-----Original Message----- From: NIPC Watch [mailto:nipcwatch@private] Sent: Tuesday, September 03, 2002 9:00 AM To: Cyber Threats Subject: [Cyber_threats] Daily News 09/03/02 August 28, CERT/CC - CERTŪ Advisory CA-2002 (Revised)-19 Buffer Overflows in Multiple DNS Resolver Libraries. Buffer overflow vulnerabilities exist in multiple implementations of DNS resolver libraries. Operating systems and applications that utilize vulnerable DNS resolver libraries may be affected. A remote attacker who is able to send malicious DNS responses could potentially exploit these vulnerabilities to execute arbitrary code or cause a denial of service on a vulnerable system. The DNS protocol provides name, address, and other information about Internet Protocol (IP) networks and devices. To access DNS information, a network application uses the resolver to perform DNS queries on its behalf. Resolver functionality is commonly implemented in libraries that are included with operating systems. Source: http://www.cert.org/advisories/CA-2002-19.html August 30, C|NET Networks A federal grand jury has indicted the founder of the StopAmerica.org Web site on charges of aiding Al-Qaeda terrorists. Prosecutors say Earnest James Ujaama, 36, who was born James Earnest Thompson, conspired to create an Al-Qaeda boot camp in rural Oregon. Ujaama also helped Al-Qaeda with computer training and Internet propaganda, according to the 9-page indictment released late Wednesday. Ujaama is a well-known Seattle activist who was arrested by the FBI last month and was held as a material witness until charges could be filed. In addition to operating the StopAmerica.org site, which quotes Ujaama as accusing the United States of "conspiracy to commit genocide and crimes of terrorism against Muslim people," the government says he designed a site called the Supporters of Shariah. Source: http://www.ds-osac.org/edb/cyber/news/story.cfm?KEY=8863 Virus: #1 Virus in USA: PE_FUNLOVE.4099 Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports 80(http); 6314; 1433(ms-sql-s); 21(ftp); 139(netbios-ssn); 25(smtp}; 1080(socks); 445(microsoft-ds); 111(sunrpc); 22 (ssh) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Cyber_Threats mailing list Cyber_Threats@listserv http://listserv.infragard.org/mailman/listinfo/cyber_threats
This archive was generated by hypermail 2b30 : Tue Sep 03 2002 - 10:16:09 PDT