Security 10918 Published by Philipp Esselbach 0

Among the components provided by Services for Unix (SFU) 2.0 are services that implement the NFS (Network File System) and Telnet protocols. Both services contain memory leaks that could be triggered by a user request. An attacker who repeatedly sent such a request could deplete the kernel memory on the server to the point where
performance slowed and the system could potentially fail.

A patch is available to fix this vulnerability. Please read the Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms01-039.asp for information on obtaining this patch.

Security 10918 Published by Philipp Esselbach 0

The SirCam worm continued to spread Tuesday, although antivirus experts said it still paled in comparison to other destructive programs.

"We escalated this to ´high risk,´ but it is not a blockbuster virus on the order of Love Letter or Melissa, said David Perry, global director of education for antivirus-software maker Trend Micro. "This is a summer-cold virus."

Read more

Security 10918 Published by Philipp Esselbach 0

The SirCam worm continued to gain momentum Monday, carrying with it the potential not only to slow corporate e-mail servers but also to send along company secrets.

The worm, which cropped up last week, continued to infect systems across the world over the weekend.

Read more

Security 10918 Published by Philipp Esselbach 0

The Microsoft Outlook View Control is an ActiveX control that allows Outlook mail folders to be viewed via web pages. The control should only allow passive operations such as viewing mail or calendar data. In reality, though, it exposes a function that could allow the web page to manipulate Outlook data. This could enable an attacker to delete mail, change calendar information, or take virtually any other action through Outlook including running arbitrary code on the user´s machine.

Hostile web sites would pose the greatest threat with respect to this vulnerability. If a user could be enticed into visiting a web page controlled by an attacker, script or HTML on the page could invoke the control when the page was opened. The script or HTML could then use the control to take whatever action the attacker desired on the user´s Outlook data.

A patch is available to fix this vulnerability. Please read the Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms01-038.asp

Security 10918 Published by Philipp Esselbach 0

A new variant of the Leave worm is doing the rounds in the guise of a Microsoft security bulletin, according to antivirus experts.

The worm first appeared last month as a self-propagating virus that infected machines already made vulnerable by the SubSeven Trojan horse. Among other things, it synchronises an infected computer´s clock with that of the US Naval Observatory.

Read more

Security 10918 Published by Philipp Esselbach 0

An SMTP service installs by default as part of Windows 2000 server products, and can be selected for installation on Windows 2000 Professional. A vulnerability results because of a flaw in the authentication process used by the service. The vulnerability could allow an unauthorized user to successfully authenticate to the service using incorrect credentials. An attacker who exploited the vulnerability could gain user-level privileges on the SMTP service, thereby enabling the attacker to use the service but not to administer it. The most likely purpose in exploiting the vulnerability would be to perform mail relaying via the server.

A patch is available to fix this vulnerability. Please read the Security Bulletin http://www.microsoft.com/technet/security/bulletin/ms01-037.asp for information on obtaining this patch.