----- Original Message -----
From: "Network Computing and The SANS Institute"
<[EMAIL PROTECTED]>
To: "Scott Fosseen (SD381534)" <[EMAIL PROTECTED]>
Sent: Thursday, December 20, 2001 8:02 PM
Subject: Security Alert Consensus #128


| To: Scott Fosseen (SD381534)
| Re: Your personalized newsletter
|
|                      -- Security Alert Consensus --
|                            Number 128 (01.51)
|                       Thursday, December 20, 2001
|                           Created for you by
|                  Network Computing and the SANS Institute
|                           Powered by Neohapsis
|
| ----------------------------------------------------------------------
|
| Welcome to SANS' distribution of the Security Alert Consensus.
|
| ----------------------------------------------------------------------
|
| This issue is brought to you by ...
| Nokia Internet Communications - a division of Nokia. NOKIA TEAMS UP WITH
| LEADING PUBLISHERS, Offering the most reliable, up-to-date SECURITY-
| focused information on the Web including: News & Assessment tools,
| Reviews & Analyst Reports For more information, visit our Security
| Resource Center:
| http://www.nokia.com/internet/na
|
| ----------------------------------------------------------------------
|
| Seasons Greetings from the Security Alert Consensus Team! We wish to
| extend our sincerest wishes for a very happy holiday season to all
| of you and your families.
|
| This week produced a few notable vulnerabilities. Admins of the
| various commercial Unixes (Solaris, HP-UX and so on) should look at
| the SystemV-derived login buffer overflow (reported as {01.51.009}
| under the Cross-Platform category). Linux users may want to update
| their glibc libraries to prevent possible overflows in the glob()
| function (reported as {01.51.024} in the Linux category). And, finally,
| so Windows users don't feel left out, Microsoft Corp. released an
| Internet Explorer mega-patch (reported as {01.51.010} in the Windows
| category). This patch fixes all nasty problems to date, including the
| one that automatically downloads and executes applications without
| warning the user.
|
| Special note: Microsoft today issued a critical recommendation
| regarding Windows, Windows XP, or ME machines that share internet
| connections with Windows 98/98SE clients. You can read more on and
| download this significant patch here:
| http://www.microsoft.com/technet/treeview/default.asp?url=
| /technet/security/bulletin/ms01-059.asp
|
| Until next time,
| --Security Alert Consensus Team
|
| ************************************************************************
|
| -----BEGIN PGP SIGNED MESSAGE-----
| Hash: SHA1
|
| TABLE OF CONTENTS:
|
| {01.51.001} Win - IIS large, content-length header DoS
| {01.51.004} Win - IKE UDP flood DoS
| {01.51.010} Win - MS01-058: Cumulative IE patch
| {01.51.018} Win - Citrix auto-launch of .ICA files
| {01.51.025} Win - EFTP directory listing vulnerability
| {01.51.026} Win - CentraOne log file info disclosure
|
|
| - --- Windows News -------------------------------------------------------
|
| *** {01.51.001} Win - IIS large, content-length header DoS
|
| Various people are reporting a potential denial of service found in
| IIS 5.0 (and possibly other versions), whereby a remote attacker sends
| a content-length header with an extremely large value. As a result,
| the server waits for the indicated amount of data to be sent, with
| no apparent timeouts.
|
| This vulnerability has not been confirmed. An exploit has been
| published.
|
| Source: SecurityFocus Bugtraq
| http://archives.neohapsis.com/archives/bugtraq/2001-12/0098.html
|
| *** {01.51.004} Win - IKE UDP flood DoS
|
| Various discussions in the past week have touched on the possibility
| of a denial of service attack against the IKE IPSEC service listening
| on UDP port 500. An ongoing flood can result in abnormally high CPU
| use while the packets are processed.
|
| This vulnerability has not been confirmed.
|
| Source: SecurityFocus Bugtraq
| http://archives.neohapsis.com/archives/bugtraq/2001-12/0108.html
|
| *** {01.51.010} Win - MS01-058: Cumulative IE patch
|
| Microsoft has released MS01-058 ("Cumulative IE patch"). This patch
| fixes all known security problems in Internet Explorer to date,
| including three new problems: the ability for a malicious Web site
| to execute arbitrary applications in IE 6; the ability to read files
| from the user's system; and a bug that could allow a Web site to
| trick the user into seeing a different file name in the download box.
|
| FAQ and patch:
| http://www.microsoft.com/technet/security/bulletin/MS01-058.asp
|
| Source: Microsoft
| http://archives.neohapsis.com/archives/vendor/2001-q4/0053.html
|
| *** {01.51.018} Win - Citrix auto-launch of .ICA files
|
| An advisory was released indicating that IE will automatically
| download and launch any .ICA file presented by a malicious Web site
| or e-mail. The .ICA file could cause a connection to a trojaned
| server, thereby allowing the server to copy files from or to the
| client's machine. Apparently, only the Windows version of the client
| is affected.
|
| The advisory indicates vendor confirmation. A list of workarounds is
| available at:
| http://archives.neohapsis.com/archives/bugtraq/2001-12/0133.html
|
| Source: SecurityFocus Bugtraq
| http://archives.neohapsis.com/archives/bugtraq/2001-12/0133.html
|
| *** {01.51.025} Win - EFTP directory listing vulnerability
|
| EFTP version 2.0.8.346 contains a bug that allows a remote attacker to
| gain directory listings outside the FTP root by sending a particular
| pattern of CWD commands.
|
| This vulnerability has not been confirmed.
|
| Source: SecurityFocus Bugtraq
| http://archives.neohapsis.com/archives/bugtraq/2001-12/0134.html
|
| *** {01.51.026} Win - CentraOne log file info disclosure
|
| The CentraOne collaboration and learning application has been found
| to create world-readable logs that contain large amounts of sensitive
| user information, including user name and password.
|
| This vulnerability has not been confirmed.
|
| Source: VulnWatch
| http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0072.html
|
| ************************************************************************
|
| -----BEGIN PGP SIGNATURE-----
| Version: GnuPG v1.0.6 (BSD/OS)
| Comment: For info see http://www.gnupg.org
|
| iD8DBQE8InZr+LUG5KFpTkYRAtg0AJ4oRUpS3jiXQgnqoHiKNzvjeJrdjgCfc+3J
| 3VPkRtIHdjho7bSFjCXX3vk=
| =KMB6
| -----END PGP SIGNATURE-----
| ------------------------------------------------------------------------
|
| This issue is brought to you by ...
| Nokia Internet Communications - a division of Nokia. NOKIA TEAMS UP WITH
| LEADING PUBLISHERS, Offering the most reliable, up-to-date SECURITY-
| focused information on the Web including: News & Assessment tools,
| Reviews & Analyst Reports For more information, visit our Security
| Resource Center:
| http://www.nokia.com/internet/na
|
| ----------------------------------------------------------------------
|
| Become a Security Alert Consensus member! If this e-mail was passed
| to you and you would like to begin receiving our security e-mail
| newsletter on a weekly basis, we invite you to subscribe today.
| http://www.sans.org/sansnews/
|
| We are signing the Consensus newsletter
| with PGP. The new SANS PGP key is posted at:
| http://certserver.pgp.com:11371/pks/lookup?op=get&search=0xA1694E46
| and can be accessed from the SANS Web site (http://www.sans.org).
|
| Special Note: To better secure your confidential information,
| we will no longer include personal URLs in our Consensus
| newsletter mailings. Instead, we have created a new form
| (http://www.sans.org/sansurl). On this form you can enter the SD
| number located near your name at the top of the newsletter. When you
| submit this form, an e-mail containing a URL will be sent to you at
| the e-mail address on record. With this URL you can make changes to
| your account (edit the content of your Consensus mailing, for example)
| without endangering the security of your personal URL. If you'd like
| to change your e-mail address or other information, or unsubscribe
| to this newsletter, please visit your new URL as described above. If
| you have any problems or questions, e-mail us at <[EMAIL PROTECTED]>.
|
| Missed an issue? You can find all back issues of
| Security Alert Consensus (and Security Express) online.
| http://archives.neohapsis.com/
|
| Your opinion counts. We'd like to hear your thoughts on Security Alert
| Consensus. E-mail any questions or comments to <[EMAIL PROTECTED]>.
|
| Copyright (c) 2001 Network Computing, a CMP Media LLC
| publication. All Rights Reserved. Distributed by Network
| Computing (http://www.networkcomputing.com) and The SANS Institute
| (http://www.sans.org). Powered by Neohapsis Inc., a Chicago-based
| security assessment and integration services consulting group
| ([EMAIL PROTECTED] | http://www.neohapsis.com/).
|
|
|
|


---------------------------------------------------------
Archived messages from this list can be found at:
http://www.mail-archive.com/tech-cord@aea5.k12.ia.us/
---------------------------------------------------------

Reply via email to