DAILY BRIEF Number: DOB02-088 Date: 24 June 2002

http://www.ocipep.gc.ca/DOB/DOB02-088_e.html

NEWS

Kananaskis, Calgary Ready for G8 Summit

Motorists driving through Kananaskis Country this week will only be allowed to do so in
police-escorted convoys and only if they have a reason to be there, according to RCMP 
Corporal Jamie
Johnston. Travel restrictions in the area will remain in effect until Friday morning. 
In Calgary,
Premier Ralph Klein said he was confident that all security measures were in place and 
that Calgary
was ready for the G8 Summit. Meanwhile, protesters are planning a march for June 26 
with the goal of
blocking off all traffic in Calgary's downtown core. Rene Biberstine, a protest 
organizer, is
encouraging businesses to close and workers to stay home for the day. A "family 
friendly" march was
held on June 23 in Calgary by about 2,000 people as part of the "G6B" (Group of Six 
Billion).
(Source: CBC News, 22-23 June 2002)

Click here for the source article - 1
Click here for the source article - 2
Click here for the source article - 3
Click here for the source article - 4

IN BRIEF

New Terrorist Attacks on U.S. Planned: Al-Qaeda Spokesperson
The al-Qaeda terrorist network is planning new attacks against the U.S. within the 
next few months,
according to a person claiming to be a spokesperson for the group. In an address on 
the al-Jazeera
television network, the spokesperson said Osama bin Laden was alive and would soon 
appear on
television. The address was believed to have been recorded recently. (Source: CBC 
News, 23 June
2002)
Click here for the source article


Cargo Container Inspection to Improve
The U.S. government must start checking high-risk cargo containers before they leave a 
foreign port,
according to Customs Deputy Commissioner Douglas Browning. New technology will allow 
customs
inspectors to ensure that containers have not been tampered with between departure and 
arrival
points. By January 2003, all inspectors will be using a pocket-size device that can 
detect
radiation. (Source: fcw.com, 24 June 2002)
Click here for the source article


Manitoba Flood Update
Levels on the Roseau River in southeastern Manitoba were still rising on Saturday and 
there were
concerns over possible flooding in the town of Vita, according to local media. A 
boil-water advisory
was still in effect in the region, and people were warned to stay off water in flood 
areas because
of strong currents and turbulence. (Source: The Winnipeg Sun, 24 June 2002)
Click here for the source article


Search for Al-Qaeda Web Site
U.S. law enforcement officials were searching for an Arabic web site that appeared to 
send messages
to al-Qaeda followers, including possible information on future terrorist attacks, 
according to U.S.
media reports. The "alneda.com" web site, which emerged earlier this month on web 
servers in
Malaysia and Texas, contained audio and video clips of Osama bin Laden. (Source: 
Modbee.com, 23 June
2002)
Click here for the source article






CYBER UPDATES
See: What's New for the latest Alerts, Advisories and Information Products

Threats

Symantec reports on W32.HLLW.Kazmor, which is a worm with Trojan horse capabilities 
that disguises
itself as popular movie, game, or software files. It propagates via a local network 
and KaZaA
file-sharing networks by tricking users into downloading and opening it.
http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.kazmor.html


Trend Micro reports on WORM_FRETHEM.G, which is a non-destructive, memory-resident 
variant of
WORM_FRETHEM.A that propagates via e-mail.
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_FRETHEM.G


Trend Micro reports on W97M_AYAM.A, which is a nondestructive macro virus that 
propagates via e-mail
with the subject line "Hi man, it's %user name%" and the attachment "Maya.doc".
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=W97M_AYAM.A

Vulnerabilities

CERT/CC reports on a vulnerability in the Linksys EtherFast Router. It enables remote 
management,
even if the feature is disabled, and it could result in unauthorized access, 
unauthorized
monitoring, information leakage, denial-of-service and permanent disability of 
affected devices.
http://www.kb.cert.org/vuls/id/267883


SecurityFocus reports on a mail-merge vulnerability in MS Word. View the "Solution" 
tab for patch
information.
http://online.securityfocus.com/bid/5066/discussion/


SecurityFocus reports on vulnerabilities in MS Excel that could allow a remote 
attacker to
automatically execute arbitrary macro code contained in a newly opened workbook. View 
the "Solution"
tab for patch information.
http://online.securityfocus.com/bid/5064/discussion/
http://online.securityfocus.com/bid/5063/discussion/


SecurityFocus reports on a buffer overflow vulnerability in MS SQL Server that could 
allow a remote
attacker to execute attacker-supplied instructions with the privileges of the SQL 
Server process.
Other products that rely on Jet Engine may also be affected by this vulnerability. 
View the
"Solution" tab for upgrade information.
http://online.securityfocus.com/bid/5057/discussion/


SecurityFocus reports on vulnerabilities in Basilix webmail. The first vulnerability 
could allow a
local attacker to view files attached to outgoing mail messages by webmail users. A 
second
vulnerability could allow a remote attacker to send sensitive information to arbitrary 
users. A
third issue could result in the remote disclosure of sensitive information contained 
in the
database, or the ability to modify data. The last issue involves a script injection 
vulnerability.
View the "Solution" tab for workaround information.
http://online.securityfocus.com/bid/5065/discussion/
http://online.securityfocus.com/bid/5062/discussion/
http://online.securityfocus.com/bid/5061/discussion/
http://online.securityfocus.com/bid/5060/discussion/


SecurityFocus reports on a remote denial-of-service vulnerability in IRSSI. No known 
patch is
available at this time.
http://online.securityfocus.com/bid/5055/discussion/


SecurityFocus reports on a vulnerability in Apache Tomcat for Windows that could allow 
a remote
attacker to make requests. This could result in the disclosure of the absolute path to 
the server's
web root. View the "Solution" tab for upgrade information.
http://online.securityfocus.com/bid/5054/discussion/


SecurityFocus reports on a memory corruption vulnerability in Konqueror version 2.2.2 
and Opera
version 6.0.1 for Linux. No known patch is available at this time.
http://online.securityfocus.com/bid/5059/discussion/


SecurityFocus provides a report on a vulnerability in the /usr/etc/xfsmd daemon that 
could lead to a
remote root exploit. Follow the link for details.
http://online.securityfocus.com/advisories/4221


SecurityFocus provides a report on a format string vulnerability in dhcpd dynamic DNS 
that could
allow a remote attacker to get root access to the host. Follow the link for details.
http://online.securityfocus.com/advisories/4222


SecuriTeam reports on a cross-site scripting vulnerability in Audiogalaxy that could 
allow a remote
attacker to cause users to view 3rd-party malicious JavaScript or HTML code as 
legitimate
Audiogalaxy content.
http://www.securiteam.com/securitynews/5DP0N0A7FI.html

Tools

Snort IDScenter 109beta2 is a GUI for Snort IDS on Windows platforms.
http://www.eclipse.fr.fm/snort.htm


Bruteforce Exploit Detector 0.3 is a perl script that remotely detects unknown buffer 
overflow
vulnerabilities in FTP, SMTP, and POP daemons.
http://www.kryptocrew.de/snakebyte/bed.html



CONTACT US

For additions to, or removals from the distribution list for this product, or to 
report a change in
contact information, please send to:
Email: [EMAIL PROTECTED]

For urgent matters or to report any incidents, please contact OCIPEP’s Emergency 
Operations Centre
at:

Phone: (613) 991-7000
Fax: (613) 996-0995
Secure Fax: (613) 991-7094
Email: [EMAIL PROTECTED]

For general information, please contact OCIPEP’s Communications Division at:

Phone: (613) 991-7035 or 1-800-830-3118
Fax: (613) 998-9589
Email: [EMAIL PROTECTED]
Web Site: www.ocipep-bpiepc.gc.ca

Disclaimer
The information in the OCIPEP Daily Brief has been drawn from a variety of external 
sources.
Although OCIPEP makes reasonable efforts to ensure the accuracy, currency and 
reliability of the
content, OCIPEP does not offer any guarantee in that regard. The links provided are 
solely for the
convenience of OCIPEP Daily Brief users. OCIPEP is not responsible for the information 
found through
these links.







IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to