* Patches from Red Hat, Mandrake Linux, others * Beware e-mail worm with message entitled "FW: Daily Report!!!" * Bug reporting proposal lacks bite, and other interesting reading Today’s bug patches and security alerts:DoS flaw in Avaya Cajun P33x and P13x switchesA denial-of-service vulnerability exists in Version 3.x of the firmware for Avaya’s Cajun P33x and P13x switches. An attacker could stop the switch for periods of 30 seconds. For more, visit the Avaya security announcement page:https://support.avaya.com/japple/css/japple?PAGE=avaya.css.OpenPage&temp.template.name=SecurityAdvisory **********Grey Magic warns of IE flaw A vulnerability in Internet Explorer Versions 5.01 and greater could allow scripts to run in the Local Zone. The scripts run with maximum privileges and could be used to steal confidential user information. Microsoft said it will release a fix in the next service pack. For more, go to:https://sec.greymagic.com/adv/gm014-ie/**********Slackware releases Kernel 2.4.21A new version of the Slackware Linux kernel is available. Version 2.4.21 improves on a previous fix for a vulnerability in ptrace. For more, go to:https://www.slackware.com/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.522012 **********Red Hat patches XpdfA flaw in Xpdf, an X Window application for viewing PDF files, could be exploited to run arbitrary code on the affected machine. A malicious user would have to embed external hyperlinks into a PDF document in order to take advantage of this vulnerability. For more, go to:https://rhn.redhat.com/errata/RHSA-2003-196.html Red Hat issues update printer databaseA number of bugs have been patched in Red Hat’s printer database code. There is also some enhanced information about printer drivers in the new release. For more, go to:https://rhn.redhat.com/errata/RHBA-2003-185.html**********Mandrake Linux patches gzipA flaw in the way GNU Zip’s (gzip) znew command creates temporary files could be exploited in a symlink attack against the affected machine. For more, go to:https://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:068Mandrake Linux repairs BitchXA flaw in BitchX, an IRC client, could be exploited by an attacker to write outside the buffer boundaries causing a denial-of-service. The vulnerability could also be exploited to run arbitrary code on the affected machine. For more, go to:https://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:069**********Updated ethereal package available from Mandrake Linux, DebianA number of buffer overflow vulnerabilities have been found in the ethereal code for various Linux flavors. The flaws have been corrected. For more, go to:Mandrake Linux:https://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:067Debian:https://www.debian.org/security/2003/dsa-324**********Conectiva issues Apache patchConectiva has released an update for its implementation of the Apache Web server. As we reported earlier this month, another security hole was found in the Apache code. Version 2.0.46 is the latest update to patch all known vulnerabilities. For more, go to:https://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661**********Debian patches nowebA flaw in the “noroff” script that comes with noweb creates unsafe temporary files. This could be exploited by a local user to overwrite arbitrary files owned by the user invoking the problem script. For more, go to:https://www.debian.org/security/2003/dsa-323Buffer overflow in Debian TypespeedA buffer overflow flaw in the networked part of Typespeed, a speed typing game that can be played competitively over a network, could be exploited to run arbitrary code with the privileges of the user that invoked the Typespeed application. For more, go to:https://www.debian.org/security/2003/dsa-322Debian issues fix for jnethackA couple of flaws have been found in the jnethack game. One is a buffer overflow that could be used by an attaker to gain elevated privileges on the affected machine. A second flaw involves incorrect permission settings on the package itself which could allow a malicious user to replace binaries on the affected machine with malicious applications. For more, go to:https://lists.debian.org/debian-security-announce/debian-security-announce-2003/msg00116.html**********Today’s roundup of virus alerts:VBS/Suhd-A – An e-mail worm that spreads to everyone listed in the infected user’s Outlook address book. The infected message is entitled “FW: Daily Report!!!” and has an attachment called “Daily Report.Xls”. (Sophos)W32/Crock-A – This virus attempts to steal the username and password of a user’s Yahoo ID and e-mails the information to everyone listed in the local Outlook address book. The virus also terminates a number of security related applications such as antivirus programs. (Sophos)Bat/Mumu-B – A network worm that contains a set of hacking tools designed to exploit configuration problems with the Windows IPC$ share. The virus also attempts to create a generic logon to the infected machine, weakening the overall security of the unit. (Sophos)W32/Sobig-D – This virus spreads via network shares and e-mail. It searches for e-mail addresses in TXT, EML, HTML, HTM or DBX files on a currently infected machine. The virus is programmed not to spread after July 2, 2003. (Sophos, Computer Associates)**********From the interesting reading department:Improving Web Application Security: Threats and Counter measures RoadmapA Microsoft publication for helping users create secure ASP .Net Web applications. Microsoft.https://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnnetsec/html/ThreatCounter.aspBug reporting proposal lacks biteA couple of weeks ago the Organization for Internet Security released a proposed standard for bug reporting, called the Security Vulnerability Reporting and Response Process. Network World, 06/16/03.https://www.nwfusion.com/columnists/2003/0616kearns.htmlCA readies multi-function security toolComputer Associates this fall plans to ship security and policy-enforcement software to fight viruses and spam, to filter Web content in accordancewith corporate use policies, and to block peer-to-peer file sharing. Network World Fusion, 06/16/03.https://www.nwfusion.com/news/2003/0616casec.htmlCisco updates certifications, adds security trainingCisco this week introduced education programs for designing network security architectures and updated certification tests forspecific Cisco security gear. Network World Fusion, 06/17/03.https://www.nwfusion.com/news/2003/0617ciscert.html Related content news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Industry Networking news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Network Security Networking news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center news AWS and Nvidia partner on Project Ceiba, a GPU-powered AI supercomputer The companies are extending their AI partnership, and one key initiative is a supercomputer that will be integrated with AWS services and used by Nvidia’s own R&D teams. By Andy Patrizio Nov 30, 2023 3 mins CPUs and Processors Generative AI Supercomputers Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe