_________________________________________________________________ London, Thursday, April 04, 2002 _________________________________________________________________
INFOCON News _________________________________________________________________ IWS - The Information Warfare Site http://www.iwar.org.uk _________________________________________________________________ IWS Sponsor National Center for Manufacturing Sciences http://www.ncms.org host of the InfraGard Manufacturing Industry Association http://trust.ncms.org _________________________________________________________________ ---------------------------------------------------- [UNIRAS (UK Government Cert)] ---------------------------------------------------- * Microsoft Security Operations Guide for Windows 2000 Server http://www.uniras.gov.uk/l1/l2/l3/brief2002/Briefing%20-%208702.txt * UNIRAS SQL Injection vulnerabilities http://www.uniras.gov.uk/l1/l2/l3/brief2002/Briefing%20-%208602.txt * Compaq Potential Security Vulnerabilities with Compaq Secure Web Server (PHP and apache/mod_ssl) Compaq http://www.uniras.gov.uk/l1/l2/l3/brief2002/Briefing%20-%208402.txt * 3 Security Advisories concerning vulnerabilities in: IRIX TCP/IP, IRIX FTP and IRIX rpc/HOSTALIASES http://www.uniras.gov.uk/l1/l2/l3/brief2002/Briefing%20-%208302.txt ---------------------------------------------------- [News Index] ---------------------------------------------------- [1] 2 NIST Computer Security DRAFT Publications - just released [2] Tech Insider: Securing the cyber front [3] Computer saboteur escapes conviction [4] Aussie worm hits Europe [5] Opening a can of worms [6] Army official warns that hackers could infiltrate battlefield [7] MS security patch fails on local files [8] BA ditches MS servers after virus threat [9] (AU) EFA: anti-terror laws weaken e-mail privacy [10] Yahoo! Rips! Up! Privacy! Policy! [11] Tech firms look for best places to pitch security products [12] Basic flaws lead to big gaps in security [13] EBay closes password option to plug hole [14] Windows Messenger 'Trojan update' [15] Spammers busted in Net fraud crackdown [16] Legislation driving Bush administration e-gov efforts [17] High-tech companies gear up to oppose contracting bill _________________________________________________________________ News _________________________________________________________________ [1] 2 NIST Computer Security DRAFT Publications - just released NIST's Computer Security Division has just released 2 DRAFT security special publications. Both of these publications can be found on the Computer Security Resource Center (CSRC) at: http://csrc.nist.gov/publications/drafts.html The two drafts should be the first two bulleted items at the top of page. Draft # 1. April 2, 2002 -- The draft Special Publication 800-45 Guidelines on Electronic Mail Security is available for public comment. The document is intended primarily for a technical audience. It provides detailed guidance on setting up and maintaining a secure email system, and includes pointers to related material. NIST seeks your comments and suggestions on the document. Please provide them directly to Wayne Jansen ([EMAIL PROTECTED]) by April 30, 2002. Draft # 2. April 2, 2002 -- The draft NIST Special Publication 800-40, Procedures for Handling Security Patches, is available for public comment. This document describes and recommends the use of a systematic, accountable, and documented process for handling security patches and vulnerabilities. In addition, the document provides specific advice for obtaining, testing, distributing, and installing security patches. Please provide comments and suggestions to Peter Mell ([EMAIL PROTECTED]) by May 2, 2002. Both DRAFT documents are available in .pdf format. The URL again for these documents are http://csrc.nist.gov/publications/drafts.html ---------------------------------------------------- [2] Tech Insider: Securing the cyber front By Shane Harris Last year's spate of hacker attacks, viruses and worms shed light on the nation's poor state of information security--and the government's inability to shore it up. After Sept. 11, the state of the country's cyber security seemed even more vulnerable to an even wider range of threats, and the White House stepped forward with what seemed like a bright idea to secure the cyber front. To safeguard the government's vital interests and keep it running in a time of crisis, Richard Clarke, President Bush's cybersecurity czar, told the technology industry to build Uncle Sam an exclusive, super-secure, government-only network that would be 100 percent impenetrable and safe from online attacks. It's called Govnet, and despite Clarke's best effort to articulate the administration's vision, few people really know what it is. With a reported cost as high as $45 billion, Govnet is a coveted contract, but technology executives are frustrated by what they see as the government' s inability to define what exactly Govnet would be. Even though the General Services Administration has issued a request for information (RFI) on a system that is open-ended enough to allow for private sector creativity, most private sector executives seem to be in the dark about what the government wants. http://www.govexec.com/dailyfed/0402/040202ti.htm ---------------------------------------------------- [3] Computer saboteur escapes conviction By John Leyden Posted: 03/04/2002 at 11:58 GMT A computer technician saw his convictions for maliciously spreading a computer virus struck out after a court decided his actions caused minimal financial loss. Last September, Herbert Pierre-Louis was found guilty by a jury of two counts of deliberately infecting the computer systems of his former employer, Purity Wholesale Grocers of Boca Raton, Florida. The prosecution argued that Pierre-Louis was motivation for his crime was a reprimand by his supervisor for work related problems ten days before the virus was transmitted, in June 1998. http://www.theregister.co.uk/content/55/24688.html ---------------------------------------------------- [4] Aussie worm hits Europe By Chris Lee in Melbourne [03-04-2002] Level 2 alert on mass-mailing virus A new worm emerging from Australia has put antivirus companies and IT managers on red alert. 'Mylife' is a mass-mailing virus with a destructive payload that sends itself to everyone in the recipient's Windows address book. It was first seen last month but began to spread in earnest on 1 April. http://www.vnunet.com/News/1130579 ---------------------------------------------------- [5] Opening a can of worms Robert X Cringely Amber is mad at her brother-in-law because she wants to plan a surprise party for her twin sister, and he is not cooperating. "Amber, he is her husband," I offered as devil's advocate. "Why do you always side with him, anyway?" Amber attacked. Not very nice I guess I opened the proverbial can of worms when I wrote about some unhappy spies doubling as VeriSign customers. More spies told me that even VeriSign's partners are unhappy with the way it conducts business, and VeriSign is getting a reputation after numerous attempts to go around partners and sign up those partners' customers directly. http://www.idgnet.co.nz/webhome.nsf/UNID/E17419B46E4F2CB2CC256B880070A28F!op endocument ---------------------------------------------------- [6] Army official warns that hackers could infiltrate battlefield By Molly M. Peterson, National Journal's Technology Daily NEWPORT, R.I. -- Noting that a cyberterrorist attack could have grave consequences on the battlefield, the Army's top information security officer said Tuesday that the military must take a more proactive approach to defending its critical information systems. "It is conceivable, in theory, for a hacker sitting in his easy chair to get inside a tank," Col. Thaddeus Dmuchowski, director of the Army's Information Operations Assurance Office, said during a conference sponsored by the National High Performance Computing & Communications Council. "We can't wait for the next attack to happen," Dmuchowski said. "We have to be proactive. And in order to be proactive, we have to have as much imagination as those who would do us harm." http://www.govexec.com/dailyfed/0402/040202td1.htm ---------------------------------------------------- [7] MS security patch fails on local files By Thomas C Greene in Washington Posted: 02/04/2002 at 12:14 GMT The MS patch intended to fix a data binding flaw in IE, which enables a script to call executables on your Windows machine using the object tag, does not protect against malicious files launched from a local directory. http://www.theregister.co.uk/content/55/24667.html ---------------------------------------------------- [8] BA ditches MS servers after virus threat By Rene Millman [03-04-2002] Airline removes 100 'unauthorised' web servers British Airways has removed 100 "unauthorised" web servers running Microsoft IIS from its network over fears that the software could be a target for virus attacks. The move came after the company found that the web servers had been installed by its own staff "without the correct authorisation procedures". BA was worried that the servers could be attacked by the Code Red virus. A company spokesman said that the airline was not affected by the virus. http://www.vnunet.com/News/1130615 ---------------------------------------------------- [9] EFA: anti-terror laws weaken e-mail privacy By Andrew Colley, ZDNet Australia 02 April 2002 Australian police will be able to exploit legal ambiguities in Federal anti-terror legislation that could weaken e-mail privacy protection, according to Electronic Frontiers Australia. Civil liberties group Electronic Frontiers Australia (EFA) said that "confusing" wording in proposed changes to telecommunications interception laws, which are included in the Security Legislation Amendment (Terrorism) Bill 2002, leaves the legal status of e-mails stored at ISPs in doubt. http://www.zdnet.com.au/newstech/security/story/0,2000024985,20264357,00.htm ---------------------------------------------------- [10] Yahoo! Rips! Up! Privacy! Policy! By Andrew Orlowski in San Francisco Posted: 04/03/2002 at 05:31 EST Yahoo! changed its privacy policy last week, contemptuously exposing all of its registered users to third-party spam, marketing offers and cold calls that they'd previously said they didn't want. As from now, Yahoo! mail users are exposed to a dozen unwanted "Special Offers and Marketing Communications", and users who've left their phone numbers with the portal will discover that they've been "agreed" to cold calling and junk snail mail, for good measure. http://www.theregus.com/content/6/24520.html ---------------------------------------------------- [11] Tech firms look for best places to pitch security products By William New, National Journal's Technology Daily The opportunities are flourishing for the information technology industry to help protect the United States from threats. But as thousands of American tech companies answer the government's call for new ideas in the fight against terrorism, how many are getting their message to the right place? Many in industry, and some in government, think Tom Ridge's Office of Homeland Security is the place. Others see the Defense Department as Security Central, with increasingly deep pockets. And others believe the best way to proceed is to piggyback on traditional government contractors. To varying degrees, they are all right. But despite popular perception, going to Ridge's office may be the least effective, according to Phil Bond, undersecretary of Commerce for technology administration and Secretary Donald Evans' chief of staff. http://www.govexec.com/dailyfed/0402/040102td1.htm ---------------------------------------------------- [12] Basic flaws lead to big gaps in security By Paul Allen [03-04-2002] Specialist trining failing to keep pace with security investments Commitment to specialist training is failing to keep up with security hardware investment, leaving key devices improperly configured and enterprises open to attack. A report from consultant NTA Monitor, collated over four years of penetration testing with blue-chip enterprise clients, showed that little progress had been made in addressing basic issues, such as router configuration, which accounted for the highest percentage of vulnerabilities. http://www.vnunet.com/News/1130599 ---------------------------------------------------- [13] EBay closes password option to plug hole 10:56 Wednesday 3rd April 2002 Troy Wolverton, CNET News.com A vulnerability on eBay that could allow hackers to gain control of a user's account has been shut down EBay disabled a password function on its site Tuesday to close a "very serious" security hole that could allow hackers access to users' accounts, a spokesman said. EBay disabled the "Change Your Password" function in an effort to close the vulnerability, eBay spokesman Kevin Pursglove said Tuesday. That feature will remain disabled until eBay can put a fix in place, he said. http://news.zdnet.co.uk/story/0,,t269-s2107658,00.html ---------------------------------------------------- [14] Windows Messenger 'Trojan update' By Thomas C Greene in Washington Posted: 02/04/2002 at 13:50 GMT This is too cute. You can wipe Windows Messenger from XP with a simple hack, and yet MS will defy you with a 'Critical Update'. That's how desperate they are to force this little Trojan on you. Following a tip from a Messenger-averse reader whose uninstall got thwarted, I looked into it, starting with a clean install of Win-XP. Messenger was, of course, lurking in the background and consuming RAM though I have no use for it. And of course MS doesn't allow you to uninstall it. http://www.theregister.co.uk/content/55/24668.html ---------------------------------------------------- [15] Spammers busted in Net fraud crackdown 10:01 Wednesday 3rd April 2002 Lisa M. Bowman, CNET News.com The FTC says it has netted dozens of alleged Internet scammers in a major anti-consumer fraud effort launched in conjunction with six US states and Canada Trumpeting its first major joint effort to crack down on illegal spam, the Federal Trade Commission said Tuesday that it has busted dozens of alleged Web scammers in conjunction with law enforcement from six US states and Canada. http://news.zdnet.co.uk/story/0,,t269-s2107647,00.html ---------------------------------------------------- [16] Legislation driving Bush administration e-gov efforts By Liza Porteus, National Journal's Technology Daily Federal legislation has helped spur agencies to integrate technology into government services and has laid the groundwork for many of the Bush administration's e-government and homeland security initiatives, officials said Tuesday. The 1998 Government Paperwork Elimination Act (GPEA) mandates that agencies must give citizens the option to submit information and conduct transactions electronically and gives legal weight to the use of electronic signatures. Agencies have until Oct. 21, 2003 to comply. The 2000 Government Information Security Reform Act (GISRA) mandated that all agencies conduct regular reviews of their security and information practices. These two measures "have helped us quite a bit ... It's defined security in our daily lives," Mayi Canales, deputy chief information officer for the Treasury Department, said during a Council for Excellence in Government conference on e-government. http://www.govexec.com/dailyfed/0402/040202td2.htm ---------------------------------------------------- [17] High-tech companies gear up to oppose contracting bill By Bara Vaida, National Journal's Technology Daily As more high-tech companies turn to the federal government for business after the Sept. 11 attacks, many of them are joining with a broad business coalition to oppose legislation that they say would slow down the government's ability to outsource information technology projects. Individual companies such as Computer Sciences Corp., Electronic Data Systems, IBM, Keane Inc. and high-tech associations like the Electronic Industries Alliance, the Government Electronics and Information Technology Association, the Information Professional Services Council and the Technology Association of America have joined to block any movement on the Truthfulness, Responsibility and Accountability in Contracting (TRAC) Act, H.R. 721, a bill that has substantial support from government employee unions and the lawmakers that represent them. "Our immediate focus is to bottle up this bill and educate members on the shortcomings of TRAC-like efforts," said Booth Jameson, director of global government affairs at EDS. http://www.govexec.com/dailyfed/0402/040102td2.htm ---------------------------------------------------- _____________________________________________________________________ The source material may be copyrighted and all rights are retained by the original author/publisher. Copyright 2002, IWS - The Information Warfare Site _____________________________________________________________________ Wanja Eric Naef Webmaster & Principal Researcher IWS - The Information Warfare Site <http://www.iwar.org.uk> --------------------------------------------------------------------- To subscribe - send an email to "[EMAIL PROTECTED]" with "subscribe infocon" in the body To unsubscribe - send an email to "[EMAIL PROTECTED]" with "unsubscribe infocon" in the body --------------------------------------------------------------------- IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk