CRIME FW: [Cyber_threats] Daily News 11/15/02

From: George Heuston (GeorgeH@private)
Date: Fri Nov 15 2002 - 09:33:29 PST

  • Next message: Kuo, Jimmy: "RE: CRIME FW: [Cyber_threats] Daily News 11/15/02"

    -----Original Message-----
    From: NIPC Watch [mailto:nipcwatch@private] 
    Sent: Friday, November 15, 2002 7:29 AM
    To: Cyber Threats
    Subject: [Cyber_threats] Daily News 11/15/02
    
    November 13, CERT/CC
    CERT Advisory CA-2002-30 Trojan Horse tcpdump and libpcap Distributions.
    The
    CERT/CC has received reports that several of the released source code
    distributions of the libpcap and tcpdump packages were modified by an
    intruder and contain a Trojan horse. The CERT/CC has received reports
    that
    some copies of the source code for libpcap, a packet acquisition
    library,
    and tcpdump, a network sniffer, have been modified by an intruder and
    contain a Trojan horse. The Trojan horse version of the tcpdump source
    code
    distribution contains malicious code that is run when the software is
    compiled. This code, executed from the tcpdump configure script, will
    attempt to connect (via wget, lynx, or fetch) to port 80/tcp on a fixed
    hostname in order to download a shell script named services. In turn,
    this
    downloaded shell script is executed to generate a C file (conftes.c),
    which
    is subsequently compiled and run. Source.
    http://www.cert.org/advisories/CA-2002-30.html
    
    November 14, CERT/CC
    CERT(r) Advisory CA-2002-31 Multiple Vulnerabilities in BIND. Multiple
    vulnerabilities with varying impacts have been found in BIND, the
    popular
    domain name server and client library software package from the Internet
    Software Consortium (ISC). Information on these vulnerabilities can be
    found
    separately in notes published by CERT/CC. Some of these vulnerabilities
    may
    allow remote attackers to execute arbitrary code with the privileges of
    the
    user running named, (typically root), or with the privileges of
    vulnerable
    client applications. The other vulnerabilities will allow remote
    attackers
    to disrupt the normal operation of DNS name service running on victim
    servers. An attacker could execute arbitrary code with the privileges of
    the
    application that made the request or cause a denial of service. The
    attacker
    would need to control the contents of DNS responses, possibly by
    spoofing
    responses or gaining control of a DNS server. Source.
    http://www.cert.org/advisories/CA-2002-31.html
    
    Virus: #1 Virus in USA: WORM_BUGBEAR.A
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports
    137(netbios-ns); 80(http); 1433(ms-sql-s); 21(ftp); 1080(socks);
    25(smtp);
    139(netbios-ssn); 445(microsoft-ds); 27374(asp); 111(sunrpc)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    
    _______________________________________________
    Cyber_Threats mailing list
    Cyber_Threats@listserv
    http://listserv.infragard.org/mailman/listinfo/cyber_threats
    



    This archive was generated by hypermail 2b30 : Fri Nov 15 2002 - 15:08:38 PST