-----Original Message-----
From: UNIRAS (UK Govt CERT)
Sent: 13 June 2002 16:53
To: Undisclosed Recipients
Subject: UNIRAS Briefing - 185/02 - UNIRAS - Importance of correct
Security procedures concerning GSI EMail



-----BEGIN PGP SIGNED MESSAGE-----

- --------------------------------------------------------------------------
--------
   UNIRAS (UK Govt CERT) Briefing Notice - 185/02 dated 13.06.02  Time:
16:35
 UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
Centre)
- --------------------------------------------------------------------------
--------
  UNIRAS material is also available from its website at www.uniras.gov.uk
and
         Information about NISCC is available from www.niscc.gov.uk
- --------------------------------------------------------------------------
--------

Title
=====
Web-based Email problem

Detail
======

Departmental and organisational security officers should be aware that there
have been two recent incidents reported to UNIRAS where virus infected Email
file attachments were received via web based mail systems and then
propagated
within the organisation.

The use of web mail bypasses anti-virus measures placed in front of or on
the
organisation's external gateway. Furthermore, if the organisation does not
deploy
anti-virus protection on user workstations, the virus will be propagated at
least
as far as the organisation's mail server. If the mail server does not have
anti-virus protection, the virus will spread further.

First Incident Details:

The infection was controlled due to server based AVS products being used.
However
this simply removed the infected Email attachment. The virus code was still
available to generate a number of "blank" emails that in the wrong
circumstances
could have generated a localised Denial of Service attack.

Second Incident Details:

The virus code executed caused a number of systems to be infected.

Prevention

It is recommended that organisations should consider the potential risks
involved
in the use of web mail facilities. Organisations are advised to check that
their
existing anti-virus measures are not bypassed by permitting web mail, or to
prohibit the use of web mail unless there is a clear business case.

In the event of such a business need, anti-virus products should be
installed on
user workstations (and servers if they have Email access) that scan all web
mail
file attachments before opening them. Ideally, the use of anti-virus
products on
network gateways, servers and workstations is recommended for maximum
protection.

- --------------------------------------------------------------------------
--------

For additional information or assistance, please contact the HELP Desk by
telephone or Not Protectively Marked information may be sent via EMail to:

[EMAIL PROTECTED]
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686

- --------------------------------------------------------------------------
--------
This Briefing contains the information released by the original author. Some
of the information may have changed since it was released. If the
vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical
site
to ensure that you receive the most current information concerning that
problem.

Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
and opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors
or omissions contained within this briefing notice. In particular, they
shall
not be liable for any loss or damage whatsoever, arising from or in
connection
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams
(FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to
prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- --------------------------------------------------------------------------
--------
<End of UNIRAS Briefing>
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQCVAwUBPQi7Topao72zK539AQE9igQArJIt0E/RU82bJvOBPr88cdS7kGp+kcHA
cK6uXqMiy0SGDyiqepAZ0vD95b9MyOkAXWBgHbtdrfnshH4bI+gP+Fl3mDSKoNG9
8Gi24nO4iTFSNkDQh/P7WxzFj+mzd8kg1+Y0qjGjyBrRtlBvJawN+ue7CdNuGIOS
jh6PhJ6G+Yk=
=AEAF
-----END PGP SIGNATURE-----




IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to