fyi.


-----Original Message-----
From:   [EMAIL PROTECTED] 
[SMTP:[EMAIL PROTECTED]]
Sent:   Sunday, April 11, 1999 20:42
Subject:        Sunbelt NTools E-News: Win2000 Shipdate October 6-th?

2. "TECH BRIEFING"

      * 21 NEW VULNERABILITIES FOUND IN NT

Most of you know that Security Threats continue to increase as more
companies provide external access to their internal systems via the
Internet for mission critical applications. This requires an ever
increasing vigilance to make sure you are hacker or cracker-proof.
These are the new vulnerabilities you have to protect yourself
against when you run NT. A good example was the Melissa Virus.

This list was compiled by the developer of STAT, which has proven 
to be an instant HIT at Sunbelt. Over 30 licenses were sold in less 
than 3 weeks. Here are the latest culprits that STAT will find and
warn you about: The number in front of each vulnerability is simply
the next in sequence.

V467 Footprint Macro Virus - The W97M.Footprint Word macro virus 
overwrites the footers on all open documents. It also overwrites all 
macros in open documents and open and attached templates with the 
macro virus code.

V468 Marker virus - W97M.marker is a Word macro virus that uploads 
users information to an FTP site. V469 Boserve.exe - The executable 
program,  boserve.exe, usually contains a virus called CDC-BO.A 
(Hacktool).

V470 Whack.exe - The executable program, whack.exe, usually contains 
the W32.CIH. SPACEFILLER virus.

V471 Reboot.ini - BackOffice Server 4.0 does not delete the installation 
setup file, "reboot.ini". This file may contain the account userid and 
password for selected services.

V472 Outlook Express - Microsoft Outlook Express and Outlook 98 can 
crash when attempting to open a file attachment with an extremely 
long file name.

V473 KnownDLLs List - Core operating system DLLs are kept in virtual 
memory and shared between the programs running on the system. A data 
structure called the KnownDLLs is referenced to determine the location 
on the DLL in virtual memory. By default, any user can read from and 
write to the KnownDLLs list. A user can load a malicious DLL to 
increase privileges.

V474 Sndvol.exe - Sndvol.exe is a trojan horse program that mails 
information back to a Bulgarian Internet Service provider. The trojan 
horse is installed when users click on a message supposedly from 
Microsoft about an Internet Explorer update. The program may delete 
the original sndvol32.exe sound volume program.

V475 Mprexe.dll - Mprexe.dll is a trojan horse program that mails 
information back to a Bulgarian Internet Service provider. The trojan 
horse is installed when users click on a message supposedly from 
Microsoft about an Internet Explorer update. The program may delete 
the original sndvol32.exe sound volume program.

V476 Rundll - Rundll2.dl_ is a trojan horse that is installed when 
running a game such as whack-a-mole (game.exe or whack.exe). this is 
part of the NetBus backdoor utility.

V477 Args.bat - The args.bat demo file that comes with O'Reilly's 
Website Pro 2.0 webserver allows a user to run arbitrary commands on 
the web server by placing cgi scripts there. This could compromise 
a web server. This file is usually found in the /cgi-dos directory.

V478 IISADMPWD - When IIS 4.0 server is installed, the 
\winnt\system32\inetsrv\iisadmpwd directory by default has a number 
of .htr files that anyone can access over the Internet. A remote 
attacker can attack user accounts or gain user information through 
this directory and default files.

V479 JavaScript Enabled - Enabling JavaScript on a browser may 
introduce malicious Java scripts that could cause a denial of service 
or be used for information gathering.

V480 Java Applet Enabled - Enabling Java applet on a browser may 
introduce malicious Java scripts that could cause a denial of service 
or be used for information gathering.

V481 Form Data Submit Warning Disabled - There is a default warning 
that is displayed when submitting non-encrypted forms. The warning 
prompt makes sure users are alerted if a script attempts to submit 
data using forms. Users should be cautious if they see this warning 
when browsing and have not actually chosen to submit any data.

V482 Scripts Directory - When IIS 4.0 server is installed, the
 \winnt\system32\inetsrv\scripts directory by default has a repost.asp
file that anyone can access over the Internet. This could potentially
allow users to upload files to the /users directory.

V483 Photo Trojan Horse - The photos17.exe is a trojan horse email 
attachment, usually sent from Harvard. When executed, it deletes the
sndvol32.exe sound volume program, installs sndvol.exe and creates a 
registry key. When Internet Explorer is open, this program conducts 
a port scan across a class C network in Bulgaria. This program can 
also overload a firewall memory table space.

V484 WinFreeze - WinFreeze is an ICMP/Redirect-host message storm 
program that will cause a denial of service

485 Word Macro Virus Protection - Disable macros in Microsoft Word 
to prevent macro viruses such as the Melissa virus.

486 Excel Macro Virus Protection - Disable macros in Microsoft Excel 
to prevent macro viruses such as the Papa virus.

487 PowerPoint Macro Virus Protection - Disable macros in Microsoft 
PowerPoint to prevent macro viruses.

For info on STAT, see NT Third Party News Section.



 
[ baru di onshop -> stampede linux, turbo linux 3.0.1, mandrake 5.3, ]
[ freebsd 3.1 , cheapbytes linux archives, cheapbytes rpm galore's ]
====================================================================== 
 berhenti  dari milis hackerlink : [EMAIL PROTECTED] 
 peraturan pada milis hackerlink :         [EMAIL PROTECTED]
 arsip milis ini : http://www.mail-archive.com/[email protected]    

Kirim email ke