OCIPEP  DAILY BRIEF Number: DOB02-077 Date: 7 June 2002

NEWS

Bush Administration Announces Homeland Security Overhaul
President Bush went on national television Thursday night and asked Congress
"to join me in creating a single permanent department with an overriding and
urgent mission-securing the American homeland and protecting the American
people." Both sides of Congress appeared to agree with the proposed creation
of a Department of Homeland Security, with a budget of US$37 billion and
170,000 employees. In what is being called the biggest overhaul plan since
1947, the new department would incorporate an intelligence clearinghouse
that would gather information from other agencies such as the FBI and CIA
and "synthesize" the material with the aim of thwarting future terrorist
attacks. Tom Ridge, currently director of Homeland Security, is a likely
candidate to head the new department. According to the CNN news network, the
department would be comprised of four divisions:

Border and Transportation Security, including the U.S. Coast Guard, the
Customs Service, and the Immigration and Naturalization Service;
Emergency Preparedness and Response, including the Federal Emergency
Management Agency (FEMA) and grant programs for so-called "first responders"
now scattered across several agencies;
Chemical, Biological, Radiological and Nuclear Countermeasures.
Information Analysis and Infrastructure Protection, including the Secret
Service and the new clearinghouse for intelligence information.
(Source: CNN.com, 6 June 2002)
http://www.cnn.com/2002/ALLPOLITICS/06/06/bush.security/index.html

Comment: A transcript of President Bush's speech is available at:
http://www.msnbc.com/news/763148.asp

For a full text of the White House proposal for a Homeland Security
Department, see: http://www.govexec.com/dailyfed/0602/060602bushproposal.htm

Anti-G8 "Solidarity Village" Dreams Are Dead
The dreams of holding a "Solidarity Village" in Calgary are dead, according
to anti-G8 Summit activists. Anti-G8 protest organizer Sarah Kerr said that
the large village will be replaced by several smaller events for the
5,000-10,000 activists expected to participate in demonstrations. John
Chaput, Calgary's G8 project manager, explained that a site that could
accommodate the anticipated number of participants could not be found, and
the use of public space as a campsite would violate city regulations. Police
will deal with people who try to set up camp in city parks without approval,
according to Chaput. City officials will likely approve permits for a rally
to be held at Olympic Plaza and a march through the city streets. (Source:
The Calgary Herald, 6 June 2002)
http://www.canada.com/calgary/calgaryherald/story.asp?id={BF47D06F-A469-4B89
-8334-6D6407095EC0}


IN BRIEF

Conklin Residents Return Home
About 250 residents of Conklin, Alberta, were allowed to return to their
homes yesterday after the forest fire threatening their community receded.
Fire authorities also lifted evacuation alerts for the communities of
Janvier and Chard. Rainfall on Wednesday night helped the firefighters by
cooling some of the hot spots. (Source: CBC News, 6 June 2002)
http://edmonton.cbc.ca/template/servlet/View?filename=hf_6062002

Comment: For updates on this incident and others, click on the Incident
Mapping button at the top of the Daily Brief.

Hacker Group Defaces U.S. Navy Sites
Acting in a similar fashion as the "Deceptive Duo", a hacker group calling
itself the "Infidelz" defaced U.S. Navy web sites and posted confidential
personal information of job applicants from a human resources site. The
group does not appear to have the same motivation as the "Duo," who claimed
to be helping the government by exposing weak security practices. (Source:
vnunet.com, 6 June 2002)
http://www.vnunet.com/News/1132407

Comment: Members of the Deceptive Duo were arrested by the FBI in mid-May
after defacing a number of high-profile U.S. government and defense industry
web sites.

Virus Preys on World Cup Fans
British anti-virus company Sophos warns that workers trying to keep current
on the most recent World Cup scores in South Korea and Japan could be
victims of a new virus that poses as a web utility allowing users to see
up-to-the-minute game results. The VBS/Chick-F virus arrives in an e-mail
with the subject "RE: Korea Japan Results," and once opened, attempts to
spread itself to everyone in the user's address book. (Source: Sophos, 7
June 2002) http://www.sophos.com/virusinfo/articles/vbschickf.html





CYBER UPDATES
See: What's New for the latest Alerts, Advisories and Information Products

Threats

Central Command reports on Worm/Brit.F, which is a slight variation of
Worm/BritneyPic, a worm that spreads via e-mail and mIRC. It arrives with
the subject line "RE: Korea Japan Results" and the attachment
"koreajapan.chm".
http://support.centralcommand.com/cgi-bin/command.cfg/php/enduser/std_adp.ph
p?p_refno=020606-000007


Symantec reports on Backdoor.Tron, which is a Trojan that attempts to kill
the processes of several versions of the ZoneAlarm firewall and Tiny
Personal Firewall (version 2.0.15.0).
http://securityresponse.symantec.com/avcenter/venc/data/backdoor.tron.html

Vulnerabilities

SecurityFocus reports on a buffer overflow vulnerability in MS Internet
Explorer's gopher client that could allow a remote attacker to run arbitrary
code on a user's system. No known patch is available at this time.
http://online.securityfocus.com/bid/4930/discussion/


SecurityFocus reports on a vulnerability in some versions of BIND 9, which
ships with HP products and Caldera Open UNIX. It could cause the server to
shut down and lose its ability to respond to further DNS requests. View the
"Solution" tab for upgrade information.
http://online.securityfocus.com/bid/4936/discussion/


SecurityFocus reports on a format string vulnerability in OpenServer
'crontab' that could allow a local attacker to overwrite memory in the
address space of the crontab process. View the "Solution" tab for workaround
information.
http://online.securityfocus.com/bid/4938/discussion/


SecurityFocus reports on a vulnerability in Ghostscript for Unix and Linux
that could allow a local attacker to execute arbitrary commands when a page
is printed. View the "Solution" tab for patch information.
http://online.securityfocus.com/bid/4937/discussion/


SecurityFocus reports on a format string vulnerability in slurp NNTP client
for Unix and Linux that could allow a remote server to execute code on a
vulnerable client. No known patch is available at this time.
http://online.securityfocus.com/bid/4935/discussion/


SecurityFocus reports on a format string vulnerability in snmpdx. View the
"Solution" tab for workaround information.
http://online.securityfocus.com/bid/4932/discussion/


SecurityFocus reports on a format string vulnerability in Stellar-X MSNTAuth
for Squid web proxy server that could allow a remote attacker to execute
arbitrary code. No known patch is available at this time.
http://online.securityfocus.com/bid/4929/discussion/


SecurityFocus reports on a buffer overflow vulnerability in mibiisa that
could allow a remote attacker to craft a request to overwrite the return
address of the affected stack frame with an arbitrary value. View the
"Solution" tab for workaround information.
http://online.securityfocus.com/bid/4933/discussion/


SecurityFocus reports on a vulnerability in the LogiSense Hawk-i, Hawk-i ASP
and DNS Manager System that could allow a remote attacker to modify the SQL
query used to validate the user and gain access to arbitrary known accounts.
No known patch is available at this time.
http://online.securityfocus.com/bid/4931/discussion/


SecurityFocus provides a report on a vulnerability in Multiple Red-M 1050
Blue Tooth that could allow a remote attacker to disable the admin web
server, crack the admin password, piggyback authorized admin connections and
locate the device on a network. Follow the link for a solution.
http://online.securityfocus.com/advisories/4180


SecurityFocus provides a report on a vulnerability in X-Chat IRC client for
X Window and GTK+ that could allow a malicious server to execute arbitrary
commands on it. Follow the link for a solution.
http://online.securityfocus.com/advisories/4185

Tools
There are no updates to report at this time.



CONTACT US

For additions to, or removals from the distribution list for this product,
or to report a change in contact information, please send to:
Email: [EMAIL PROTECTED]

For urgent matters or to report any incidents, please contact OCIPEP’s
Emergency Operations Centre at:

Phone: (613) 991-7000
Fax: (613) 996-0995
Secure Fax: (613) 991-7094
Email: [EMAIL PROTECTED]

For general information, please contact OCIPEP’s Communications Division at:

Phone: (613) 991-7035 or 1-800-830-3118
Fax: (613) 998-9589
Email: [EMAIL PROTECTED]
Web Site: www.ocipep-bpiepc.gc.ca

Disclaimer
The information in the OCIPEP Daily Brief has been drawn from a variety of
external sources. Although OCIPEP makes reasonable efforts to ensure the
accuracy, currency and reliability of the content, OCIPEP does not offer any
guarantee in that regard. The links provided are solely for the convenience
of OCIPEP Daily Brief users. OCIPEP is not responsible for the information
found through these links.




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to