1997, one of the first public debates was held on who should protect the private sector (an economic national security asset) from the “bad guys” – not just from hacking, but also international espionage and terrorism. There were two camps. One suggested that the government should take the protective lead. The other camp said, “No, keep the Feds out of my company. We’ll take care of ourselves.” Network World, 04/12/04.https://www.nwfusion.com/columnists/2004/0412schwartau.html?nlMobile security start-up receives fresh fundingMobile security vendor Senforce Technologies has reaped $12.4 million in its latest venture funding round. Network World Fusion, 04/14/04.https://www.nwfusion.com/news/2004/0414senforce.html?nlMicrosoft bolsters executive ranks at security unitMicrosoft, as part of its battle against cybersecurity threats, is moving two senior executives to its security business and technology unit, the company said Monday. IDG News Service, 04/12/04.https://www.nwfusion.com/news/2004/0412microbolst.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Industry news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe