New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1011
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image cybsec: Advisories!: Latest Advisories & Live Feeds (03/29/04) image
Cyber Security

Latest Advisories







Live Virus Advisory Feeds
03-26-2004




*Live Feeds are from Panda, Trend Micro, and Symantec

Live Virus Advisory Feeds

National Cyber Alert System (US-Cert)


Secunia

Secunia Highlights:
OpenSSL SSL/TLS Handshake Denial of Service Vulnerabilities
Three vulnerabilities have been discovered in OpenSSL, which can be exploited by malicious people to cause a DoS (Denial-of-Service).
ISS Multiple Products ICQ Server Response Processing Vulnerability
Briley Hassell-Jack of eEye Digital Security has discovered a vulnerability in multiple ISS products, which can be exploited to compromise a vulnerable system.
Symantec Internet Security ActiveX Component Arbitrary File Execution
NGSSoftware has discovered a vulnerability in Norton Internet Security 2004, which can be exploited by malicious people to compromise a user's system.

Latest 15 Secunia Security Advisories:
2004-03-29
- Foxmail UrlToLocal Buffer Overflow Vulnerability

- XMB Cross Site Scripting Vulnerabilities

- phpBB privmsg.php SQL Injection Vulnerability

- Check Point Products OpenSSL Vulnerabilities

- Gentoo update for Courier

- Gentoo update for UUDeview

- Gentoo update for ethereal

- MySQL mysqlbug Insecure Temporary File Creation Vulnerability

- phpBB Multiple Vulnerabilities

2004-03-26
- eSignal STREAMQUOTE Buffer Overflow Vulnerability

- oftpd PORT Command Denial of Service Vulnerability

- OpenLinux update for mc

- OpenLinux update for mutt

- Gentoo update for Apache 2

- AIX invscoutd Insecure Logfile Handling Vulnerability

Top 5 Most Read Secunia Security Advisories (Last 24 hours):
- Internet Explorer URL Spoofing Vulnerability

- Sun Java System (Sun ONE) SSL Vulnerabilities

- Check Point Products OpenSSL Vulnerabilities

- Internet Explorer showHelp() Restriction Bypass Vulnerability

- AIX invscoutd Insecure Logfile Handling Vulnerability


Security Tracker

Special Alert - Check Point issues OpenSSL fixes for Provider-1 and FireWall-1/VPN-1.
Fresh Guest Book (guest.cgi) Input Validation Bug in 'Name' Field Permits Cross-Site Scripting Attacks

ShelzZ of 0x29a team reported an input validation vulnerability in Fresh Guest Book. A remote user can conduct cross-site scripting attacks.

Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information

NessusWX Discloses Remote Account Passwords to Local Users

An access control vulnerability was reported in NessusWX. A local user can obtain passwords used by the Nessus scanner in conducting network scans.

Impact: Disclosure of authentication information

NeWT Discloses Remote Account Passwords to Local Users

An access control vulnerability was reported in the NeWT vulnerability scanner. A local user can obtain passwords used by the scanner in conducting network scans.

Impact: Disclosure of authentication information

Nessus Discloses Remote Account Passwords to Local Users

An access control vulnerability was reported in Nessus. A local user can obtain passwords used by the Nessus scanner in conducting network scans.

Impact: Disclosure of authentication information

Emil Buffer Overflows and Format String Flaws Let Remote Users Execute Arbitrary Code

Some buffer overflow and format string vulnerabilities were reported in Emil. A remote user can execute arbitrary code on the target system.

Impact: Execution of arbitrary code via network, User access via network


SecurityFocus Vulnerabilities

2004-03-26: WU-FTPD restricted-gid Unauthorized Access Vulnerability
2004-03-26: GdkPixbuf Unspecified Bitmap Handling Denial Of Service Vulnerability
2004-03-26: Multiple Vendor Internet Browser Cookie Path Argument Restriction Bypass Vulnerability
2004-03-25: Midnight Commander Virtual File System Symlink Buffer Overflow Vulnerability
2004-03-25: Mutt Menu Drawing Remote Buffer Overflow Vulnerability
2004-03-25: Apache Mod_SSL HTTP Request Remote Denial Of Service Vulnerability
2004-03-25: Apache Error Log Escape Sequence Injection Vulnerability
2004-03-25: Apache Connection Blocking Denial Of Service Vulnerability
2004-03-25: Emil Multiple Buffer Overrun and Format String Vulnerabilities
2004-03-25: Nival Interactive Etherlords Remote Denial Of Service Vulnerability
2004-03-25: PHPBB Search.PHP Search_Results Parameter SQL Injection Vulnerability
2004-03-25: PhpBB admin_words.php Multiple Vulnerabilities
2004-03-25: phpBB profile.php avatarselect Cross-Site Scripting Vulnerability
2004-03-25: ESignal Remote Buffer Overflow Vulnerability
2004-03-25: Apache mod_disk_cache Module Client Authentication Credential Storage Weakness
2004-03-25: phpBB Multiple Input Validation Vulnerabilities
2004-03-25: Trend Micro Interscan WebManager Java TeleWindow Unspecified Credential Theft Vulnerability
2004-03-25: Cisco Aironet AP1x00 Malformed HTTP GET Denial Of Service Vulnerability
2004-03-25: Cisco ACNS Authentication Library Remote Buffer Overrun Vulnerability
2004-03-25: Cisco Content Service Switch Management Port UDP Denial Of Service Vulnerability
2004-03-25: Cisco IOS MSFC2 Malformed Layer 2 Frame Denial Of Service Vulnerability
2004-03-25: Check Point Firewall-1 SmartDashboard Filter Buffer Overflow Vulnerability
2004-03-25: MySQL Aborted Bug Report Insecure Temporary File Creation Vulnerability
2004-03-25: Kerio MailServer Spam Filter Buffer Overrun Vulnerability
2004-03-24: HP Web Jetadmin Remote Arbitrary Command Execution Vulnerability
2004-03-24: NexGen FTP Server Remote Directory Traversal Vulnerability
2004-03-24: HP Web Jetadmin setinfo.hts Script Directory Traversal Vulnerability
2004-03-24: HP Web Jetadmin Printer Firmware Update Script Arbitrary File Upload Weakness
2004-03-24: PicoPhone Internet Phone Remote Buffer Overflow Vulnerability
2004-03-24: GNU SPIP Unspecified PHP Code Execution Vulnerability
2004-03-24: JelSoft VBulletin ShowThread.PHP Cross-Site Scripting Vulnerability
2004-03-24: JelSoft VBulletin ForumDisplay.PHP Cross-Site Scripting Vulnerability
2004-03-24: PHP openlog() Buffer Overflow Vulnerability
2004-03-24: rident.pl Symbolic Link Vulnerability
2004-03-24: IP3 Networks IP3 NetAccess Appliance SQL Injection Vulnerability
2004-03-24: Virtual Programming VP-ASP Shopping Cart CatalogID SQL Injection Vulnerability
2004-03-24: Trend Micro Interscan Viruswall localweb Directory Traversal Vulnerability
2004-03-24: CPanel Multiple Cross-Site Scripting Vulnerabilities
2004-03-24: Kerio WinRoute Firewall Unspecified Malformed HTTP Header Denial of Service Vulnerability
2004-03-24: Common Desktop Environment DTLogin Unspecified Remote Double Free Vulnerability
2004-03-24: Centrinity FirstClass HTTP Server TargetName Parameter Cross-Site Scripting Vulnerability
2004-03-24: Microsoft Visual C++ MFC ISAPI Extension Denial Of Service Vulnerability
2004-03-24: Ecartis Multiple Buffer Overrun Vulnerabilities
2004-03-24: ECartis LIScript Arbitrary Variable Viewing Vulnerability
2004-03-23: Sun Solaris vfs_getvfssw function Local Privilege Escalation Vulnerability
2004-03-23: FluidGames The Rage Game Server Remote Denial of Service Vulnerability
2004-03-23: OpenBSD isakmpd Multiple Unspecified Remote Denial Of Service Vulnerabilities
2004-03-23: Symantec AntiVirus Scan Engine For Red Hat Linux Insecure Temporary File Vulnerabilities
2004-03-23: Mythic Entertainment Dark Age of Camelot Encryption Key Signing Vulnerability
2004-03-23: DameWare Mini Remote Control Server Clear Text Encryption Key Disclosure Vulnerability
2004-03-23: DameWare Mini Remote Control Server Weak Random Key Generation Weakness
2004-03-23: Borland Interbase Database User Privilege Escalation Vulnerability
2004-03-23: OpenSSL ASN.1 Large Recursion Remote Denial Of Service Vulnerability
2004-03-23: SSH Communications SSH Tectia Server Private Key Disclosure Vulnerability
2004-03-23: Hibyte HiGuest Message Field HTML Injection Vulnerability
2004-03-23: Foxmail Remote Buffer Overflow Vulnerability
2004-03-23: Ipswitch WS_FTP Multiple Vulnerabilities
2004-03-23: Multiple Vendor H.323 Protocol Implementation Vulnerabilities
2004-03-22: ReGet Software ReGet Directory Traversal Vulnerability
2004-03-22: Qualcomm Eudora Spoofed Attachment Line Denial Of Service Vulnerability
2004-03-22: Pine rfc2231_get_param() Remote Integer Overflow Vulnerability
2004-03-22: Pine Message/External-Body Type Attribute Buffer Overflow Vulnerability
2004-03-22: PHP-Nuke MS-Analysis Module HTTP Referrer Field SQL Injection Vulnerability
2004-03-22: PHP-Nuke MS-Analysis Module Multiple Cross-Site Scripting Vulnerabilities
2004-03-22: PHP-Nuke MS-Analysis Module Multiple Remote Path Disclosure Vulnerabilities
2004-03-22: Invision Power Top Site List Comments function id Parameter SQL Injection Vulnerability
2004-03-22: Joel Palmius Mod_Survey Survey Input Field HTML Injection Vulnerability
2004-03-22: Invision Gallery Multiple SQL Injection Vulnerabilities
2004-03-22: JelSoft VBulletin Multiple Module Index.PHP Cross-Site Scripting Vulnerabilities
2004-03-22: JelSoft VBulletin Private.PHP Cross-Site Scripting Vulnerability
2004-03-22: Xine Bug Reporting Script Insecure Temporary File Creation Vulnerability
2004-03-22: Ericsson HM220dp DSL Modem World Accessible Web Administration Interface Vulnerability
2004-03-22: XWeb Directory Traversal Vulnerability

Symantec SSR

W32.Beagle.V@mm March 29, 2004 March 29, 2004
W32.Netsky.Q@mm
W32/Netsky.Q@mm [McAfee], W32/Netsky-Q [Sophos], WORM NETSKY.Q [Trend] March 28, 2004 March 29, 2004
W32.Sober.E@mm March 27, 2004 March 28, 2004
W32.Beagle.U@mm
Bagle.U [F-Secure], WORM_BAGLE.U [Trend], W32/Bagle-U [Sophos], W32/Bagle.u@MM [McAfee] March 26, 2004 March 26, 2004
W32.Timese.AG March 25, 2004 March 26, 2004
W32.Hesi.Worm March 25, 2004 March 26, 2004
Swaffer.Exploit
Exploit-ViaSWFurl [MacAfee] March 25, 2004 March 26, 2004
Trojan.Noupdate.B March 24, 2004 March 25, 2004
W32.Snapper.A@mm
I-Worm.Snapper [Kaspersky], W32/Snapper@MM [McAfee], Snapper [F-Secure] March 24, 2004 March 24, 2004
Backdoor.IRC.Aladinz.N March 24, 2004 March 24, 2004
Backdoor.IRC.Spybuzz March 23, 2004 March 24, 2004
Backdoor.R3C.B March 23, 2004 March 24, 2004
W32.Blackmal@mm
W32/MyWife.a@MM [McAfee], I-Worm.Nyxem [Kaspersky], W32/Nyxem-A [Sophos], WORM_BLUEWORM.A [Trend] March 23, 2004 March 24, 2004
W32.Gaobot.SA
W32.HLLW.Polybot.B, W32/Gaobot.worm.gen.d [McAfee], Phatbot March 23, 2004 March 23, 2004
W32.HLLW.Donk.L March 23, 2004 March 23, 2004
W32.HLLW.Lovgate.O@mm
I-Worm.LovGate.t [Kaspersky], W32/Lovgate.s@MM [McAfee] March 23, 2004 March 23, 2004
W32.HLLW.Gaobot.RS March 22, 2004 March 22, 2004
W32.Netsky.P@mm
W32.Netsky.Q@mm, W32/Netsky.p@MM [McAfee], Win32.Netsky.P [Computer Associates], NetSky.P [F-Secure], W32/Netsky.P.worm [Panda], W32/Netsky-P [Sophos], WORM_NETSKY.P [Trend] March 21, 2004 March 22, 2004
Backdoor.Danton March 21, 2004 March 22, 2004
Backdoor.Tumag March 21, 2004 March 22, 2004
W32.Witty.Worm
W32/Witty.worm [McAfee], WORM_WITTY.A [Trend] March 20, 2004 -----
Backdoor.IRC.MyPoo March 20, 2004 March 22, 2004
Backdoor.IRC.MyPoo.Kit March 20, 2004 March 22, 2004
Download.SmallWeb March 20, 2004 March 22, 2004
Download.SmallWeb.Kit March 20, 2004 March 22, 2004
PWSteal.Bancos.G March 20, 2004 March 22, 2004
PWSteal.Tarno.C March 20, 2004 March 22, 2004
Trojan.KillAV.D March 20, 2004 March 22, 2004
W32.HLLW.Gaobot.RQ
W32/Randbot.worm [McAfee], Backdoor.SdBot.gen [Kaspersky] March 20, 2004 March 22, 2004
W32.HLLW.Leox.B March 20, 2004 March 22, 2004
Backdoor.Cazno March 19, 2004 March 22, 2004
Backdoor.Cazno.Kit March 19, 2004 March 22, 2004
Backdoor.Ranky.E March 19, 2004 March 22, 2004
Download.Chamber March 19, 2004 March 22, 2004
Download.Chamber.Kit March 19, 2004 March 22, 2004
Trojan.Bookmarker.G March 19, 2004 March 22, 2004
Trojan.Dustbunny March 19, 2004 March 22, 2004
Trojan.Linst March 19, 2004 March 22, 2004
Trojan.Regsys March 19, 2004 March 22, 2004
W32.HLLW.Antinny.G March 19, 2004 March 19, 2004
W32.HLLW.Polybot
Phatbot, W32/Polybot.l!irc [McAfee], WORM_AGOBOT.HM [Trend], Backdoor.Agobot.hm [Kaspersky] March 19, 2004 March 19, 2004
W32.Nimos.Worm
W32/Nomis.worm [Mcafee] March 18, 2004 March 18, 2004
W32.Beagle@mm (vbs) March 18, 2004 March 18, 2004
W32.Beagle.T@mm
I-Worm.Bagle.o [Kaspersky] March 18, 2004 March 18, 2004
W32.Beagle.S@mm
W32/Bagle.s@MM [McAfee] March 18, 2004 March 18, 2004
W32.Beagle.R@mm
W32/Bagle.r@MM [Mcafee], PE_BAGLE.R [Trend], W32/Bagle-R [Sophos], Win32.Bagle.R [Computer Associates], I-Worm.Bagle.q [Kaspersky] March 18, 2004 March 18, 2004
W32.Beagle.O@mm
W32.Bagle.Q [Computer Associates], Bagle.Q [F-Secure], W32/Bagle.q@MM [McAfee], W32/Bagle.Q [Panda], W32/Bagle-Q [Sophos], PE_Bagle.Q [Trend], W32.Beagle.Q@mm March 18, 2004 March 18, 2004
W32.Dinfor.D.Worm March 17, 2004 March 18, 2004
W32.HLLW.Lovgate.N@mm
W32/Lovgate.p@MM [McAfee] March 17, 2004 March 17, 2004
W32.HLLW.Gaobot.RF March 17, 2004 March 17, 2004
W32.Netsky.O@mm
W32/Netsky.o@MM [McAfee], WORM_NETSKY.O [Trend] March 17, 2004 March 17, 2004
PWSteal.Bancos.F March 16, 2004 March 17, 2004
W32.Netsky.N@mm
W32/Netsky.n@MM [McAfee], I-Worm.NetSky.o [Kaspersky] March 16, 2004 March 17, 2004
W32.HLLW.RedDw@mm March 15, 2004 March 16, 2004
W32.Beagle.N@mm
Win32.Bagle.O [Computer Associates], Bagle.P@mm [F-Secure], W32/Bagle.p@MM [McAfee], W32/Bagle.O [Panda], W32/Bagle-O [Sophos], PE_BAGLE.P [Trend] March 15, 2004 March 15, 2004
W32.Tuoba.Trojan March 15, 2004 March 15, 2004
W32.Cone.F@mm March 14, 2004 March 14, 2004
Trojan.Mitglieder.E
W32/Bagle.gen@mm March 13, 2004 March 13, 2004
Trojan.Mitglieder.D
W32/Bagle.gen@mm March 13, 2004 March 13, 2004
W32.Beagle.M@mm
Win32.Bagle.N [Computer Associates], Bagle.N [F-Secure], W32/Bagle.n@MM [McAfee], W32/Bagle.N [Panda], W32/Bagle-N [Sophos], PE_BAGLE.N [Trend] March 13, 2004 March 13, 2004
W32.HLLW.Citor March 13, 2004 March 13, 2004
W32.HLLW.Annil@mm March 12, 2004 March 13, 2004
W32.Cone.E@mm March 12, 2004 March 13, 2004
PWSteal.Irftp March 12, 2004 March 13, 2004
Trojan.Etsur March 12, 2004 March 13, 2004
Trojan.Noupdate March 11, 2004 March 12, 2004
Trojan.Gipma March 10, 2004 March 11, 2004
W32.Cone.D@mm March 10, 2004 March 11, 2004
W32.Netsky.M@mm
I-Worm.NetSky.m [Kaspersky], W32/Netsky.m@MM [McAfee], WORM_NETSKY.M [Trend], W32/Netsky-M [Sophos], Win32.Netsky.M [Computer Associates] March 10, 2004 March 11, 2004
Trojan.Simcss.B March 10, 2004 March 10, 2004
W97M.Trug.B March 9, 2004 March 10, 2004
W32.Netsky.L@mm March 9, 2004 March 10, 2004
W32.Cone.C@mm March 9, 2004 March 9, 2004
W32.Netsky.K@mm
W32/Netsky-J [Sophos], Win32.Netsky.J [Computer Associates], W32/Netsky.j@MM [McAfee], WORM_NETSKY.J [Trend], I-Worm.NetSky.j [Kaspersky] March 8, 2004 March 8, 2004
W32.Keco@mm
W32/Keco.worm [McAfee], WORM_KECO.A [Trend], Win32.Keco.A [Computer Associates], I-Worm.Keco [Kaspersky] March 8, 2004 March 8, 2004
W32.Netsky.J@mm
NetSky.J [F-Secure], W32/Netsky-K [Sophos], Win32.Netsky.K [Computer Associates], WORM_NETSKY.K [Trend] March 8, 2004 March 8, 2004
W32.Sober.D@mm
Win32.Sober.D [Computer Associates], W32/Sober.d@MM [McAfee], WORM_SOBER.D [Trend], W32/Roca-A [Sophos], I-Worm.Sober.d [Kaspersky] March 7, 2004 March 8, 2004
W32.Netsky.I@mm
W32/Netsky.i@MM [McAfee], I-Worm.Netsky.gen [Kaspersky], Win32.Netsky.I [Computer Associates], WORM_NETSKY.I [Trend], W32/Netsky-I [Sophos] March 7, 2004 March 8, 2004
Trojan.Reur.B March 5, 2004 March 8, 2004
W32.HLLW.Reur.B March 5, 2004 March 8, 2004
W32.HLLW.Heycheck March 5, 2004 March 8, 2004
PWSteal.Banpaes.C March 5, 2004 March 5, 2004
W32.Netsky.H@mm March 5, 2004 March 5, 2004
W32.Netsky.G@mm
Win32.Netsky.G [Computer Associates], NetSky.G [F-Secure], W32/Netsky.g@MM [McAfee], WORM_NETSKY.G [Trend] March 4, 2004 March 5, 2004
X97M.Kbase
X97M/Generic (McAfee) March 3, 2004 March 4, 2004
W32.Mydoom.H@mm
W32/Mydoom.h@MM [McAfee], Win32.Mydoom.H [Computer Associates], WORM_MYDOOM.H [Trend] March 3, 2004 March 4, 2004
W32.Beagle.K@mm
Win32.Bagle.K [Computer Associates], Bagle.K [F-Secure], W32/Bagle.k@MM [McAfee], W32/Bagle.K.worm [Panda], W32/Bagle-K [Sophos], WORM_BAGLE.K [Trend Micro] March 3, 2004 March 3, 2004
W32.Netsky.F@mm
Win32.Netsky.F [Computer Associates], NetSky.F [F-Secure], W32/Netsky.f@MM [McAfee], WORM_NETSKY.F [Trend] March 3, 2004 March 3, 2004
W32.Beagle.J@mm
W32/Bagle.j@MM [McAfee], WORM_BAGLE.J [Trend], Win32.Bagle.J [Computer Associates], W32/Bagle-J [Sophos] March 2, 2004 March 2, 2004
W32.Hiton@mm
W32/Hiton.a@MM [McAfee], WORM_HITON.A [Trend], Win32.Hiton.A [Computer Associates] March 2, 2004 March 2, 2004
W32.Mydoom.G@mm
W32/Mydoom.g@MM [McAfee], WORM_MYDOOM.G [Trend], Win32.Mydoom.G [Computer Associates], W32/MyDoom-G [Sophos] March 2, 2004 March 2, 2004
W32.Beagle.I@mm
WORM_BAGLE.I [Trend], W32/Bagle-I [Sophos], Win32.Bagle.I [Computer Associates], W32/Bagle.i@MM [McAfee] March 1, 2004 March 2, 2004
W32.Beagle.H@mm
W32/Bagle.h@MM [McAfee], W32/Bagle-H [Sophos], I-Worm.Bagle.Gen [Kaspersky], WORM_BAGLE.H [Trend], Win32.Bagle.H [Computer Associates] March 1, 2004 March 1, 2004
W32.Netsky.E@mm
Win32.Netsky.E [Computer Associates], W32/Netsky.e@MM [McAfee], W32/Netsky-E [Sophos], WORM_NETSKY.E [Trend], I-Worm.Netsky.e [Kaspersky] March 1, 2004 March 1, 2004
W32.Netsky.D@mm
WORM_NETSKY.D [Trend], W32/Netsky.d@MM [McAfee], W32/Netsky.D.worm [Panda], W32/Netsky-D [Sophos], Win32.Netsky.D [Computer Associates], I-Worm.Netsky.d [Kaspersky] March 1, 2004 March 1, 2004
W32.Beagle.G@mm
W32/Bagle.g@MM [McAfee], WORM_BAGLE.G [Trend] February 29, 2004 February 29, 2004
W32.Beagle.F@mm
W32/Bagle.f@MM [McAfee], W32/Bagle-F [Sophos], Win32.Bagle.F [Computer Associates], WORM_BAGLE.F [Trend], I-Worm.Bagle.f [Kaspersky] February 29, 2004 February 29, 2004
W32.Cone.B@mm February 29, 2004 February 29, 2004
W32.HLLW.Cult.P@mm February 29, 2004 February 29, 2004
Trojan.Bookmarker.F February 29, 2004 February 29, 2004
W32.Beagle.E@mm
Bagle.E [F-Secure], I-Worm.Bagle.e [Kaspersky], WORM_BAGLE.E [Trend], Win32.Bagle.E [Computer Associates], W32/Bagle-E [Sophos] February 28, 2004 February 28, 2004
W32.HLLW.Evianc
Bloodhound.W32.5, Worm.P2P.gen [Kaspersky] February 28, 2004 February 28, 2004
W32.HLLW.Moega.AP February 28, 2004 February 28, 2004
W32.Beagle.C@mm
W32.Beagle.A@mm, W32/Bagle.c@MM [McAfee], WORM_BAGLE.C [Trend], Win32.Bagle.C [Computer Associates], W32/Bagle-C [Sophos], I-Worm.Bagle.c [Kaspersky] February 27, 2004 February 27, 2004
Trojan.Tilser February 27, 2004 February 27, 2004
PWSteal.Bancos.E February 26, 2004 February 27, 2004
Backdoor.IRC.Loonbot February 26, 2004 February 26, 2004
PWSteal.Tarno.B February 26, 2004 February 26, 2004
W32.Mockbot.A.Worm February 25, 2004 February 26, 2004
Backdoor.IRC.Aladinz.M February 25, 2004 February 26, 2004
W32.Netsky.C@mm
W32/Netsky.c@MM [McAfee], Win32.Netsky.C [Computer Associates], W32/Netsky-C [Sophos], WORM_NETSKY.C [Trend], I-Worm.Moodown.c [Kaspersky] February 24, 2004 February 25, 2004
W32.Bizex.Worm
Worm.Win32.Bizex [Kaspersky], W32/Bizex.worm [McAfee], W32/Bizex-A [Sophos] February 24, 2004 February 25, 2004






NAV Daily Definitions (Go!)


*Note: The i32 Intelligent Updater package cannot be used to update Symantec AntiVirus Corporate Edition 8.0 servers or Norton AntiVirus Corporate Edition 7.6 servers, but can be used to update Corporate Edition clients. The x86 Intelligent Updater package can be used to update corporate Edition clients and servers.

National Cyber Alert System (US-Cert)


March 18, 2004: US-CERT Channels Available
US-CERT publishes a number of RSS channels that web publishers can use to automate pointers to the latest computer security information from US-CERT.

Latest version: March 27, 2004 19:03:33 EST
Exploit for Cisco vulnerabilities released
Witty Worm
Phatbot Trojan
Many Variants of W32/Beagle malicious code
Many Variants of W32/Netsky malicious code
Many Variants of W32/MyDoom malicious code

Technical
TA04-078A
Multiple Vulnerabilities in OpenSSL
SB04-077
Summary of Security Items from March 3 through March 16, 2004
Non-technical
SA04-079A
Continuing Threats to Home Users
ST04-005
Understanding Anti-Virus Software

New and Notable Vulnerabilities
CDE dtlogin XDMCP vulnerability
Remotely exploitable ISS vulnerability
Vulnerabilities in OpenSSL
Linux Kernel mremap() Vulnerabilities
BlackICE and RealSecure heap overflow vulnerability

Live Virus Advisory Feed

Posted on Monday, 29 March 2004 @ 10:27:36 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Linux.com
· GNU Project
· PHP HomePage
· Red Hat
· Linux Games
· Microsoft
· Linux Kernel Archives
· PHP-Nuke
· Intel
· MySQL Database Server
· HotScripts
· Apache Web Server
· W3 Consortium
· CSS Standard
· HTML Standard
· Hewlett Packard
· Spam Cop
· SETI Institute
· Borland
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register