Information Security News mailing list archives

Security UPDATE, January 9, 2002


From: InfoSec News <isn () c4i org>
Date: Thu, 10 Jan 2002 07:15:48 -0600 (CST)

********************
Windows & .NET Magazine Security UPDATE--brought to you by Security
Administrator, a print newsletter bringing you practical, how-to
articles about securing your Windows .NET, 2000, and NT systems.
   http://www.secadministrator.com
********************

~~~~ THIS ISSUE SPONSORED BY ~~~~

LANguard Security Event Log Monitor: FREE Offer!
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2F0Ab 

Lieberman & Associates 
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2G0Ac 
   (below IN FOCUS)

~~~~~~~~~~~~~~~~~~~~

~~~~ SPONSOR: LANGUARD SECURITY EVENT LOG MONITOR: FREE OFFER! ~~~~
   Catch hackers red-handed with GFI's LANguard S.E.L.M.! Performs 
intrusion detection through network-wide monitoring of the security 
event logs of all NT/2000 servers and workstations. Enables you to 
respond quickly to important security events, without spending hours 
examining logs. Notifies administrators of critical security events in 
real time and provides tips for interpreting events. Through its pre-
built event viewer filters, LANguard S.E.L.M. allows you to check for 
high, medium or low security events as often as needed. You can use its 
report module for in-depth investigations and trends analysis. Get your 
FREE starter pack (1 server/5 workstations) and white papers today 
from:
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2F0Ab 

~~~~~~~~~~~~~~~~~~~~

January 9, 2002--In this issue:

1. IN FOCUS
     - Security Audits Lead to Proactive Defense

2. SECURITY RISKS
     - Multiple Vulnerabilities in Microsoft SQL Server 2000 and 7.0
     - Buffer Overflow in AOL AIM

3. ANNOUNCEMENTS
     - Don't Miss the Best Computer Security Event Around!
     - If You Like Reading This UPDATE, You'll Love...

4. SECURITY ROUNDUP
     - News: Antivirus Vendors Warn of Worm and ClickTillUWin Trojan 
       Horse
     - News: GAO Releases Planning Guide for Security Audits
     - News: Counterpane Introduces New Managed Protection Service
     - News: Top Stories of 2001, #1: Security and Privacy Problems Dog 
       Microsoft
     - News: GFI Updates Its Email Vulnerability Testing
     - News: SecureWave Announces Upgraded Buffer-Overflow Protection
     - News: Stiffer Penalties and New Technologies to Fight Cybercrime
     - News: Microsoft Releases Cumulative IE Patch
     - News: Tales of the Bizarre: Al Qaeda Allegedly Hacked Microsoft
     - News: FireProof Now Works with Microsoft ISA Server
     - News: A Quick Look at the First Office XP Service Pack

5. HOT RELEASE
     - Sponsored by VeriSign--The Value of Trust

6. SECURITY TOOLKIT
     - Virus Center
           Virus Alert: Maldal.G
     - FAQ: How Can I Move or Copy Scheduled Tasks Between Machines?

7. NEW AND IMPROVED
     - Content Security Software
     - Protect Corporate Networks

8. HOT THREADS
     - Windows 2000 Magazine Online Forums
         - Featured Thread: How to Restrict Terminal Server Users
     - HowTo Mailing List:
         - Featured Thread: If You Had to Do It Over

9. CONTACT US
   See this section for a list of ways to contact us.

~~~~~~~~~~~~~~~~~~~~

1. ==== IN FOCUS ====

* SECURITY AUDITS LEAD TO PROACTIVE DEFENSE

Hello everyone,

When did you last conduct an audit of your business environment's 
security? You need to perform some level of audit about every 3 months to 
ensure a level of compliance that meets your business needs. 

Audits are sometimes complex to undertake, and you must go through a 
learning curve to arrive at a reasonable process. You can learn the 
audit process by trial and error, by following published guidelines, or 
by hiring a consulting firm to help you. The latter two methods are 
probably best because trial and error can lead to significant security 
breaches that are expensive to remedy. 

If you're interested in hiring a consulting firm to assist with an 
audit, you'll find numerous firms that can help. One company, 
Counterpane Internet Security, sent me an email recently that told how 
it helps companies audit and monitor ongoing security conditions 
involving their networks. You can read more about Counterpane's 
offerings by going to the URL listed in the related news story in the 
SECURITY ROUNDUP section of this newsletter. 

If you decide to use published guidelines to help develop a process for 
performing audits or for gauging a consulting firm's audit process, 
you'll be interested to know about an audit planning guide that the US 
Government Accounting Office (GAO) published recently. The 60-page 
guide offers advice about conducting reasonable audits and includes 
form templates to help expedite the process. You can read more about 
the document by going to the URL listed in our related news story in 
the SECURITY ROUNDUP section of this newsletter.

If you don't conduct security audits of your business regularly, you 
leave your business vulnerable to unknown risks and lacking 
countermeasures.

Until next time, have a great week. 

Sincerely,

Mark Joseph Edwards, News Editor
mark () ntsecurity net

~~~~~~~~~~~~~~~~~~~~

~~~~ SPONSOR: LIEBERMAN & ASSSOCIATES ~~~~
   THE HAMMER. FAST, SIMPLE AND EFFICIENT. And so are our tools, which 
slam down the changes you want to make across all machines at 
incredible speeds. With our User Manager Pro you can make the same 
changes to all your workstations in just a few mouse clicks. With our 
Service Account Manager you can report and change service settings on 
all your servers in seconds. Award winning. Microsoft Gold Certified. 
FREE TRIAL
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2G0Ac 

~~~~~~~~~~~~~~~~~~~~

2. ==== SECURITY RISKS ====
   (contributed by Ken Pfeil, ken () winnetmag com)

* MULTIPLE VULNERABILITIES IN MICROSOFT SQL SERVER 2000 AND 7.0
   Multiple vulnerabilities exist in Microsoft SQL Server 2000 and 7.0. 
The first vulnerability is a result of several functions that let the 
SQL database generate text messages. By not adequately verifying that 
the text fits into the allocated buffer space, SQL Server can cause a 
buffer overrun using the service's security context. The second 
vulnerability results from a format string error in the C runtime 
functions that SQL Server calls when you install the software on 
Windows XP, Windows 2000, and Windows NT 4.0 systems. An attacker can 
use this vulnerability to cause a Denial of Service (DoS) condition. 
Users can learn details about these vulnerabilities on the discoverer's 
Web site. Microsoft has released Security Bulletin MS01-060 to address 
these vulnerabilities and recommends that affected users immediately 
apply the patches provided with the bulletin. Microsoft cautions users 
about the risk of applying the C runtime patch--if a regression error 
were to result from applying the patch, the results might be widespread 
and damaging.
   http://www.secadministrator.com/articles/index.cfm?articleid=23639

* BUFFER OVERFLOW IN AOL AIM
   A buffer overflow exists in AOL Instant Messenger (AIM) that an 
attacker can use to remotely execute commands on the vulnerable system. 
A buffer overrun condition in the parsing code used to parse game 
requests causes this vulnerability. Users can find details about this 
vulnerability on the discoverer's Web site. AOL has patched its servers 
to correct this vulnerability. AOL's servers now have an overly long 
game request parsed so that the vulnerability no longer triggers the 
overflow on the AIM client.
   http://www.secadministrator.com/articles/index.cfm?articleid=23701

3. ==== ANNOUNCEMENTS ====

* DON'T MISS THE BEST COMPUTER SECURITY EVENT AROUND!
   The Black Hat Briefings & Training: Windows Security 2002 event 
(running February 5 through 8, 2002) is filling up fast. Microsoft is 
on board as a new Platinum sponsor, joining PriceWaterhouseCoopers. 
All-star speakers are being added weekly. Join 500 colleagues in New 
Orleans during the peak of Mardi Gras.
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0pHV0AF 

* IF YOU LIKE READING THIS UPDATE, YOU'LL LOVE...
   Windows & .NET Magazine UPDATE. Every Tuesday, we deliver news, 
commentary, and tips so that, in about 5 minutes, you can catch up on 
the latest Windows industry happenings, learn a new skill, and face 
your day a little more informed. It's free, so subscribe today!
   http://www.winnetmag.com/email/index.cfm?id=1

4. ==== SECURITY ROUNDUP ====

* NEWS: ANTIVIRUS VENDORS WARN OF ZACKER WORM AND CLICKTILLUWIN TROJAN 
HORSE 
   Antivirus software vendors warn about a new worm and Trojan horse. 
The worm attempts to delete security software, and the worm sends 
private information offsite.
   http://www.secadministrator.com/articles/index.cfm?articleid=23667

* NEWS: GAO RELEASES PLANNING GUIDE FOR SECURITY AUDITS 
   The US General Accounting Office (GAO) has released a set of 
guidelines that help audit information systems to arrive at a more 
acceptable level of security. 
   http://www.secadministrator.com/articles/index.cfm?articleid=23645

* NEWS: COUNTERPANE INTRODUCES NEW MANAGED PROTECTION SERVICE 
   Counterpane Internet Security introduced Counterpane Protected 
Service, a new managed service that helps companies address evolving 
security risks.
   http://www.secadministrator.com/articles/index.cfm?articleid=23638

* NEWS: TOP STORIES OF 2001, #1: SECURITY AND PRIVACY PROBLEMS DOG 
MICROSOFT 
   It was a tough year for the integrity of Microsoft's products. 
Integrity encompasses a number of things, including basic security, 
privacy, and reliability concerns, and also a general feeling of trust 
one has in a given product.
   http://www.secadministrator.com/articles/index.cfm?articleid=23631

* NEWS: GFI UPDATES ITS EMAIL VULNERABILITY TESTING 
   GFI, makers of Mail essentials for Exchange/SMTP, has updated its 
email vulnerability testing to include tests for two known 
vulnerabilities in Outlook XP that Outlook's built-in security features 
don't completely protect.
   http://www.secadministrator.com/articles/index.cfm?articleid=23637

* NEWS: SECUREWAVE ANNOUNCES UPGRADED BUFFER-OVERFLOW PROTECTION 
   SecureWave announced the release of SecureStack 2.0, an upgraded 
version of its buffer-overflow protection software. 
   http://www.secadministrator.com/articles/index.cfm?articleid=23558

* NEWS: STIFFER PENALTIES AND NEW TECHNOLOGIES TO FIGHT CYBERCRIME 
   If legislators pass H.R. 3482, criminals will face stiffer penalties 
when breaking the law while using the Internet. H.R. 3482 will let 
federal prosecutors impose stiffer penalties depending on a variety of 
factors.
   http://www.secadministrator.com/articles/index.cfm?articleid=23551

* NEWS: MICROSOFT RELEASES CUMULATIVE IE PATCH 
   Microsoft released a new patch that fixes all known security 
vulnerabilities in Internet Explorer (IE) 6.0 and IE 5.5 Service Pack 2 
(SP2).
   http://www.secadministrator.com/articles/index.cfm?articleid=23548

* NEWS: TALES OF THE BIZARRE: AL QAEDA ALLEGEDLY HACKED MICROSOFT 
   According to a captured al Qaeda member, members of the group were 
able to pose as programmers and get jobs at Microsoft, where they 
attempted to plant "Trojans, trapdoors, and bugs in Windows XP."
   http://www.secadministrator.com/articles/index.cfm?articleid=23535

* NEWS: FIREPROOF NOW WORKS WITH MICROSOFT ISA SERVER 
   Radware announced today that its FireProof product now works with 
Microsoft Internet Security and Acceleration (ISA) Server 2000. 
   http://www.secadministrator.com/articles/index.cfm?articleid=23543

* NEWS: A QUICK LOOK AT THE FIRST OFFICE XP SERVICE PACK 
   Microsoft expects last week's Office XP Service Pack 1 (SP1) release 
to usher in a new era of corporate adoptions of the product because 
many organizations wait for the first consolidated update package 
before upgrading
   http://www.secadministrator.com/articles/index.cfm?articleid=23525

5. ==== HOT RELEASE ====

SPONSORED BY VERISIGN--THE VALUE OF TRUST
   Secure your servers with 128-bit SSL encryption! Grab your copy of 
VeriSign's FREE Guide, "Securing Your Web site for Business," and learn 
about using SSL to encrypt e-commerce transactions. Get it now!
   http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0Lo50Aj 

6. ==== SECURITY TOOLKIT ====

* VIRUS CENTER
   Panda Software and the Windows 2000 Magazine Network have teamed to 
bring you the Center for Virus Control. Visit the site often to remain 
informed about the latest threats to your system security.
   http://www.secadministrator.com/panda

* VIRUS ALERT: MALDAL.G
   The Maldal.G worm, aka Zacker, is a worm compressed with the ASPack 
compressor. The worm infects systems running Microsoft Outlook by 
spreading itself to names listed in a user's address book and by 
looking for email addresses in Web pages cached on a user's system. 

Zacker comes as a message that might have any of a variety of subjects 
and contains a lengthy body of text. The worm attempts to delete 
numerous security-related directories on a system, including those that 
belong to ZoneAlarm, Antiviral Toolkit Pro, F-Protect, eSafe, PC-
Cillin, Quick Heal, FindVirus, McAfee Antivirus, and Norton Antivirus. 
The worm also deletes several types of files on an affected system, 
including HTML; Microsoft Word, Excel, and PowerPoint documents; 
Microsoft Access databases; Zip files; JPG images; and MPEG audio and 
video. Affected file extensions include .htm, .pps, .php, .html, .com, 
.bat, .mdb, .xls, .doc, .lnk, .ppt, .jpg, .mpeg, .ini, .dat, .zip, and 
.txt.
   http://63.88.172.127/panda/index.cfm?fuseaction=virus&virusid=1132

* FAQ: HOW CAN I MOVE OR COPY SCHEDULED TASKS BETWEEN MACHINES?
   ( contributed by John Savill, http://www.windows2000faq.com )

A. You can move or copy tasks between machines thanks to a Scheduled 
Tasks feature that appears as a property of computers available under 
My Network Places. To move or copy a task between machines, follow 
these steps: 

   1. Open Scheduled Tasks on your local machine (go to Start, 
Settings, Control Panel, Scheduled Tasks). 
   2. Right-click the task you want to move or copy.
   3. If you want to copy the task, select Copy; if you want to move 
the task, select Cut. 
   4. Open My Network Places in Windows Explorer, expand the domain or 
workgroup, and select the target machine to which you want to copy or 
move the task. 
   5. Right-click the target machine's Scheduled Tasks, and click 
Paste. 

The task will now appear on the target machine under Scheduled Tasks. 
Make sure that the task you copy or move will work on the remote 
machine (e.g., ensure that the target application exists on the machine 
and that parameters are valid).

7. ==== NEW AND IMPROVED ====
   (contributed by Scott Firestone, IV, products () winnetmag com)

* CONTENT SECURITY SOFTWARE
   Authentica released PageRecall 3.0 and NetRecall 3.0, content 
security software for electronic documents and Web-based content. Both 
products feature automatic proxy detection, and NetRecall features 
audio file encryption and tight integration with Microsoft Office XP. 
Pricing is based on concurrent users and server configuration and 
starts at $17,500 for a 100-user environment. Contact Authentica at 
781-487-2600.
   http://www.authentica.com

* PROTECT CORPORATE NETWORKS
   InfoExpress announced an alliance with Alcatel to provide a secure, 
integrated VPN and firewall solution to safeguard corporate networks. 
InfoExpress' enterprise personal firewall, CyberArmor, was tested and 
certified interoperable with Alcatel's Secure VPN Client software on 
various hardware platforms. CyberArmor detects when the Alcatel Secure 
VPN Client is active and dynamically applies the appropriate customized 
security policy. Pricing for CyberArmor starts at $59 per seat. Contact 
InfoExpress at 650-623-0260.
   http://www.infoexpress.com

8. ==== HOT THREADS ====

* WINDOWS & .NET MAGAZINE ONLINE FORUMS
   http://www.winnetmag.net/forums 

Featured Thread: How to Restrict Terminal Server Users
   (Two messages in this thread)

Prashant is using Windows NT Terminal Server 4.0 with Citrix Metaframe 
1.8, and his users access more than two applications at a time using 
the Citrix client. He noticed that if a user leaves the application 
field blank in the Citrix client, the user gets the server's desktop 
instead of an application. Prashant wants to restrict users from being 
able to get a server desktop. Do you know how to make that restriction? 
If so, lend a hand at the following URL:
   http://www.secadministrator.com/forums/thread.cfm?thread_id=90417

* HOWTO MAILING LIST
   http://www.secadministrator.com/listserv/page_listserv.asp?s=howto

Featured Thread: If You Had to Do It Over
   (One message in this thread)

Jack wants to know how to lay a solid foundation of knowledge in the 
Internet/network security field, especially areas such as intrusion 
detection, scanning, firewalls, forensics, incident response, and 
projects such as "The Honeynet Project." For example, if you had the 
ability to go back and learn everything again, how would you go about 
doing that? 

For someone who already works in the IT field, has a strong interest in 
security, and wants to seriously pursue this field, what are the steps 
he or she should take in order to get going on the right path--the solid 
path, the one with no shortcuts? Can you help? Read the responses or 
lend a hand at the following URL:
http://63.88.172.96/listserv/page_listserv.asp?a2=ind0201a&l=howto&p=1790

9. ==== CONTACT US ====
   Here's how to reach us with your comments and questions:

* ABOUT IN FOCUS -- mark () ntsecurity net

* ABOUT THE NEWSLETTER IN GENERAL -- mlibbey () winnetmag com (please
mention the newsletter name in the subject line)

* TECHNICAL QUESTIONS -- http://www.winnetmag.net/forums

* PRODUCT NEWS -- products () winnetmag com

* QUESTIONS ABOUT YOUR SECURITY UPDATE SUBSCRIPTION? Customer
Support -- securityupdate () winnetmag com

* WANT TO SPONSOR SECURITY UPDATE? emedia_opps () winnetmag com

********************

   Receive the latest information about the Windows and .NET topics of 
your choice. Subscribe to our other FREE email newsletters.
   http://www.winnetmag.net/email

|-+-+-+-+-+-+-+-+-+-| 

Thank you for reading Security UPDATE.

SUBSCRIBE
To subscribe, send a blank email to mailto:Security-UPDATE_Sub () list winnetmag com.



-
ISN is currently hosted by Attrition.org

To unsubscribe email majordomo () attrition org with 'unsubscribe isn' in the BODY
of the mail.


Current thread: