CRIME FW: [Information_technology] Daily News 4/28/03

From: George Heuston (GeorgeH@private)
Date: Mon Apr 28 2003 - 10:31:58 PDT

  • Next message: George Heuston: "CRIME FW: Fighting Identity Theft"

    -----Original Message-----
    From: NIPC Watch [mailto:nipc.watch@private] 
    Sent: Monday, April 28, 2003 8:04 AM
    To: Information Technology
    Subject: [Information_technology] Daily News 4/28/03
    
    April 24, CNET News.com
    Cisco flaw exposes Windows servers. A potentially critical vulnerability
    has
    been found in Cisco Systems' Secure Access Control Server for Windows
    servers, which is used to control devices such as routers in large
    networks.
    The buffer overflow glitch may allow an attacker to seize control of the
    Cisco service when it's running on Windows, according to Cisco. The Unix
    variant is not affected. Exploitation of the flaw could result in a
    malicious hacker gaining full control of a target company's security
    infrastructure, leaving it completely exposed. An exploit for the
    vulnerability is not known to be circulating, and ACS servers are
    usually
    deployed on network segments with limited physical access.
    Administrators of
    ACS systems block TCP port 2002 until they can deploy Cisco's fix. A
    patch
    is available at the Cisco Website:
    http://www.cisco.com/warp/public/707/cisco-sa-20030423-ACS.shtml.
    Source:
    http://news.com.com/2100-1002-998160.html?tag=fd_top
    
    April 24, IDG News Service
    Microsoft fixing patch that can slow Windows XP. Microsoft is revising a
    security patch for Windows XP systems with Service Pack 1 installed
    after
    customers complained that installing the patch slowed their systems down
    to
    a crawl. Removing the patch brings system speed back to normal.
    Originally
    released on April 16, Security Bulletin MS03-013 addressed a buffer
    overrun
    vulnerability in the Windows kernel, which manages core services for the
    operating system such as allocating processor time and memory, as well
    as
    error handling. Microsoft is working on a revised patch which will be
    re-issued when it has been completed and fully tested. Microsoft said
    that
    customers running Windows XP Service Pack 1 should still consider
    applying
    the flawed patch as protection until a new version is released. The
    revised
    bulletin is available at the Microsoft Website:
    http://www.microsoft.com/technet/treeview/default.asp?url=/t
    echnet/security/bulletin/MS03-013.asp. Source:
    http://www.nwfusion.com/news/2003/0424micropulls.html
    
    April 24, Government Computer News
    NCS expands coverage for Wireless Priority Service. The National
    Communications System (NCS) has expanded coverage for its Wireless
    Priority
    Service (WPS) for cellular phone users into the western and northeastern
    continental United States and Hawaii. WPS is the cellular equivalent of
    the
    Government Emergency Telecommunications Service, which provides priority
    wireline telephone service to national security and emergency service
    personnel during emergencies. Authorized users in federal, state and
    local
    government and key private infrastructure organizations can go to the
    head
    of the queue for an open cellular channel when a WPS prefix is dialed
    with a
    number, increasing the chances of completing a call during times of
    congestion. Source:
    http://www.gcn.com/vol1_no1/daily-updates/21859-1.html
    
    
    Internet Security Systems - AlertCon: 1 out of 4
    https://gtoc.iss.net/
    Last Changed 8 April 2003
    
    Security Focus - ThreatCon: 1 out of 4
    www.securityfocus.com
    Last Changed 18 April 2003
    
    Current Virus and Port Attacks
    Virus: #1 Virus in USA: WORM_LOVGATE.F
    Source: http://wtc.trendmicro.com/wtc/wmap.html, Trend World Micro Virus
    Tracking Center [Infected Computers, North America, Past 24 hours, #1 in
    United States]
    
    Top 10 Target Ports: 137 (netbios-ns), 80 (www), 1434 (ms-sql-m), 445
    (microsoft-ds), 7088 (---), 25 (smtp), 139 (netbios-ssn), 113 (ident),
    4662
    (eDonkey2000), 6346 (gnutella-svc)
    Source: http://isc.incidents.org/top10.html; Internet Storm Center
    
    _______________________________________________
    Information_technology mailing list
    Information_technology@listserv
    



    This archive was generated by hypermail 2b30 : Mon Apr 28 2003 - 11:38:29 PDT