PureBytes Links
Trading Reference Links
|
Hi All
Below is the latest from WOW regarding the virus threat which
exploits certain security weaknesses in Microsoft Outlook and
Microsoft Outlook Express.
Incidentally WOW is a free service and well worth subscribing
to as it keeps a computer user abreast of the latest happenings
in all areas of Microsoft endeavours.
http://www.mcc.com.au/wow/index.htm
regards
ray
R Barros
101/25 Market Street
Sydney NSW 2000
Australia
Voice: 61 2 92673470
Fax: 61 2 92673478
E-Mail: rbarros@xxxxxxxxxxxxxxxxxx
----------
> From: Woody's Office Watch <wow.robot@xxxxxxxx>
> To: rbarros@xxxxxxxxxxxxxxxxxx
> Subject: Woody's Office Watch #3.32
> Date: Wednesday, August 05, 1998 1:10 PM
>
> --==>> WOW -- WOODY's OFFICE WATCH <<==--
> (your own Microsoft Word & Office guru every week!)
> 5 August 1998 Vol 3 No 32
>
> First, a word from this weeks WOW sponsor ...
>
> WHO PUT THE "MAL" IN MALWARE? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> Security, security, security. It's been a sobering week. If
> you use any sort of email program (and since you're reading
> this, you probably do! <grrrrrrin>), you're at risk for the
> "message attachment with long name" problem we described
> last week. If you use Outlook 98, Outlook Express, the
> patch Microsoft posted early last week is just a partial
> solution,
> http://www.microsoft.com/security/bulletins/ms98-008.htm .
> If you use Netscape, there's still no word on when the hole
> will get plugged - at least, none on the Netscape Web site
> that I can find.
>
> But that's just one problem - an email worm. Several other
> security exposures raised their ugly heads last week.
>
> If you run NT on a network, anybody who can log on to PC
> attached to the network can get Administrator privileges
> and blast away. The so-called "privilege elevation attack"
> was discovered in India, and if you have an NT network, you
> need to get the latest patch.
> http://www.microsoft.com/security/bulletins/ms98-009.htm
>
> Then there's the very, very nasty CIH virus. That's a
> Windows 95/98 virus (actually a collection of viruses) that
> not only wipe out data, they can re-program certain PC's
> BIOS, making them completely unbootable. Even MSNBC is
> talking about this one,
> http://www.msnbc.com/news/182929.asp .
>
> And if you still believe in the Ether Bunny and Java's
> super-secure "sandbox", take heart: a group of programmers
> at Princeton just discovered (yet another) hole in the
> sandbox. They wrote a Java program that, when run on
> Netscape Communicator 4.0, will wreak havoc on a PC. (No
> word on whether the same is true with Internet Explorer,
> but it probably is.)
>
> Oh. I almost forgot. There's also the "SMTP and NNTP Denial
> of Service Vulnerabilities in Exchange Server," by which a
> suitably motivated creep (there's that word again) can
> cause Exchange Server's Internet Mail Service to go
> belly-up.
> http://www.microsoft.com/security/bulletins/ms98-007.htm
>
> Anti-virus ace Rob Rosenberger was kind enough to put
> together another WOWarticle to shed some light on all this
> heat...
>
>
> ROB'S MALWARE MISSIVE ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> NTBUGTRAQ moderator Russ Cooper received international
> media attention when he wrote about a "new" email exploit.
> In theory, someone can run malicious code on your computer
> by crafting an extremely long filename for an email
> attachment. The attachment doesn't need to execute -- the
> filename *itself* executes when Outlook tries to parse the
> filename.
>
> Reporters monitor NTBUGTRAQ for juicy computer security
> stories. Cooper's editorial (an outright "call to action")
> piqued the media's interest, so they gave him international
> exposure. This exploit may sound bizarre to the average
> reporter... but I yawned when I heard about it. You see,
> this latest security flaw is just a derivative of the
> 'letter bomb' exploit (1996) and the "res://" exploit
> (1997).
>
> What? You never heard of them before now? Shame on you!
> The 'res://' exploit affected Internet Explorer components
> capable of displaying HTML, including the email & news
> clients. The 'letter bomb' exploit affected Netscape
> components capable of displaying HTML, including the email
> & news clients. Both exploits relied on the use of, shall
> we say, "unanticipated" filenames.
>
> "Why didn't reporters warn everybody about the Res thing or
> the letter bomb thing?" you might ask. Answer: those
> exploits probably came too soon after the Hare virus media
> fiasco of 1996. Some computer magazines reported on them,
> but the international newswires never really took an
> interest. (Neither did NTBUGTRAQ, oddly, but Cooper admits
> "even those [who track security flaws] are finding it too
> difficult to keep up.") Cooper's dire warning of a "modern
> potential for disaster" came at the right time for media
> exposure.
>
> In his editorial, Cooper notes "administrators [and
> urban-legend websites] have been telling their users that
> no email message can harm their machine just by the user
> looking at the message." The long-filename exploit,
> however, changes the nature of a simple email. Again,
> Cooper tells us nothing new -- the person who discovered
> the 'letter bomb' exploit said the same thing in 1996.
>
> On a sad note, Cooper used the "some equals all" fallacy
> concerning the Good Times virus alert hoax. Specifically,
> he declared "with the discovery [of this recent exploit],
> 'Good Times Virus' becomes potentially real!" For the
> record: the mythological Good Times virus launches when you
> read an evil phrase with your eyeballs and it sets your
> processor into a demonic Nth-complexity infinite binary
> loop. Also for the record: the person who discovered the
> 'letter bomb' exploit made the same claim about Good Times.
> A hoax does not suddenly become true just because one part
> of it suddenly became true.
>
> So! Enough chit-chat. Let's assess the severity of the
> newest computer security threat. We'll assume you use an
> exploitable email program, of course.
>
> Can an evil-doer use this new exploit to crash your email
> software, or perhaps crash the operating system itself?
> Yes. Can he do it easily? Yes. Can an evil-doer use this
> new exploit to run malicious code on your computer? Yes.
> Can he do it easily? NO. It remains a highly theoretical
> threat with only a few "I proved my point" examples.
>
> Should you install the security patch from Microsoft?
> Certainly. You can download the current patch if you wish,
> or you can wait for MS to release the "better" patch which
> will also fix a related security flaw. Note: ignore the
> news.com report which claims the patch is "flawed." It
> works exactly as advertised; Microsoft will merely add more
> to it soon, to make your computer even more secure. (Think
> of the next release as "Patch v2.0.") I dismiss the
> news.com report as a typical fear mongering story.
>
> Should you "broadcast" a computer security alert to
> everybody you know? Well, it depends. Do they all look up
> to you as an expert on computer security? Do you know if
> they all use an exploitable email program? If you answer
> "no" to either question...
>
> I predict this latest exploit will soon join its brothers
> in the land of obscurity. Don't go spastic over all the
> media hoopla, folks. Just keep reading Woody's Office
> Watch for news on the latest Office patches. Enough said!
>
> Rob Rosenberger, webmaster
> Computer Virus Myths home page
> http://www.kumite.com/myths
>
> http://kumite.com/myths/myths/myth024.htm to read about the
> 1996 'letter bomb' exploit.
> http://www.pcworld.com/pcwtoday/article/0,1510,5605,00.html
> to read about the 1997 'res://' exploit.
> http://www.wopr.com/wow/wowv3n19.shtml to read WOW archive
> issue v3-n19.
> http://ntbugtraq.ntadvice.com/editorials/newworm.asp to
> read Russ Cooper's 1998 editorial.
> http://home.netscape.com/products/security/resources/bugs/longfile.html
> to read Netscape's instructions on how to avoid the newest
> exploit.
> http://www.microsoft.com/ie/security/?/ie/security/oelong.htm
> to read Microsoft's instructions on how to avoid the newest
> exploit.
|