💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HNS › issue068.… captured on 2021-12-03 at 14:04:38.

View Raw

More Information

-=-=-=-=-=-=-

HNS Newsletter
Issue 68 - 25.06.2001
http://net-security.org
http://security-db.com

This is a newsletter delivered to you by Help Net Security. It covers weekly 
roundups of security events that were in the news the past week. Visit Help 
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 2598

Table of contents:
 
1) General security news
2) Security issues
3) Security world
4) Featured products
5) Featured article
6) Defaced archives


========================================================
Secure Exchange 2000 against email attacks/viruses!
========================================================
LANguard SELM is a network wide event log monitor that retrieves logs 
from all NT/2000 servers and workstations and immediately alerts the 
administrator of possible intrusions. Through network wide reporting, you 
can identify machines being targeted as well as local users trying to hack 
internal company information. LANguard analyses the system event logs, 
therefore is not impaired by switches, IP traffic encryption or high-speed 
data transfer.

Download your evaluation copy from:
http://www.net-security.org/cgi-bin/ads/ads.pl?banner=gfitxt
========================================================


General security news
---------------------
 
----------------------------------------------------------------------------

NSA SECURES WIN-2K
Your tax dollars have been put to good use for a change, as the US NSA has 
been busy figuring out how to make Windows 2000 more secure, and has 
released a set of templates and instructions to enable anyone to batten down 
their '2K hatches. The package had been available briefly at NSA's Web site, 
but has temporarily been taken down due to overwhelming demand. The files
will be available again from NSA within a week's time.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/19761.html


SECURITY TIPS: APPLYING IIS 5 PATCHES
While we try to keep most of the security tips in this column as general as 
possible, this week's is very specific and addresses a critical vulnerability in 
Microsoft's Internet Information Server 5 which was recently discovered.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/Features/1123261


CARNIVORE 'NO PROBLEM' FOR NEW E-MAIL ENCRYPTION
If a new software research project proves successful, Web surfers will be able 
to send secure e-mail and instant messages that are not only automatically 
encrypted, but are further hidden from prying eyes by a stream of fake data. 
A research team led by Nikola Bobic, a part-time professor at Ottawa University,
aims to create a virtual network on the Internet called "Cryptobox", which 
would be similar to peer-to-peer systems like Gnutella.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.osopinion.com/perl/story/11281.html


COMPUTER VIRUSES EASIER TO WRITE, HARDER TO FIGHT
As automated programs have made computer hacking and the creation of 
malicious code easier, more security administrators are scanning for the 
software tools used to create viruses and attack networks. And while 
companies and universities are looking to secure their own systems, they 
are also concerned with the liability that comes with malicious code that 
was created on their systems being used against other systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsfactor.com/perl/story/11333.html


HACKER TOOLS AND THEIR SIGNATURES, PART TWO
This is the second installment in the Hacker Tools and Their Signatures series, 
a series written to assist system administrators, security administrators, and 
the security community as a whole to identify and understand the tools that 
are being used in the hacker community. The first article examined This 
installment will focus on two tools: Juno and Unisploit. This paper will provide 
a detailed analysis of these tools, including tcpdump examples and other 
useful references.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/ids/articles/junisploit.html


DDOS ATTACKERS RAISING THE BAR
Distributed denial-of-service attacks - which by some estimates total more 
than 4,000 a week - are likely to get much worse as the perpetrators hone 
their skills and new weaknesses in popular platforms are discovered and 
exploited. As vendors such as Asta Networks Inc. and Mazu Networks Inc. 
prepare to launch their anti-DDoS solutions in the coming weeks, attackers 
across the Internet are fine-tuning their tools and creating sophisticated 
assaults designed to elude even the best defenses.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0%2C11011%2C2775881%2C00.html


LAWYERS RAISE FEARS OVER ALTAVISTA'S SEARCH ENGINE
Lawyers have warned that companies using AltaVista's new search engine 
technology are at risk of breaching data protection laws. Launched last week, 
AltaVista's new software lets people search entire corporate networks allowing 
employees to access all network folders, personal computers and emails. 
Lawyers are warning that the search facility could be too intrusive. Unless 
these are protected in some way, it could allow others to pry into personal 
records and emails.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/6/19773.html


BEST PRACTICES AND GOOD ENGINEERING LEADS TO SECURITY
Security has always been a dynamic task, not something you do once and let 
run forever. The changes in our networked environment, and the increasingly 
global nature of business and government dictates that you need to be on top 
of security every second of the day. New vulnerabilities and new attack 
methodologies are created and distributed as sets of exploit code thru the 
internet. Underground cells of crackers then take these cookie cutter solutions 
and use it to further their peer reverence and sometimes to further a political 
cause.
Link: http://www.alphaque.com/article.php?sid=21


SOCIAL WORKER ADVISES DETENTION FOR MAFIABOY
Hanny Chung, a court-appointed social worker, told a sentencing hearing that 
his lack of remorse meant a "moderate risk" existed he would do it again. "Not 
only is he not taking full responsibility for what he did, he's still trying to justify 
that what he did was right," Chung told Judge Gilles Ouellet. Mafiaboy, who 
can't be identified under Canadian law because of his age, pleaded guilty in 
January to 58 charges related to the attacks and security breaches of sites 
in Canada, the United States, Denmark and South Korea.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.salon.com/tech/wire/2001/06/19/hacker/index.html


(UN)AUTHORIZED ACCESS
"Continuing with our theme of legality online this week, I'll be going over 
(un)authorized access. Specifically, I will be looking at the issue of accessing 
online resources, attempted access, and what people providing restricted 
services should be aware of."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010620.html


KEEPING SECRETS
This is an interview with Michael Jacobs, information assurance director at the 
NSA. "The security side of the development cycle was risk-averse. Now, we've 
got a risk-complex environment [because] we don't have the luxury of time. 
For example, firewalls upgrade every 18 months. So we have to be more agile 
in our approach to dealing with security problems. This has shifted the burden
of security from the developer - us - to the customer."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/story/0,1199,NAV47_STO61396,00.html.html


ULTIMATE IN INTERNET SECURITY OR ANTI-HACKER HYPE?
A security firm headed by a former KGB agent has come under fire for claims 
its forthcoming products provide the ultimate solution to computer security 
problems. Invicta Networks, is developing security products that attempt to 
foil cracking attacks by using constantly changing IP addresses, which it 
claims "has the ability to cloak entire computer networks with a shield that 
makes them invisible and impossible to hack". According to Invicta, this 
means its hardware system protects against both external and internal 
hackers as well as denial of service attacks and computer viruses.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/19814.html


ONLINE SHOPS EXPOSE CUSTOMER ORDER DATA
Several small online shops are exposing their customer order data, including 
credit card numbers, because of improperly installed online shopping cart 
software. Hundreds of unencrypted customer records were viewable Tuesday 
by anyone with a Web browser at a candle-making supply store, a computer 
seller, a music shop and a photographer's gallery, Newsbytes has confirmed. 
The exposed sites are all running a free online shopping cart program called 
DCShop, from Boston-based DC Business Solutions.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/167000.html


KNOW THY ENEMY
Open ports and any unsolicited attempts by your computer to contact the 
Net should always be a cause for concern. Unfortunately, most of us never
really know what our computers are doing.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/anchordesk/stories/story/0,10738,2777057,00.html


SECURE ONLINE BEHAVIOR, PART TWO
This is the second article in a series devoted to introducing readers to secure 
online behaviors. In the first article, we saw how users have come to rely on 
the Internet for exchanging business and personal information, and looked at 
some of the security risks that this might pose. This article will discuss secure 
e-mail behavior by looking at the various threats posed by using e-mail, as 
well as some secure habits that users should take to minimize those risks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/basics/articles/sechabits2.html


NETWORK NEGLIGENCE CREATES SECURITY RISK
Rob Enderle, research fellow at Giga Information Group, said that maintenance 
on user accounts has become an important networking issue. He warned that 
negligence in closing accounts after a user left the company could subject 
corporate networks to the mercy of disgruntled ex-employees, temps or 
contractors. He argued that organisations usually deploy multiple software 
applications, with separate accounts to set-up. After creation, each login 
needs maintenance and closure when users leave the company. But the 
complexity of account maintenance process was prone to create 'orphan 
accounts', which remained open even though users had left.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.vnunet.com/News/1123341


PERFORMANCE CO-PILOT FIXED PACKAGES
Performance Co-Pilot (version 2.2.1-3) is now available. This version contains 
fixes for the recent security issues uncovered against the earlier 2.2.0-18 
release. New source and binary RPMs are available from SGI.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://oss.sgi.com/projects/pcp/download


ECHELON PANEL CALLS IT A DAY
The defining accomplishment of the European Parliament's temporary committee 
on Echelon may be that it is due to close up shop right on schedule, less than 
a year after it began its work. Many will remember the committee for backing 
off from accusing the United States of using the alleged satellite-based 
surveillance system for industrial espionage, as many of the committee's 36 
members clearly believe it did.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/politics/0,1283,44721,00.html


PHREAKERS HIT GEORGIA COMPANY
They used a Covington company's toll-free line to run up $89,911.80 in 
overseas calls. Now, it's a question of who pays the bill. Officials of the 
Covington company, Gerri Murphy Realty, say they bear no blame for the 
calls to Pakistan, India, Bangladesh and other spots outside metro Atlanta. 
Finding that the phone line was misused was unpleasant. Finding that the 
company is supposed to pay sent the trio who owns and runs Murphy 
Realty scrambling for lawyer Robert Stansfield.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.thedigest.com/more/129/129-135.html


FULL DISCLOSURE STUDY RESULTS
The goal of this distinction project was to determine the attitudes about 
disclosure practices in the computer security community regarding issues 
surrounding full disclosure. Two hypotheses were tested. First, a majority 
of those in the computer security field support the full disclosure model of 
disseminating vulnerability information and second, attitudes on the full 
disclosure debate will vary across participation in different computer 
security circles. In order to test these hypotheses, opinions from users 
of full disclosure information and computer security practitioners were 
solicited using an on-line survey.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://fisher.osu.edu/people/goens_1/results.htm


CALIFORNIA INDICTMENT IN RUSSIAN HACKS
A Russian computer programmer imprisoned in the U.S. on charges that he 
perpetrated a cyber crime spree of extortion and credit card fraud was 
indicted in California - adding the Golden State to a growing list of destinations 
on the accused hacker's whirlwind tour of U.S. detention centers. Alexey V. 
Ivanov, 20, was slammed with fifteen counts of computer fraud and extortion 
for the Southern California portion of a string of financially-motivated attacks 
on e-commerce companies and small financial institutions, aimed at stealing 
credit card numbers and consumer information, and strong-arming companies 
into paying protection money.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/news/219


CIA CAN'T COMPETE WITH HACKERS
The CIA cannot predict computer attacks on U.S. systems before they happen,
as the agency is expected to do with political and military events, a top CIA 
official told Congress on Thursday. Despite a major increase in intelligence 
efforts dedicated to computer security, attackers still develop new tools and 
techniques faster than the CIA can keep up, Lawrence K. Gershwin said. Often, 
"we end up detecting it after it's happened," said Gershwin, the CIA's top 
adviser on science and technology issues. "I don't feel very good about our 
ability to anticipate."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://cbsnews.com/now/story/0,1597,297811-412,00.shtml


INTRODUCTION TO IPv6
This article discusses features of IPv6: bigger address space, support for 
mobile devices, and built-in security. It also shows some of the changes 
from IPv4 to IPv6.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.onlamp.com/pub/a/onlamp/2001/05/24/ipv6_tutorial.html


GIBSON POSTS LIST OF ATTACK SITES
After weathering seven denial of service attacks in a little over one month, 
Steve Gibson has decided to name names. He has successfully logged the 
addresses of 195 machines that were used by the attackers to flood GRC.com 
with data. In a move designed both to prod the operators into patching their 
systems, and to cut the legs out from under his attackers, Gibson has posted 
a list of the machines at his site.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newsbytes.com/news/01/167145.html


WEB SECURITY LAPSE PUTS WHICH? IN DOCK
Naming and shaming is all in a day's work for the Consumers' Assocation, but 
friday it had to name and shame itself. It had to warn more than 2,700 
people who had bought Which? TaxCalc software from its website that their 
financial details had been available on the internet and could have fallen in to 
the wrong hands. The program helps with self-assessment tax forms. The 
association has advised the customers to cancel the cards used, to head 
off fraud.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.guardianunlimited.co.uk/internetnews/story/0,7369,511452,00.html


E-COMMERCE FEARS? GOOD REASONS
The little lock icon that appears in your Web browser's window is supposed to 
prove you are engaging in a safe transaction. But it may be nothing more than 
a visual placebo. The icon is intended to indicate that information is being 
encrypted as it moves from your computer to the e-commerce site's computer. 
But complete and uncrackable encryption of outgoing and incoming information 
may not always take place every time the lock appears on your computer's 
screen. And safe arrival at the site's servers doesn't guarantee your information 
is safe forever. Experts say that once the data arrives at the e-commerce site, 
it's often stored decrypted on the site's servers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/ebiz/0,1272,44690,00.html


STARTUPS AIM TO PREVENT DoS ATTACKS
With more than $100m in venture funding, four startups aim to combat DoS 
network attacks, which by some estimates total more than 4000 a week. 
Arbor Networks, Asta Networks, Lancope Technologies and Mazu Networks 
are attempting to automate the response to DoS attacks which still require 
the co-operation of the major internet service providers as most DoS attacks 
cannot be traced.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://webserv.vnunet.com/News/1123388

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

REMOTE BUFFER OVERFLOW IN MICROSOFT IIS
There exists a remote buffer overflow vulnerability in all versions of Microsoft 
Internet Information Services (IIS) Web server software. The vulnerability lies 
within the code that allows a Web server to interact with Microsoft Indexing 
Service functionality. The vulnerable Indexing Service ISAPI filter is installed 
by default on all versions of IIS. The problem lies in the fact that the .ida 
(Indexing Service) ISAPI filter does not perform proper "bounds checking" on 
user inputted buffers and therefore is susceptible to a buffer overflow attack.
Link: http://www.net-security.org/text/bugs/992957789,83405,.shtml


MULTIPLE VULNERABILITIES IN AMLSERVER
AMLServer's "Webpaging" http interface is susceptible to a directory traversal 
attack. Adding the string "../" to a URL allows an attacker access to files 
outside of the webserver's publishing directory. This allows read access to 
any file on the server. A second problem is found in the file pUser.Dat. All 
username/password combinations applicable to the various services provided 
by AMLServer are stored in this file in plaintext. The mentioned userfile is 
stored in the server's main directory. The exact location can be obtained 
exploiting another problem in the web interface, a path disclosure bug. The 
http-header field 'Location' contains the full path to servermaindir/Messages.
Link: http://www.net-security.org/text/bugs/992958480,13379,.shtml


SECURITY VULNERABILITY IN CISCO TFTPD SERVER 1.1
TFTPD is vulnerable to some kind of primitve directory transversal attack 
which allows a remote user to obtain any file from the target system.
Link: http://www.net-security.org/text/bugs/992958565,61005,.shtml


DCSHOP SECURITY VULNERABILITY
The issue does not show up on properly configured servers, i.e. where the 
"Everyone"-group has "Full Access" to the CGI-BIN or sub-folders.
Link: http://www.net-security.org/text/bugs/992958636,8903,.shtml


CONECTIVA LINUX SECURITY ANNOUNCEMENT - FETCHMAIL
Fetchmail would segfault when receiving emails with large "To:" headers. This 
was due to a buffer overflow in the header parser and it could be exploited 
remotely.
Link: http://www.net-security.org/text/bugs/993038284,68116,.shtml


SURGEFTP VULNERABILITIES
1.) A simple directory transversal bug allows listing of normaly unaccessable files
2.) FTP allows anybody to DOS the machine with a well known con/con attack.
Link: http://www.net-security.org/text/bugs/993038307,52537,.shtml


MANDRAKE LINUX SECURITY - KDELIBS UPDATE
A problem exists with the kdesu component of kdelibs. It created a world
readable temporary file to exchange authentication information and delete 
it shortly after. This can be abused by a local user to gain access to the X 
server and could result in a compromise of the account that kdesu would 
access.
Link: http://www.net-security.org/text/bugs/993038396,68436,.shtml


RED HAT LINUX LOCALLY EXPLOITABLE FORMAT STRING
A format string vulnerability exists in the batch SMTP processing code, which 
is triggered by any SMTP response that includes a part of its SMTP command.
Link: http://www.net-security.org/text/bugs/993125773,14203,.shtml


W3M MALFORMED MIME HEADER BUFFER OVERFLOW
w3m, a text file/Web browser which is similar to lynx, has a buffer overflow 
vulnerability in a routine to parse MIME header. If a user retrieves/downloads 
a malformed Web page with w3m, a malicious Web server administrator may 
gain an escalated privilege from the w3m user, which is run by w3m remotely.
Link: http://www.net-security.org/text/bugs/993125802,52251,.shtml


CONECTIVA - TWO SECURITY FIXES FOR XINETD
"xinetd" is an alternative to the inetd superserver. zen-parse reported on 
Bugtraq a remote buffer overflow vulnerability in xinetd that could be used 
by a remote attacker to execute arbitrary commands on the server with 
root privileges. Another vulnerability that has been corrected with this release 
is the umask setting, which previous versions were configuring to zero. With 
the umask set to zero, applications started by xinetd could inadvertently 
create world writable files if they did not check this setting before.
Link: http://www.net-security.org/text/bugs/993125833,6282,.shtml


MULTIPLE VENDOR 802.11B ACCESS POINT SNMP FLAW
ISS X-Force has discovered a serious flaw in the authentication mechanism of 
the Atmel VNET-B Simple Network Management Protocol (SNMP) implementation. 
Atmel devices are provided via Original Equipment Manufacturer (OEM) agreements 
to Netgear and Linksys. These devices do not implement any SNMP security 
measures, which may allow an attacker to gain access to or control a wireless 
LAN (WLAN).
Link: http://www.net-security.org/text/bugs/993126131,21102,.shtml


EPERL ALLOWS THE USER TO EMBED PERL CODE
ePerl allows the user to embed perl code (specified inside ePerl delimiters) in 
HTML. ePerl has the ability to "safely" include untrusted files using the #sinclude 
directive. The untrusted file is not supposed to be able to specify any perl code 
to run, but this safe mode can easily be circumvented. The #sinclude directive 
operates by replacing the ePerl delimiters on the untrusted file so that they are 
ignored during parsing. The problem is that it still follows the preprocessing 
directives, so the untrusted file can then include another file while not in 
safe mode.
Link: http://www.net-security.org/text/bugs/993221840,96404,.shtml


KAV (AVP) FOR SENDMAIL FORMAT STRING BUG
While testing this software by permission of Kaspersky Lab, format string bug 
was found in syslog() call in avpkeeper
/usr/local/share/AVP/avpkeeper/avpkeeper
utility, which is launched from sendmail to scan and desinfect messages.
Link: http://www.net-security.org/text/bugs/993222097,77121,.shtml


CERBERUS FTP SERVER 1.X REMOTE DOS ATTACK
Cartel security team has found a buffer overflow in the Cerberus FTP server, 
which means that an attacker can execute a denial of service attack against 
it.This attack will crash the server, without any error. FTP service is then 
unavailable.
Link: http://www.net-security.org/text/bugs/993222237,68606,.shtml


A-FTP ANONYMOUS FTP SERVER REMOTE DOS ATTACK VULNERABILITY 
Cartel security team has found a buffer overflow in the A-FTP anonymous FTP 
server, which means that an attacker can execute a denial of service attack 
against it. Once the big buffer has been sent, the server is vulnerable. Only 
one more connection is needed to make the FTP service unavailable.
Link: http://www.net-security.org/text/bugs/993222306,99442,.shtml

----------------------------------------------------------------------------





Security world
--------------

All press releases are located at:
http://net-security.org/text/press


----------------------------------------------------------------------------

BASTILLE LINUX RELEASES VERSION 1.2 - [18.06.2001]

The Bastille Linux development team today announced the release of Bastille 
Linux 1.2, a hardening script for multiple Linux distributions. With this release, 
Bastille Linux delivers on the full promise of simplified, automated security 
administration for Linux systems.

Press release:
< http://www.net-security.org/text/press/992862006,86386,.shtml >

----------------------------------------------------------------------------

MANAGED SECURITY SERVICES PORTAL BY LURHQ - [18.06.2001]

LURHQ Corporation announced the release of the Managed Security Services 
Portal, a technology that allows the customer to co-manage and monitor their 
information security infrastructure. The Managed Security Services Portal 
provides a consolidated interface to LURHQ's Managed Firewall, Intrusion 
Detection, Anti-virus, and SherlockESM (enterprise security monitoring) 
customers.

Press release:
< http://www.net-security.org/text/press/992862138,82967,.shtml >

----------------------------------------------------------------------------

NAI EXPANDS GAUNTLET FIREWALL 6.0 - [18.06.2001]

PGP Security, a division of Network Associates, announced that it has expanded 
Gauntlet Firewall 6.0 and virtual private networking (VPN) software support to 
include the 64-bit Solaris 8 Operating Environment (Solaris OE) from Sun 
Microsystems. This makes PGP Security, with its Gauntlet 6.0 product, one of 
the first major firewall application providers to fully support the Solaris OE on all 
of Sun's hardware platforms, including the recently introduced Netra T1 and X1 
thin servers and the UltraSPARC(TM) III based servers.

Press release:
< http://www.net-security.org/text/press/992862401,65792,.shtml >

----------------------------------------------------------------------------

SECUREINFO CORP. EXPANDS SECURETRAINING INSTITUTE - [18.06.2001]

SecureInfo Corporation has expanded its business operations to include the 
newly formed SecureTraining Institute which has added an additional 3000 
feet of classroom space and new offices to SecureInfo Corp.'s current 
location in the Koger Center.

Press release:
< http://www.net-security.org/text/press/992862692,65353,.shtml >

----------------------------------------------------------------------------

WATCHGUARD ANNOUNCED LIVESECURITY SERVICE GOLD - [18.06.2001]

WatchGuard Technologies, Inc., a leader in Internet security solutions, 
announced LiveSecurity Service Gold, a premium support package that 
helps administrators quickly and easily deploy large scale, multi-site 
Virtual Private Networks. LiveSecurity reduces the complexity of managing 
Internet security by integrating customer support with value-added 
customer care services that help administrators safeguard their network 
against evolving threats.

Press release:
< http://www.net-security.org/text/press/992862901,82296,.shtml >

----------------------------------------------------------------------------

SURFCONTROL'S SUPERSCOUT GETS 5 STAR FROM SC MAG - [19.06.2001]

SurfControl, The Internet Filtering Company, announced today that SC Magazine 
has awarded its SuperScout Web Filter an overall rating of five stars in its June 
Market Survey of various security related hardware and software products.
SuperScout Web Filter, a software solution that enhances employee productivity, 
optimizes bandwidth and reduces legal liability, earned the highest five star 
ranking for its features, performance and ease of use among others.

Press release:
< http://www.net-security.org/text/press/992958804,3720,.shtml >

----------------------------------------------------------------------------

ICSA LABS ANNOUNCES NIDS CERTIFICATION - [19.06.2001]

TruSecure Corporation, the leader in information security assurance, announced 
that its ICSA Labs division will offer the industry's first and only continuously 
deployed testing and certification program for Network Intrusion Detection 
Systems (NIDS) to test the functionality and compliance of intrusion detection 
products. The NIDS Certification Program offers an independent and 
comprehensive process that vigorously tests, assesses and validates the 
security of intrusion detection systems relied upon by corporations and 
public entities.

Press release:
< http://www.net-security.org/text/press/992959084,73052,.shtml >

----------------------------------------------------------------------------

SECURITY BIOMETRICS ACQUIRES NETFACE LLC - [20.06.2001]

Security Biometrics Inc. announced today that the Company has signed an 
agreement to acquire 100% of NetFace LLC for 20 million Security Biometrics 
Inc.'s common shares. NetFace holds the exclusive option to license DSI 
Datotech, Inc.'s Gesture Recognition Technology specific for video gaming and 
Internet/Interactive TV markets. Through its exercise of this license, NetFace 
has the first "right of refusal" on the development of other GRT horizontal
markets.

Press release:
< http://www.net-security.org/text/press/993038646,41062,.shtml >

----------------------------------------------------------------------------

SYGATE SECURE ENTERPRISE 2.0 RELEASED - [20.06.2001]

Sygate Technologies, the leader in securing the remote enterprise, unveiled a 
new version of its flagship product suite, enabling IT professionals to successfully 
defend their organizations from a new generation of stealthy viruses. These 
emerging corporate security threats have the power to fool traditional defenses 
by changing the way they look several times a day, or masquerading as known 
computer programs. They prey on the unprotected machines of remote workers 
and mobile professionals to gain access to corporate data centers via existing 
VPN and wireless communications, giving hackers unrestricted access to valuable 
databases and files.

Press release:
< http://www.net-security.org/text/press/993038820,2135,.shtml >

----------------------------------------------------------------------------

MAX. 6 MONTH TO AUTHOR OF KOURNIKOVA WORM - [21.06.2001]

The suspected author of the infamous Anna Kournikova worm is to face 
prosecution in the Netherlands. Jan de Wit is suspected of being "OnTheFly", 
the author of the Kournikova worm. It is alleged that he identified himself as 
the worm's creator after it infected thousands of computers across the globe 
in February. De Wit is due to appear in court on September 12th charged with 
spreading information via a computer network with the intention of causing 
damage. According to Dutch authorities the maximum sentence he could 
receive is either 6 months imprisonment or a fine of 100,000 guilders, 
equivalent to over �27,000.

Press release:
< http://www.net-security.org/text/press/993122455,25589,.shtml >

----------------------------------------------------------------------------

11TH ANNUAL VIRUS BULLETIN CONFERENCE IN PRAGUE - [21.06.2001]

Virus Bulletin today announces that the 11th annual Virus Bulletin international 
conference and exhibition will be held at the Hilton, Prague on Thursday 27th 
and Friday 28th September 2001. VB2001 is the only event to focus exclusively 
on the threat of viruses and includes an exhibition and conference programme.

Press release:
< http://www.net-security.org/text/press/993126494,65876,.shtml >

----------------------------------------------------------------------------




Featured products
-------------------

The HNS Security Database is located at:
http://www.security-db.com

Submissions for the database can be sent to: staff@net-security.org


----------------------------------------------------------------------------

NET-COMMANDO 2000 LITE

Net-Commando 2000 Lite is a High-grade Hacker Protection/Prevention, Trojan 
Horse virus Detection/Prevention/Removal, it is a cut-down version of its bigger 
brother - Net-Commando 2000. It provides uses technology from Net-Commando 
2000 to rank itself a Quality Hacker Protection and Trojan Horse virus Detection 
Systems.

Read more:
< http://www.security-db.com/product.php?id=599 >

This is a product of Delta Design UK, for more information:
< http://www.security-db.com/info.php?id=130 >

----------------------------------------------------------------------------

DIRECTORYSMART

DirectorySmart, is a proven platform for securing Web applications and defining, 
enforcing and delegating e-business security policies across complex business 
relationships. By integrating role-based policy management, Web access control 
and delegated authority into one comprehensive and easy-to-deploy product, 
DirectorySmart enables companies to bring their e-business initiatives to market 
quickly and scale to millions of users without incremental costs.

Read more:
< http://www.security-db.com/product.php?id=765 >

This is a product of OpenNetwork Technologies, for more information:
< http://www.security-db.com/info.php?id=176 >

----------------------------------------------------------------------------

BV-CONTROL FOR UNIX

As BindView's premier security solution, bv-Control for UNIX ensures the safety 
and reliability of UNIX systems. From comprehensive security assessments to 
routine disk space analysis, bv-Control for UNIX delivers the information 
necessary to efficiently secure and maintain optimal network service levels. 
bv-Control's superior reporting capabilities are flexible and easy-to-use, 
allowing security administrators to quickly pinpoint and close security risks - 
improving enterprise security and productivity.

Read more:
< http://www.security-db.com/product.php?id=577 >

This is a product of BindView, for more information:
< http://www.security-db.com/info.php?id=29 >

----------------------------------------------------------------------------




Featured article
----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org


----------------------------------------------------------------------------

ANONYMIZED? SAFE WEB? NOT YET. by Alexander K. Yezhov

Just a couple of words about the JavaScript filtering problems I've discovered 
recently. You could see my posts to bugraq or some reprinted versions 
somewhere. I bet almost everyone knows the Anonymizer service. It's a good 
tool that lets you stay anonymous surfing the web. Moreover, it blocks the 
JavaScript code placed on the web pages. The problem is that it just comments 
scripts instead of cutting them out. On the one hand it's good since you can 
look at the original JavaScript code if you want. On the other hand this 
commenting has some disadvantages.

Read more:
< http://www.net-security.org/text/articles/anonymized.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[18.06.2001]

Original: http://www.kenwood.cd/
Defaced: http://defaced.alldas.de/mirror/2001/06/18/www.kenwood.cd/
OS: Windows

Original: http://www.hackerwatch.org/
Defaced: http://defaced.alldas.de/mirror/2001/06/18/www.hackerwatch.org/
OS: Windows

Original: http://www.parliament.ru/
Defaced: http://defaced.alldas.de/mirror/2001/06/18/www.parliament.ru/
OS: Windows


[19.06.2001]

Original: http://www.interface.microsoft.co.za/
Defaced: http://defaced.alldas.de/mirror/2001/06/19/www.interface.microsoft.co.za/
OS: Windows

Original: http://www.bentleyslondon.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/19/www.bentleyslondon.com/
OS: Windows

Original: http://www.governor.state.tx.us/
Defaced: http://defaced.alldas.de/mirror/2001/06/19/www.governor.state.tx.us/
OS: Windows


[20.06.2001]

Original: http://www.artmuseum.net/
Defaced: http://defaced.alldas.de/mirror/2001/06/20/www.artmuseum.net/
OS: Windows

Original: http://www2.saude.sp.gov.br/
Defaced: http://defaced.alldas.de/mirror/2001/06/20/www2.saude.sp.gov.br/
OS: Windows


[21.06.2001]

Original: http://arulk.rte.microsoft.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/21/arulk.rte.microsoft.com/
OS: Windows

Original: http://feeds.mobile.msn.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/21/feeds.mobile.msn.com/
OS: Windows

Original: http://redsand.rte.microsoft.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/21/redsand.rte.microsoft.com/
OS: Windows


[22.06.2001]

Original: http://atwnt368.external.hp.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/22/atwnt368.external.hp.com/
OS: Windows

Original: http://service-asc.sel.sony.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/22/service-asc.sel.sony.com/
OS: Windows

Original: http://webcfeedback.msn.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/22/webcfeedback.msn.com/
OS: Windows


[23.06.2001]

Original: http://booksrv2.raleigh.ibm.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/23/booksrv2.raleigh.ibm.com/
OS: Windows

Original: http://www.x.org/
Defaced: http://defaced.alldas.de/mirror/2001/06/23/www.X.Org/
OS: Windows

Original: http://www.ericsson.co.ma/
Defaced: http://defaced.alldas.de/mirror/2001/06/23/www.ericsson.co.ma/
OS: Windows

Original: http://ecs08.external.hp.com/
Defaced: http://defaced.alldas.de/mirror/2001/06/23/ecs08.external.hp.com/
OS: Windows

Original: http://www.netbsd.hu/
Defaced: http://defaced.alldas.de/mirror/2001/06/23/www.netbsd.hu/
OS: Windows


[24.06.2001]

Original: http://www.fiat.ch/
Defaced: http://defaced.alldas.de/mirror/2001/06/24/www.fiat.ch/
OS: Windows

Original: http://www.lancia.ch/
Defaced: http://defaced.alldas.de/mirror/2001/06/24/www.lancia.ch/
OS: Windows

Original: http://www.schmidt.de/
Defaced: http://defaced.alldas.de/mirror/2001/06/24/www.schmidt.de/
OS: Windows

Original: http://www.police.york.on.ca/
Defaced: http://defaced.alldas.de/mirror/2001/06/24/www.police.york.on.ca/
OS: Windows

----------------------------------------------------------------------------

========================================================
Help Net Security T-Shirt available
========================================================
Thanks to our affiliate Jinx Hackwear we are offering you the opportunity 
to wear a nifty HNS shirt :) The image speaks for itself so follow the link 
and get yourself one, summer is just around the corner.
Get one here: http://207.21.213.175:8000/ss?click&jinx&3af04db0
========================================================

Questions, contributions, comments or ideas go to:
 
Help Net Security staff
 
staff@net-security.org
http://net-security.org
http://security-db.com