-----Original Message-----
From: UNIRAS (UK Govt CERT)
Sent: 17 April 2002 17:32
To: Undisclosed Recipients
Subject: UNIRAS Alert - 14/02 - Malicious Software Report - new variant
of K l e z
Importance: High
-----BEGIN PGP SIGNED MESSAGE-----
- --------------------------------------------------------------------------
--------
UNIRAS (UK Govt CERT) Alert Notice - 14/02 dated 17.04.02 Time: 17:25
UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- --------------------------------------------------------------------------
--------
UNIRAS material is also available from its website at www.uniras.gov.uk
and
Information about NISCC is available from www.niscc.gov.uk
- --------------------------------------------------------------------------
--------
Title
=====
Malicious Software Report - new variant of Klez, W32.Klez.H@mm,
W32.Klez.K@mm
Detail
======
Reports are coming in of a new variant of the Klez worm, based on the Klez E
variant. Today has seen a significant acceleration in its promulgation.
Anti-
virus software vendors have variously named the new variant H and K. At the
time
of writing, the following vendors have released information on the subject:
Symantec
http:[EMAIL PROTECTED]
McAfee http://vil.mcafee.com/dispVirus.asp?virus_k=99455
Message Labs http://www.messagelabs.co.uk/viruseye/
F-Secure http://www.f-secure.com/v-descs/klez_h.shtml
Sophos http://www.sophos.co.uk/virusinfo/articles/klezh.html
You should consult your anti-virus software vendor to ensure that the most
recent
patch releases will protect you against this new variant.
- --------------------------------------------------------------------------
--------
For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:
[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686
- --------------------------------------------------------------------------
--------
UNIRAS wishes to acknowledge the contributions of Symantec, McAfee, Message
Labs,
Sophos and F-Secure for the information contained in this Alert.
- --------------------------------------------------------------------------
--------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical
site
to ensure that you receive the most current information concerning that
problem.
Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.
Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.
UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- --------------------------------------------------------------------------
--------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
iQCVAwUBPL2i4Ipao72zK539AQH8cAP/ZjzpG14G85qB7bkLe6urKJ6yq4M2cBTk
BF4pVaQpZhCCasV+ijdMaPlIE7vwAtFDrL7I8ySpgfKM2buNZIlJ+Kg1wafj1vA8
j8MKIgGGrdbY2+DDVkT5kPSynmcuRAmLWyEozHvCOO9N7B4bxZNqXL457VB5NWPQ
IewgPRFl9V0=
=2ybn
-----END PGP SIGNATURE-----
IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk