DAILY BRIEF Number: DOB02-116 Date: 2 August 2002

NEWS

http://www.ocipep.gc.ca/DOB/DOB02-116_e.html

OCIPEP Issues Advisory - Trojan Horse In OpenSSH Distribution
On 1 August 2002, OCIPEP released Advisory AV02-039 to bring attention to a
Trojan Horse in OpenSSH distribution. The Trojan can allow a remote attacker to
gain unauthorized remote access.

Comment: OCIPEP reported this exploit in yesterday's Daily Brief, DOB02-115.

Ontario Will Spend $9 Million To Control West Nile Virus
The Ontario government will distribute $9 million to boards of health throughout
the province to fight the propagation of the West Nile (WN) virus by mosquitos.
Although no Canadians have been diagnosed with the disease in Canada,
Environment Canada officials stated that the record breaking high temperatures
represent optimal conditions for the virus to spread. Most of the money will be
invested in mosquito control and a smaller portion of the budget will be
allocated for surveillance and public education.
(Source: CTV News, 1 August 2002)
Click here for the source article

Comment: Authorities on the West Nile virus state that personal prevention, such
as using insect repellant, is the most effective way to avoid contracting the
disease. Attempting to prevent the spread of the disease by controlling the
mosquito population through "fogging" is viewed as relatively inefficient.

Ontario Electricity: Record Breaking Demand
The ongoing heat wave across the province pushed the Ontario's electricity
system to the limit yesterday. The extra demand for power, mainly from air
conditioners, is roughly equivalent to adding another city of Toronto to the
province's power grid. (Source: thestar.com, 2 August, 2002)
Click here for the source article

Comment: This situation demonstrates the potential for the natural environment
to impact critical infrastructure. Last month, high temperatures brought about
increased demand for power in Ontario and prompted a warning from Ontario's
electricity distributor that residents should consider cutting back on
consumption to reduce the load on the system. Ontario Energy Minister Chris
Stockwell downplayed reports of possible brownouts if electricity use was not
curtailed. See:
http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/20020702/heat_electricity_02
0702/




IN BRIEF

Quebec And Newfoundland: Groundwork For New Hydro Deal
Premiers of Quebec and Newfoundland have laid the groundwork for a new deal to
build a 2000 megawatt hydroelectric project at Gull Island on the Lower
Churchill River in Labrador.
(Source: globeandmail.com, 1 August 2002)
Click here for the source article


Pentagon: Hamas Experimenting with Chemical Weapons
The Pentagon has determined that the Hamas terrorist organization has been
conducting research in the use of chemical weapons for suicide bombers. (Source:
World Tribune.com, 31 August 2002)
Click here for the source article





CYBER UPDATES
See: What's New for the latest Alerts, Advisories and Information Products

Threats

Sophos reports on Troj/Tobizan-A, which is a Trojan horse that creates a copy of
itself named kernel32.exe in the Windows system folder and allows a remote
attacker to communicate with and control the compromised computer using IRC.
http://sophos.com/virusinfo/analyses/trojtobizana.html


Sophos reports on W32/Surnova-B, which is a worm that propagates via the KaZaA
network and the MSN instant messenger.
http://sophos.com/virusinfo/analyses/w32surnovab.html


Symantec reports on W32.Parol@mm, which is a worm written in Visual Basic that
propagates via Outlook e-mail. It arrives with the subject line "I LIVE or Hello
Hello Hello" and the attachment "Par.exe"
http:[EMAIL PROTECTED]

Vulnerabilities

Georgi Guninski reports on a remotely exploitable vulnerability in MS Internet
Explorer 6.0, MS Office Web Components 9 and 10 and MS Office XP OWC that could
cause an almost arbitrary file to be written to a client system. Follow the link
for a workaround.
http://www.guninski.com/iexla.html


SecurityFocus provides a report on a remotely exploitable buffer overflow
vulnerability in MS Windows Media Player XP, 6.3, 6.4, 7.0 and 7.1. View the
"Solution" tab for patch information.
http://online.securityfocus.com/bid/5357/discussion/


CERT/CC provides a report on a remotely exploitable buffer overflow
vulnerability in Multiple Vendors' versions of Sun RPC xdr_array that could
allow an attacker to execute arbitrary code on target hosts with root
privileges. Follow the link for upgrade information.
http://www.kb.cert.org/vuls/id/192995


SecurityFocus provides a report on two locally exploitable SuSE product
vulnerabilities: the first is in mod_ssl and it results in a denial-of-service
and remote code execution as the webserver user. The second vulnerability is in
mm and it results in privilege escalation as root. Follow the link for upgrade
information.
http://online.securityfocus.com/advisories/4326


Additional vulnerabilities were reported in the following products:


IPSwitch IMail Web Calendaring (multiple versions) denial-of-service
vulnerability (SecurityFocus).
http://online.securityfocus.com/bid/5365/discussion/


Synthetic Reality Sympoll 1.2 file disclosure vulnerability (SecurityFocus).
http://online.securityfocus.com/bid/5360/discussion/


ncompress 4.2.4 and earlier buffer overflow vulnerability (CERT/CC).
http://www.kb.cert.org/vuls/id/176363

Tools
There are no new updates to report at this time.



CONTACT US

For additions to, or removals from the distribution list for this product, or to
report a change in contact information, please send to:
Email: [EMAIL PROTECTED]

For urgent matters or to report any incidents, please contact OCIPEP’s Emergency
Operations Centre at:

Phone: (613) 991-7000
Fax: (613) 996-0995
Secure Fax: (613) 991-7094
Email: [EMAIL PROTECTED]

For general information, please contact OCIPEP’s Communications Division at:

Phone: (613) 991-7035 or 1-800-830-3118
Fax: (613) 998-9589
Email: [EMAIL PROTECTED]
Web Site: www.ocipep-bpiepc.gc.ca

Disclaimer
The information in the OCIPEP Daily Brief has been drawn from a variety of
external sources. Although OCIPEP makes reasonable efforts to ensure the
accuracy, currency and reliability of the content, OCIPEP does not offer any
guarantee in that regard. The links provided are solely for the convenience of
OCIPEP Daily Brief users. OCIPEP is not responsible for the information found
through these links.







IWS INFOCON Mailing List
@ IWS - The Information Warfare Site
http://www.iwar.org.uk


Reply via email to