[ISN] Linux Security Week - August 11th 2003

From: InfoSec News (isnat_private)
Date: Tue Aug 12 2003 - 02:25:25 PDT

  • Next message: InfoSec News: "[ISN] Worm Exploits RPC Flaw in Windows"

    +---------------------------------------------------------------------+
    |  LinuxSecurity.com                            Weekly Newsletter     |
    |  August 11th, 2003                             Volume 4, Number 32n |
    |                                                                     |
    |  Editorial Team:  Dave Wreski             daveat_private    |
    |                   Benjamin Thomas         benat_private     |
    +---------------------------------------------------------------------+
    
    Thank you for reading the LinuxSecurity.com weekly security newsletter.
    The purpose of this document is to provide our readers with a quick
    summary of each week's most relevant Linux security headlines.
    
    This week, perhaps the most interesting articles include "Maintaining
    System Integrity During Forensics," "A Balanced Approach to Performing a
    Security Assessment," "Host-based Intrusion Detection With samhain," and
    "Reducing Human Factor Mistakes."
    
      >>>> FREE Apache SSL Guide from Thawte <<
    
      Are you worried about your web server security?  Click here to get a
      FREE Thawte Apache SSL Guide and find the answers to all your Apache SSL
      security needs.
    
     Click Command:
     http://ads.linuxsecurity.com/cgi-bin/newad_redirect.pl?id=vertad_thawteapache
    
    LINUX ADVISORY WATCH:
    This week, advisories were released for wget, postfix, kernel, atari800,
    xfstt, kdelibs, mindi, phpgroupware, eroaster, libc, kdelibs, php, core,
    stunnel, man-db, Konqueror, and wuftpd. The distributors include
    Conectiva, Debian, Guardian Digital's EnGarde Secure Linux, FreeBSD,
    Mandrake, NetBSD, Red Hat, Slackware, SuSe, and TurboLinux.
    
    http://www.linuxsecurity.com/articles/forums_article-7766.html
    
    -->  Take advantage of the LinuxSecurity.com Quick Reference Card!
    -->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf
    
    
    +---------------------+
    | Host Security News: | <<-----[ Articles This Week ]-------------
    +---------------------+
    
    
    * Security flaws under the microscope
    August 8th, 2003
    
    A study unveiled at the Black Hat Briefings conference in Las Vegas last
    week paints a grim picture of network security problems.  Among the
    study's surprising results: Some kinds of computer security
    vulnerabilities--especially ones with an aggressive "exploit" (something
    that takes advantage of the vulnerability, such as a worm or virus)--may
    plague computer networks indefinitely.
    
    http://www.linuxsecurity.com/articles/forums_article-7770.html
    
    
    * Out, Out, Damned Spam
    August 7th, 2003
    
    It was May, 1978. Lauren Weinstein was among those developing an early
    version of the Internet when an e-mail popped into his box. It was the
    first spam ever -- a pitch from Digital Equipment Corp. sent, literally,
    to everyone on the fledgling Net. "People thought it was a little bit
    annoying but sort of amusing," Weinstein says.
    
    http://www.linuxsecurity.com/articles/privacy_article-7762.html
    
    
    * NIAP Certification Becoming a Priority
    August 7th, 2003
    
    The government's plan to pressure software vendors to build more secure
    products seems to be gathering a bit of momentum. A major part of the
    National Strategy to Secure Cyberspace, the idea involves using market
    pressures and the government's purchasing power to influence vendors'
    development practices.
    
    http://www.linuxsecurity.com/articles/government_article-7760.html
    
    
    * Spam and Viruses: Unholy Matrimony, Part 1
    August 6th, 2003
    
    Make no mistake about it -- spam and viruses are deliberate, malicious
    assaults on our systems that often work together to penetrate and
    compromise our networks. A popular dirty trick by spammers is to plant
    malicious code in their spew to exploit recipients' systems. Remember
    jeem.mail.pv? Proxy-guzu?
    
    http://www.linuxsecurity.com/articles/privacy_article-7758.html
    
    
    * Maintaining System Integrity During Forensics
    August 4th, 2003
    
    Deciding how to maintain the integrity of a system for use in a forensic
    examination can be a little like deciding which club to use to get out of
    the rough on the last hole of a golf tournament, i.e. the stakes are high
    and you never know if you've made the right choice until it's too late to
    change your mind (note: this analogy only works if you play golf as badly
    as I do.
    
    http://www.linuxsecurity.com/articles/server_security_article-7741.html
    
    
    * LDAP Injection
    August 4th, 2003
    
    This a paper about how a hacker uses LDAP Injection to Steal Your Data and
    Bypass authentication.  It's as simple as placing additional LDAP Query
    commands into input fields in Web Form or Query strings allowing hackers
    complete access to your backend systems!
    
    http://www.linuxsecurity.com/articles/server_security_article-7746.html
    
    
    +------------------------+
    | Network Security News: |
    +------------------------+
    
    * A Balanced Approach to Performing a Security Assessment
    August 8th, 2003
    
    Fundamentally, there exist just two basic approaches to performing
    security assessments: vulnerability priority and asset priority. While
    these two approaches will eventually (if taken to their ultimate
    conclusion) converge to the same result, it is rare for an organization to
    hold the line and make the investment required to follow the process to
    its finale.
    
    http://www.linuxsecurity.com/articles/security_sources_article-7767.html
    
    
    * Sniffing with Net::Cap to stealthily managing iptables rules
    remotely, Part 1
    August 6th, 2003
    
    In our saga that began several weeks ago, we're trying to create a
    firewall setup that allows no inbound access by default that can be
    modified remotely to allow a small window of inbound SSH connectivity.
    
    http://www.linuxsecurity.com/articles/network_security_article-7755.html
    
    * Lack of Security at Wireless Conferences
    August 6th, 2003
    
    During the 802.11 Planet Expo in Boston, wireless security company
    AirDefense monitored WLAN activity and published their findings in the
    July 2003 edition of WLAN Watch newsletter.
    
    http://www.linuxsecurity.com/articles/network_security_article-7757.html
    
    * Host-based Intrusion Detection With samhain
    August 5th, 2003
    
    Samhain is a wonderful GPL host-based intrusion detection system. Rather
    than just comparing files with a known-good database, samhain can perform
    centralized monitoring with encrypted TCP/IP communications, log to SQL
    databases, compute cryptographic checksums of configuration files, use
    stealth mode to disguise itself from intruders, and detect kernel
    rootkits.
    
    http://www.linuxsecurity.com/articles/intrusion_detection_article-7748.html
    
    
    * Wireless security: Harder Than You Think
    August 4th, 2003
    
    Once more I sat at the control console and went through the D-Link
    wireless access point's forms to enable WEP (Wired Equivalent Privacy)
    encryption. I knew it wasn't exactly the best encryption on the planet,
    but it was better than nothing at all, and the network I was working with
    didn't handle much sensitive information anyway.
    
    http://www.linuxsecurity.com/articles/network_security_article-7744.html
    
    
    +------------------------+
    | General Security News: |
    +------------------------+
    
    * Blogs: Another Tool in the Security Pro's Toolkit (Part Two)
    August 7th, 2003
    
    In my last column, I introduced you to blogging and blogs, and some of the
    issues that security professionals should consider before starting their
    own blogs. In this column we continue the discussion, and focus on blogs
    that specialize in security.
    
    http://www.linuxsecurity.com/articles/security_sources_article-7761.html
    
    
    * The Folly of Antispam Legislation
    August 5th, 2003
    
    >From a spam-viewing perspective, the average citizen, it would seem, is
    aging, balding, out of shape, impotent, undereducated and has incurred
    significant credit card debt through online encounters with other lusty
    members of the human race.
    
    http://www.linuxsecurity.com/articles/privacy_article-7749.html
    
    
    * Demonstrating ROI for Penetration Testing (Part Two)
    August 5th, 2003
    
    There are two camps when it comes to demonstrating ROI for security
    initiatives. One camp believes it is absolutely impossible, ridiculous and
    suggests you should not even try. The other camp believes it is not only
    possible but important and absolutely necessary.
    
    http://www.linuxsecurity.com/articles/security_sources_article-7750.html
    
    
    * Linux Approved for Use On Most-sensitive Computers
    August 5th, 2003
    
    Linux software has been approved for use on the most sensitive computers
    in corporations and the federal government, including those inside banks
    and the Pentagon, an important step for software widely considered the top
    rival to Microsoft Corp.
    
    http://www.linuxsecurity.com/articles/general_article-7751.html
    
    
    * Reducing Human Factor Mistakes
    August 4th, 2003
    
    Nowadays companies and organizations face the problem where massive
    attempts at illegal intrusions hit their network on a daily basis. In
    spite of the latest technological improvements in security, it's still the
    network users who are often unknowingly inviting security breaches through
    carelesnes and a lack of awareness.
    
    http://www.linuxsecurity.com/articles/network_security_article-7713.html
    
    
    -----
    
    
     #### Concerned about the next threat?  ####
     #### EnGarde is the undisputed winner! ####
    
     Hardened Linux Puts Hackers EnGarde! Winner of the Network Computing
     Editor's Choice Award, EnGarde "walked away with our Editor's Choice
     award thanks to the depth of its security strategy..." Find out what the
     other Linux vendors are not telling you.
    
     http://store.guardiandigital.com/html/eng/products/software/esp_overview.shtml
    
    
    
    
    ------------------------------------------------------------------------
    Distributed by: Guardian Digital, Inc.                LinuxSecurity.com
    
         To unsubscribe email newsletter-requestat_private
             with "unsubscribe" in the subject of the message.
    ------------------------------------------------------------------------
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Tue Aug 12 2003 - 04:49:00 PDT