Virus and Bug Patch AlertThis newsletter is sponsored by SilverPeakNetwork World's Virus and Bug Patch Alert Newsletter, 07/02/07New worm targets Harry Potter fansBy Jason MeserveToday's bug patches and security alerts: HP is warning HP-UX users running Xserver about a denial-of-service vulnerability that can be exploited by a local user. A patch is available to fix the flaw.
********** More Kerbos 5 updates available As we reported last week, multiple flaws were found in MIT's Kerberos 5 authentication system. More vendors have come out with patches over the weekend: ********** RealPlayer, Helix Player vulnerable to attack Users are being advised to upgrade to newer versions of the RealPlayer and Helix Player multimedia products because of a critical security flaw. The flaw could allow an attacker to gain control over a user's PC using a buffer-overflow vulnerability, a memory problem that can allow unauthorized code to run on a machine, according to iDefense Inc. IDG News Service, 06/28/07. ********** Three new updates from rPath: Fetchmail (password disclosure) httpd mod_ssl (denial of service) ********** Three new patches from Debian: hiki (input sanitization, file deletion) ********** Today's malware news: Harry Potter worm says he is dead Always ready to hitch their creations to current pop-culture events, malware writers have developed a new worm just in time for the release of the latest "Harry Potter" movie and novel. The worm, called W32/Hairy-A, automatically infects a PC when users attach USB drives, according to researchers at security vendor Sophos. Network World, 06/29/07. If you don’t have an email address, or if you have a great spam filtering engine, you may not be among us throngs who have been flooded with spam linking to a “postcard from a family member”. Arbor Networks' Security to the Core Blog, 06/29/07. MySpace again under phishing attack Phishers have been using compromised MySpace.com accounts to attack unsuspecting Web surfers, security experts said Thursday. The attack is thought to have infected several thousand PCs according to reports from ISPs, said Johannes Ullrich, chief research officer for the SANS Institute. Ullrich has documented the issue on the SANS Internet Storm Center blog. Internet Storm Center advisory A recent proof of concept back door Trojan (Backdoor.Fonamebot) that we have examined here in Symantec has perhaps pointed the way forward for the transmission of data between zombies and the bot herder. What we have seen is a new kind of back door that sends and receives its data through the DNS protocol. Symantec Security Response blog, 06/29/07. Spam from the Kernel: Full-Kernel Malware Installed by MPack In the past few weeks, we have observed many Web sites that have been compromised to distribute browser exploits with the MPack kit. We’ve tracked many different MPack sources created with the intent of distributing different types of malicious codes. So far we’ve seen the following malware samples installed while surfing sites compromised by Mpack: Trojan.Anserin, Trojan.Linkoptimizer.B, Backdoor.IRC.Bot, Infostealer.Ldpinch, and Trojan.Srizbi. Symantec Security Response blog, 06/29/07. ********** From the interesting reading department: Technocrat is alerting Cisco users to a paper available at milw0rm.com that goes into detail about the IOS vulnerability that made Michael Lynn a controversial figure at Black Hat in 2005. Cisco Subnet, 06/29/07. With iPhone launch, a hacker's to-do list When Apple introduced the latest version of its Safari browser two weeks ago, it took the hacking community just hours to start reporting bugs in the beta code. On Friday, the iPhone is likely to get even closer scrutiny from many of the same security researchers. Here's a list of the top items on the typical iPhone hacker's to-do list. IDG News Service, 06/29/07. Hackers don't time exploits for maximum impact, researcher says The idea that cybercriminals stockpile exploits, then time their release to do the most damage gives them too much credit, a security researcher said today. Computerworld, 06/29/07. Microsoft U.K. domain succumbs to SQL injection attack A hacker successfully attacked a Web page within Microsoft's U.K. domain on Wednesday, resulting in the display of a photograph of a child waving the flag of Saudi Arabia. IDG News Service, 06/29/07. Opinion: Stalker terrorizes family via cell phone? The Kuykendall family in Fircrest, Wash., claims that a hacker has been stalking them for four months through their camera phones, using the microphones in the phones to listen to them and the cameras to watch. They say that even when they turn off the phones, the hacker can turn them back on. Computerworld, 06/29/07.
|
Contact the author: Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog. Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair" This newsletter is sponsored by SilverPeakARCHIVEArchive of the Virus and Bug Patch Alert Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment