---------------------- Forwarded by Vince J Kaminski/HOU/ECT on 03/27/2000 
08:46 AM ---------------------------


"NW Security and Bug Patch Alert" <Security-BugPatch@bdcimail.com> on 
03/22/2000 04:28:49 AM
Please respond to "Security and Bug Patch Alert Help" <NWReplies@bellevue.com>
To: <vkamins@enron.com>
cc:  
Subject: Guarding the perimeter is not always enough


NETWORK WORLD FUSION FOCUS: JASON MESERVE on
SECURITY AND BUG PATCH ALERT
TODAY'S FOCUS: Guarding the perimeter is not always enough
03/21/00

Dear Wincenty Kaminski,

Today's Focus: Guarding the perimeter is 
not always enough
---------------------------------------------------------------
By Jason Meserve

Oh, the irony. You build your security systems to protect internal
systems from outside intruders, then someone inside the company decides
to play cyber-vandal.

Last week, authorities charged Abdelkader Smires with launching denial-
of-service attacks against his own employer, New York-based Internet
Trading Technologies, Inc. (ITTI). Smires was upset that ITTI did not
meet his demands for a raise and more stock options. He used computers
at a Kinko's Copy store and a local university to launch his revenge
attacks against ITTI that disrupted the company's trading systems for
three days.

"He and the other programmer were involved in writing the software, so
he knew just where to attack. He was fully familiar with weaknesses in
the code," said Eric Friedberg, computer and telecommunications crime
coordinator for the U.S. Attorney's Office in Brooklyn, N.Y., in an
interview with Computerworld "Although it was a potentially disastrous
attack for the company, it wasn't a highly sophisticated attack."

Read more about the attack here:
http://www.nwfusion.com/news/2000/0317insidejob.html


Another interesting article to check out is "The service-pack shuffle
ruffles a lot of feathers" in this week's issue of Network World
(http://www.nwfusion.com/archive/2000/83305_03-20-2000.html). My
colleague Deni Connor writes that customer are fed up with the endless
release of service packs, which seem to be replacing quality assurance
at the companies developing our enterprise software.


But with no bugs, there would be no newsletter, so on with the latest
patches and alerts.


Cisco Secure PIX Firewall FTP vulnerabilities

Cisco announced that its PIX Firewall has a problem interpreting FTP
commands, allowing inappropriate access through the firewall. The
announcement covers two vulnerabilities: One when the firewall receives
an error from an internal FTP server and the second when a client inside
the firewall visits an external site and selects a link that the
firewall interprets as two commands. One of the commands inadvertently
opens a connection through the firewall.
http://www.cisco.com/warp/public/707/pixftp-pub.shtml
************


Patch available for "OfficeScan DoS & Message Replay" vulnerability

Trend Micro has released a new version of OfficeScan Corporate Edition -
Version 3.51 - that eliminates two security vulnerabilities found on
previous versions. Previous versions of OfficeScan allow intruders
within a firewall to initiate a denial-of-service attack on the
OfficeScan client (tmlisten.exe) as well as to capture OfficeScan
commands.  These commands can be replayed and used to change other
OfficeScan client configurations.
Patch:
http://www.antivirus.com/download/ofce_patch.htm
Advisory:
http://www.antivirus.com/download/ofce_patch_35.htm
************


FreeBSD releases four advisories

The makers of FreeBSD did a little housecleaning last week, releasing
advisories on a number of previously announced vulnerabilities in
various Linux packages.
mh/nmh/exmh/exmh2 ports allow remote execution of binary code
Relating to the nmh's mhshow vulnerability when reading MIME headers.
New packages at:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/mail/nmh-1.0.3.
tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/mail/nmh-1.0.3
.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/mail/nmh-1.0.
3.tgz

Lynx ports contain numerous buffer overflows
The lynx WWW browser is written in an unsecured format that contains a
number of holes. There is currently no patch available, so FreeBSD
recommends removing the package to eliminate the problem.
mtr port contains a local root exploit
The mtr program (versions 0.41 and below) fails to correctly drop setuid
root privileges during operation, allowing a local root compromise.
Fixes:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/net/mtr-0.42.tg
z
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/net/mtr-0.42.t
gz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/net/mtr-0.42.
tgz

orville-write port contains local root compromise
One of the commands installed by the port is incorrectly installed with
setuid root permissions. The &huh8 command should not have any special
privileges because it is intended to be run by the local user to view
his saved messages.
Fixes:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-3-stable/misc/orville-wr
ite2.41a.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-current/misc/orville-w
rite-2.41a.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/alpha/packages-4-current/misc/orville-
write-2.41a.tgz
************


IE and Outlook 5.x allow executing arbitrary programs using .eml files

Georgi Guninski has found yet another flaw in Microsoft's popular
browser and e-mail program. This one allows arbitrary programs to be
launched via attached .eml files. No patch is currently available from
Microsoft, so Guninski recommends shutting off active scripting.
For a demonstration that starts WordPad:
http://www.nat.bg/~joro/eml.html
************


Sojourn search engine exposes files

The Cerberus Security Team has discovered a weakness in the commercial
search engine, Sojourn, that allows attackers to read any local file on
the file system that they have read access to (as provided by the
account the Web server is running under). As such, files such as
/etc/passwd on Unix systems can be read and files such as the
global.asa on Windows NT and 2000. No patch was available as of this
writing.More on Sojourn:
http://www.generationterrorists.com/sojourn_superuser.html
************


Problem with AIX 4.x linker

The Sendmail Consortium is warning of a problem with the AIX 4.x linker.
According to the advisory, unlike most other linkers, the AIX linker
uses the paths specified at compile time for the program's shared
library search path at run time.  Therefore, AIX compilations that use
the -L flag with the AIX linker must use extra precautions to prevent
security problems. This problem is not specific to Sendmail and can
affect other applications. IBM claims it is aware of the problem and
provides workarounds.
AIX site:
http://www.ibm.com/servers/aix/
************


Oracle Web Listener 4.0.x

The Cerberus Security Team has discovered a number of issues with
Oracle's Web Listener, part of Oracle Application Server (OAS), which
allow a remote attacker to run arbitrary commands on the Web server. As
part of the default installation, OAS creates an ows-bin virtual
directory that is a cgi-bin equivalent. According to Cerberus, this
directory not only contains a number of batch files, DLLs and
executables but also the binary image file for the Listener itself,
which could lead to malicious users executing commands on the server
with special query strings. No patch is available yet, though Cerberus
recommends removing the ows-bin directory or point to a more benign
directory.
OAS Web site:
http://www.oracle.com/appserver/
************


kreatecd local root compromise

TESO has found a vulnerability within the kreatecd application for
Linux. An attacker can gain local root-access. Halloween Linux Version 4
and SuSE 6.x are vulnerable. According to the TESO advisory, the author
of the software has been notified. The advisory recommends removing the
suid bit of kreatecd.
See the exploit:
http://www.cs.uni-potsdam.de/homepages/students/linuxer
************


'Melting Worm' slithers into the wild

From Computerworld: A new worm now "in the wild" has the potential to
shut down Windows platforms and make the operating system permanently
unusable.
Read the article:
http://www.nwfusion.com/news/2000/0316worm.html
************


Vulnerability in Microsoft SQL Server 7.0 encryption used to store
administrative login ID

Internet Security Systems (ISS) has identified a vulnerability in the
encryption used to conceal the password and login ID of a registered SQL
Server user in Enterprise Manager for Microsoft SQL Server 7.0. When
registering a new SQL Server in the Enterprise Manager or editing the
SQL Server registration properties, the login name that will be used by
the Enterprise Manager for the connection must be specified. If a SQL
Server login name is used instead of a Windows Domain user name and the
'Always prompt for login name and password' checkbox is not set, the
login ID and password are weakly encrypted and stored in the registry.
http://xforce.iss.net/alerts/advise45.php3
************


Patch available for "Malformed Media License Request" vulnerability

Microsoft has released a patch that eliminates a denial-of-service
vulnerability in Windows Media License Manager. The vulnerability could
allow a malicious user to temporarily prevent the license server from
issuing further licenses to customers for protected digital content such
as music and video.
http://www.microsoft.com/technet/security/bulletin/fq00-016.asp
************

To contact Jason Meserve:
-------------------------
Jason Meserve is a staff writer with Network World, covering search
engines, portals, videoconferencing, IP Multicast and document
management. He also oversees the "Security Alerts" page on Fusion
(http://www2.nwfusion.com/security/bulletins.html). Jason can be reached
at mailto:jmeserve@nww.com.

*********************************************************
Subscription Services

To subscribe or unsubscribe to any Network World e-mail newsletters,
go to:
http://www.nwwsubscribe.com/news/scripts/notprinteditnews.asp

To change your email address, go to:
http://www.nwwsubscribe.com/news/scripts/changeemail.asp

Subscription questions? Contact Customer Service by replying to this
message.

Other Questions/Comments

Have editorial comments? Write Jeff Caruso, Newsletter Editor, at:
mailto:jcaruso@nww.com

For advertising information, write Jamie Kalbach, Account Executive,
at: mailto:jkalbach@nww.com

Network World Fusion is part of IDG.net, the IDG Online Network.
IT All Starts Here:
http://www.idg.com

Copyright Network World, Inc., 2000