[ISN] Security UPDATE, January 9, 2002

From: InfoSec News (isnat_private)
Date: Thu Jan 10 2002 - 05:15:48 PST

  • Next message: InfoSec News: "[ISN] Virus writers take an early crack at .Net"

    ********************
    Windows & .NET Magazine Security UPDATE--brought to you by Security
    Administrator, a print newsletter bringing you practical, how-to
    articles about securing your Windows .NET, 2000, and NT systems.
       http://www.secadministrator.com
    ********************
    
    ~~~~ THIS ISSUE SPONSORED BY ~~~~
    
    LANguard Security Event Log Monitor: FREE Offer!
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2F0Ab 
    
    Lieberman & Associates 
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2G0Ac 
       (below IN FOCUS)
    
    ~~~~~~~~~~~~~~~~~~~~
    
    ~~~~ SPONSOR: LANGUARD SECURITY EVENT LOG MONITOR: FREE OFFER! ~~~~
       Catch hackers red-handed with GFI's LANguard S.E.L.M.! Performs 
    intrusion detection through network-wide monitoring of the security 
    event logs of all NT/2000 servers and workstations. Enables you to 
    respond quickly to important security events, without spending hours 
    examining logs. Notifies administrators of critical security events in 
    real time and provides tips for interpreting events. Through its pre-
    built event viewer filters, LANguard S.E.L.M. allows you to check for 
    high, medium or low security events as often as needed. You can use its 
    report module for in-depth investigations and trends analysis. Get your 
    FREE starter pack (1 server/5 workstations) and white papers today 
    from:
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2F0Ab 
    
    ~~~~~~~~~~~~~~~~~~~~
    
    January 9, 2002--In this issue:
    
    1. IN FOCUS
         - Security Audits Lead to Proactive Defense
    
    2. SECURITY RISKS
         - Multiple Vulnerabilities in Microsoft SQL Server 2000 and 7.0
         - Buffer Overflow in AOL AIM
    
    3. ANNOUNCEMENTS
         - Don't Miss the Best Computer Security Event Around!
         - If You Like Reading This UPDATE, You'll Love...
    
    4. SECURITY ROUNDUP
         - News: Antivirus Vendors Warn of Worm and ClickTillUWin Trojan 
           Horse
         - News: GAO Releases Planning Guide for Security Audits
         - News: Counterpane Introduces New Managed Protection Service
         - News: Top Stories of 2001, #1: Security and Privacy Problems Dog 
           Microsoft
         - News: GFI Updates Its Email Vulnerability Testing
         - News: SecureWave Announces Upgraded Buffer-Overflow Protection
         - News: Stiffer Penalties and New Technologies to Fight Cybercrime
         - News: Microsoft Releases Cumulative IE Patch
         - News: Tales of the Bizarre: Al Qaeda Allegedly Hacked Microsoft
         - News: FireProof Now Works with Microsoft ISA Server
         - News: A Quick Look at the First Office XP Service Pack
    
    5. HOT RELEASE
         - Sponsored by VeriSign--The Value of Trust
    
    6. SECURITY TOOLKIT
         - Virus Center
               Virus Alert: Maldal.G
         - FAQ: How Can I Move or Copy Scheduled Tasks Between Machines?
    
    7. NEW AND IMPROVED
         - Content Security Software
         - Protect Corporate Networks
    
    8. HOT THREADS
         - Windows 2000 Magazine Online Forums
             - Featured Thread: How to Restrict Terminal Server Users
         - HowTo Mailing List:
             - Featured Thread: If You Had to Do It Over
    
    9. CONTACT US
       See this section for a list of ways to contact us.
    
    ~~~~~~~~~~~~~~~~~~~~
    
    1. ==== IN FOCUS ====
    
    * SECURITY AUDITS LEAD TO PROACTIVE DEFENSE
    
    Hello everyone,
    
    When did you last conduct an audit of your business environment's 
    security? You need to perform some level of audit about every 3 months to 
    ensure a level of compliance that meets your business needs. 
    
    Audits are sometimes complex to undertake, and you must go through a 
    learning curve to arrive at a reasonable process. You can learn the 
    audit process by trial and error, by following published guidelines, or 
    by hiring a consulting firm to help you. The latter two methods are 
    probably best because trial and error can lead to significant security 
    breaches that are expensive to remedy. 
    
    If you're interested in hiring a consulting firm to assist with an 
    audit, you'll find numerous firms that can help. One company, 
    Counterpane Internet Security, sent me an email recently that told how 
    it helps companies audit and monitor ongoing security conditions 
    involving their networks. You can read more about Counterpane's 
    offerings by going to the URL listed in the related news story in the 
    SECURITY ROUNDUP section of this newsletter. 
    
    If you decide to use published guidelines to help develop a process for 
    performing audits or for gauging a consulting firm's audit process, 
    you'll be interested to know about an audit planning guide that the US 
    Government Accounting Office (GAO) published recently. The 60-page 
    guide offers advice about conducting reasonable audits and includes 
    form templates to help expedite the process. You can read more about 
    the document by going to the URL listed in our related news story in 
    the SECURITY ROUNDUP section of this newsletter.
    
    If you don't conduct security audits of your business regularly, you 
    leave your business vulnerable to unknown risks and lacking 
    countermeasures.
    
    Until next time, have a great week. 
    
    Sincerely,
    
    Mark Joseph Edwards, News Editor
    markat_private
    
    ~~~~~~~~~~~~~~~~~~~~
    
    ~~~~ SPONSOR: LIEBERMAN & ASSSOCIATES ~~~~
       THE HAMMER. FAST, SIMPLE AND EFFICIENT. And so are our tools, which 
    slam down the changes you want to make across all machines at 
    incredible speeds. With our User Manager Pro you can make the same 
    changes to all your workstations in just a few mouse clicks. With our 
    Service Account Manager you can report and change service settings on 
    all your servers in seconds. Award winning. Microsoft Gold Certified. 
    FREE TRIAL
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0p2G0Ac 
    
    ~~~~~~~~~~~~~~~~~~~~
    
    2. ==== SECURITY RISKS ====
       (contributed by Ken Pfeil, kenat_private)
    
    * MULTIPLE VULNERABILITIES IN MICROSOFT SQL SERVER 2000 AND 7.0
       Multiple vulnerabilities exist in Microsoft SQL Server 2000 and 7.0. 
    The first vulnerability is a result of several functions that let the 
    SQL database generate text messages. By not adequately verifying that 
    the text fits into the allocated buffer space, SQL Server can cause a 
    buffer overrun using the service's security context. The second 
    vulnerability results from a format string error in the C runtime 
    functions that SQL Server calls when you install the software on 
    Windows XP, Windows 2000, and Windows NT 4.0 systems. An attacker can 
    use this vulnerability to cause a Denial of Service (DoS) condition. 
    Users can learn details about these vulnerabilities on the discoverer's 
    Web site. Microsoft has released Security Bulletin MS01-060 to address 
    these vulnerabilities and recommends that affected users immediately 
    apply the patches provided with the bulletin. Microsoft cautions users 
    about the risk of applying the C runtime patch--if a regression error 
    were to result from applying the patch, the results might be widespread 
    and damaging.
       http://www.secadministrator.com/articles/index.cfm?articleid=23639
    
    * BUFFER OVERFLOW IN AOL AIM
       A buffer overflow exists in AOL Instant Messenger (AIM) that an 
    attacker can use to remotely execute commands on the vulnerable system. 
    A buffer overrun condition in the parsing code used to parse game 
    requests causes this vulnerability. Users can find details about this 
    vulnerability on the discoverer's Web site. AOL has patched its servers 
    to correct this vulnerability. AOL's servers now have an overly long 
    game request parsed so that the vulnerability no longer triggers the 
    overflow on the AIM client.
       http://www.secadministrator.com/articles/index.cfm?articleid=23701
    
    3. ==== ANNOUNCEMENTS ====
    
    * DON'T MISS THE BEST COMPUTER SECURITY EVENT AROUND!
       The Black Hat Briefings & Training: Windows Security 2002 event 
    (running February 5 through 8, 2002) is filling up fast. Microsoft is 
    on board as a new Platinum sponsor, joining PriceWaterhouseCoopers. 
    All-star speakers are being added weekly. Join 500 colleagues in New 
    Orleans during the peak of Mardi Gras.
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0pHV0AF 
    
    * IF YOU LIKE READING THIS UPDATE, YOU'LL LOVE...
       Windows & .NET Magazine UPDATE. Every Tuesday, we deliver news, 
    commentary, and tips so that, in about 5 minutes, you can catch up on 
    the latest Windows industry happenings, learn a new skill, and face 
    your day a little more informed. It's free, so subscribe today!
       http://www.winnetmag.com/email/index.cfm?id=1
    
    4. ==== SECURITY ROUNDUP ====
    
    * NEWS: ANTIVIRUS VENDORS WARN OF ZACKER WORM AND CLICKTILLUWIN TROJAN 
    HORSE 
       Antivirus software vendors warn about a new worm and Trojan horse. 
    The worm attempts to delete security software, and the worm sends 
    private information offsite.
       http://www.secadministrator.com/articles/index.cfm?articleid=23667
    
    * NEWS: GAO RELEASES PLANNING GUIDE FOR SECURITY AUDITS 
       The US General Accounting Office (GAO) has released a set of 
    guidelines that help audit information systems to arrive at a more 
    acceptable level of security. 
       http://www.secadministrator.com/articles/index.cfm?articleid=23645
    
    * NEWS: COUNTERPANE INTRODUCES NEW MANAGED PROTECTION SERVICE 
       Counterpane Internet Security introduced Counterpane Protected 
    Service, a new managed service that helps companies address evolving 
    security risks.
       http://www.secadministrator.com/articles/index.cfm?articleid=23638
    
    * NEWS: TOP STORIES OF 2001, #1: SECURITY AND PRIVACY PROBLEMS DOG 
    MICROSOFT 
       It was a tough year for the integrity of Microsoft's products. 
    Integrity encompasses a number of things, including basic security, 
    privacy, and reliability concerns, and also a general feeling of trust 
    one has in a given product.
       http://www.secadministrator.com/articles/index.cfm?articleid=23631
    
    * NEWS: GFI UPDATES ITS EMAIL VULNERABILITY TESTING 
       GFI, makers of Mail essentials for Exchange/SMTP, has updated its 
    email vulnerability testing to include tests for two known 
    vulnerabilities in Outlook XP that Outlook's built-in security features 
    don't completely protect.
       http://www.secadministrator.com/articles/index.cfm?articleid=23637
    
    * NEWS: SECUREWAVE ANNOUNCES UPGRADED BUFFER-OVERFLOW PROTECTION 
       SecureWave announced the release of SecureStack 2.0, an upgraded 
    version of its buffer-overflow protection software. 
       http://www.secadministrator.com/articles/index.cfm?articleid=23558
    
    * NEWS: STIFFER PENALTIES AND NEW TECHNOLOGIES TO FIGHT CYBERCRIME 
       If legislators pass H.R. 3482, criminals will face stiffer penalties 
    when breaking the law while using the Internet. H.R. 3482 will let 
    federal prosecutors impose stiffer penalties depending on a variety of 
    factors.
       http://www.secadministrator.com/articles/index.cfm?articleid=23551
    
    * NEWS: MICROSOFT RELEASES CUMULATIVE IE PATCH 
       Microsoft released a new patch that fixes all known security 
    vulnerabilities in Internet Explorer (IE) 6.0 and IE 5.5 Service Pack 2 
    (SP2).
       http://www.secadministrator.com/articles/index.cfm?articleid=23548
    
    * NEWS: TALES OF THE BIZARRE: AL QAEDA ALLEGEDLY HACKED MICROSOFT 
       According to a captured al Qaeda member, members of the group were 
    able to pose as programmers and get jobs at Microsoft, where they 
    attempted to plant "Trojans, trapdoors, and bugs in Windows XP."
       http://www.secadministrator.com/articles/index.cfm?articleid=23535
    
    * NEWS: FIREPROOF NOW WORKS WITH MICROSOFT ISA SERVER 
       Radware announced today that its FireProof product now works with 
    Microsoft Internet Security and Acceleration (ISA) Server 2000. 
       http://www.secadministrator.com/articles/index.cfm?articleid=23543
    
    * NEWS: A QUICK LOOK AT THE FIRST OFFICE XP SERVICE PACK 
       Microsoft expects last week's Office XP Service Pack 1 (SP1) release 
    to usher in a new era of corporate adoptions of the product because 
    many organizations wait for the first consolidated update package 
    before upgrading
       http://www.secadministrator.com/articles/index.cfm?articleid=23525
    
    5. ==== HOT RELEASE ====
    
    SPONSORED BY VERISIGN--THE VALUE OF TRUST
       Secure your servers with 128-bit SSL encryption! Grab your copy of 
    VeriSign's FREE Guide, "Securing Your Web site for Business," and learn 
    about using SSL to encrypt e-commerce transactions. Get it now!
       http://list.winnetmag.com/cgi-bin3/flo?y=eKAC0CJgSH0CBw0Lo50Aj 
    
    6. ==== SECURITY TOOLKIT ====
    
    * VIRUS CENTER
       Panda Software and the Windows 2000 Magazine Network have teamed to 
    bring you the Center for Virus Control. Visit the site often to remain 
    informed about the latest threats to your system security.
       http://www.secadministrator.com/panda
    
    * VIRUS ALERT: MALDAL.G
       The Maldal.G worm, aka Zacker, is a worm compressed with the ASPack 
    compressor. The worm infects systems running Microsoft Outlook by 
    spreading itself to names listed in a user's address book and by 
    looking for email addresses in Web pages cached on a user's system. 
    
    Zacker comes as a message that might have any of a variety of subjects 
    and contains a lengthy body of text. The worm attempts to delete 
    numerous security-related directories on a system, including those that 
    belong to ZoneAlarm, Antiviral Toolkit Pro, F-Protect, eSafe, PC-
    Cillin, Quick Heal, FindVirus, McAfee Antivirus, and Norton Antivirus. 
    The worm also deletes several types of files on an affected system, 
    including HTML; Microsoft Word, Excel, and PowerPoint documents; 
    Microsoft Access databases; Zip files; JPG images; and MPEG audio and 
    video. Affected file extensions include .htm, .pps, .php, .html, .com, 
    .bat, .mdb, .xls, .doc, .lnk, .ppt, .jpg, .mpeg, .ini, .dat, .zip, and 
    .txt.
       http://63.88.172.127/panda/index.cfm?fuseaction=virus&virusid=1132
    
    * FAQ: HOW CAN I MOVE OR COPY SCHEDULED TASKS BETWEEN MACHINES?
       ( contributed by John Savill, http://www.windows2000faq.com )
    
    A. You can move or copy tasks between machines thanks to a Scheduled 
    Tasks feature that appears as a property of computers available under 
    My Network Places. To move or copy a task between machines, follow 
    these steps: 
    
       1. Open Scheduled Tasks on your local machine (go to Start, 
    Settings, Control Panel, Scheduled Tasks). 
       2. Right-click the task you want to move or copy.
       3. If you want to copy the task, select Copy; if you want to move 
    the task, select Cut. 
       4. Open My Network Places in Windows Explorer, expand the domain or 
    workgroup, and select the target machine to which you want to copy or 
    move the task. 
       5. Right-click the target machine's Scheduled Tasks, and click 
    Paste. 
    
    The task will now appear on the target machine under Scheduled Tasks. 
    Make sure that the task you copy or move will work on the remote 
    machine (e.g., ensure that the target application exists on the machine 
    and that parameters are valid).
    
    7. ==== NEW AND IMPROVED ====
       (contributed by Scott Firestone, IV, productsat_private)
    
    * CONTENT SECURITY SOFTWARE
       Authentica released PageRecall 3.0 and NetRecall 3.0, content 
    security software for electronic documents and Web-based content. Both 
    products feature automatic proxy detection, and NetRecall features 
    audio file encryption and tight integration with Microsoft Office XP. 
    Pricing is based on concurrent users and server configuration and 
    starts at $17,500 for a 100-user environment. Contact Authentica at 
    781-487-2600.
       http://www.authentica.com
    
    * PROTECT CORPORATE NETWORKS
       InfoExpress announced an alliance with Alcatel to provide a secure, 
    integrated VPN and firewall solution to safeguard corporate networks. 
    InfoExpress' enterprise personal firewall, CyberArmor, was tested and 
    certified interoperable with Alcatel's Secure VPN Client software on 
    various hardware platforms. CyberArmor detects when the Alcatel Secure 
    VPN Client is active and dynamically applies the appropriate customized 
    security policy. Pricing for CyberArmor starts at $59 per seat. Contact 
    InfoExpress at 650-623-0260.
       http://www.infoexpress.com
    
    8. ==== HOT THREADS ====
    
    * WINDOWS & .NET MAGAZINE ONLINE FORUMS
       http://www.winnetmag.net/forums 
    
    Featured Thread: How to Restrict Terminal Server Users
       (Two messages in this thread)
    
    Prashant is using Windows NT Terminal Server 4.0 with Citrix Metaframe 
    1.8, and his users access more than two applications at a time using 
    the Citrix client. He noticed that if a user leaves the application 
    field blank in the Citrix client, the user gets the server's desktop 
    instead of an application. Prashant wants to restrict users from being 
    able to get a server desktop. Do you know how to make that restriction? 
    If so, lend a hand at the following URL:
       http://www.secadministrator.com/forums/thread.cfm?thread_id=90417
    
    * HOWTO MAILING LIST
       http://www.secadministrator.com/listserv/page_listserv.asp?s=howto
    
    Featured Thread: If You Had to Do It Over
       (One message in this thread)
    
    Jack wants to know how to lay a solid foundation of knowledge in the 
    Internet/network security field, especially areas such as intrusion 
    detection, scanning, firewalls, forensics, incident response, and 
    projects such as "The Honeynet Project." For example, if you had the 
    ability to go back and learn everything again, how would you go about 
    doing that? 
    
    For someone who already works in the IT field, has a strong interest in 
    security, and wants to seriously pursue this field, what are the steps 
    he or she should take in order to get going on the right path--the solid 
    path, the one with no shortcuts? Can you help? Read the responses or 
    lend a hand at the following URL:
    http://63.88.172.96/listserv/page_listserv.asp?a2=ind0201a&l=howto&p=1790
    
    9. ==== CONTACT US ====
       Here's how to reach us with your comments and questions:
    
    * ABOUT IN FOCUS -- markat_private
    
    * ABOUT THE NEWSLETTER IN GENERAL -- mlibbeyat_private (please
    mention the newsletter name in the subject line)
    
    * TECHNICAL QUESTIONS -- http://www.winnetmag.net/forums
    
    * PRODUCT NEWS -- productsat_private
    
    * QUESTIONS ABOUT YOUR SECURITY UPDATE SUBSCRIPTION? Customer
    Support -- securityupdateat_private
    
    * WANT TO SPONSOR SECURITY UPDATE? emedia_oppsat_private
    
    ********************
    
       Receive the latest information about the Windows and .NET topics of 
    your choice. Subscribe to our other FREE email newsletters.
       http://www.winnetmag.net/email
    
    |-+-+-+-+-+-+-+-+-+-| 
    
    Thank you for reading Security UPDATE.
    
    SUBSCRIBE
    To subscribe, send a blank email to mailto:Security-UPDATE_Subat_private
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn' in the BODY
    of the mail.
    



    This archive was generated by hypermail 2b30 : Thu Jan 10 2002 - 09:57:34 PST