[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Virus in E-mail's



PureBytes Links

Trading Reference Links

Hi All

Below is the latest from WOW regarding the virus threat which
exploits certain security weaknesses in Microsoft Outlook and
Microsoft Outlook Express.

Incidentally WOW is a free service and well worth subscribing
to as it keeps a computer user abreast of the latest happenings
in all areas of Microsoft endeavours.

http://www.mcc.com.au/wow/index.htm

regards

ray

R Barros
101/25 Market Street
Sydney NSW 2000
Australia

Voice:   61 2 92673470  
Fax:       61 2 92673478
E-Mail:  rbarros@xxxxxxxxxxxxxxxxxx


----------
> From: Woody's Office Watch <wow.robot@xxxxxxxx>
> To: rbarros@xxxxxxxxxxxxxxxxxx
> Subject: Woody's Office Watch #3.32
> Date: Wednesday, August 05, 1998 1:10 PM
> 
>          --==>> WOW -- WOODY's OFFICE WATCH <<==--
>     (your own Microsoft Word & Office guru every week!)
>     5 August 1998                           Vol 3 No 32
> 
>   First, a word from this weeks WOW sponsor ...
> 
>   WHO PUT THE "MAL" IN MALWARE? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>   Security, security, security. It's been a sobering week. If
>   you use any sort of email program (and since you're reading
>   this, you probably do! <grrrrrrin>), you're at risk for the
>   "message attachment with long name" problem we described
>   last week. If you use Outlook 98, Outlook Express, the
>   patch Microsoft posted early last week is just a partial
>   solution,
>   http://www.microsoft.com/security/bulletins/ms98-008.htm .
>   If you use Netscape, there's still no word on when the hole
>   will get plugged - at least, none on the Netscape Web site
>   that I can find.
> 
>   But that's just one problem - an email worm. Several other
>   security exposures raised their ugly heads last week.
> 
>   If you run NT on a network, anybody who can log on to PC
>   attached to the network can get Administrator privileges
>   and blast away. The so-called "privilege elevation attack"
>   was discovered in India, and if you have an NT network, you
>   need to get the latest patch.
>   http://www.microsoft.com/security/bulletins/ms98-009.htm
> 
>   Then there's the very, very nasty CIH virus. That's a
>   Windows 95/98 virus (actually a collection of viruses) that
>   not only wipe out data, they can re-program certain PC's
>   BIOS, making them completely unbootable. Even MSNBC is
>   talking about this one,
>   http://www.msnbc.com/news/182929.asp .
> 
>   And if you still believe in the Ether Bunny and Java's
>   super-secure "sandbox", take heart: a group of programmers
>   at Princeton just discovered (yet another) hole in the
>   sandbox. They wrote a Java program that, when run on
>   Netscape Communicator 4.0, will wreak havoc on a PC. (No
>   word on whether the same is true with Internet Explorer,
>   but it probably is.)
> 
>   Oh. I almost forgot. There's also the "SMTP and NNTP Denial
>   of Service Vulnerabilities in Exchange Server," by which a
>   suitably motivated creep (there's that word again) can
>   cause Exchange Server's Internet Mail Service to go
>   belly-up.
>   http://www.microsoft.com/security/bulletins/ms98-007.htm
> 
>   Anti-virus ace Rob Rosenberger was kind enough to put
>   together another WOWarticle to shed some light on all this
>   heat...
> 
> 
>   ROB'S MALWARE MISSIVE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>   NTBUGTRAQ moderator Russ Cooper received international
>   media attention when he wrote about a "new" email exploit.
>   In theory, someone can run malicious code on your computer
>   by crafting an extremely long filename for an email
>   attachment.  The attachment doesn't need to execute -- the
>   filename *itself* executes when Outlook tries to parse the
>   filename.
> 
>   Reporters monitor NTBUGTRAQ for juicy computer security
>   stories.  Cooper's editorial (an outright "call to action")
>   piqued the media's interest, so they gave him international
>   exposure.  This exploit may sound bizarre to the average
>   reporter... but I yawned when I heard about it.  You see,
>   this latest security flaw is just a derivative of the
>   'letter bomb' exploit (1996) and the "res://" exploit
>   (1997).
> 
>   What?  You never heard of them before now?  Shame on you!
>   The 'res://' exploit affected Internet Explorer components
>   capable of displaying HTML, including the email & news
>   clients.  The 'letter bomb' exploit affected Netscape
>   components capable of displaying HTML, including the email
>   & news clients.  Both exploits relied on the use of, shall
>   we say, "unanticipated" filenames.
> 
>   "Why didn't reporters warn everybody about the Res thing or
>   the letter bomb thing?" you might ask.  Answer: those
>   exploits probably came too soon after the Hare virus media
>   fiasco of 1996.  Some computer magazines reported on them,
>   but the international newswires never really took an
>   interest. (Neither did NTBUGTRAQ, oddly, but Cooper admits
>   "even those [who track security flaws] are finding it too
>   difficult to keep up.")  Cooper's dire warning of a "modern
>   potential for disaster" came at the right time for media
>   exposure.
> 
>   In his editorial, Cooper notes "administrators  [and
>   urban-legend websites] have been telling their users that
>   no email message can harm their machine just by the user
>   looking at the message."  The long-filename exploit,
>   however, changes the nature of a simple email.  Again,
>   Cooper tells us nothing new -- the person who discovered
>   the 'letter bomb' exploit said the same thing in 1996.
> 
>   On a sad note, Cooper used the "some equals all" fallacy
>   concerning the Good Times virus alert hoax.  Specifically,
>   he declared "with the discovery [of this recent exploit],
>   'Good Times Virus' becomes potentially real!"  For the
>   record: the mythological Good Times virus launches when you
>   read an evil phrase with your eyeballs and it sets your
>   processor into a demonic Nth-complexity infinite  binary
>   loop.  Also for the record: the person who discovered the
>   'letter bomb' exploit made the same claim about Good Times.
>   A hoax does not suddenly become true just because one part
>   of it suddenly became true.
> 
>   So!  Enough chit-chat.  Let's assess the severity of the
>   newest computer security threat.  We'll assume you use an
>   exploitable email program, of course.
> 
>   Can an evil-doer use this new exploit to crash your email
>   software, or perhaps crash the operating system itself?
>   Yes.  Can he do it easily?  Yes. Can an evil-doer use this
>   new exploit to run malicious code on your computer?  Yes.
>   Can he do it easily?  NO.  It remains a highly theoretical
>   threat with only a few "I proved my point" examples.
> 
>   Should you install the security patch from Microsoft?
>   Certainly.  You can download the current patch if you wish,
>   or you can wait for MS to release the "better" patch which
>   will also fix a related security flaw.  Note: ignore the
>   news.com report which claims the patch is "flawed."  It
>   works exactly as advertised; Microsoft will merely add more
>   to it soon, to make your computer even more secure.  (Think
>   of the next release as "Patch v2.0.")  I dismiss the
>   news.com report as a typical fear mongering story.
> 
>   Should you "broadcast" a computer security alert to
>   everybody you know? Well, it depends.  Do they all look up
>   to you as an expert on computer security?  Do you know if
>   they all use an exploitable email program?  If you answer
>   "no" to either question...
> 
>   I predict this latest exploit will soon join its brothers
>   in the land of obscurity.  Don't go spastic over all the
>   media hoopla, folks.  Just keep reading Woody's Office
>   Watch for news on the latest Office patches.  Enough said!
> 
>   Rob Rosenberger, webmaster
>   Computer Virus Myths home page
>   http://www.kumite.com/myths
> 
>   http://kumite.com/myths/myths/myth024.htm to read about the
>   1996 'letter bomb' exploit.
>   http://www.pcworld.com/pcwtoday/article/0,1510,5605,00.html
>   to read about the 1997 'res://' exploit.
>   http://www.wopr.com/wow/wowv3n19.shtml to read WOW archive
>   issue v3-n19.
>   http://ntbugtraq.ntadvice.com/editorials/newworm.asp to
>   read Russ Cooper's 1998 editorial.
>   http://home.netscape.com/products/security/resources/bugs/longfile.html
>   to read Netscape's instructions on how to avoid the newest
>   exploit.
>   http://www.microsoft.com/ie/security/?/ie/security/oelong.htm
>   to read Microsoft's instructions on how to avoid the newest
>   exploit.