-----Original Message----- From: NIPC Watch [mailto:nipc.watch@private] Sent: Monday, April 28, 2003 8:04 AM To: Information Technology Subject: [Information_technology] Daily News 4/28/03 April 24, CNET News.com Cisco flaw exposes Windows servers. A potentially critical vulnerability has been found in Cisco Systems' Secure Access Control Server for Windows servers, which is used to control devices such as routers in large networks. The buffer overflow glitch may allow an attacker to seize control of the Cisco service when it's running on Windows, according to Cisco. The Unix variant is not affected. Exploitation of the flaw could result in a malicious hacker gaining full control of a target company's security infrastructure, leaving it completely exposed. An exploit for the vulnerability is not known to be circulating, and ACS servers are usually deployed on network segments with limited physical access. Administrators of ACS systems block TCP port 2002 until they can deploy Cisco's fix. A patch is available at the Cisco Website: http://www.cisco.com/warp/public/707/cisco-sa-20030423-ACS.shtml. Source: http://news.com.com/2100-1002-998160.html?tag=fd_top April 24, IDG News Service Microsoft fixing patch that can slow Windows XP. Microsoft is revising a security patch for Windows XP systems with Service Pack 1 installed after customers complained that installing the patch slowed their systems down to a crawl. Removing the patch brings system speed back to normal. Originally released on April 16, Security Bulletin MS03-013 addressed a buffer overrun vulnerability in the Windows kernel, which manages core services for the operating system such as allocating processor time and memory, as well as error handling. Microsoft is working on a revised patch which will be re-issued when it has been completed and fully tested. Microsoft said that customers running Windows XP Service Pack 1 should still consider applying the flawed patch as protection until a new version is released. The revised bulletin is available at the Microsoft Website: http://www.microsoft.com/technet/treeview/default.asp?url=/t echnet/security/bulletin/MS03-013.asp. Source: http://www.nwfusion.com/news/2003/0424micropulls.html April 24, Government Computer News NCS expands coverage for Wireless Priority Service. The National Communications System (NCS) has expanded coverage for its Wireless Priority Service (WPS) for cellular phone users into the western and northeastern continental United States and Hawaii. WPS is the cellular equivalent of the Government Emergency Telecommunications Service, which provides priority wireline telephone service to national security and emergency service personnel during emergencies. Authorized users in federal, state and local government and key private infrastructure organizations can go to the head of the queue for an open cellular channel when a WPS prefix is dialed with a number, increasing the chances of completing a call during times of congestion. Source: http://www.gcn.com/vol1_no1/daily-updates/21859-1.html Internet Security Systems - AlertCon: 1 out of 4 https://gtoc.iss.net/ Last Changed 8 April 2003 Security Focus - ThreatCon: 1 out of 4 www.securityfocus.com Last Changed 18 April 2003 Current Virus and Port Attacks Virus: #1 Virus in USA: WORM_LOVGATE.F Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus Tracking Center [Infected Computers, North America, Past 24 hours, #1 in United States] Top 10 Target Ports: 137 (netbios-ns), 80 (www), 1434 (ms-sql-m), 445 (microsoft-ds), 7088 (---), 25 (smtp), 139 (netbios-ssn), 113 (ident), 4662 (eDonkey2000), 6346 (gnutella-svc) Source: http://isc.incidents.org/top10.html; Internet Storm Center _______________________________________________ Information_technology mailing list Information_technology@listserv
This archive was generated by hypermail 2b30 : Mon Apr 28 2003 - 11:38:29 PDT