• United States

DoS flaw in Avaya Cajun P33x and P13x switches

Jun 19, 20035 mins

* Patches from Red Hat, Mandrake Linux, others * Beware e-mail worm with message entitled "FW: Daily Report!!!" * Bug reporting proposal lacks bite, and other interesting reading

Today’s bug patches and security alerts:

DoS flaw in Avaya Cajun P33x and P13x switches

A denial-of-service vulnerability exists in Version 3.x of the firmware for Avaya’s Cajun P33x and P13x switches. An attacker could stop the switch for periods of 30 seconds. For more, visit the Avaya security announcement page:


Grey Magic warns of IE flaw

A vulnerability in Internet Explorer Versions 5.01 and greater could allow scripts to run in the Local Zone. The scripts run with maximum privileges and could be used to steal confidential user information. Microsoft said it will release a fix in the next service pack. For more, go to:


Slackware releases Kernel 2.4.21

A new version of the Slackware Linux kernel is available. Version 2.4.21 improves on a previous fix for a vulnerability in ptrace. For more, go to:


Red Hat patches Xpdf

A flaw in Xpdf, an X Window application for viewing PDF files, could be exploited to run arbitrary code on the affected machine. A malicious user would have to embed external hyperlinks into a PDF document in order to take advantage of this vulnerability. For more, go to:

Red Hat issues update printer database

A number of bugs have been patched in Red Hat’s printer database code. There is also some enhanced information about printer drivers in the new release. For more, go to:


Mandrake Linux patches gzip

A flaw in the way GNU Zip’s (gzip) znew command creates temporary files could be exploited in a symlink attack against the affected machine. For more, go to:

Mandrake Linux repairs BitchX

A flaw in BitchX, an IRC client, could be exploited by an attacker to write outside the buffer boundaries causing a denial-of-service. The vulnerability could also be exploited to run arbitrary code on the affected machine. For more, go to:


Updated ethereal package available from Mandrake Linux, Debian

A number of buffer overflow vulnerabilities have been found in the ethereal code for various Linux flavors. The flaws have been corrected. For more, go to:

Mandrake Linux:



Conectiva issues Apache patch

Conectiva has released an update for its implementation of the Apache Web server. As we reported earlier this month, another security hole was found in the Apache code. Version 2.0.46 is the latest update to patch all known vulnerabilities. For more, go to:


Debian patches noweb

A flaw in the “noroff” script that comes with noweb creates unsafe temporary files. This could be exploited by a local user to overwrite arbitrary files owned by the user invoking the problem script. For more, go to:

Buffer overflow in Debian Typespeed

A buffer overflow flaw in the networked part of Typespeed, a speed typing game that can be played competitively over a network, could be exploited to run arbitrary code with the privileges of the user that invoked the Typespeed application. For more, go to:

Debian issues fix for jnethack

A couple of flaws have been found in the jnethack game. One is a buffer overflow that could be used by an attaker to gain elevated privileges on the affected machine. A second flaw involves incorrect permission settings on the package itself which could allow a malicious user to replace binaries on the affected machine with malicious applications. For more, go to:


Today’s roundup of virus alerts:

VBS/Suhd-A – An e-mail worm that spreads to everyone listed in the infected user’s Outlook address book. The infected message is entitled “FW: Daily Report!!!” and has an attachment called “Daily Report.Xls”. (Sophos)

W32/Crock-A – This virus attempts to steal the username and password of a user’s Yahoo ID and e-mails the information to everyone listed in the local Outlook address book. The virus also terminates a number of security related applications such as antivirus programs. (Sophos)

Bat/Mumu-B – A network worm that contains a set of hacking tools designed to exploit configuration problems with the Windows IPC$ share. The virus also attempts to create a generic logon to the infected machine, weakening the overall security of the unit. (Sophos)

W32/Sobig-D – This virus spreads via network shares and e-mail. It searches for e-mail addresses in  TXT, EML, HTML, HTM or DBX files on a currently infected machine. The virus is programmed not to spread after July 2, 2003. (Sophos, Computer Associates)


From the interesting reading department:

Improving Web Application Security: Threats and Counter measures Roadmap

A Microsoft publication for helping users create secure ASP .Net Web applications. Microsoft.

Bug reporting proposal lacks bite

A couple of weeks ago the Organization for Internet Security released a proposed standard for bug reporting, called the Security Vulnerability Reporting and Response Process. Network World, 06/16/03.

CA readies multi-function security tool

Computer Associates this fall plans to ship security and policy-enforcement software to fight viruses and spam, to filter Web content in accordancewith corporate use policies, and to block peer-to-peer file sharing. Network World Fusion, 06/16/03.

Cisco updates certifications, adds security training

Cisco this week introduced education programs for designing network security architectures and updated certification tests forspecific Cisco security gear. Network World Fusion, 06/17/03.