http://www.ocipep.gc.ca/DOB/DOB02-176_e.html OCIPEP DAILY BRIEF Number: DOB02-176 Date: 30 October 2002 NEWS
New act to make Ontario's drinking water safe - Update As reported in the OCIPEP Daily Brief DOB02-175 released 29 October 2002, the Safe Drinking Water Act was unveiled yesterday by the Ontario provincial government. The law will call for: licenses for all labs; a new position of chief provincial inspector; annual reports by the government to the legislature; and, new standards for water testing, treatment, distribution and quality. Early reaction to the bill has been mixed, with NDP MPP Marilyn Churley, the architect of the initial draft of the Safe Drinking Water Act, unhappy that the Conservative government version doesn't deal with source protection. Ontario Premier Ernie Eves said the government intends to follow Justice O'Connor's advice that it amend the Environmental Protection Act to cover source water protection. (Source: thestar.com, 30 October 2002) Click here for the source article OCIPEP Comment: Justice O'Connor's reports, made in the wake of the Walkerton tragedy, contained 121 recommendations to improve the safety and security of Ontario's drinking water. With regard to water source protection, the report stated that a strong source-protection program "lowers risk cost-effectively, because keeping contaminants out of drinking water sources is an efficient way of keeping them out of the drinking water". Windows 2000 earns Common Criteria certification The Microsoft Windows 2000 operating system was awarded a Common Criteria certification, a document that spells out common security criteria recognized by 15 countries, including Canada and the U.K. Windows 2000 was certified at Evaluation Assurance Level 4, meaning that it was "methodically designed, tested and reviewed. " (Source: news.com, 29 October 2002) Click here for the source article U.S. Department of Commerce releases certification and accreditation guidelines The U.S. Department of Commerce has released the first of three sections of information security guidelines designed to fix the "inconsistent and flawed" security assessments for systems used by government agencies. Some current security certification procedures are "excessively complex, outdated and costly to implement," according to the National Institute of Standards and Technology (NIST). A NIST researcher stresses that there is a need to "move toward the adoption of a standardized process," which would allow federal agencies "to better understand how their partners are dealing with the security issues." The other two sections of guidelines, one dealing with system controls, and the other with verification procedures and techniques, will be released next spring. (Source: computerworld.com, 29 October 2002) Click here for the source article OCIPEP Comment: A draft copy (PDF version) of the Guidelines for the Security Certification and Accreditation of Federal Information Technology Systems can be viewed at: http://csrc.nist.gov/sec-cert/SP-800-37-v1.0.pdf According to recent reports, although leading software companies have recently committed themselves to improving the latent security of the products they bring to market, there remains a significant threat to the security of information networks due to poorly secured software. According to @Stake, a U.S. security consultancy, 70 percent of security defects are due to flaws in software design. Microsoft recently publicly committed itself to ensuring the security of its products. However, according to analysts, the work the programmers are doing now will not be reflected in the company's products for a year or two. (Source: economist.com, 26 October, 2002) http://www.economist.com/surveys/displayStory.cfm?Story_id=1389575 IN BRIEF Alberta forest fires cost $300M The cost of fighting forest fires in Alberta this year was over $300 million, five times more than budgeted, according to a provincial fire information officer. The continuing droughts, as well as the evacuation of residents from several communities and road closures, were factors that contributed to the record expenses. (Source: cbc.ca, 29 October 2002) Click here for the source article CIA report warns against cyberterrorism In a report to the Senate Intelligence Committee, the Central Intelligence Agency (CIA) warns that groups such as Sunni extremists, Hezbollah and Aleph-formerly known as Aum Shinrikyo-may join al-Qaeda to wage cyberwarfare against the U.S. (Source: news.com, 29 October 2002) Click here for the source article Port Simpson - Update The B.C. Provincial Emergency Program has issued its tenth and final update concerning the power outage and roadway access closure at Port Simpson, 55 km north of Prince Rupert. Power has been restored since October 22, and community officials indicate they are past the crisis stage and have moved into recovery operations. A meeting will be held today to address the road restoration, which was put on hold because of the risk of further slides. In order to respond better to future emergencies, the community school will be transformed into an emergency response facility. (Source: B.C. PEP, 29 October 2002) More earthquakes in Mount Etna area Reports this morning indicated that the Italian Government has declared a state of emergency in parts of Sicily, after approximately 1,000 people were forced to leave their homes after another series of earthquakes in the region surrounding Mount Etna on Tuesday. The most forceful quake registered at 4.4 mg on the Richter scale. The Italian Defence Ministry deployed 1,000 soldiers to assist. (Source: bbcnews.com, 30 October 2002) Click here for the source article Great Britain power outage The violent storm that hit parts of Europe during the weekend left a million homes without power in Great Britain, according to a media report. As of yesterday, there were still 65,000 homes without electricity. Britain's energy minister plans to investigate the reportedly poor response of energy suppliers to the crisis. (Source: guardian.co.uk, 30 October 2002) Click here for the source article CYBER UPDATES See: What's New for the latest Alerts, Advisories and Information Products See: News - Windows 2000 earns Common Criteria certification See: News - U.S. Commerce Department releases certification and accreditation guidelines See In Brief - CIA report warns against cyberterrorism Threats Symantec reports on VBS.Pocus, which is a VB Script virus that infects .vbs files in the root of the C drive. http://securityresponse.symantec.com/avcenter/venc/data/vbs.pocus.html Trend Micro reports on WORM_SPONGE.A, which is a destructive, memory-resident MS Outlook worm. It arrives with the subject: "SpongeBob Wallpaper" and the attachment: Spongy.exe. http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SPO NGE.A Central Command reports on W32/Ramdile, which is a destructive file infector that infects files with the extensions: .exe, .src and .cpl. http://support.centralcommand.com/cgi-bin/command.cfg/php/enduser/std_ad p.php?p_refno=021029-000012 Vulnerabilities Debian krb5 package buffer overflow. (Debian) http://www.debian.org/security/2002/dsa-183 Apple 12/640 PS LaserWriter TCP/IP configuration utility Telnet server password vulnerability. (SecurityFocus) http://online.securityfocus.com/bid/6052/discussion Acuma Acusend Unauthorized file access vulnerability. (SecurityFocus) http://online.securityfocus.com/bid/6048/discussion ISC INN multiple vulnerabilities. (SecurityFocus) http://online.securityfocus.com/bid/6049/discussion http://online.securityfocus.com/bid/4501/discusson Tools Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local and remote root exploits during the exploit itself. http://www.wwjh.net CONTACT US To add or remove a name from the distribution list, or to modify existing contact information, e-mail: [EMAIL PROTECTED] For urgent matters or to report any incidents, please contact OCIPEP's Emergency Operations Centre at: Phone: (613) 991-7000 Fax: (613) 996-0995 Secure Fax: (613) 991-7094 Email: [EMAIL PROTECTED] For general information, please contact OCIPEP's Communications Division at: Phone: (613) 944-4875 or 1-800-830-3118 Fax: (613) 998-9589 Email: [EMAIL PROTECTED] Web Site: www.ocipep-bpiepc.gc.ca Disclaimer The information in the OCIPEP Daily Brief has been drawn from a variety of external sources. Although OCIPEP makes reasonable efforts to ensure the accuracy, currency and reliability of the content, OCIPEP does not offer any guarantee in that regard. The links provided are solely for the convenience of OCIPEP Daily Brief users. OCIPEP is not responsible for the information found through these links. IWS INFOCON Mailing List @ IWS - The Information Warfare Site http://www.iwar.org.uk