The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


CERT Summary CS-99.04


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 23 Nov 1999 16:44:55 -0500
From: CERT Advisory <[email protected]>
To: [email protected]
Subject: CERT Summary CS-99.04

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CERT Summary CS-99-04

   November 23, 1999
   
   Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT
   summary to draw attention to the types of attacks reported to our
   incident response team, as well as other noteworthy incident and
   vulnerability information. The summary includes pointers to sources of
   information for dealing with the problems.
   
   Past CERT summaries are available from
   http://www.cert.org/summaries/
   ______________________________________________________________________
   
Reminder: New CERT/CC PGP Key

   On October 4, 1999, the PGP key for the CERT/CC was replaced with a
   new PGP key. For more information, see
   
   http://www.cert.org/contact_cert/encryptmail.html
   ______________________________________________________________________
   
"CERT/CC Current Activity" Web Page

   The CERT/CC Current Activity web page is a regularly updated summary
   of the most frequent, high-impact types of security incidents and
   vulnerabilities currently being reported to the CERT/CC. It is
   available from
   
   http://www.cert.org/current/current_activity.html
       
   The information on the Current Activity page will be reviewed and
   updated as reporting trends change.
   ______________________________________________________________________
   
Year 2000 (Y2K) Information

   The CERT/CC has published information regarding the Y2K problem:
   
   Y2K Information
       http://www.cert.org/y2k-info/
   ______________________________________________________________________
   
Recent Activity

   Since the last CERT summary, issued in August 1999 (CS-99-03), we have
   published advisories on WU-FTPD, BIND, CDE, and AMD. We have also
   analyzed and published information regarding distributed intruder
   tools. Among other activity, we continue to see widespread scans for
   known vulnerabilities.
   
    1. Distributed Intruder Tools
       Denial of Service
       We have received reports of intruders compromising machines in
       order to install distributed systems used for launching packet
       flooding denial-of-service attacks. The systems typically contain
       a small number of servers and a large number of clients. These
       reports indicate that machines participating in such distributed
       systems are likely to have been root compromised. You can find
       more information in
       
        CERT Incident Note 99-07
                http://www.cert.org/incident_notes/IN-99-07.html
                
       Sniffer
       We have received reports of intruders using distributed network
       sniffers to capture usernames and passwords. The distributed
       sniffer consists of a client and a server portion. As of this
       summary, the sniffer clients have been found exclusively on
       compromised Linux hosts. For more information please see
       
        CERT Incident Note 99-06
                http://www.cert.org/incident_notes/IN-99-06.html
                
    2. CDE Vulnerabilities
       Multiple vulnerabilities have been identified in some
       distributions of the Common Desktop Environment (CDE). These
       vulnerabilities are different from those discussed in CA-98.02 and
       can lead to intruders gaining root access on vulnerable systems.
       For more information please see
       
        CERT Advisory CA-99-11
                http://www.cert.org/advisories/CA-99-1-CDE.html
                
    3. BIND Vulnerabilities
       Several vulnerabilities have been found in BIND, the popular
       domain name server from the Internet Software Consortium (ISC).
       One of these vulnerabilities may allow remote intruders to gain
       privileged access to name servers. The others can severely disrupt
       the operation of the name server. For more information, please see
       
        CERT Advisory CA-99-14
                http://www.cert.org/advisories/CA-99-14-bind.html
                
    4. WU-FTPD Vulnerabilities
       Three vulnerabilities have been identified in WU-FTPD and other
       ftp daemons based on the WU-FTPD source code. WU-FTPD is a common
       package used to provide File Transfer Protocol (FTP) services.
       Remote and local intruders may be able to exploit these
       vulnerabilities to execute arbitrary code as the user running the
       ftp daemon (usually root). Incidents involving the first of these
       three vulnerabilities have been reported to the CERT Coordination
       Center. For more information please see
       
        CERT Advisory CA-99-13
                http://www.cert.org/advisories/CA-99-13-wuftpd.html
                
    5. AMD Vulnerabilities
       There is a buffer overflow vulnerability in the logging facility
       of the amd daemon. This daemon automatically mounts file systems
       in response to attempts to access files that reside on those file
       systems. Remote intruders can exploit this vulnerability to
       execute arbitrary code as the user running the amd daemon (usually
       root). For more information see
       
        CERT Advisory CA-99-12
                http://www.cert.org/advisories/CA-99-12-amd.html
                
                We have received reports regarding exploits of this
                vulnerability. For more information please see
                
                CERT Incident Note 99-05
                http://www.cert.org/incident_notes/IN-99-05.html
                
    6. RPC Vulnerabilities
       We continue to receive reports of exploitations involving three
       RPC vulnerabilities: rpc.cmsd, ttdbserverd, and statd/automountd.
       These exploitations can lead to root compromise on systems that
       implement vulnerable RPC services. Analysis has shown that similar
       artifacts have been found on compromised systems. For more
       information on the vulnerabilities please see
        CERT Incident Note 99-04
            http://www.cert.org/incident_notes/IN-99-04.html
            CERT Advisory CA-99-08
            http://www.cert.org/advisories/CA-99-08-cmsd.html
            CERT Advisory CA-99-05
            http://www.cert.org/advisories/CA-99-05-statd-automountd.html
            CERT Advisory CA-98-11
            http://www.cert.org/advisories/CA-98.11.tooltalk.html
    7. Virus and Trojan Horse Activity
       We continue to see reports of virus activity. Current versions of
       anti-virus software can help to protect your systems from these
       viruses.
       It is important to take great caution with any email or Usenet
       attachments that contain executable content. If you receive a
       message containing attachments, scan the message file with
       anti-virus software before you open or run the file. Doing this
       does not guarantee that the contents of the file are safe, but it
       lowers your risk of virus infection by checking for viruses and
       Trojan horses that your scanning software can detect.
       CERT/CC has published a Virus Resources page that includes
       information on
       
          Frequently Asked Questions (FAQs) about Computer Viruses
                
          Hoax and Chain Letter Databases
                
          Virus Databases
                
          Virus Organizations and Publications
                
          Anti-Virus Vendors
                
          Virus Related Papers
                
       Please see
       
        Virus Resources
                http://www.cert.org/other_sources/viruses.html
                
    8. Continued Widespread Scans
       We continue to receive reports of scanning and probing activity.
       The most frequent reports tend to involve services that have
       well-known vulnerabilities. Hosts continue to be affected by
       exploitation of well-known vulnerabilities in these services.
        sunrpc (TCP port 111) and mountd (635)
            http://www.cert.org/advisories/CA-98.12.mountd.html
            http://www.cert.org/incident_notes/IN-99-04.html
            IMAP (TCP port 143)
            http://www.cert.org/advisories/CA-98.09.imapd.html
            POP3 (TCP port 110)
            http://www.cert.org/advisories/CA-98.08.qpopper_vul.html
            DNS (TCP port 53 [domain])
            http://www.cert.org/advisories/CA-98.05.bind_problems.html
            http://www.cert.org/advisories/CA-97.22.bind.html
   ______________________________________________________________________
   
What's New and Updated

   Since the last CERT summary, we have developed new and updated
     * Advisories
     * CERT statistics
     * Incident notes
     * Tech tips/FAQs
     * Y2K information
       
   There are descriptions of these documents and links to them on our
   "What's New" web page at
   http://www.cert.org/nav/whatsnew.html
   ______________________________________________________________________
   
   This document is available from:
   http://www.cert.org/summaries/CS-99-04.html
   ______________________________________________________________________
   
CERT/CC Contact Information

   Email: [email protected]
          Phone: +1 412-268-7090 (24-hour hotline)
          Fax: +1 412-268-6989
          Postal address:
          CERT Coordination Center
          Software Engineering Institute
          Carnegie Mellon University
          Pittsburgh PA 15213-3890
          U.S.A.
          
   CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
   Monday through Friday; they are on call for emergencies during other
   hours, on U.S. holidays, and on weekends.
   
Using encryption

   We strongly urge you to encrypt sensitive information sent by email.
   Our public PGP key is available from
   
   http://www.cert.org/CERT_PGP.key
       
   If you prefer to use DES, please call the CERT hotline for more
   information.
   
Getting security information

   CERT publications and other security information are available from
   our web site
   
   http://www.cert.org/
       
   To be added to our mailing list for advisories and bulletins, send
   email to [email protected] and include SUBSCRIBE
   your-email-address in the subject of your message.
   
   Copyright 1999 Carnegie Mellon University.
   Conditions for use, disclaimers, and sponsorship information can be
   found in
   
   http://www.cert.org/legal_stuff.html
       
   * "CERT" and "CERT Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________
   
   NO WARRANTY
   Any material furnished by Carnegie Mellon University and the Software
   Engineering Institute is furnished on an "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied as to any matter including, but not limited to, warranty of
   fitness for a particular purpose or merchantability, exclusivity or
   results obtained from use of the material. Carnegie Mellon University
   does not make any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA+AwUBODsBglr9kb5qlZHQEQIvZACbBrc75HYvuxT/JZDa778JBH3eWcAAlR1S
AFgkAYyLg3U8XXq5dhCRR0g=
=Oqqs
-----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру