* Patches from Apple, Debian, OpenPKG, others * Beware latest variants of Bugbear, Netsky, Bagle, Agobot * Server Sleuths: Securing servers, and other interesting reading Today’s bug patches and security alerts:Apple patches Mac OS X flawsApple has released a patch that fixes a couple of vulnerabilities in its Mac OS X server and client operating systems. One of the flaws in the AppleFileServer is a buffer overflow that could be exploited to gain administrative privileges on the affected machine, according to an alert from @Stake. For more, go to:Apple advisory: https://docs.info.apple.com/article.html?artnum=61798@Stake AppleFileServer advisory: https://www.atstake.com/research/advisories/2004/a050304-1.txt**********Debian, Slackware and Trustix patch rsync flawA vulnerability in the rsync file transfer program could be exploited to write files outside the intended directory. For more, go to:Debian:https://www.debian.org/security/2004/dsa-499 Slackware:https://www.nwfusion.com/go2/0503bug2a.htmlTrustix:https://www.nwfusion.com/go2/0503bug2b.html **********Debian patches flimA flaw in the way flim, an emacs library for working with Internet messages, writes temporary files could be exploited to overwrite files on the affected machine. For more, go to:https://www.debian.org/security/2004/dsa-500Debian releases patch for etermA flaw in the eterm terminal emulator for Debian could be exploited to insert and execute hidden commands without the user’s knowledge. For more, go to:https://www.debian.org/security/2004/dsa-496**********SuSE releases kernel updateSuSE has release a kernel update that fixes a number of vulnerabilities in previous releases. The flaws could be exploited for privilege elevation and in denial-of-service attacks against the affected machine. For more, go to:https://www.suse.com/de/security/2004_10_kernel.html**********Trustix update fixes flaws in libpng and proftpdA new Trustix update fixes flaws in two packages. First, a libpng flaw could be exploited in a denial-of-service attack against the affected machine. Second, a proftpd flaw could allow access to files the user would not normally have rights to. For more, go to:https://www.nwfusion.com/go2/0503bug2c.html**********OpenPKG patches proftpdA flaw in Version 1.2.9 of proftpd for Mandrake Linux may allow a client access to files that the user should not have access to. For more, go to:https://www.openpkg.org/security/OpenPKG-SA-2004.018-proftpd.html**********Slackware patches sysklogdA flaw in sysklogd could result in unallocated memory being overwritten, causing the application to crash. For more, go to:https://www.nwfusion.com/go2/0503bug2d.htmlSlackware issues libpng fixA flaw in the way libpng creates error messages could be exploited in a denial-of-service attack. For more, go tohttps://www.nwfusion.com/go2/0503bug2e.html**********SGI Advanced Linux Environment security update #19This release includes updated RPMs for SGI ProPack v2.4 for the SGI Altix family of systems and fixes flaws in wu-ftpd, XFree86 and util-linux. For more, go to:https://www.nwfusion.com/go2/0503bug2f.html**********Today’s roundup of virus alerts:Almost 1.5 million users download Sasser cleanup toolAlmost 1.5 million Windows customers downloaded a cleanup tool for the Sasser Internet worm in the first two days after Microsoft began offering the tool on Sunday, according to a Microsoft spokeswoman. IDG News Service, 05/04/04.https://www.nwfusion.com/news/2004/0504microalmos.html?nlDownload the cleanup tool:https://www.microsoft.com/security/incident/sasser.aspSasser infections hit Amex, othersSecurity experts are continuing to issue warnings about the Sasser Internet worm as organizations struggled to clean up the damage caused by infected hosts. IDG News Service, 05/04/04.https://www.nwfusion.com/news/2004/0504sasseinfec.html?nlW32/Famus-A – A mass-mailing worm that spreads via a message with a subject line of “Que sabe el Pentagono sobreusted (What the Pentagon knows about you)” and an attachment called “PentagonSecret.xls.exe”. No word on any permanent damage caused, but it does send an e-mail to the virus author from the infected machine. (Sophos)W32/Famus-C – An e-mail worm that comes with a subject line of “Famous / Famosos” and an attachment called “Famous.exe”. The virus displays a message on the infected machine. (Sophos)W32/Bugbear-G – Another Bugbear variant that spreads via e-mail with an infected file attachment. The attachment is randomly named but will have a .pif extension. The virus terminates security-related applications running on the infected machine. (Sophos)W32/Netsky-AC – A new Netsky variant that sends infected messages that look to be from an anti-virus vendor. The message will have the subject line “Escalation” and an attachment that ends with the extension .cpl. (Sophos)W32/Bagle-AA – A new Bagle variant that uses a range of subject line and attachment names to send infected files via e-mail. The virus will display the message “Can’t find a viewer associated with the file” on the infected machine when the attachment is first opened. (Sophos)Troj/Agobot-IB – A backdoor Trojan that allows a remote user access to the infected machine. Sophos provides no information on how it spreads. (Sophos)Troj/Agobot-HZ – Similar to Agobot-IB in capability. No word from Sophos on how it spreads. (Sophos)W32/Agobot-VB, GZ, NA and PV – Another Agobot variant that spreads by exploiting network shares with weak password protection. The virus attempts to block access to anti-virus vendor sites and provides backdoor access to attackers. (Sophos)W32/Agobot-HD and GJ – A backdoor Trojan horse that spreads via network shares with weak passwords. The virus logs into an IRC server to allow attackers access to the infected machine. (Sophos)**********From the interesting reading department:Dr. Internet: Securing IISWe’re worried about the latest IIS exploits. Are there workarounds we can use to secure the system while we further test the patch installation on our development server? Network World, 05/03/04.https://www.nwfusion.com/columnists/2004/0503internet.html?nlBradner: Resetting the Internet?I guess it was too good a story to get right. The press widely reported recently that security geek Paul Watson discovered a previously unknown way to cause catastrophic disruptions of the Internet with only a few seconds of effort. Network World, 05/03/04.https://www.nwfusion.com/columnists/2004/0503bradner.html?nlServer Sleuths: Securing serversSecuring our servers is our IT organization’s biggest concern. With new regulations concerning the protection of data and new viruses popping up almost daily, what can I do to ensure that our servers are up-to-date with the latest patches and service packs? Network World, 05/03/04.https://www.nwfusion.com/columnists/2004/0503sleuths.html?nlGibbs: Getting rid of scumware. Mostly.The most important thing you can do about scumware is learn how your organization is being affected and keep up with the best practices for solving the problem as it evolves. Good luck, and rest assured you are going to have a job for a long time to come. Network World, 05/03/04.https://www.nwfusion.com/columnists/2004/0503backspin.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Industry news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe