-----Original Message-----
From: Peter Radatti [mailto:[EMAIL PROTECTED]]
Sent: 14 June 2002 13:43
To: Wanja Eric Naef [IWS] [EMAIL PROTECTED]
Cc: Infocon
Subject: Re: [INFOCON] - UNIRAS Briefing - 185/02 - UNIRAS - Importance
of correct Security procedures concerning GSI EMail

This is not true for anyone who is using any of the many port 25 virus
scanners.  In this case the virus scan is performed prior to delivery to the
mail reader agent. Examples are CyberSoft NTI (all tcp/ip & udp), Trend
Microsystems, McAFee, and Sophis.  Some of the more popular free programs are
AmaVis, LibMilter and dozens more.

Peter Radatti
CyberSoft, Inc.

"Wanja Eric Naef [IWS]" wrote:

> -----Original Message-----
> From: UNIRAS (UK Govt CERT)
> Sent: 13 June 2002 16:53
> To: Undisclosed Recipients
> Subject: UNIRAS Briefing - 185/02 - UNIRAS - Importance of correct
> Security procedures concerning GSI EMail
>
> -----BEGIN PGP SIGNED MESSAGE-----
>
> - --------------------------------------------------------------------------
> --------
>    UNIRAS (UK Govt CERT) Briefing Notice - 185/02 dated 13.06.02  Time:
> 16:35
>  UNIRAS is part of NISCC(National Infrastructure Security Co-ordination
> Centre)
> - --------------------------------------------------------------------------
> --------
>   UNIRAS material is also available from its website at www.uniras.gov.uk
> and
>          Information about NISCC is available from www.niscc.gov.uk
> - --------------------------------------------------------------------------
> --------
>
> Title
> =====
> Web-based Email problem
>
> Detail
> ======
>
> Departmental and organisational security officers should be aware that there
> have been two recent incidents reported to UNIRAS where virus infected Email
> file attachments were received via web based mail systems and then
> propagated within the organisation.
>
> The use of web mail bypasses anti-virus measures placed in front of or on
> the organisation's external gateway. Furthermore, if the organisation does not
> deploy anti-virus protection on user workstations, the virus will be propagated at
> least as far as the organisation's mail server. If the mail server does not have
> anti-virus protection, the virus will spread further.
>
> First Incident Details:
>
> The infection was controlled due to server based AVS products being used.
> However this simply removed the infected Email attachment. The virus code was still
> available to generate a number of "blank" emails that in the wrong
> circumstances could have generated a localised Denial of Service attack.
>
> Second Incident Details:
>
> The virus code executed caused a number of systems to be infected.
>
> Prevention
>
> It is recommended that organisations should consider the potential risks
> involved in the use of web mail facilities. Organisations are advised to check that
> their existing anti-virus measures are not bypassed by permitting web mail, or to
> prohibit the use of web mail unless there is a clear business case.
>
> In the event of such a business need, anti-virus products should be
> installed on user workstations (and servers if they have Email access) that scan all 
>web
> mail file attachments before opening them. Ideally, the use of anti-virus
> products on network gateways, servers and workstations is recommended for maximum
> protection.
>
> - --------------------------------------------------------------------------
> --------
>
> For additional information or assistance, please contact the HELP Desk by
> telephone or Not Protectively Marked information may be sent via EMail to:
>
> [EMAIL PROTECTED]
> Tel: 020 7821 1330 Ext 4511
> Fax: 020 7821 1686
>
> - --------------------------------------------------------------------------
> --------
> This Briefing contains the information released by the original author. Some
> of the information may have changed since it was released. If the
> vulnerability
> affects you, it may be prudent to retrieve the advisory from the canonical
> site
> to ensure that you receive the most current information concerning that
> problem.
>
> Reference to any specific commercial product, process, or service by trade
> name, trademark manufacturer, or otherwise, does not constitute or imply
> its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views
> and opinions of authors expressed within this notice shall not be used for
> advertising or product endorsement purposes.
>
> Neither UNIRAS or NISCC shall also accept responsibility for any errors
> or omissions contained within this briefing notice. In particular, they
> shall
> not be liable for any loss or damage whatsoever, arising from or in
> connection
> with the usage of information contained within this notice.
>
> UNIRAS is a member of the Forum of Incident Response and Security Teams
> (FIRST)
> and has contacts with other international Incident Response Teams (IRTs) in
> order to foster cooperation and coordination in incident prevention, to
> prompt
> rapid reaction to incidents, and to promote information sharing amongst its
> members and the community at large.
> - --------------------------------------------------------------------------
> --------
> <End of UNIRAS Briefing>
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
>
> iQCVAwUBPQi7Topao72zK539AQE9igQArJIt0E/RU82bJvOBPr88cdS7kGp+kcHA
> cK6uXqMiy0SGDyiqepAZ0vD95b9MyOkAXWBgHbtdrfnshH4bI+gP+Fl3mDSKoNG9
> 8Gi24nO4iTFSNkDQh/P7WxzFj+mzd8kg1+Y0qjGjyBrRtlBvJawN+ue7CdNuGIOS
> jh6PhJ6G+Yk=
> =AEAF
> -----END PGP SIGNATURE-----
>
> IWS INFOCON Mailing List
> @ IWS - The Information Warfare Site
> http://www.iwar.org.uk



IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to