[INFOCON] - Ridge Aims to Reduce U.S. Vulnerabilities to Terrorism

2002-06-12 Thread Wanja Eric Naef [IWS]

[At least life as a politician in DC will be interesting
again as they will be facing the biggest turf war ever 
which could get quite nasty. The proposed Homeland 
Security Department will also have to survive 88 
congressional committees and subcommittees. So one 
should really ask whether this will be worth the effort 
as the government's limited resources could be used 
to make current the agencies more efficient. There is 
something wrong with the system and it looks like that 
instead of changing the system, the administration just risks 
to create another layer of bureaucracy which might not really
help to protect the nation.  WEN]

10 June 2002 
Ridge Aims to Reduce U.S. Vulnerabilities to Terrorism
(Homeland Security Advisor Wants To Draw Lessons From 9-11)(3500)

Homeland Security Advisor Tom Ridge wants to draw on the security
expertise in the federal government to "significantly reduce the
vulnerability to terrorism and terrorist attack."

Speaking June 10 to the National Association of Broadcasters Education
Foundation in Washington, Ridge said: "It's time for us to take the
lessons learned from 9/11 and from our war on terrorism and apply them
to homeland security."

He said the new Cabinet-level Department of Homeland Security proposed
by President Bush should be "a clearinghouse for many of the best
practices that we believe can be deployed to prevent terrorism."

The new department, which must be approved by Congress, should have
one single mission, Ridge said: to protect the American people and
their way of life from terrorism.

Drawing 170,000 existing personnel from now disparate sources, he said
the new department "will bring together everyone under the same roof,
working toward the same goal and pushing in the same direction."

Following is the transcript of Ridge's remarks:

(begin transcript)

THE WHITE HOUSE
Office of the Press Secretary
June 10, 2002

REMARKS BY HOMELAND SECURITY ADVISOR TOM RIDGE
TO THE NATIONAL ASSOCIATION OF BROADCASTERS EDUCATION FOUNDATION
2002 SERVICE TO AMERICA SUMMIT

Ronald Reagan Building
Washington, D.C.

GOVERNOR RIDGE: Thank you, Eddie. And good morning, ladies and
gentlemen. I want to thank you for this invitation to spend some time
with you this morning. I must applaud Eddie and the foundation for
extending the invitation several weeks ago. Your timing was
impeccable. (Laughter.) So I might consider to borrow your crystal
ball in the future.

But it is good to have the opportunity within a few short days after
the President announced his vision and his plan to create a
Cabinet-level Department of Homeland Security to spend some time with
this organization. So I very much appreciate the opportunity to speak
to your group at such an important time for our country.

The nine months since the terrorist attacks have been a great time to
be an American, in spite of the horror and the tragedy associated with
the attacks. We have learned so much about what this country and its
people are all about. And most of what we have learned, we have
learned through you.

Through your unblinking eyes and ears, the entire human drama was
brought into our living rooms -- the heartbreaking losses, the heroic
responses, the heartfelt prayers and words of comfort from a concerned
nation. Many of your stations offered 24-hour coverage in the days
following the attacks. And in doing so, you accepted the reality of
lost ad revenues at a time when advertising was already scarce. No
matter the cost, you continued to get the news out.

At the same time, through your efforts, broadcasters helped this
country raise in excess of $1 billion [$1 thousand million] for the
victims of 9/11 and related causes -- an extraordinary contribution in
and of itself. And you still found time to record and air PSAs [Public
Service Announcements], answering the questions all Americans had: How
can we help?

You've even won over some old critics. Apparently, a former FCC
[Federal Communications Commission] chairman about four decades ago in
a speech to your group -- a fellow by the name of Newton Minow -- was
very, very critical of the media. But recently he was reported to have
said, and I quote, "Television deserves a round of gratitude from the
American people for the way they have handled this crisis. They
deserve the highest praise." But most importantly, as Americans
understand it, you did your job, keeping all of us informed and aware.

Now I think broadcasters have a new challenge, reporting on homeland
security. In many ways -- many, many ways -- this is a much more
difficult story to report. It doesn't have very good sound or visuals.
It's complicated. There are a lot of gray areas. There aren't too many
photo opportunities. It can be under-reported, breeding false
confidence, or over-reported, stoking unnecessary fears.

But it is one of the most important, if not the most important, story
of our lifetimes. It's the story of how we protect American lives and
the American way of life, th

[INFOCON] - UNIRAS Briefing - 181/02 - MICROSOFT - UncheckedBuffer in MSN Chat Control Can Lead to Code Execution (Rev - full

2002-06-12 Thread Wanja Eric Naef [IWS]



-Original Message-
From: UNIRAS (UK Govt CERT)
Sent: 12 June 2002 14:14
To: Undisclosed Recipients
Subject: UNIRAS Briefing - 181/02 - MICROSOFT - Unchecked Buffer in MSN
Chat Control Can Lead to Code Execution (Rev - full protection now
available)



-BEGIN PGP SIGNED MESSAGE-

- --

   UNIRAS (UK Govt CERT) Briefing Notice - 181/02 dated 12.06.02  Time:
14:12
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- --

  UNIRAS material is also available from its website at www.uniras.gov.uk
and
 Information about NISCC is available from www.niscc.gov.uk
- --


Title
=

MICROSOFT Security Bulletin:

Unchecked Buffer in MSN Chat Control Can Lead to Code Execution
(Rev - full protection now available)

Detail
==

- -BEGIN PGP SIGNED MESSAGE-

- - --
Title:  Unchecked Buffer in MSN Chat Control Can Lead to Code
Execution (Q321661)
Released:   08 May 2002
Revised:11 June 2002 (version 2.0)
Software:   MSN Chat, MSN Messenger, Exchange Instant Messenger
Impact: Run Code of Attacker's Choice
Max Risk:   Critical
Bulletin:   MS02-022

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-022.asp.
- - --

Reason for Revision:

On May 8 2002, Microsoft released the original version of this
bulletin. On June 11, 2002 the bulletin was updated to announce
that while the fixes issued on May 8 2002 resolved the vulnerability,
they did not protect in all cases against the reintroduction of the
vulnerable control. As a result, a new set of fixes is being released
to ensure that systems are fully protected against the reintroduction
of the vulnerable control. A new MSN Chat control, updated patch,
updated version of MSN Messenger and an updated version of
Exchange Instant Messenger have been made available. Customers who
have applied any of the fixes released on May 8, 2002 are
encouraged to consider applying the updated fixes.

Issue:
==
The MSN Chat control is an ActiveX control that allows groups of
users to gather in a single, virtual location online to engage in
text messaging. The control is offered for download as a single
ActiveX control from a number of MSN sites. In addition, it is
included with MSN Messenger since version 4.5 and Exchange Instant
Messenger. While the MSN Chat control is included with these
products it is not used to provide Instant Messaging functionality,
but rather to add chat functionality to those products.

An unchecked buffer exists in one of the functions that handles
input parameters in the MSN Chat control. A security
vulnerability results because it is possible for a malicious user
to levy a buffer overrun attack and attempt to exploit this flaw.
A successful attack could allow code to run in the user's context.

It would be possible for an attacker to attempt to exploit
this vulnerability either through a malicious web site or through
HTML email. However, Outlook Express 6.0 and the
Outlook Email Security Update, which is available for
Outlook 98 and Outlook 2000, Outlook 2002 and can thwart such
attempts through their default security settings.

Mitigating Factors:

 - A successful attack would require that the user have installed
   the MSN Chat control, MSN Messenger, or
   Exchange Instant Messenger.

 - The MSN Chat control does not install with any version of
   Windows or Internet Explorer by default.

 - Windows Messenger which ships with Windows XP does not
   include the MSN Chat control. Windows XP users would be
   vulnerable only if they have chosen to install the MSN Chat
   control from MSN sites.

 - The HTML email attack vector is blocked by the following
   Microsoft mail products:
- Outlook 98 and Outlook 2000 with the
  Outlook Email Security Update
- Outlook 2002
- Outlook Express.
   This is because these products all open HTML email in the
   Restricted Sites zone by default.

Risk Rating:

 - Internet systems: Low
 - Intranet systems: Low
 - Client systems: Critical

Patch Availability:
===
 - A patch is available to fix this vulnerability. Please read the
   Security Bulletin at
   http://www.microsoft.com/technet/security/bulletin/ms02-022.asp
   for information on obtaining this patch.

Acknowledgment:
===
 - eEye Digital Security (http://www.eeye.com)

- - -

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.

[INFOCON] - OCIPEP DAILY BRIEF Number: DOB02-080 Date: 12 June2002

2002-06-12 Thread Wanja Eric Naef [IWS]

DAILY BRIEF Number: DOB02-080 Date: 12 June 2002

NEWS

Ottawa to Buy Smallpox Vaccine for All Canadians
The Ottawa Citizen reports that the federal government will purchase
millions of doses of the smallpox vaccine, enough to inoculate every
Canadian. Dr. Ron St. John, executive director of Health Canada's Centre for
Emergency Preparedness and Response, stated that negotiations were already
underway to acquire the vaccines, which could cost up to $123 million. There
are also plans to vaccinate epidemiologists and federal health workers who
would be in the front line in the event of a smallpox outbreak. While he
acknowledged that the possibility of a bioterrorist attack on Canada is
extremely remote, Dr. St. John stressed that even a limited outbreak could
turn into a national catastrophe. The vaccine is effective if given within
four days of exposure to the virus. (Source: The Ottawa Citizen, 12 June
2002)
http://www.canada.com/ottawa/ottawacitizen/story.asp?id={C693E8BE-C7CB-40AF-
B28C-B27CF936D0E1}
http://www.canada.com/ottawa/ottawacitizen/

Platform-Jumping Virus a New Challenge for Virus Writers
A new virus that made the headlines last week has prompted a renewed
interest in Unix and Linux viruses, according to anti-virus experts. A
Symantec researcher explained that the Simile virus, which can jump from
Windows to Unix operating systems, presents new challenges for virus
writers. A McAfee analyst commented that "Unix shell script viruses are
relatively easy to create, yet powerful enough to create big problems."
(Source: vnunet.com, 11 June 2002)
http://www.vnunet.com/News/1132517

Comment: The same news source on 5 June published an article
(http://www.vnunet.com/News/1132372) quoting Symantec and McAfee experts who
had released an advisory after the discovery of the Simile/Etap virus. They
called it a "very complex virus that uses entry-point obscuring,
metamorphism and polymorphic decryption," which makes it hard to detect.
Typically, the majority of viruses are Windows based due in part to the
proliferation of Microsoft Windows operating system in the market place. As
the popularity of Unix-based operating systems increases in the general user
population (i.e. Linux) it follows that we may see: (1) an increase in
viruses that target the Unix/Linux operating systems and (2) viruses that
have the ability to infect more than one type of operating system (i.e.
Unix/Linux and Windows).

IN BRIEF

Transportation Delays Expected in Calgary During G8 Summit
Most roads near Calgary International Airport will be closed to the public
from June 25 to 28 as part of the Calgary Police's security restrictions
during the G8 Summit. Air travellers are urged to allow at least an extra 30
minutes to reach the airport and to check with the G8 Summit information
line for information on road closures. Service on the city's light rail
system may also be affected. (Source: CBC News, 11 June 2002)
http://calgary.cbc.ca/template/servlet/View?filename=sy_11062002

State of Emergency Declared in Flooded Alberta Communities
Rain continued to fall in southern Alberta, and the worst may be yet to
come, if warm weather accelerates melting of the snow that fell in the
mountains, according to Dennis Chief Calf, fire chief and head of disaster
services for the Blood Tribe Reserve. A state of emergency has been declared
in the community of Pincher Creek and in the county of Lethbridge, while
flood warnings are in effect in several other communities. (Source: CBC
News, 11 June 2002)
http://calgary.cbc.ca/template/servlet/View?filename=fd_11062002

FBI Investigates Dive Shops
Scuba diving shops across the U.S. are being contacted by FBI agents
concerned that terrorists may have been taking scuba diving training with
the intention of blowing up ships, power plants, bridges and other
structures that are waterfront. Agents are looking for unusual requests from
potential trainees, such as limited-visibility diving and diving in a
harbour, where water is turbulent and cloudy. (Source: The Toronto Star, 11
June 2002)
http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Artic
le_Type1&c=Article&cid=1022100028330&call_page=
TS_World&call_pageid=968332188854&call_pagepath=News/World&col=968350060724

Comment: This appears to be further to a May 23 information bulletin from
the National Infrastructure Protection Center (NIPC) stating that various
terrorist elements had sought to "develop an offensive scuba diver
capability."





CYBER UPDATES
See: What's New for the latest Alerts, Advisories and Information Products

Threats

Central Command reports on Worm/Trilissa.D, which is a worm that propagates
via Outlook e-mail. It arrives with the subject line "Bush is a criminal!"
and the attachment "Bush_you_are_guilty!!!.scr".
http://support.centralcommand.com/cgi-bin/command.cfg/php/enduser/std_adp.ph
p?p_refno=020611-11


Central Command reports on TR/Win32.Rewin, which is a Trojan horse that
allows backdoor access to a v

[INFOCON] - NIPC Daily Report for June 12, 2002

2002-06-12 Thread Wanja Eric Naef [IWS]

NIPC Daily Report
12 June, 2002

The NIPC Watch and Warning Unit compiles this report to inform recipients of
issues impacting the integrity and capability of the nation's critical
infrastructures.

DoD software acquisition strategy. In hopes of closing security holes in
software acquisitions, beginning July 1, the Defense Department will require
a broad group of commercial software suppliers to evaluate their products
using a standard known as Common Criteria (CC). The CC not only focuses on
information assurance products; such as firewalls or intrusion-detection
systems, but "information assurance-enabled products" such as Web browsers,
operating systems and databases as well.  According to DOD, products that
fail to pass CC muster, will not be purchased by the department. (Federal
Computer Week, 10 Jun)

Congress to Examine Domain Name Co. Congress is taking a look at the
California company that administers Internet addresses after critics said it
is too slow to address security holes and should be more closely regulated.
The Internet Corporation for Assigned Names and Numbers, or ICANN, governs
the system that translates common Web site addresses into strings of numbers
understood by computers. Testimony prepared for a Senate committee hearing,
and obtained by The Associated Press, says the Commerce Department has not
taken a strong enough role in overseeing the company. ICANN gained control
of the Internet's domain name system through a 1998 agreement with the
Commerce Department. But the deal was only supposed to be a transition, and
control was supposed to be ceded to another private company or organization
in 2000. ICANN has been fraught with infighting and delays, and the deal was
extended to September of this year. The company has governed the creation of
new domain names, such as .info and .name, and created more competition in
domain name sales.  (AP Technology, 12 Jun)

Summit addresses threats to cyberspace. On 10 June, political, industry, and
academic leaders stressed the need for cooperation in order to prevent
domestic and international attacks on the nation's information networks at
the third Networked Economy Summit, which was hosted by George Mason
University.  Richard A. Clarke, special adviser to the president for
cyberspace security said, "The threats to cyberspace, and there are many,
cannot be handled only by the military or the government.  All of us own a
piece of cyberspace, so all of us must act to secure cyberspace." Clarke
said that by mid-September, his office, along with the Office of Homeland
Security would be presenting the president with a National Strategy to
Secure Cyberspace, compiled from the advice of different sectors of society.
(Washington Post, 11 Jun)

Colorado wildfires knock out high-voltage lines.  The wildfires blazing in
Colorado have knocked out high-voltage power lines and forced utility Xcel
Energy Inc. to shut down lines in fire areas to prevent more damage.  The
fires so far have not cut power deliveries to Xcel's transmission customers
because the utility has been able to re-route electricity around the blazes,
said Mark Stutz, a spokesman for Xcel.  Some customers who get their power
from low-voltage distribution systems, however, have lost power.   Xcel
provides power to about 75 percent of Colorado's consumers.  The 77,000 acre
(31,162-hectare) fire, located about 55 miles southwest of Denver, damaged a
230 kilovolt Tarryall-to-Daniels Park transmission line Sunday night and
forced it off the grid. The blaze also knocked out a 115 kv Tarryall-to-
Divide line west of Colorado Springs.   Another 69 kv transmission cable
near Grand Junction in western Colorado was burned and a 69 kv line running
from a hydroelectric power plant near Glenwood Springs was shut off for
safety reasons. The Western Electricity Coordinating Council in Salt Lake
City, Utah is keeping a close eye on the Colorado fires, but thus far the
state's grid is not threatened.  (Reuters, 11 Jun)

FHWA awards a tech services pact. The Federal Highway Administration has
awarded a 10-year, $175 million contract to Indus Corp. to secure the agency
's databases. Under the Federal Highway Administration Information
Technology Support Services contract, Indus will also help the agency with
its enterprise architecture, network infrastructure, help desk, document
management and telecommunications services. (GCN.com, 11 Jun)

~dmh




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk