-----Original Message----- From: UNIRAS (UK Govt CERT) Sent: 13 June 2002 16:53 To: Undisclosed Recipients Subject: UNIRAS Briefing - 185/02 - UNIRAS - Importance of correct Security procedures concerning GSI EMail -----BEGIN PGP SIGNED MESSAGE----- - -------------------------------------------------------------------------- -------- UNIRAS (UK Govt CERT) Briefing Notice - 185/02 dated 13.06.02 Time: 16:35 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination Centre) - -------------------------------------------------------------------------- -------- UNIRAS material is also available from its website at www.uniras.gov.uk and Information about NISCC is available from www.niscc.gov.uk - -------------------------------------------------------------------------- -------- Title ===== Web-based Email problem Detail ====== Departmental and organisational security officers should be aware that there have been two recent incidents reported to UNIRAS where virus infected Email file attachments were received via web based mail systems and then propagated within the organisation. The use of web mail bypasses anti-virus measures placed in front of or on the organisation's external gateway. Furthermore, if the organisation does not deploy anti-virus protection on user workstations, the virus will be propagated at least as far as the organisation's mail server. If the mail server does not have anti-virus protection, the virus will spread further. First Incident Details: The infection was controlled due to server based AVS products being used. However this simply removed the infected Email attachment. The virus code was still available to generate a number of "blank" emails that in the wrong circumstances could have generated a localised Denial of Service attack. Second Incident Details: The virus code executed caused a number of systems to be infected. Prevention It is recommended that organisations should consider the potential risks involved in the use of web mail facilities. Organisations are advised to check that their existing anti-virus measures are not bypassed by permitting web mail, or to prohibit the use of web mail unless there is a clear business case. In the event of such a business need, anti-virus products should be installed on user workstations (and servers if they have Email access) that scan all web mail file attachments before opening them. Ideally, the use of anti-virus products on network gateways, servers and workstations is recommended for maximum protection. - -------------------------------------------------------------------------- -------- For additional information or assistance, please contact the HELP Desk by telephone or Not Protectively Marked information may be sent via EMail to: [EMAIL PROTECTED] Tel: 020 7821 1330 Ext 4511 Fax: 020 7821 1686 - -------------------------------------------------------------------------- -------- This Briefing contains the information released by the original author. Some of the information may have changed since it was released. If the vulnerability affects you, it may be prudent to retrieve the advisory from the canonical site to ensure that you receive the most current information concerning that problem. Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed within this notice shall not be used for advertising or product endorsement purposes. Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information contained within this notice. UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing amongst its members and the community at large. - -------------------------------------------------------------------------- -------- <End of UNIRAS Briefing> -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> iQCVAwUBPQi7Topao72zK539AQE9igQArJIt0E/RU82bJvOBPr88cdS7kGp+kcHA cK6uXqMiy0SGDyiqepAZ0vD95b9MyOkAXWBgHbtdrfnshH4bI+gP+Fl3mDSKoNG9 8Gi24nO4iTFSNkDQh/P7WxzFj+mzd8kg1+Y0qjGjyBrRtlBvJawN+ue7CdNuGIOS jh6PhJ6G+Yk= =AEAF -----END PGP SIGNATURE----- IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk