💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › HNS › issue057.… captured on 2022-01-08 at 15:57:57.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

HNS Newsletter
Issue 57 -01.04.2001
http://net-security.org
http://security-db.com

This is a newsletter delivered to you by Help Net Security. It covers weekly 
roundups of security events that were in the news the past week. Visit Help 
Net Security for the latest security news - http://www.net-security.org.

Subscribe to this weekly digest on:
http://www.net-security.org/text/newsletter

Archive of the newsletter in TXT and PDF format is available here:
http://www.net-security.org/news/archive/newsletter

Current subscriber count to this digest: 2139

Table of contents:
 
1) General security news
2) Security issues
3) Security world
4) Featured articles
5) Security software
6) Defaced archives



General security news
---------------------
 
----------------------------------------------------------------------------

COMPANIES SEND EMPLOYEES TO 'HACKER' WORKSHOPS
The best way to keep a hacker from breaking into a computer system from the 
outside may just be to have a hacker on the inside. That's what John Brozycki 
and Darien Ford's company figured when it paid $7,000 so they could learn to 
think like a computer interloper. "Ultimate Hacking: Hands On," a four-day 
course in Manhattan, gives them a legitimate opportunity to hack their way 
into computer systems. When they return to their regular jobs, keeping the 
network secure at a credit union in upstate New York, they'll be much better 
equipped. "You feel more confident, seeing how many of the exploits are 
done," Brozycki says, surrounded by fellow techies in a hotel conference 
room. "Once you see how they're done, you know how to prevent them."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.nandotimes.com/technology/story/0,1643,500467285-500714392-503919024-0,00.html


UNCOVERING THE SECRETS OF SE LINUX: PART 2
In an uncharacteristic move, the U.S. National Security Agency recently 
released a security-enhanced version of Linux - code and all - to the open 
source community. Part 2 of this developerWorks exclusive delves deeper 
into the code, dissecting how the security_av is computed and examining 
how other SE Linux security features are invoked.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www-106.ibm.com/developerworks/linux/library/s-selinux2/index.html


FIREWALLS GO GIGABIT
In an attempt to put load-balancing vendors out of business, both Cisco and 
CyberGuard Corp. have upped the bandwidth ante by building mind-numbing 
throughput and performance into new enterprise-level firewalls. Engineered 
to handle the new wave of high-speed links, both products rise to the task 
with multiple Ethernet, Fast Ethernet and Gigabit Ethernet interfaces, 
preventing you from using "the firewall is my bottleneck" as an excuse. 
Both rack-mountable firewalls come with fail-safe features and various 
fault-tolerance levels. While they share many of the same capabilities, 
they differ in ease of configuration, management and performance.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.internetweek.com/reviews01/rev032601.htm


MACNN REVIEW: NORTON PERSONAL FIREWALL
In an effort to boost its already strong standing in the field of Macintosh 
utilities, Symantec last year licensed Open Door Networks' DoorStop software 
firewall utility, resulting in the creation of Norton Personal Firewall. With the 
number of broadband Internet connections (which are typically more susceptible 
to hacking than dial-up connections) increasing daily, as well as the number of 
intrusions into networks, Symantec is positioning Norton Personal Firewall as the 
utility of choice for Mac users looking for increased security with their Internet 
connection, and in doing so is going head-to-head with Intego's already 
established NetBarrier.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://reviews.macnn.com/reviews/nortonpersonalfirewall/nortonpersonalfirewall.phtml


LION VIRUS: HOW TO DETECT AND PREVENT
William Stearns, of the Institute for Security Technology Studies, has written 
a script called Lionfind to detect Lion. There is no removal program as yet. As 
prevention, users of BIND 4.9.8 and 8.2.3 distributions should download the 
latest patch from ISC. Users of the BIND 9.1 distribution should download 
this update.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/12/ns-21832.html


'UNIVERSAL' KEY CLAIMED TO DISABLE MS OFFICE XP SECURITY
"Microsoft's vaunted Product Activation protection technology may not have 
been fully implemented in Office XP after all. Product keys claimed to be 
"universal" have been circulating on the Web for some weeks now, and a 
WinXP beta tester's newsgroup posting forwarded to The Register suggests 
that use of one of these keys circumvents the activation process. It is not 
at the moment possible to verify this completely. Warez copies of code 
claimed to Office XP "final" reportedly run without requiring activation if 
one of the keys is used, but those keys can't be said to be definitely 
universal until such time as they can be tested on production copies 
of Office XP sold at retail."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/4/17869.html


NOT ENOUGH PROTECTION
A majority (60%) of Canadians feel not enough is being done to protect 
Internet consumers against cyber crime, and over half (52%) feel threatened 
or concerned by this activity, a new poll released by EDS Canada indicates.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.newswire.ca/releases/March2001/26/c6703.html


UN TO DEVISE STRATEGY FOR GLOBAL E-SECURITY
Delegates from the United Nations' 189 member countries this week will meet 
with representatives from the U.S. high-tech industry to devise new strategies 
for dealing with Internet crime and global e-commerce security requirements. 
However, to ensure a coherent global strategy, world leaders must be better 
educated about the need for global security standards and the threat that 
cybercrime poses to the global economy, said Percy Mangoaela, the UN 
ambassador from Lesotho.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.computerworld.com/cwi/stories/0,1199,NAV47-68-84-88_STO58959,00.html


HACKERS CLAIM DOUBLECLICK SECURITY HOLES
Data-collection company DoubleClick returned to the privacy spotlight 
after a French Web site uncovered evidence indicating several of the 
company's servers had security holes and may have been breached.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://news.cnet.com/news/0-1003-200-5252461.html


PRIVACY GROUP CRITICIZES TIVO FOR COLLECTING INFO
The leading TV recording service has collected information about viewers - 
programs watched or recorded, remote control buttons pushed - without 
adequately informing them, a research group says. The Privacy Foundation 
was warning about the practice in a report Monday on the personalized TV 
system, which makes it easier for consumers to record and watch their 
favorite programs. Analysts expect 14 million people to be using such 
video recorders by 2004.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/industry/03/26/tv.privacy.ap/index.html


HACKER NATION
Computer intrusions have more than tripled in the last two years. Who are the 
people trying to get their hands on your data, and why? We got answers from 
some experts - including hackers themselves.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.pcworld.com/features/article/0,aid,44544,00.asp


LESSONS IN LAPTOP SECURITY
The laptop is not only a teleworker's power tool. It's a thief magnet. Securing 
confidential or proprietary data when you're on the road or you work beyond 
the enterprise is a pressing issue. Think this is someone else's problem? Think 
again. In the U.S. in 1999, 319,000 notebook computers and 27,000 desktop 
computers valued at close to $1 billion were stolen, according to Safeware, 
the Columbus, Ohio computer insurance agency.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.nwfusion.com/net.worker/columnists/2001/0326zbar.html


HACKING DANGER GROWS IN AUSTRALIA
Australia has experienced an increase in hacker attacks, with 22 web page 
defacements this year alone (?), according to Ernst & Young eRisk Solutions 
principal Eric Keser.
Link: http://finance.news.com.au/common/story_page/0,4057,1838561%255E462,00.html


ANTIGEN FOR LOTUS NOTES
Antigen is the anti-virus solution specifically designed to meet the security 
needs of Lotus Notes users. It detects and removes viruses, including Notes
based viruses-before they reach mission-critical applications, and without 
compromising the integrity of your groupware servers.
Link: http://www.security-db.com/product.php?id=46&cid=10


HOW TO AVOID GIVING FREE INFORMATION TO ATTACKERS
This paper by Richard Bartley of Xinetica Ltd. explores techniques for the 
exploitation of corporate information that attackers may use to attack an 
organization. It focuses on what strategies an organization can implement 
to minimize the unnecessary disclosure of potentially dangerous information.
Link: http://www.securityfocus.com/templates/forum_message.html?forum=2&head=5144&id=5144


COMPARISON OF CLIENT METHODS TO BLOCK SPAM
"How do people deal with spam? While there are methods to address UCE at 
the server, legal, and mail client levels, the individual has only one way to 
deal with spam: through their mail client software. In this article, I will 
introduce various means of combatting junk email."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.unixreview.com/administration/articles/0103wa.shtml


SAMBA NT DOMAIN CONTROLLER
Currently, Samba can go beyond merely emulating Windows shares to actually 
acting as the Primary Domain Controller for your Windows network. Of course, 
Samba can also become a NT domain member. In this article we shall look at 
both these options.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.freeos.com/articles/3842/


ENCRYPTING AN ACCESS DATABASE
You might feel discouraged and ask yourself, "Why bother with security?" Do 
not despair! Fortunately, Access enables you to encrypt a database. The 
encryption process renders the data in the database indecipherable from data 
in word processors, disk utilities, and other products capable of reading text. 
When a database is encrypted, no one can decipher any of its data.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://softwaredev.earthweb.com/devtools/article/0,,12061_724731,00.html


REMOTE USERS NEED FIREWALLS TOO
Last December, a bank in Southern California received a call from an online 
customer asking why one of the bank's computers was trying to hack into 
his system. It turned out that the machine doing the hacking belonged to 
the bank's president and had been remotely commandeered by an employee. 
The president called Conqwest Inc., an IT security services firm, which is 
now rolling out firewall software across the bank's 125 internal desktop, 
laptop and remote computers. Until recently, companies thought antivirus 
and VPN technologies would keep remote worker connections safe. But as 
more workers have been accessing the Internet through broadband services 
such as cable modems, exposure to hacking attacks through those machines 
has increased.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.itworld.com/Sec/2211/CWD010326firewalls/


EMAIL FILTERING: THE REAL DEAL
"Email is probably my favorite Internet related service. It's also the one that 
causes me the most problems, with regard to security. People cannot live 
without email anymore. Email is probably the most convenient form of 
communication for most of us. It's an easy way to figure out whether the 
person you want to phone in Australia is awake or not. Email also allows us 
to easily send files, from simple text documents to spreadsheets - images 
to video clips. There are extremely few companies and organizations in the 
world that have an Internet connection but do not use email. Because of 
this, most Internet spam is now delivered by email, and more importantly, 
most viruses are now spread via email."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/closet/closet20010328.html


A VIRUS THAT LEAPS PLATFORMS
A security company has identified what is believed to be the first virus with 
cross-platform abilities - it can infect both Windows and Linux operating 
systems. W32.Winux is not affecting many computers, nor is it apt to 
spread quickly, as people do not tend to share executable programs 
between machines running Linux operating systems and machines running 
Windows operating systems. Also called "Linux.Winux," W32.Winux is a non
memory resident virus. It can replicate under Windows 95/98/Me/NT/2000
and Linux operating systems and it infects EXE (Windows executable) and 
ELF files (Linux executable). The infection method is not sophisticated. The 
virus overwrites the ". reloc" section of Windows executable files. If the 
.reloc section size is not large enough to hold the virus body, the file is 
not infected. It does not destroy data but can impact an infected 
machine's performance due to the background activity of the virus.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://wired.lycos.com/news/technology/0,1282,42672,00.html


SECURITY BREACHES IN IT DIVISIONS
More than 35% of IT departments have experienced unauthorised access to 
computer systems, with half of the incidents made up of internal breaches, 
a survey has found.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://it.mycareer.com.au/networking/20010328/A32550-2001Mar28.html


SECURITY SOLUTIONS IN THE REAL WORLD
The most secure computer system is the one that's unplugged and buried 10 
feet underground, according to security expert Paul Raines. But there are 
specific steps a company can take to reduce security threats to their live 
systems - whether from external hackers or disgruntled IT workers. Raines, 
head of global information risk management for Barclays Capital, laid out 
those steps to security professionals here at the eSecurity Conference & 
Exposition in his session entitled, "Security In the Real World."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.networkweek.com/wire/story/TWB20010328S0007


EXPERTS DEBATE SEVERITY OF 'WINUX' VIRUSS
Even though there have been no reported cases of infection by the virus - 
which is incapable of spreading itself via the Internet or e-mail - some anti-
virus vendors hailed the program, known variously as "Winux" and "Lindose," 
as marking the beginning of a new era of virus writing. "It's only interesting 
in the sense that it shows virus writers are becoming more interested in 
Linux," said Graham Cluley, senior technology consultant at Sophos Inc., 
a British anti-virus vendor with U.S. headquarters in Wakefield, Mass. "It's 
very simple and not likely to spread on any big scale. Its real effect is 
wasting people's time."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.com/eweek/stories/general/0,11011,2702054,00.html


CHECK POINT FIREWALL-1 ON LINUX, PART THREE
This is the third and final article in a series devoted to the exploration of 
Check Point Firewall-1 for Linux. In the first article we discussed single 
and multisystem installation and post-installation tasks. The second article 
explored Firewall-1 concepts such as network objects, firewall rules, address 
translation rules, and NAT, as well as features and limitations of Firewall-1. In 
this installment, we will go over aspects of Firewall-1 such as file and directory 
layout, rulesets, migrating existing Firewall-1 installations to Linux, and backup 
and standby configurations.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.securityfocus.com/focus/linux/articles/checkpoint3.html


SUEXEC KEEPS YOU IN CONTROL OF YOUR SYSTEMS
One of the biggest problems for both Web hosting providers and clients is 
server security. How do you provide a flexible server environment for the 
client while maintaining some level of security? In this article, Jamie Wilson 
explains how the Apache Web server and the suEXEC module make that 
possible.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.unixinsider.com/unixinsideronline/swol-03-2001/swol-0323-suexec.html


GETTING STARTED WITH NETWORKING FOR LINUX
Josh Boudreau writes a great tutorial on setting up a network with Linux, all 
the way from the various networking layers to running telnet and ftp on your 
Local Area Network (LAN).
Link: http://www.linux.com/firststep/newsitem.phtml?sid=1&aid=11991


REVIEWING YOUR X WINDOW SECURITY
"In this article we've shown you how insecure X communication can be and 
what to do in order to provide safe X client-server communication. Depending 
on the level of security you need to implement, use xhost, xauth or Secure 
RPC X authentication methods. But no matter what, make sure you implement 
some form of security. Protect your own X server!"
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.elementkjournals.com/sun/0104/sun0141.htm


WELSH HACKER FACES JAIL SENTENCE
A hacker who was tracked down to his home in a tiny village in Wales has 
admitted to hacking into websites between February and March last year 
for his own gain and may now face a jail sentence. In a pre-trial hearing 
in court yesterday, 19-year-old computer science student Raphael Gray 
admitted hacking into the websites of companies such as nettrading, 
salesgate, feelgoodfalls, mostorefront, albionsmo and the American 
Society of Clinical Pathologists. He also admitted to stealing credit 
card information from the exploited sites, using the details for his 
own gain and offering to supply them to other criminals.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://thebusiness.vnunet.com/News/1119903


DEVELOPING A SUCCESSFUL INFORMATION SECURITY PROCESS
Part of any organization's information security program for protecting 
enterprise components and the information supporting business functions 
is the risk assessment process implemented and actually followed by that 
organization. Assessment results must provide cost-effective and 
management-approved corrective actions that mitigate potential risks 
down to an acceptable level for network operation and business function.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/risk20010329.html


CONSIDERATIONS OF A FIREWALL: PART 1
If you're upgrading your firewall, or installing one on your network for the first 
time, you'll discover that firewall technology has changed a lot in the last 
several years. How do you select one that's appropriate for your business?
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnetasia.com/biztech/security/story/0%2C2000010816%2C20192642%2C00.htm


THE APRIL FOOLS 2001 BUG IN WINDOWS
There is a time-related bug in Windows. It turns out the bug is going to hit on 
this Sunday (01.04.2001). Applications built with certain versions of Visual C++ 
could start giving the wrong time of day starting on Sunday. The problem will 
last for a week.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://msdn.microsoft.com/visualc/headlines/2001.asp


SUSE: KERNEL BACKDOOR (APRIL FOOL'S JOKE)
Roman Drahtm�ller send this message to the suse-security-announce mailing 
list in regards to an April Fools joke that some people are taking a little bit 
too seriously...
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.linuxsecurity.com/articles/hackscracks_article-2767.html


WAR DRIVING - THE LATEST HACKER FAD
The introduction of wireless networking has spawned a fresh sub-culture in the 
digital underground. It has brought script kiddies out of their bedrooms and onto 
the roads. War dialling, the hacking practice of phoning up every extension of a 
corporate phone network until the number associated with a firm's modem bank 
is hit upon, has been replaced by war driving with the introduction of wireless 
LANS. Our source tell us that war driving, which is apparently particular popular 
in Silicon Valley, involves motoring between likely target firms with a PC fitted 
with a LAN card and trying to break into their networks. Giving the flakey state 
of wireless security models this is normally childishly simple with even basic 
cracking tools.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/17976.html


CEBIT - HACKERS GIVE SIEMENS NET FILTER MOCK 'AWARD'
The German hackers' group Chaos Computer Club (CCC) has presented its 
annual satiric Chaos CeBIT Award, at the CeBIT 2001 trade show, to Siemens 
AG for the company's "SmartFilter" software. The group said it was honoring 
Siemens's "special services" in the area of "Internet censorship and obstacles 
to communication." SmartFilter is a Web filtering tool based on a "control list" 
of Web site categories and blocked sites. The software is implemented on 
Siemens's internal servers, and is also available for sale to external customers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.cnn.com/2001/TECH/industry/03/29/cebit.hackers.award.idg/index.html


THE SECURITY IMPLICATIONS OF OPEN SOURCE SOFTWARE
Natalie Whitlock talks about the incongruence of closed security systems, and 
the open source solution. She discusses Eric Raymond's ideas, the famous "back 
door" in Microsoft's FrontPage, the concept of peer review, and the open source 
dilemma that no one is at the helm guaranteeing that everything will be checked. 
She then follows the idea from theory to practice and talks with leading IT 
executives about the viability and popularity of secure open source systems.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www-106.ibm.com/developerworks/linux/library/l-oss.html


COPS NAB FIRST ITALIAN VIRUS SUSPECT
Italian police have arrested a man suspected of writing the Vierika computer 
virus, similar to the Kournikova virus which overloaded computer systems 
around the world last month. The man is believed to be the first Italian 
charged with virus writing. In a twist, however, Vierika is not believed to 
have caused much damage. Industry experts said the Italian authorities 
appear to be making an example out of the suspect, to discourage other 
virus writers.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.zdnet.co.uk/news/2001/12/ns-21943.html


ENGARDE SECURE LINUX AVAILABLE FOR DOWNLOAD
EnGarde improves the security of existing versions of Linux in critical areas with 
advanced forms of data integrity management and assurance, a complete suite 
of e-business services, intrusion alert capabilities, improved authentication and 
access control utilizing strong cryptography, and complete SSL secure web
based administration capabilities. Users familiar with the history of Linux have 
become accustomed to its stability, versatility, and scalability. Now, with 
EnGarde, Guardian Digital has added unsurpassed security.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.engardelinux.com/announce.html


HACKERS WORSE THAN TERRORISTS - ROBIN COOK
Hackers are a greater threat than terrorists, Foreign Secretary Robin Cook 
reckons. Speaking in Parliament yesterday, he said that a "computer-based 
attack could cripple the nation more quickly than a military strike". Cook 
made the claims in a debate on the work of the intelligence services. But 
where have we heard these claims before? Ah, yes the US National Security 
Agency, whose director Air Force General Michael Hayden said last November: 
"The virtual battlefield has "taken on a dimension within which we will conduct 
operations to ensure American security."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.theregister.co.uk/content/8/17986.html


OPENHACK: DID HE WIN OR NOT?
A hacker is claming that he has won Argus' ballyhooed OpenHack III 
competition by cracking its much-vaunted PitBull security system. Argus 
concedes the crack, but isn't awarding the promised big cash prize. The 
same challenge was offered at the European technology conference CeBit 
this week. This time, one person says he was able to crack the system. 
But he evidently missed the deadline. A hacker calling himself Bladez won't 
receive the $4,250 prize offered by Argus because he says he misunderstood 
what time the competition ended and was under the impression that he had 
a few hours left to work. Bladez said that he is worried that Argus Systems 
will hail the CeBit competition as another success or "will simply stay quiet 
and thrive off their OpenHack coverage. In fact, an Argus Systems 
employee told me there would probably be no press release, though 
it wasn't clear if this was because of my hack or not."
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.wired.com/news/technology/0,1282,42747,00.html


DON'T BE A FOOL
Be sure to update your software and be ready for hoaxes and bugs this April 
Fool's Day! Every year, users fall victim to pranks or malware attacks.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://securityportal.com/articles/fool20010330.html


ENGARDE SECURE LINUX QUICK START
This EnGarde Quick Start guide is designed to help you quickly set up EnGarde 
Secure Linux, change user passwords, and manage certificates. Although this 
document is sufficient, we recommend you read the complete user manual for 
a full understanding of the system. EnGarde Secure Linux comes with an easy 
to use front-end for installing the operating system. Described in the following 
sections are the system requirements to successfully complete the installation 
and run EnGarde Secure Linux.
Link: http://ftp.engardelinux.org/pub/engarde/1.0.1/docs/ESLQuick-1.0.1.pdf


HACKERS: CORPORATE SECURITY STINKS!
Companies are paying more attention to safeguarding their digital assets, 
but the overall state of corporate data security is still poor, said hackers 
and security experts attending the CanSecWest conference.
Link: http://www.net-security.org/cgi-bin/news.cgi?url=http://www.msnbc.com/news/552177.asp


SYSTEM ADMINISTRATION OF APACHE / TOMCAT
Learn all about the pros and cons of JSP web applications at the sysadmin level, 
including installation and configuration of Apache /Tomcat. This article will give 
you the basics on object-oriented development efforts, making scaling of your 
Web site a simple process. Jump into the world of Java Servlets and JSP with 
Linux!
Link: http://www.linux.com/sysadmin/newsitem.phtml?sid=1&aid=11992

----------------------------------------------------------------------------




Security issues
---------------

All vulnerabilities are located at:
http://net-security.org/text/bugs


----------------------------------------------------------------------------

ELRON IM PRODUCTS VULNERABILITY
At least two products of the Elron Internet Manager family of tools contain 
directory traversal vulnerabilities. The problem exists in the following 
products:
- IM Message Inspector
- IM Anti-Virus
Elron Internet Manager products that are not vulnerable are:
- IM Firewall
If the IM Web Inspector comes with Elron Software's proprietary web server 
as well, it is undoubtedly vulnerable as well.
Link: http://www.net-security.org/text/bugs/985571836,4823,.shtml


AKOPIA INTERCHANGE E-COMMERCE PROBLEMS
A serious security vulnerability has been found in the default installation of 
the Interchange demo stores 'barry', 'basic', and 'construct' distributed in 
Interchange versions 4.5.3 through 4.6.3. Using a group login that had no 
password set by default, it is possible to log in to the back-end administration 
area and view and alter products, orders, and customer information.
Link: http://www.net-security.org/text/bugs/985571971,72095,.shtml


ILMI COMMUNITY IN OLICOM/CROSSCOMM ROUTERS
Crosscomm/Olicom routers have a undocumented community string ILMI (yes, 
the same as in cisco :) that has read and write permissions (i didn't check the 
whole tree, but you can set system.sysContact.0 for example). This was 
checked on a XLT-F router with software 'XL 80 IM Version 5.5 Build Level 
2' (this was what it reported via snmp).
Link: http://www.net-security.org/text/bugs/985632784,11513,.shtml


MDAEMON IMAP DENIAL OF SERVICE
Some of the commands for the IMAP server do not have proper bounds 
checking, enabling a user to shutdown the service remotely.It should be 
noted that a user account is required.The commands affected are SELECT 
and EXAMINE.The SELECT command selects a mailbox so that messages in 
it can be accessed.EXAMINE works in the same way as SELECT, however 
the mailbox is marked as read- only and cannot be modified.
Link: http://www.net-security.org/text/bugs/985632878,8973,.shtml


RAPTOR 6.5 HTTP VULNERABILITY
The Raptor firewall is vulnerability for forwarding http request on other port 
numbers than 80, if a rule allows http traffic.Redirect rules does not affect 
this problem. When an extern or internal client, configures itself to use the 
nearest interface as proxy, it's possible to access other ports that 80 on 
the target host.
Link: http://www.net-security.org/text/bugs/985632976,78240,.shtml


BEA WEBLOGIC UNICODE DIRECTORY BROWSING
By requesting a URL and ending it with one of the following unicode 
representations: %00, %2e, %2f or %5c, it is possible to bypass the 
listing of the default document (eg. index.html) and browse the content 
of the web folders.
Link: http://www.net-security.org/text/bugs/985658808,90631,.shtml


PROBLEMS WITH WEBLOGIC 4.5.1 AND 5.1
It is interesting to note that similar (in fact, worse) behaviour is exhibited in 
both Weblogic 4.5.1 and 5.1. Appending a '%00' to the end of a .jsp request 
retrieves the source of the jsp.
Link: http://www.net-security.org/text/bugs/985694957,71506,.shtml


LINUX MANDRAKE - OPENSSH UPDATE
There are several weaknesses in various implementations of the SSH protocols. 
When exploited, they let the attacker obtain sensitive information by passively 
monitoring encrypted SSH sessions. The information can later be used to speed 
up brute-force attacks on passwords, including the initial login password and 
other passwords appearing in interactive SSH sessions, such as those used 
with su. Versions of OpenSSH 2.5.2 and later have been fixed to reduce the 
impact of these traffic analysis problems, and as such all Linux- Mandrake 
users are encouraged to upgrade their version of openssh immediately.
Link: http://www.net-security.org/text/bugs/985695208,67583,.shtml


ANACONDA CLIPPER VULNERABILITY
Comment: '..' and '/' are not filtered while processing user input, so it is 
possible to enter arbitrary values to retreive files from remote sever, 
which should not be accessible normally (for ex., /etc/passwd).
Link: http://www.net-security.org/text/bugs/985727518,50822,.shtml


SOLARIS /USR/BIN/TIP VULNERABILITY
The tip program is installed setuid uucp by default in Solaris, it contains a 
vulnerability in handling data from enviroment variables, if this variable 
exceeds predefined lenght an exploitable stack overflow can occur. 
Through exploiting this vulnerability an attacker can gain effective 
uid uucp and through that root.
Link: http://www.net-security.org/text/bugs/985727795,52777,.shtml


IMMUNIX OS SECURITY ADVISORY: KERNEL
The 2.2.19 kernel release fixes numerous security problems including the 
ptrace/execve race condition bug that was reported by Wojciech Purczynski.
Link: http://www.net-security.org/text/bugs/985781896,12557,.shtml


CONECTIVA LINUX - LICQ UPDATE
"licq" is a very popular ICQ graphical client. Previous versions have two 
vulnerabilities that could be exploited by a remote attacker to execute 
arbitrary commands on the client host. The first vulnerability is a buffer 
overflow in a log function. The second vulnerability consists in the use 
of the system() function to invoke an external browser when an URL is 
received. This function will expand and interpret shell characters and 
this could be used to execute commands on behalf of the user running licq.
Link: http://www.net-security.org/text/bugs/985781950,25662,.shtml


LINUX MANDRAKE - VIM UPDATE
Users could embed malicious VIM control codes into a file, and as soon as 
any user opened that file in vim-enhanced or vim-X11 with the status line 
option enabled in .vimrc, the commands would be executed as that user.
Link: http://www.net-security.org/text/bugs/985781974,91775,.shtml


SONICWALL IKE PRE-SHARED KEY LENGTH BUG
The limitation of using only a 48 byte key as opposed to using a full 128 
byte key degrades the overall security of the firewall.
Link: http://www.net-security.org/text/bugs/985782130,58962,.shtml


SYMANTEC RESPONSE REGARDING RAPTOR BUG
The first point we would like to make is that although we do agree with the 
authors as it relates to the security implication of the described HTTP 
functionality we do not accept the assertion that this is a product related 
issue with the Raptor Firewall (HTTP proxy). Rather, our Raptor Firewall HTTP 
proxy is RFC-compliant, and as such it is behaving consistently with the 
specification as described in RFC 2616. From a pure protocol perspective, 
this is a valid HTTP connection and thus the traffic is being allowed through 
the firewall with a proper rule. However, recognizing the security impact of 
this configuration, the Raptor Firewall provides you with the capability to 
shut down this functionality by setting a configuration option (http.noproxy) 
through our configuration files or the RMC.
Link: http://www.net-security.org/text/bugs/985782335,57110,.shtml


PROBLEMS WITH DCOM VB T-SQL DEBUGGER
Microsoft Developer Studio version 6 installs a world-launchable DCOM object, 
known as the VB T-SQL Debugger, which contains an exploitable buffer overflow.
Link: http://www.net-security.org/text/bugs/985782436,4158,.shtml


MYSQL 3.23.36 FIXES SECURITY HOLES
This release should fix the final bugs we accidently got into 3.23.34 and a long 
security bug that has been in MySQL a long time! The main fixed bugs are that 
UPDATE didn't always use keys when updating on something not based on a 
primary key and that 'affected rows' wasn't returned to the client if the mysqld 
server wasn't compiled with support for transactions.
Link: http://www.net-security.org/text/bugs/985782554,94105,.shtml


VPN3000 CONCENTRATOR TELNET VULNERABILITY
Sending a flood of data to the SSL or regular telnet port can cause the Cisco
VPN 3000 series concentrators to reboot. After rebooting, the equipment would 
function normally until the flood of data is sent again. To remove the vulnerability, 
Cisco is offering free software upgrades to revision 3.0.00 for all affected 
platforms. The defect is described in DDTS record CSCds90807.
Link: http://www.net-security.org/text/bugs/985819001,59759,.shtml


INFRAMAIL DENIAL OF SERVICE VULNERABILITY
There exists a paring problem in the handling of 302 pages by the server 
serving both the webpages and the administration interface for the 
members of the Inframail product family. This allows for a DoS against the 
system through a malformed POST request consisting of a space followed 
by a long string (276 bytes or more) of characters. The running services will 
freeze and the program will need to be restarted to regain full functionality.
Link: http://www.net-security.org/text/bugs/985819085,68042,.shtml


SOLARIS 2.7 + IBM WCS 4.0.1 VULNERABILITY
Follow URL insert "/" will be downloading ".jsp" source.
Link: http://www.net-security.org/text/bugs/985879982,82795,.shtml


TOMCAT 3.0 FOR WIN2000 VULNERABILITY
A security vulnerability has been found in Windows NT/2000 systems that 
have Tomcat 3.0 installed.The vulnerability allows remote attackers to 
access files outside the document root directory scope.
Link: http://www.net-security.org/text/bugs/985880053,23891,.shtml

----------------------------------------------------------------------------




Security world
--------------

All press releases are located at:
http://net-security.org/text/press

----------------------------------------------------------------------------

COVERT LABS ON INVALID CERTIFICATES - [26.03.2001]

McAfee AVERT (Anti-Virus Emergency Response Team) in conjunction with 
COVERT Labs (Computer Vulnerability Emergency Response Team) at PGP 
Security, divisions of Network Associates, Inc. advised computer users of 
recently discovered invalid digital certificates issued by VeriSign to an 
unidentified person posing as a Microsoft employee. The digital certificates, 
which normally are used to verify authorized issuers, could be used to 
authenticate viruses and malicious code. AVERT and COVERT report that 
no damage has been associated with the fraudulent certificates.

Press release:
< http://www.net-security.org/text/press/985572246,4935,.shtml >

----------------------------------------------------------------------------

TEMPEST SOFTWARE SHIPS SITESHIELD - [26.03.2001]

Tempest Software, Inc. a premier provider of technology and products that 
facilitate secure, standards-based information exchange over the Internet,
announced it is shipping Version 2 of SiteShield, the new "plug and play" 
software solution to secure websites. Based on Tempest's solid, proven 
technology, SiteShield protects all applications, data and information 
assets on a web server by keeping it securely behind a firewall closed to 
all incoming traffic. SiteShield addresses the need for e-business openness 
while protecting companies against potentially embarrassing and destructive 
hacking and security lapses.

Press release:
< http://www.net-security.org/text/press/985633090,77204,.shtml >

----------------------------------------------------------------------------

CISCO SYSTEMS AND MICROSOFT PARTNER - [26.03.2001]

Cisco Systems, Inc. announces the first implementation of the 802.1x draft 
security standard shipping on its Cisco Aironet 350 Series of Wi-Fi (IEEE 
802.11b) compliant wireless local area networking (WLAN) products. Cisco 
collaborated with Microsoft to develop, deliver and deploy the first enterprise 
authentication and security architecture based on the in progress Institute 
of Electrical and Electronics Engineers 802.1x and Extensible Authentication 
Protocol (EAP) standard. Through this cooperative effort between Cisco and 
Microsoft, enterprises can, for the first time, scale wireless deployments to 
thousands of users with a standard, centralized security management 
framework while streamlining network management and administration.

Press release:
< http://www.net-security.org/text/press/985633141,91936,.shtml >

----------------------------------------------------------------------------

SECURITYFOCUS' ARIS ANALYZER - [26.03.2001]

SecurityFocus.com is proud to announce ARIS (Attack Registry and Intelligence 
Service) Analyzer. The ARIS Analyzer is a free service that allows you to submit 
attack data collected by intrusion detection systems and helps you manage 
your security incidents. ARIS Analyzer also allows you to correlate your attacks 
with those seen by other people.

Press release:
< http://www.net-security.org/text/press/985633561,34135,.shtml >

----------------------------------------------------------------------------

SECURING NEW MICROSOFT TECHNOLOGY CENTER - [27.03.2001]

Rainbow Technologies, Inc., a leading provider of high-performance security 
solutions for the Internet and eCommerce, and iVEA Technologies, a Rainbow 
Technologies company, announced that Microsoft Corp. will feature Rainbow's 
iKey workstation security solution and iVEA's CryptoSwift eCommerce accelerator 
as critical components for the new Microsoft Technology Center - Silicon Valley 
(MTC-SV), opening in Mountain View, California. Rainbow and iVEA products are 
currently used in MTCs in Waltham, Mass. and Austin, Texas. The MTC-SV is a 
working lab dedicated to the development and rapid deployment of eCommerce 
solutions to both startups and established business-to-business (B2B) companies.

Press release:
< http://www.net-security.org/text/press/985694527,1979,.shtml >

----------------------------------------------------------------------------

SECURING ANY MESSAGING ENVIRONMENT - [27.03.2001]

Addressing the increasing need for secure messaging networks, Mirapoint,
a leading provider of Internet messaging infrastructure products, was 
announced the release of the Mirapoint Message Director, the first system 
optimised for securing any messaging environment. The Message Director is 
a scalable and easy to deploy messaging solution that can be added to any 
enterprise or service provider messaging environment. BMW Group is the first 
customer of the Message Director and will use the new product to increase 
message security, management and performance.

Press release:
< http://www.net-security.org/text/press/985694688,65075,.shtml >

----------------------------------------------------------------------------

SYGATE PERSONAL FIREWALL 4.0 ANNOUNCED - [28.03.2001]

Sygate Technologies, a leading provider of Internet security software solutions, 
announced the release of Sygate Personal Firewall 4.0, the first personal firewall 
software that combines firewall and intrusion defense technologies to deliver 
comprehensive security and ease of use for home and small businesses. As a 
firewall, Sygate Personal Firewall 4.0 controls access to communication ports 
and monitors any port-scanning activity. As an intrusion defense agent, it only 
allows trusted communication and considers any other network activity `guilty 
until proven innocent.' As a result, Sygate Personal Firewall 4.0 secures computer 
systems, without the obtrusive and irrelevant alerting characteristics of other 
security solutions. When attacks do occur, Sygate Personal Firewall 4.0 offers 
forensic capabilities allowing users to find the source of intrusion and take 
appropriate action.

Press release:
< http://www.net-security.org/text/press/985744343,74897,.shtml >

----------------------------------------------------------------------------

NETWORK ICE WINS `BEST OF SHOW' - [28.03.2001]

Network ICE, a leading provider of intrusion detection and protection for 
enterprises and consumers, won "Best of Show" at Upside Events' Preview 
Spring 2001 in Beverly Hills, Calif. Undercover journalists at the March 13 
competition scored and ranked nearly 20 invited-only companies on 
innovation, user-friendliness and potential benefit to customers. ICEpac 
Security Suite, Network ICE's enterprise product, beat nearly 20 companies 
that demonstrated their latest products and technologies. ICEpac uses 
Network ICE's patent-pending BlackICE technology to detect, identify and 
block hackers' Internet attacks before they can compromise a system. The 
ICEpac suite is designed to protect an entire corporation's network including 
remote VPN users. It uses one of the most advanced intrusion detection 
technologies to single out hackers and stop them from breaking into your 
network or stealing valuable information assets.

Press release:
< http://www.net-security.org/text/press/985744438,94075,.shtml >

----------------------------------------------------------------------------

COMPUTER WORMS: FLASHBACK TO EARLY 90S? - [28.03.2001]

With more than two thousand new computer viruses rearing their ugly heads 
each month, it's the worms among them that keep "hacker trackers" up at 
night. Unlike simple viruses, which spread from file to file in one computer, 
worms live short but spectacular lives, inflicting major damage quickly 
because they use the network to spread from computer to computer. 
Now that network operating systems have been available for some time, 
there is mounting concern among Internet security experts that the ever
increasing availability of information on the "guts" of network operating 
systems gives hackers clues to break in and compromise a network's security.

Press release:
< http://www.net-security.org/text/press/985744630,4514,.shtml >

----------------------------------------------------------------------------

CENTRAL COMMAND DISCOVERS W32.WINUX - [28.03.2001]

Central Command, a leading provider of PC anti-virus software and computer 
security services, and its partners announced the discovery of W32.Winux, 
the world's first cross platform virus capable of infecting computers using 
both the Microsoft Windows and Linux operating systems. "Today with the 
discovery of W32.Winux, we have received the world's first known virus 
capable of spreading on both Windows and Linux computer systems. While 
people do not share executables between these operating systems, this 
new proof of concept virus represents a technology innovation that may 
lead to more destructive viruses in the future. Our Emergency Virus 
Response Team discovered this new virus and has analyzed it," said 
Steven Sundermeier, Product Manager at Central Command Inc.

Press release:
< http://www.net-security.org/text/press/985783671,65011,.shtml >

----------------------------------------------------------------------------

FORENSICS EXPLORERS INTRODUCES NETINFORMANT - [30.03.2001]

Forensics Explorers introduces NetInformant, a suite of products that go far 
beyond other network security systems and solves problems most network 
security software cannot even detect. In addition, NetInformant is the only 
network security system that can guard against the most dangerous and 
difficult to detect threats: threats from an organizations trusted employees, 
clients and strategic partners, the people who operate behind the firewall.
While most network security software merely tracks network activity and 
compares it to a list of known security risks, or calculates whether specific 
activity is statistically unusual, NetInformant audits and evaluates all 
network activity, flags network security management when potential 
client-specified issues arise, and produces action items which can be 
implemented immediately. 


Press release:
< http://www.net-security.org/text/press/985912691,88510,.shtml >

----------------------------------------------------------------------------




Featured articles
-----------------

All articles are located at:
http://www.net-security.org/text/articles

Articles can be contributed to staff@net-security.org

Below is the list of the recently added articles.

----------------------------------------------------------------------------

TRACKING SPYWARE AND PROBES by M. E. Kabay

"I'd like to share with you a recent exchange I had with a friend of mine whose 
system seems to have been infected with spyware. Hopefully, this case study 
will help you when you examine your own systems."

Read more:
< http://www.net-security.org/text/articles/nwf/tracking.shtml >

----------------------------------------------------------------------------

TESTING PATCHES by M. E. Kabay

There are many firms, including AtomicTangerine, which can carry out 
penetration tests to verify that patches are up to date and functioning. 
Just be sure that you obtain contractual confirmation that the firm does 
not hire criminal hackers. The last thing you need is to have untrustworthy 
people testing your security.

Read more:
< http://www.net-security.org/text/articles/nwf/testing.shtml >

----------------------------------------------------------------------------

HTML MAIL THREATENS PRIVACY  by M. E. Kabay

The threat to privacy from Big Brother (governments) sometimes
overshadows the equal threat from "Little Brother" (industry).

Read more:
< http://www.net-security.org/text/articles/nwf/html.shtml >

----------------------------------------------------------------------------




Security Software
-------------------

All programs are located at:
http://net-security.org/various/software

----------------------------------------------------------------------------

LIONFIND 0.1

Lion is a new worm, that is very similar to the Ramen worm. However, this worm 
is much more dangerous and should be taken seriously. It infects Linux machines 
with the BIND DNS server running. It is known to infect BIND version(s) 8.2, 
8.2-P1, 8.2.1, 8.2.2-Px. BIND 8.2.3-REL and BIND 9 are not vulnerable. The BIND 
vulnerability is the TSIG vulnerability that was reported back on January 29, 2001. 
SANS developed a utility called Lionfind that will detect the Lion files on an 
infected system. Simply download it, uncompress it, and run lionfind. It will list 
which of the suspect files is on the system.

Info/Download:
< http://www.net-security.org/various/software/985822791,25782,linux.shtml >

----------------------------------------------------------------------------

CHKROOTKIT 0.30

chkrootkit is a tool to locally check for signs of a rootkit. It contains: 

chkrootkit: shell script that checks system binaries for rootkit modification. 
The following commands are examined: 

basename, biff, chfn, chsh, cron, date, dirname, du, echo, env, find, fingerd, 
grep, identd, ifconfig, inetd, killall, login, ls, mail, netstat, passwd, pidof, pop2, 
pop3, ps, pstree, rpcinfo, rshd, sendmail, sshd, su, syslogd, tar, tcpd, telnetd, 
timed, top, traceroute, write 

ifpromisc.c: checks if the interface is in promiscuous mode. 
chklastlog.c: checks for lastlog deletions. 
chkwtmp.c: checks for wtmp deletions. 
chkproc.c: checks for signs of LKM trojans. 

The following rootkits and worms are currently detected: 

lrk3, lrk4, lrk5, lrk6 (and some variants); 
Solaris rootkit; 
FreeBSD rootkit; 
t0rn (including latest variant); 
Ambient's Rootkit for Linux (ARK); 
Ramen Worm; 
rh[67]-shaper; 
RSHA; 
Romanian rootkit; 
RK17; 
Lion Worm. 

Info/Download:
< http://www.net-security.org/various/software/985827056,98592,linux.shtml >

----------------------------------------------------------------------------




Defaced archives
------------------------

[26.03.2001]

Original: http://enlint003.ericsson.nl/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/enlint003.ericsson.nl/
OS: Windows

Original: http://pokemon.nintendo.es/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/pokemon.nintendo.es/
OS: Windows

Original: http://www.necworx.nec.com/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/www.necworx.nec.com/
OS: Windows

Original: http://www.suizhong.gov.cn/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/www.suizhong.gov.cn/
OS: Windows

Original: http://c3-svr.hq.nato.int/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/c3-svr.hq.nato.int/
OS: Windows

Original: http://www.intelsat.int/
Defaced: http://defaced.alldas.de/mirror/2001/03/26/www.intelsat.int/
OS: Windows


[27.03.2001]

Original: http://www.tjciq.gov.cn/
Defaced: http://defaced.alldas.de/mirror/2001/03/27/www.tjciq.gov.cn/
OS: Windows

Original: http://www.microsoft.economy.ru/
Defaced: http://defaced.alldas.de/mirror/2001/03/27/www.microsoft.economy.ru/
OS: Windows

Original: http://www.shangyu.gov.cn/
Defaced: http://defaced.alldas.de/mirror/2001/03/27/www.shangyu.gov.cn/
OS: Windows

Original: http://www.hertz.fi/
Defaced: http://defaced.alldas.de/mirror/2001/03/27/www.hertz.fi/
OS: Windows

Original: http://www.foundry.sony.com/
Defaced: http://defaced.alldas.de/mirror/2001/03/27/www.foundry.sony.com/
OS: Windows


[28.03.2001]

Original: http://www.yahoo.com.ph/
Defaced: http://defaced.alldas.de/mirror/2001/03/28/www.yahoo.com.ph/
OS: Unknown

Original: http://www.volvo.com.tw/
Defaced: http://defaced.alldas.de/mirror/2001/03/28/www.volvo.com.tw/
OS: Unknown

Original: http://www.travel.gov.cn/
Defaced: http://defaced.alldas.de/mirror/2001/03/28/www.travel.gov.cn/
OS: Windows

Original: http://www.telefonica.com.uy/
Defaced: http://defaced.alldas.de/mirror/2001/03/28/www.telefonica.com.uy/
OS: Linux


[29.03.2001]

Original: http://www.telfort.ericsson.nl/
Defaced: http://defaced.alldas.de/mirror/2001/03/29/www.telfort.ericsson.nl/
OS: Windows

Original: http://enlint004.ericsson.nl/
Defaced: http://defaced.alldas.de/mirror/2001/03/29/enlint004.ericsson.nl/
OS: Windows

Original: http://www.ebay.co.th/
Defaced: http://defaced.alldas.de/mirror/2001/03/29/www.ebay.co.th/
OS: Windows

Original: http://www.agrisd.gov.cn/
Defaced: http://defaced.alldas.de/mirror/2001/03/29/www.agrisd.gov.cn/
OS: Windows


[30.03.2001]

Original: http://www.contraloriadecundinamarca.gov.co/
Defaced: http://defaced.alldas.de/mirror/2001/03/30/www.contraloriadecundinamarca.gov.co/
OS: Windows

Original: http://harita.intel.com/
Defaced: http://defaced.alldas.de/mirror/2001/03/30/harita.intel.com/
OS: Windows

Original: http://www.camaragyn.go.gov.br/
Defaced: http://defaced.alldas.de/mirror/2001/03/30/www.camaragyn.go.gov.br/
OS: Windows


[31.03.2001]

Original: http://shop.europe.creative.com/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/shop.europe.creative.com/
OS: Unknown

Original: http://www.canon-office.co.uk/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/www.canon-office.co.uk/
OS: Windows

Original: http://www.renault.pt/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/www.renault.pt/
OS: Windows

Original: http://www.peugeot.sk/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/www.peugeot.sk/
OS: Unknown

Original: http://www.martini.com/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/www.martini.com/
OS: Windows

Original: http://www.panasonic-office.co.uk/
Defaced: http://defaced.alldas.de/mirror/2001/03/31/www.panasonic-office.co.uk/
OS: Windows

----------------------------------------------------------------------------


Questions, contributions, comments or ideas go to:
 
Help Net Security staff
 
staff@net-security.org
http://net-security.org
http://security-db.com