OCIPEP DAILY BRIEF Number: DOB02-087 Date: 21 June 2002
http://www.ocipep.gc.ca/DOB/DOB02-087_e.html

NEWS

Microsoft Issues Cumulative Patches
Microsoft Corp. issued a set of cumulative patches on 19 June that applies to all 
previously
released fixes for Excel for Windows and Word for Windows. The patches also eliminate 
four newly
discovered vulnerabilities, all of which could enable an attacker to run Macro code on 
a user's
machine. The new vulnerabilities include two Excel macro execution vulnerabilities, an 
HTML script
execution vulnerability and a new variant of the "Word Mail Merge" vulnerability first 
addressed in
a previous Microsoft bulletin (MS00-071). (Source: Microsoft Corp., 19 June 2002)

Comment: The Microsoft Security Bulletin concerning these cumulative patches can be 
viewed at
http://microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS02-031.asp


Apache HTTP Server Exploit Released
A functional remote Apache HTTP Server exploit may have been in existence for some 
time prior to
being reported, according to Internet Security Systems X-Force. As reported in the 
June 19 Daily
Brief, OCIPEP issued an advisory concerning a chunk handling vulnerability in Apache 
Web Server that
could be used by remote attackers to compromise the web servers.

Comment: An updated version of the ApacheChunkedEncodingBo check to detect all 
vulnerable
installations of Apache HTTP Server will be available at: http://www.iss.net/download
eEye has created a free tool that IT administrators can use to scan their networks for 
vulnerable
Apache servers. The tool also provides a link to information on how to correctly patch 
vulnerable
servers.
To learn more about the free scanning tool visit:
http://www.eeye.com/html/Research/Tools/apachechunked.html

The OCIPEP advisory can be viewed at 
http://www.ocipep.gc.ca/emergencies/advisories/AV02-032_e.html.
The ISS X-Force alert is available at
http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20524

Government to Streamline Counter-Terrorism Effort
Canadian government agencies involved in the fight against terrorism, according to a 
media report,
are working on multi-million-dollar plans to determine how to better coordinate the 
response in the
event of an attack,. The RCMP has set up a new agency called the Integrated National 
Security
Enforcement Teams (INSETs), which will bridge intelligence gaps between the 
approximately 40
agencies involved in counter-terrorism activities. In addition to information 
integration, Solicitor
General Canada's Counter-Terrorism Division is working on a plan to prepare the 
country for a
chemical, biological or nuclear attack. (Source: CBC News, 20 June 2002)
Click here for the source article

Comment: CBC News provides a collection of articles regarding the government's 
response to terrorism
at http://www.cbc.ca/news/indepth/targetterrorism/canadahomefront/

Calgary Protest Targets Identified on Anarchist Web Site
An anarchist web site has identified seventeen Calgary businesses as targets during 
next week's G8
Summit protests. The list includes several government offices and corporations that 
are deemed as
having unethical business practices. Several companies have apparently told their 
employees to stay
home for the two days of the Summit. The unidentified authors of the list claim to be 
part of an
anti-capitalist, anarchist collective. (Source: CBC News, 21 June 2002)
Click here for the source article


IN BRIEF

B.C. Flood Update
The Fraser River has receded and there are now hopes that the threat of severe 
flooding in the
Fraser Valley has passed. By Thursday the level had dropped 13 centimetres in Prince 
George,
however, there was still a possibility of minor flooding in some areas. (Source: CBC 
News, 20 June
2002)
Click here for the source article

Manitoba Flood Victims to Receive Compensation
Residents of southeastern Manitoba who suffered flood damage during the June 10 rains 
will soon
receive compensation cheques from the provincial government. The compensation package 
includes $1
million for private citizens, and $6 million to repair infrastructure such as roads 
and bridges.
(Source: CBC News, 20 June 2002)
Click here for the source article

CYBER UPDATES
See: What's New for the latest Alerts, Advisories and Information Products

Threats

Symantec reports on W32.Kwbot.Worm, which is a worm with Trojan horse capabilities 
that disguises
itself as popular movie, game, or software files. It propagates via KaZaA file-sharing 
networks by
tricking users into downloading and opening it.
http://securityresponse.symantec.com/avcenter/venc/data/w32.kwbot.worm.html


Symantec reports on Backdoor.NetControle, which is a Trojan horse written in Visual 
Basic.
http://securityresponse.symantec.com/avcenter/venc/data/backdoor.netcontrole.html


Trend Micro reports on VBS_CHU.A, which is a worm that infects VBS and MS Word doc 
files. It arrives
with the subject line "Upgrade MS Exchange" and the attachment "MSXchange.vbs".
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=VBS_CHU.A

Vulnerabilities

SecurityFocus reports on a vulnerability in the phpShare 'phpshare.php' script that 
could allow a
remote attacker to include arbitrary files located on remote servers. View the 
"Solution" tab for
upgrade information.
http://online.securityfocus.com/bid/5049/discussion/


SecurityFocus reports on a vulnerability in Webscripts WebBBS that could allow a 
remote attacker to
execute arbitrary commands on the underlying shell of the host system and possibly 
gain local,
interactive access to the host with the privileges of the webserver process. No known 
patch is
available at this time.
http://online.securityfocus.com/bid/5048/discussion/


SecurityFocus reports on a vulnerability in Mandrake 8.2 Msec that could allow a local 
attacker to
view the contents of home directories and reset their permissions. View the "Solution" 
tab for
workaround information.
http://online.securityfocus.com/bid/5050/discussion/


SecurityFocus reports on a vulnerability in DeepMetrix LiveStats that could allow a 
remote attacker
to cause arbitrary script code to be included in HTML reports generated by LiveStats. 
No known patch
is available at this time.
http://online.securityfocus.com/bid/5047/discussion/


SecurityFocus reports on buffer overflow vulnerabilities in the Borland Interbase 
gds_lock_mgr and
gds_drop programs for Unix and Linux that could allow a local attacker to overwrite 
stack memory and
potentially execute arbitrary code as root. No known patch is available at this time.
http://online.securityfocus.com/bid/5046/discussion/
http://online.securityfocus.com/bid/5044/discussion/


SecurityFocus reports on a buffer overflow vulnerability in 4D WebServer for Windows 
and MacOS that
could allow a remote attacker to cause a denial-of-service or execute attacker-supplied
instructions. No known patch is available at this time.
http://online.securityfocus.com/bid/5045/discussion/


SecurityFocus reports on a vulnerability in MetaLinks MetaCart2.sql that could allow a 
remote
attacker to obtain the contents of the user database being used by MetaCart2.sql. No 
known patch is
available at this time.
http://online.securityfocus.com/bid/5042/discussion/


SecurityFocus reports on a vulnerability in MPE/iX for HP e3000 class servers that 
could allow a
remote attacker to exploit the SNMP protocol implementation. View the "Solution" tab 
for patch
information.
http://online.securityfocus.com/bid/5043/discussion/


SecurityFocus provides a report on a buffer overflow vulnerability in Cisco VPN Client 
for Linux,
Solaris and Mac OS X that could allow a local attacker to gain admin privileges on the 
client
system. Follow the link for details.
http://online.securityfocus.com/advisories/4214


SecurityFocus reports on aTOS Bit vulnerability in Cisco ONS15454 IP. Follow the link 
for details.
http://online.securityfocus.com/advisories/4216
Tools

Wellenreiter is a wireless network sniffer with an ESSID-bruteforcing feature.
http://www.securiteam.com/tools/5BP0J2A7FW.html


Systrace enforces system call policies for applications by constraining the 
application's access to
the system.
http://www.securiteam.com/tools/5FP0D2K7FA.html


Touch2 is a utility that modifies the ctime.
http://www.securiteam.com/tools/5JP0H2K7FE.html



CONTACT US

For additions to, or removals from the distribution list for this product, or to 
report a change in
contact information, please send to:
Email: [EMAIL PROTECTED]

For urgent matters or to report any incidents, please contact OCIPEP’s Emergency 
Operations Centre
at:

Phone: (613) 991-7000
Fax: (613) 996-0995
Secure Fax: (613) 991-7094
Email: [EMAIL PROTECTED]

For general information, please contact OCIPEP’s Communications Division at:

Phone: (613) 991-7035 or 1-800-830-3118
Fax: (613) 998-9589
Email: [EMAIL PROTECTED]
Web Site: www.ocipep-bpiepc.gc.ca

Disclaimer
The information in the OCIPEP Daily Brief has been drawn from a variety of external 
sources.
Although OCIPEP makes reasonable efforts to ensure the accuracy, currency and 
reliability of the
content, OCIPEP does not offer any guarantee in that regard. The links provided are 
solely for the
convenience of OCIPEP Daily Brief users. OCIPEP is not responsible for the information 
found through
these links.







IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to