* Patches from Debian, SCO, Mandrake Linux, others * Central Command's Dirty Dozen for September 2003 * Unpatched IE hole a gold mine for hackers, and other interesting reading Today’s bug patches and security alerts:OpenSSL vulnerability fixedCERT is warning users of a number of vulnerabilities in most implementations of OpenSSL. Most of the flaws could by used in various denial-of-service attacks against the OpenSSL client or server. For more, go to:CERT advisory: https://www.cert.org/advisories/CA-2003-26.htmlOpenSSL Project advisory: https://www.openssl.org/news/secadv_20030930.txtVendor advisories:Cisco:https://www.cisco.com/warp/public/707/cisco-sa-20030930-ssl.shtmlConectiva:https://www.nwfusion.com/go2/0929bug2a.html Debian:https://www.debian.org/security/2003/dsa-393EnGarde:https://www.nwfusion.com/go2/0929bug2b.html Immunix 7+ (source code):https://www.nwfusion.com/go2/0929bug2c.htmlMandrake Linux:https://www.nwfusion.com/go2/0929bug2d.htmlNovell advisory (patch due Oct. 6):https://support.novell.com/servlet/tidfinder/10087450OpenPKG:https://www.openpkg.org/security/OpenPKG-SA-2003.044-openssl.htmlRed Hat:https://rhn.redhat.com/errata/RHSA-2003-292.htmlSGI:https://www.nwfusion.com/go2/0929bug2e.htmlSlackware:https://www.nwfusion.com/go2/0929bug2f.html**********Mandrake Linux patches Apache2A flaw in the way Mandrake Linux’s Apache2 implementation handles certain CGI scripts could be exploited in a denial-of-service against Apache’s HTTP service. For more, go to:https://www.nwfusion.com/go2/0929bug2g.htmlMandrake Linux issues mplayer fixAccording to an alert from Mandrake Linux, “A buffer overflow vulnerability was found in MPlayer that is remotely exploitable. A malicious host can craft a harmful ASX header and trick MPlayer into executing arbitrary code when it parses that particular header.” For more, go to:https://www.nwfusion.com/go2/0929bug2h.html**********SCO, SGI patch sendmail flawAs we’ve reported, Michal Zalewski has found a bug in the prescan() function of sendmail, including the latest version of the application. Though no exploit is known, it could be possible for an attacker to cause heap and stack structure overflow, according to Zalewski. For more, go to:SCO UnixWare:ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.23SGI:https://www.nwfusion.com/go2/0929bug2i.html**********Conectiva, Trustix patch proftpdA bug in the way ProFTPD handles ASCII translations could be exploited by a remote user to gain root shell privileges. This could allow the attacker to have complete control over the affected machine. For more, go to:Conectiva:https://www.nwfusion.com/go2/0929bug2j.htmlTrustix:https://www.nwfusion.com/go2/0929bug2k.html**********SuSE issues fix for mysqlA buffer overflow in the popular mysql database could be exploited by a remote attacker that has access to the “user” table could execute arbitrary SQL commands on the affected machine. For more, go to:https://www.suse.com/de/security/2003_042_mysql.htmlSuSE patches lshAn attacker could exploit a flaw in lsh, an alternative to OpenSSH, to take control of the affected machine and run the code of choice. For more, go to:https://www.suse.com/de/security/2003_041_lsh.html**********SCO patches network device driver flaw@Stake has found a vulnerability in many device drivers that could allow an attacker to “harvest sensitive information.” SCO has released a fix for this problem for its UnixWare operating system. For more, go to:ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.21SCO patches OpenSSH for UnixWareA major vulnerability was found in OpenSSH that could be exploited to launch a denial-of-service against the affected machine or to potentially take over the machine to run the code of choice. For more, go to:ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.22**********Debian patches freesweepA buffer overflow in the freesweep game for Debian could be exploited by a local user to gain the privileges of “games.” A fix is available. For more, go to:https://www.debian.org/security/2003/dsa-391**********SecurityTracker warns of A-Cart vulnerabilityA cross-scripting vulnerability has been found in the A-Cart e-commerce suite, according to an alert from SecurityTracker. The flaw could be exploited by an attacker to view cookie and session information on the target machine. For more, go to:https://www.securitytracker.com/alerts/2003/Sep/1007826.html**********Today’s roundup of virus alerts:Nothing new to report today, so we bring you Central Command’s Dirty Dozen for September 2003:1. Worm/Sobig.F2. Worm/Gibe.C3. Worm/Nachi.A4. Worm/Dumaru.A5. Worm/Klez.E (including G)6. Worm/MiMail.A7. Worm/Lovsan.A8. Worm/BugBear.B9. Worm/Sobig.A10. Worm/Sircam.A11. W32/Funlove12. W32/Yaha.E**********From the interesting reading department:Unpatched IE hole a gold mine for hackersA long ignored security hole in Microsoft’s Internet Explorer is proving to be a gold mine for hackers, providing an easy way for them to plant malicious programs on vulnerable machines through hacker Web sites and instant messaging applications, security experts warn. IDG News Service, 09/29/03.https://www.nwfusion.com/news/2003/0929unpatieho.htmlVirus experts debate bug namesWhat’s in a name? That was the question computer virus experts were asking each other at a panel discussion of virus naming conventions at Virus Bulletin 2003 (VB2003), an annual gathering of the world’s leading authorities on computer viruses, worms and malicious code that was held in Toronto last week. IDG News Service, 09/30/03.https://www.nwfusion.com/news/2003/0930vb2003.htmlDenial of Service attacks take down anti-spam sitesIt appears that spammers have taken their war to the next level, attacking anti-spam sites. The attacks have forced three spam-blocking list providers offline, two specifically due to Denial of Service attacks, and one due to fear of being attacked. Geek.com, 09/29/03.https://www.geek.com/news/geeknews/2003Sep/gee20030929021977.htmSecurity specialist could face 30 years for downloading from the military and othersA computer security specialist who claimed he hacked into top-secret military computers to show how vulnerable they were to snooping by terrorists was arrested and charged Monday with six felony counts that could bring a 30-year prison sentence. LA Times, 09/30/03.https://www.nwfusion.com/go2/0929bug2l.htmlMotorola builds security into network chipsMotorola Monday announced it is building security engines into processors made for network gear in homes and small and midsized businesses. IDG News Service, 09/29/03.https://www.nwfusion.com/news/2003/0929motorbuild.htmlNeoteris stretching security software with access and content controlsSecurity vendor Neoteris Monday added to its software access management controls and a host of new features to secure content accessed via a browser. Network World Fusion, 09/29/03.https://www.nwfusion.com/news/2003/0929neoteris.html Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe