Search This Blog

Thursday, August 09, 2007

New Xunlei 0-day exploit?

Network World

Virus and Bug Patch Alert




Network World's Virus and Bug Patch Alert Newsletter, 08/09/07

New Xunlei 0-day exploit?

By Jason Meserve

Today's bug patches and security alerts:

Potential New Xunlei 0-day Exploit

Symantec has observed active exploitation of a potential 0-day vulnerability in Xunlei Web Thunder. This vulnerability has been assigned BID 25192. This vulnerability is closely related to a previously discovered Xunlei vulnerability identified as BID 24552. Exploitation of this new vulnerability may result in arbitrary download of malicious files onto the compromised computer. Symantec Security Response Weblog.

Network World Security Buyers Guide

Find the right security products for your enterprise - fast. From anti-spam to wireless LAN security, our Buyers Guides have detailed information on hundreds of products in more than 20 categories. With the side-by-side comparison tool you can evaluate product features to make the best decision for your enterprise.

Click here to go to the Security Buyers Guide now.

**********

Two new patches from rPath:

vim (code execution)

qt-x11-free (format string, code execution)

**********

Two new updates from Debian:

Iceweasel (multiple flaws)

IceApe (multiple flaws)

**********

Two new patches from Ubuntu:

Qt (multiple flaws)

KOffice (integer overflow, code execution)

**********

Foresight Linux releases three patches:

Thunderbird (data leak)

GDM (denial of service)

Qt (multiple flaws)

**********

Today's malware news:

Storm Worm's virulence may change tactics

The swiftly spiking onslaught of the Storm Worm may signal an upcoming change in how its creators intend to wield their weapon. PC World, 08/02/07.

Brazilian MSN Worm Looks Familiar

Brazil is the home of the infamous Infostealer.Bancos family of malware. Recently, however, we have seen a more diverse number of sites - beyond just banking sites - coming into the crosshairs of the Brazilian malware gangs. Is the recent W32.Imcontactspam worm another of their creations? Symantec Security Response Weblog.

Unknown Exploit Compromises Ichitaro

Symantec Security has received a sample of an Ichitaro document that contains a currently unknown exploit. This is not necessarily surprising as most software has vulnerabilities but a user who opens the document will surely be hit with a surprise. Symantec detects the malicious document as Trojan.Tarodrop.D. Symantec Security Response Weblog.

Rootkits, Downloaders, and Natalie Portman

Got a round of these in my inbox this morning. These are EXEs being spammed out in e-mail messages to get you to install malware. The names of Hollywood stars used in the emails include Nicole Kidman, Angelina Jolie, and Natalie Portman. Arbor Networks Security to the Core blog.

**********

From the interesting reading department:

U.C. researchers: Take antispam fight to the Web

According to researchers at the University of California, San Diego, antispam fighters could really hurt the spammers bottom line, if they target the Web sites used to host their scams rather than simply trying to block the mail server used to send out unsolicited commercial e-mail. IDG News Service, 08/07/07.

Mozilla: 10 day patch guarantee 'not our policy'

Mozilla does not set security policy at late-night pyjama parties. The open source browser maker was forced to issue a statement Monday, retracting a pledge attributed to the company's director of ecosystem development, Mike Schaver, to fix any critical security bugs in the browser within "Ten ****ing Days." IDG News Service, 08/06/07.

Researcher blasts Apple for 'negligent' patching

One of the researchers who went public last month with the first iPhone vulnerability said Monday that Apple's lackadaisical updating of the open-source components it uses in Mac OS X is inexcusable and negligent. Computerworld, 08/06/07.

Study: IRS security vulnerable to social engineering

The U.S. Internal Revenue Service computer network is vulnerable to social-engineering hacks, with 60 percent of employees changing their computer passwords when requested by phone callers posing as help-desk workers, according to a government auditor. IDG News Service, 08/03/07.

Black Hat: Networked systems are putty in the hands of a good hacker

Security practitioners at Black Hat prove that the computer systems in use today are pretty much just putty in the hands of a good hacker. Network World, 08/03/07.

Data leak products have security risks

Companies looking to clamp down on data leaks may be introducing a whole new set of security problems to their corporate networks, researchers from Matasano Security said at the Black Hat conference last Thursday. IDG News Service, 08/03/07.

Analyst: iPhone security concerns exaggerated

Security of the iPhone has been a hot topic among researchers and analysts since well before the device was even available to the public in June. While some have been ringing the warning bell that the iPhone is not suitable for the Enterprise, one analyst says those concerns have been overblown. MacWorld, 08/02/07.

Do Botnets Dream of Digital Sheep?

Right now, botnets are one of the most concerning problems in information security and are considered to be source of all evil like spam, click frauds and denial of service attacks. Bots are software and malicious programs which are installed on your computer illegitimately, forming the part of a larger command-and-control network called the botnet. Symantec Security Response Weblog.

Affiliation networks: Google AdSense for hackers

The next big threat to Web security has less to do with phishing and more to do with affiliation networks, according to a recent Web security report. Computerworld, 08/02/07.

Editor's Note: Starting Aug. 13, this newsletter will be renamed "Security: Threat Alert" to better reflect the focus of the newsletter. We thank you for reading Network World newsletters!


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Storm Worm's virulence may change tactics
2. U.C. researchers: Take antispam fight to Web
3. Kittens could solve spam
4. How far could cyber war go?
5. 802.11n WLAN tests show 'unbelievable' results
6. Cisco founder unveils the Next Big Thing?
7. iPhone lawsuit filed by doctor convicted of fraud
8. Cisco beats Q4 earnings expectations
9. Fujitsu links biometrics with Novell’s eDirectory
10. Do Not Call Registry gets wake-up call

MOST-READ REVIEW:
NAC alternatives hit the mark


Contact the author:

Jason Meserve is Network World's Multimedia Editor and writes about streaming media, search engines and IP Multicast. Check out his Multimedia Exchange Weblog.

Check out Jason Meserve and Keith Shaw's weekly podcast "Twisted Pair"



ARCHIVE

Archive of the Virus and Bug Patch Alert Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: