Security 10918 Published by Philipp Esselbach 0

This patch is a cumulative patch that includes the functionality of all security patches released to date for IIS 5.0, and all patches released for IIS 4.0 since Windows NT(r) 4.0 Service Pack 5.

A patch is available to fix these vulnerabilities. Please read the Security Bulletin for information on obtaining this patch.

Read more

Security 10918 Published by Philipp Esselbach 0

Thanks to CestLaVie for this one:

CERT:registered: Advisory CA-2001-24 Vulnerability in OpenView and NetView
Original release date: August 15, 2001 Last revised: --
Source: CERT/CC

Systems Affected

Systems running HP OpenView Network Node Manager (NNM) Version 6.1 on the following platforms:
HP9000 Servers running HP-UX releases 10.20 and 11.00 (only)
Sun Microsystems Solaris releases 2.x
Microsoft Windows NT4.x / Windows 2000

Systems running Tivoli NetView Versions 5.x and 6.x on the following platforms:
IBM AIX
Sun Microsystems Solaris
Compaq Tru64 Unix
Microsoft Windows NT4.x / Windows 2000

Read more

Security 10918 Published by Philipp Esselbach 0

Security professionals have welcomed the release today of a patch scanner for Windows NT and 2000 machines.
The command line program, HFNetChk, was designed by Microsoft's security program manager, Eric Schultze.

Read more

Security 10918 Published by Philipp Esselbach 0

...Contains Memory Leak

The NNTP (Network News Transport Protocol) service in Windows NT 4.0 and Windows 2000 contains a memory leak in a routine that processes news postings. Each time such a posting is processed that contains a particular construction, the memory leak causes a small amount of memory to no longer be available for use. If an attacker sent a large number of posts, the server memory could be depleted to the point at which normal service would be disrupted. An affected server could be restored to normal service by rebooting.

A patch is available to fix this vulnerability. Please read the Security Bulletin for information on obtaining this patch.

Read more

Security 10918 Published by Philipp Esselbach 0

Bates, an 18-year-old who will start his freshman year at Oklahoma University this month, knew it was uncharacteristic of Trey to flood him with winking faces--a popular emoticon used to color text-based IM conversations. His suspicions grew when the alias george.w.bush@whitehouse.gov suddenly flashed on his screen along with an invitation to accept an attached file called choke.exe. Unlike his friend, who obviously had been bitten by a virus, Bates knew better than to accept it.

Read more

Security 10918 Published by Philipp Esselbach 0

SEOUL (REUTERS) - The Code Red computer virus has mutated into a third more dangerous variant, South Korea's Information and Communication Ministry said Friday.

About 10 damage reports have come in which were believed to have been the result of the latest Code Red III, Ko Kwang-sup, an official at the ministry, told Reuters.

Read more

Security 10918 Published by Philipp Esselbach 0

Code Red claimed two major victims this week, as Microsoft confirmed that some servers running its MSN Hotmail service were infected with a version of the worm and express-shipping giant Federal Express said the worm interfered with some deliveries Wednesday.

Microsoft spokesman Jim Desler said Thursday that some Hotmail servers were brought offline to deal with the problem and that service was not disrupted. About 110 million people have accounts with the free Web-based e-mail service, according to Microsoft.

Read more

Security 10918 Published by Philipp Esselbach 0

The security firm Vigilinx Inc. is alerting customers of a first-ever worm that replicates using an Adobe portable document format (PDF). The PeachyPDF@mm worm mass mails itself through Microsoft Outlook. Not only does it send itself to 100 addresses from an infected users' address book, it also sends itself to the users' alternative E-mail addresses.

Read more

Security 10918 Published by Philipp Esselbach 0

A meaner version of the Code Red Internet worm has made its first appearance in Asia, infesting dozens of computers in China, security experts said on Tuesday.

South Korea was trying to determine whether it was this pernicious worm which had attacked government computers and Hong Kong also reported at least one confirmed infection.

Read more