TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

INTERNET THREAT UPDATE for 01-11-2002
ISS X-Force Internet Threat Intelligence Center

www.iss.net - Click on 'Current Internet Threat' for more
information.

******************************************************
ALERTCON 1 
Projected: AlertCon 1 
******************************************************

ALERTCON 1: This reflects the malicious, determined, global, 24 x 7
attacks experienced by all networks.  

CISCO:  Three vulnerabilities have been discovered in Cisco SN 5420
Storage Router software releases up to and including 1.1(5).  Two of
the vulnerabilities can cause a Denial of Service attack.  The other
allows an access to the SN 5420 configuration if it has been
previously saved on the router.  There is no workaround for these
vulnerabilities.

MICROSOFT:  Install the patch for the UPnP vulnerability as well as
the patch for the multi-vulnerability in IE 5.5 and 6.0.  Exploits
have now been noted in the wild for both.

LINUX:  FreeBSD is reporting that there is a flaw in the pine port. 
Pine is an application for reading mail and news.  The pine port,
versions previous to pine-4.44, handles URLs in messages insecurely. 
Pine allows users to launch a web browser to visit a URL embedded in
a message.  Due to a programming error, Pine does not properly escape
meta-characters in the URL before passing it to the command shell as
an argument to the web browser.  An attacker can then assume the
victim's privileges.

UNIX:  A vulnerability in the AFTPD has been discovered that could
allow a remote user to gain elevated privileges.  The problem
presents itself when a user accesses the ftp server via any type of
user account, either regular or anonymous.

VIRUSES/WORMS (3): 1. JS_GIGGER.A is a new JavaScript worm that is
capable of propagating via Microsoft Outlook/Outlook Express, MAPI,
and mIRC.  It also infects HTML and ASP files by appending its virus
code. 2. Troj/Sub7-21-I is a newly discovered backdoor Trojan. When
the server program is installed, the computer is exposed to security
attacks from remote locations. Once the connection is established,
the attacker can acquire sensitive information such as passwords and
take control over the infected computer.  3. Macromedia has released
information regarding their Flash issue that we reported on
Wednesday.

FACTOID:  According to CyberAtlas�, during the 9 to 5 workday 34
percent of total media minutes are spent on the Internet, while 30
percent are spent watching television and 26 percent are spent
listening to the radio. The survey conducted by CyberAtlas excluded
time spent crafting and reading e-mail.

COMMENTARY:  Trust.  Merriam Webster defines it as: 1 a: assured
reliance on the character, ability, strength, or truth of someone or
something b: one in which confidence is placed.  On the Internet,
trust is no less important but harder to achieve.  This trusted
relationship definition should apply when seeking solutions to
exploits and vulnerabilities.

- ------------------------------------------------------
RECOMMENDATIONS
- ------------------------------------------------------

X-Force Advisory regarding the UPnP and IE 5.5 and 6.0 issues see:
http://xforce.iss.net/alerts/advise107.php 
http://xforce.iss.net/alerts/advise106.php 

The Cisco advisory is available at:
http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml 

For the FreeBSD Security Advisory and solution, please see:
http://www.linuxsecurity.com/advisories/freebsd_advisory-1797.html 

Information regarding the AFTPD Home Directory Change Core Dump
Vulnerability can be found at:
http://www.securityfocus.com/cgi-bin/vulns-item.pl?section=discussion&;
id=3806 

For information regarding the JS_GIGGER.A worm, see:
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=JS_GIGG
ER.A 

For information on the Trojan Sub 7 refer to:
http://www.sophos.com/virusinfo/analyses/trojsub721i.html

For information from Macromedia on the Flash issue, please see:
http://www.macromedia.com/support/flash 

- - For an excellent home/small office firewall solution, please see: 
http://www.networkice.com/ 

- - For information on removing infected executable files, refer to:
http://www.sophos.com/support/faqs/filvir.html 

- -For other current worms and viruses moving across the Internet see:
https://gtoc.iss.net/secure/viruses.php 
http://www.antivirus.com/vinfo/ 

- ------------------------------------------------------
ATTACK SIGNATURE RANKING - global IDS, midnight - midnight, previous
Day, % of total
- ------------------------------------------------------

Unauthorized Access Attempt  42.20%       
Denial Of Service            27.23%       
Protocol Decode              13.53%       
Suspicious Activity          11.57%       
Pre-Attack Probe             05.35%        
Back Door                    00.12%         

- ------------------------------------------------------
TOP TEN ATTACK DESTINATION PORTS - global IDS, midnight - midnight,
previous day, % of top ten (ports found at) 
http://www.networkice.com/Advice/Exploits/Ports/default.htm 
- ------------------------------------------------------

80       (http)              76.83%       
21       (ftp)               07.68%        
25       (smtp)              07.06%        
1214     (unassigned)        03.08%        
22       (ssh)               01.81%        
443      (ssl)               01.03%        
6346     (unassigned)        00.76%         
69       (tftp)              00.59%         
137      (netbios-ns)        00.58%         
515      (lp,lpr,printer)    00.58%         

- ------------------------------------------------------
BACKGROUND, COPYRIGHT NOTICE, and DISCLAIMER 
- ------------------------------------------------------

Background. We provide this information in the spirit of PDD 63 to
help security professionals wage the war against Internet threats
more effectively. Information in this update derived primarily from
global, real time, 24 x 7 IDS feeds, ISS X-Force R&D Team research,
and professional liaison. Other sources as noted. AlertCon 1 reflects
the global, malicious, determined, 24 x 7 attacks experienced by all
networks. AlertCon 2 means increased vigilance/action recommended due
to a specific threat or concern. AlertCon 3 means increased attacks
against specific targets or vulnerabilities on a scale that is
unusually high, action required. AlertCon 4 reflects an Internet
emergency for a target or group of targets whose business continuity
may depend on some sort of immediate, decisive action. All summaries
cover 24 hours the previous workday, GMT. Monday summaries may cover
some weekend activity. 

Copyright 2001 Internet Security Systems, Inc. Permission is granted
for the redistribution of the Internet Threat Update electronically.
It is not to be sold or edited in any way without express consent of
ISS. Refer comments or questions to: [EMAIL PROTECTED] or [EMAIL PROTECTED]

Disclaimer: This information is subject to change without notice. Use
of this information constitutes acceptance for use in an 'as is'
condition. There are no warranties with regard to this information.
In no event shall the author be liable for any damages whatsoever
arising out of or in connection with the use or spread of this
information. Any use of this information is at the user's own risk.
No other use authorized. FOIA Exemption 4.

Patrick Gray
Manager, X-Force
Internet Threat Intelligence Center
Internet Security Systems
6303 Barfield Road
Atlanta, GA 30328

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4

iQA/AwUBPD8kIpG41ROSQPncEQIXAwCgvEPFSAB08qq+WGL+a0synI6GYIgAoOB1
Gb8nXEMW5K6TmnhdXw7fi4f6
=fSCz
-----END PGP SIGNATURE-----


Reply via email to