home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Mon Dec 2, 1996 Volume 8 : Issue 85
- ISSN 1004-042X
-
- Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
- News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
- Archivist: Brendan Kehoe
- Shadow Master: Stanton McCandlish
- Field Agent Extraordinaire: David Smith
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
-
- CONTENTS, #8.85 (Mon, Dec 2, 1996)
-
- File 1--Info on 'Microsoft home page virus' HOAX
- File 2--In Re Virus Hoaxes
- File 3--CIAC Bulletin H-05: Internet Hoaxes
- File 4--Cu Digest Header Info (unchanged since 1 Dec, 1996)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION ApPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ---------------------------------------------------------------------
-
- Date: 30 Nov 1996 23:48:57 -0000
- From: "Mikko H. Hypponen" <Mikko.Hypponen@datafellows.com>
- Subject: File 1--Info on 'Microsoft home page virus' HOAX
-
- Source - Newsgroups: comp.virus
-
- - ----BEGIN PGP SIGNED MESSAGE-----
-
- This is a warning on a nasty hoax that has been distributed on several
- mailing lists and in usenet news. The hoax message is falsely
- attributed to me (Mikko.Hypponen@datafellows.com).
-
- This false warning urges people to stay off Microsoft's
- home page and not to use Microsoft Internet Explorer,
- because the 'Microsoft home page is possibly infected
- by a virus'. This is nonsense.
-
- If you have seen this warning, please pass on this message,
- and please do not redistribute the original warning any more.
-
- The origins on this nasty hoax is as of yet unknown.
- The original hoax warning is quoted here in full:
-
- ---begin hoax---
-
- Red Alert for anybody using Microsoft's Internet Explorer as
- their web browser.
-
- This came in on the virus forum at the University of Hamburg
- from a fairly reliable source: Mikko H. Hypponen
- (Mikko.Hypponen@datafellows.com) in Finland. (datafellows is
- an anti-virus company)
-
- The first indication that something was amiss was when the computer
- of an MIS professional friend of Mikko's was completely wiped --
- including BIOS and CMOS -- on 11-20-96. It took a great deal of
- arguing with Microsoft until 11-22-96 (logged at 0930 hours) when
- they finally admitted something was wrong and took "their homepage
- into their lab."
-
- Mikko's first report was at 11:13 on 11-22-96. By 13:17 on 11-22-96
- the following message was received:
-
- ---------------------------------------------------------
-
- > Okay, it's official (last conversation with techs at 1200 hrs,
- > 11-22-96, virus confirmed) Western Digital and Microsoft
- > confirm that a new virus is on the web and they cannot
- > isolate it. The only thing they know for sure is that it
- > completely wipes out a computer. As of this time, they cannot
- > determine how best to get rid of the thing once it is in your
- > system.
- >
-
- [irrelevant "in-joke" cut]
-
- >
- > They are recommending that until they can isolate it (it appears
- > to be coming from several locations) you just stay off the web.
-
- ---------------------------------------------------------
-
- This sounds like a trojan rather than a virus, but it is extremely
- destructive nonetheless.
-
- Unless you can filter addresses so your webbrowser will not
- go to Microsoft's home page, stay off Microsoft's home page
- until further notice. (As Mikko post updates, I'll forward
- them.)
-
- Incidentally, Mikko and his friend *were* frequent users of Microsoft's
- Web browser.
-
- ---end hoax---
-
- Oh, by the way. I prefer Netscape and Lynx...
- If you have any questions, contact me directly at
- Mikko.Hypponen@datafellows.com.
-
-
- - ----BEGIN PGP SIGNATURE-----
- Version: 2.6.2i
-
- iQCVAwUBMp7jpdn7CX0PJlcJAQFFjQQAkzaqIaAPIH0TKVM+1K2Ampj7yP/MIaKS
- cGbWzb2A0EHnloxa5i5ZqYDYq69+Y4TYaDV2CsKz6jGdQJ+niZEs0K6sjNYRxyxV
- eO7xk52f3UOvsrKTXsgZM2MffTHV+YuHDDvw+K+qN2FgTlepJzsdGzaVlURi5LnR
- gHYqDRZoatY=
- =zvx3
- - ----END PGP SIGNATURE-----
-
- - -
- Mikko Hermanni Hyppvnen - Mikko.Hypponen@DataFellows.com
- Data Fellows Ltd's F-PROT Pro Support: F-PROT-Support@DataFellows.com
- Computer virus information available via web: http://www.DataFellows.com/
- Paivantaite 8, 02210 Espoo, Finland. Tel +358-9-478444, Fax +358-9-47844599
-
- ------------------------------
-
- Date: Mon, 25 Nov 1996 11:31:30 +0000 (GMT)
- From: harley@icrf.icnet.uk
- Subject: File 2--In Re Virus Hoaxes
-
- ((MODERATORS' NOTE: The following provides some useful URLs
- for anti-virus/hoax, and other information. The author correctly
- notes that the CIAC bulletin might be of interest here, so we're
- reprinting it in the next post--jt)).
-
- --------------
-
- Since #8.82 was somewhat dominated by Irina, Good Times, and Deeyenda,
- it might be worth drawing to the attention of CuD readers the CIAC
- bulletin H-05 of November 20th, which includes information on the
- Irina, Good Times, and Deeyenda hoaxes, the PKZ300 semi-hoax (dealing
- with the warning has wasted more time and money than the few real
- instances of this trojan ever did), and the erroneous GHOST.EXE
- 'Trojan' alert (it's -just- a screensaver, folks, at least until
- someone gets the bright idea of virus-infecting it or trojanizing it).
-
- The bulletin also revisits the 2400 baud modem virus hoax and
- Robert Morris III's joke alert of 1988, a little of which is
- included here for your edification.
-
- Warning: There's a new virus on the loose that's worse than
- anything I've seen before! It gets in through the power line,
- riding on the powerline 60 Hz subcarrier. It works by changing the
- serial port pinouts, and by reversing the direction one's disks
- spin. Over 300,000 systems have been hit by it here in Murphy,
- West Dakota alone! And that's just in the last 12 minutes.
-
- It attacks DOS, Unix, TOPS-20, Apple-II, VMS, MVS, Multics, Mac,
- RSX-11, ITS, TRS-80, and VHS systems.
-
- Well, it amuse me, even though some of this stuff has turned
- up since in hoax alerts and trolls.
-
- In the CIAC bulletin, there's also a pretty sensible
- section on how to recognise a likely hoax and ways
- to validate an alert (by examining its PGP signature, for
- instance. I rather like "When in doubt, do not send it out
- to the world.", the suggestion being that the user forwards
- it to their sysadmin for validation instead.
-
- The URL is:
-
- http://ciac.llnl.gov/ciac/bulletins/h-05.shtml
-
- One or two other hoaxes, jokes etc. are addressed in the
- alt.comp.virus FAQ at
-
- http://webworlds.co.uk/dharley/
-
- Bob Rosenberg's Computer Virus Myths page at
-
- http://www.kumite.com/myths/
-
- is a good source of information on some of these issues, too.
-
- ------------------------------
-
- From: David Crawford <crawford@eek.llnl.gov>
- Subject: File 3--CIAC Bulletin H-05: Internet Hoaxes
- Date: 25 Nov 1996 03:27:29 -0000
-
- - ----BEGIN PGP SIGNED MESSAGE-----
-
- Source - Newsgroups: comp.virus
-
- __________________________________________________________
-
- The U.S. Department of Energy
- Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | /_\ /
- \___ __|__ / \ \___
- __________________________________________________________
-
- INFORMATION BULLETIN
-
- Internet Hoaxes: PKZ300, Irina, Good Times, Deeyenda, Ghost
-
- November 20, 1996 15:00 GMT Number H-05
- ______________________________________________________________________________
- PROBLEM: This bulletin addresses the following hoaxes and erroneous
- warnings: PKZ300 Warning, Irina, Good Times, Deeyenda, and
- Ghost.exe
- PLATFORM: All, via e-mail
- DAMAGE: Time lost reading and responding to the messages
- SOLUTION: Pass unvalidated warnings only to your computer security
- department or incident response team. See below on how to
- recognize validated and unvalidated warnings and hoaxes.
- ______________________________________________________________________________
- VULNERABILITY New hoaxes and warnings have appeared on the Internet and old
- ASSESSMENT: hoaxes are still being cirulated.
- ______________________________________________________________________________
-
-
- Introduction
- ============
-
- The Internet is constantly being flooded with information about computer
- viruses and Trojans. However, interspersed among real virus notices are
- computer virus hoaxes. While these hoaxes do not infect systems, they are
- still time consuming and costly to handle. At CIAC, we find that we are
- spending much more time de-bunking hoaxes than handling real virus incidents.
- This advisory addresses the most recent warnings that have appeared on the
- Internet and are being circulated throughout world today. We will also address
- the history behind virus hoaxes, how to identify a hoax, and what to do if you
- think a message is or is not a hoax. Users are requested to please not spread
- unconfirmed warnings about viruses and Trojans. If you receive an unvalidated
- warning, don't pass it to all your friends, pass it to your computer security
- manager to validate first. Validated warnings from the incident response teams
- and antivirus vendors have valid return addresses and are usually PGP signed
- with the organization's key.
-
- PKZ300 Warning
- ==============
-
- The PKZ300 Trojan is a real Trojan program, but the initial warning about it
- was released over a year ago. For information pertaining to PKZ300 Trojan
- reference CIAC Notes issue 95-10, that was released in June of 1995.
-
- http://ciac.llnl.gov/ciac/notes/Notes10.shtml
-
- The warning itself, on the other hand, is gaining urban legend status. There
- has been an extremely limited number of sightings of this Trojan and those
- appeared over a year ago. Even though the Trojan warning is real, the repeated
- circulation of the warning is a nuisance. Individuals who need the current
- release of PKZIP should visit the PKWARE web page at http://www.pkware.com.
- CIAC recommends that you DO NOT recirculate the warning about this particular
- Trojan.
-
- Irina Virus Hoax
- ================
-
- The "Irina" virus warnings are a hoax. The former head of an electronic
- publishing company circulated the warning to create publicity for a new
- interactive book by the same name. The publishing company has apologized for
- the publicity stunt that backfired and panicked Internet users worldwide. The
- original warning claimed to be from a Professor Edward Pridedaux of the
- College of Slavic Studies in London; there is no such person or college.
- However, London's School of Slavonic and East European Studies has been
- inundated with calls. This poorly thought-out publicity stunt was highly
- irresponsible. For more information pertaining to this hoax, reference the
- UK Daily Telegraph at http://www.telegraph.co.uk.
-
- Good Times Virus Hoax
- =====================
-
- The "Good Times" virus warnings are a hoax. There is no virus by that name in
- existence today. These warnings have been circulating the Internet for years.
- The user community must become aware that it is unlikely that a virus can be
- constructed to behave in the manner ascribed in the "Good Times" virus
- warning. For more information related to this urban legend, reference CIAC
- Notes 95-09.
-
- http://ciac.llnl.gov/ciac/notes/Notes09.shtml
-
- Deeyenda Virus Hoax
- ===================
-
- The "Deeyenda" virus warnings are a hoax. CIAC has received inqueries
- regarding the validity of the Deeyenda virus. The warnings are very similar
- to those for Good Times, stating that the FCC issued a warning about it,
- and that it is self activating and can destroy the contents of a machine
- just by being downloaded. Users should note that the FCC does not and will
- not issue virus or Trojan warnings. It is not their job to do so. As of this
- date, there are no known viruses with the name Deeyenda in existence. For a
- virus to spread, it must be executed. Reading a mail message does not execute
- the mail message. Trojans and viruses have been found as executable attachments
- to mail messages, but they must be extracted and executed to do any harm. CIAC
- still affirms that reading E-mail, using typical mail agents, can not activate
- malicious code delivered in or with the message.
-
- Ghost.exe Warning
- =================
-
- The Ghost.exe program was originally distributed as a free screen saver
- containing some advertising information for the author's company (Access
- Softek). The program opens a window that shows a Halloween background with
- ghosts flying around the screen. On any Friday the 13th, the program window
- title changes and the ghosts fly off the window and around the screen. Someone
- apparently got worried and sent a message indicating that this might be a
- Trojan. The warning grew until the it said that Ghost.exe was a Trojan that
- would destroy your hard drive and the developers got a lot of nasty phone
- calls (their names and phone numbers were in the About box of the program.)
- A simple phone call to the number listed in the program would have stopped
- this warning from being sent out. The original ghost.exe program is just cute;
- it does not do anything damaging. Note that this does not mean that ghost
- could not be infected with a virus that does do damage, so the normal
- antivirus procedure of scanning it before running it should be followed.
-
- History of Virus Hoaxes
- =======================
-
- Since 1988, computer virus hoaxes have been circulating the Internet. In
- October of that year, according to Ferbrache ("A pathology of Computer
- Viruses" Springer, London, 1992) one of the first virus hoaxes was the
- 2400 baud modem virus:
-
- SUBJ: Really Nasty Virus
- AREA: GENERAL (1)
-
- I've just discovered probably the world's worst computer virus
- yet. I had just finished a late night session of BBS'ing and file
- treading when I exited Telix 3 and attempted to run pkxarc to
- unarc the software I had downloaded. Next thing I knew my hard
- disk was seeking all over and it was apparently writing random
- sectors. Thank god for strong coffee and a recent backup.
- Everything was back to normal, so I called the BBS again and
- downloaded a file. When I went to use ddir to list the directory,
- my hard disk was getting trashed again. I tried Procomm Plus TD
- and also PC Talk 3. Same results every time. Something was up so I
- hooked up to my test equipment and different modems (I do research
- and development for a local computer telecommunications company
- and have an in-house lab at my disposal). After another hour of
- corrupted hard drives I found what I think is the world's worst
- computer virus yet. The virus distributes itself on the modem sub-
- carrier present in all 2400 baud and up modems. The sub-carrier is
- used for ROM and register debugging purposes only, and otherwise
- serves no othr (sp) purpose. The virus sets a bit pattern in one
- of the internal modem registers, but it seemed to screw up the
- other registers on my USR. A modem that has been "infected" with
- this virus will then transmit the virus to other modems that use a
- subcarrier (I suppose those who use 300 and 1200 baud modems
- should be immune). The virus then attaches itself to all binary
- incoming data and infects the host computer's hard disk. The only
- way to get rid of this virus is to completely reset all the modem
- registers by hand, but I haven't found a way to vaccinate a modem
- against the virus, but there is the possibility of building a
- subcarrier filter. I am calling on a 1200 baud modem to enter this
- message, and have advised the sysops of the two other boards
- (names withheld). I don't know how this virus originated, but I'm
- sure it is the work of someone in the computer telecommunications
- field such as myself. Probably the best thing to do now is to
- stick to 1200 baud until we figure this thing out.
-
- Mike RoChenle
-
- This bogus virus description spawned a humorous alert by Robert Morris III :
-
- Date: 11-31-88 (24:60) Number: 32769
- To: ALL Refer#: NONE
- --ROBERT MORRIS III Read: (N/A)
- Subj: VIRUS ALERT Status: PUBLIC MESSAGE
-
- Warning: There's a new virus on the loose that's worse than
- anything I've seen before! It gets in through the power line,
- riding on the powerline 60 Hz subcarrier. It works by changing the
- serial port pinouts, and by reversing the direction one's disks
- spin. Over 300,000 systems have been hit by it here in Murphy,
- West Dakota alone! And that's just in the last 12 minutes.
-
- It attacks DOS, Unix, TOPS-20, Apple-II, VMS, MVS, Multics, Mac,
- RSX-11, ITS, TRS-80, and VHS systems.
-
- To prevent the spresd of the worm:
-
- 1) Don't use the powerline.
- 2) Don't use batteries either, since there are rumors that this
- virus has invaded most major battery plants and is infecting the
- positive poles of the batteries. (You might try hooking up just
- the negative pole.)
- 3) Don't upload or download files.
- 4) Don't store files on floppy disks or hard disks.
- 5) Don't read messages. Not even this one!
- 6) Don't use serial ports, modems, or phone lines.
- 7) Don't use keyboards, screens, or printers.
- 8) Don't use switches, CPUs, memories, microprocessors, or
- mainframes.
- 9) Don't use electric lights, electric or gas heat or
- airconditioning, running water, writing, fire, clothing or the
- wheel.
-
- I'm sure if we are all careful to follow these 9 easy steps, this
- virus can be eradicated, and the precious electronic flui9ds of
- our computers can be kept pure.
-
- ---RTM III
-
- Since that time virus hoaxes have flooded the Internet.With thousands of
- viruses worldwide, virus paranoia in the community has risen to an extremely
- high level. It is this paranoia that fuels virus hoaxes. A good example of
- this behavior is the "Good Times" virus hoax which started in 1994 and is
- still circulating the Internet today. Instead of spreading from one computer
- to another by itself, Good Times relies on people to pass it along.
-
- How to Identify a Hoax
- ======================
-
- There are several methods to identify virus hoaxes, but first consider what
- makes a successful hoax on the Internet. There are two known factors that make
- a successful virus hoax, they are: (1) technical sounding language, and
- (2) credibility by association. If the warning uses the proper technical
- jargon, most individuals, including technologically savy individuals, tend to
- believe the warning is real. For example, the Good Times hoax says that
- "...if the program is not stopped, the computer's processor will be placed in
- an nth-complexity infinite binary loop which can severely damage the
- processor...". The first time you read this, it sounds like it might be
- something real. With a little research, you find that there is no such thing
- as an nth-complexity infinite binary loop and that processors are designed
- to run loops for weeks at a time without damage.
-
- When we say credibility by association we are referring to whom sent the
- warning. If the janitor at a large technological organization sends a warning
- to someone outside of that organization, people on the outside tend to believe
- the warning because the company should know about those things. Even though
- the person sending the warning may not have a clue what he is talking about,
- the prestigue of the company backs the warning, making it appear real. If a
- manager at the company sends the warning, the message is doubly backed by the
- company's and the manager's reputations.
-
- Individuals should also be especially alert if the warning urges you to pass
- it on to your friends. This should raise a red flag that the warning may be
- a hoax. Another flag to watch for is when the warning indicates that it is a
- Federal Communication Commission (FCC) warning. According to the FCC, they
- have not and never will disseminate warnings on viruses. It is not part of
- their job.
-
- CIAC recommends that you DO NOT circulate virus warnings without first
- checking with an authoritative source. Authoritative sources are your computer
- system security administrator or a computer incident advisory team. Real
- warnings about viruses and other network problems are issued by different
- response teams (CIAC, CERT, ASSIST, NASIRC, etc.) and are digitally signed by
- the sending team using PGP. If you download a warning from a teams web site or
- validate the PGP signature, you can usually be assured that the warning is
- real. Warnings without the name of the person sending the original notice, or
- warnings with names, addresses and phone numbers that do not actually exist
- are probably hoaxes.
-
- What to Do When You Receive a Warning
- =====================================
-
- Upon receiving a warning, you should examine its PGP signature to see that it
- is from a real response team or antivirus organization. To do so, you will
- need a copy of the PGP software and the public signature of the team that
- sent the message. The CIAC signature is available from the CIAC web server
- at:
-
- http://ciac.llnl.gov
-
- If there is no PGP signature, see if the warning includes the name of the
- person submitting the original warning. Contact that person to see if he/she
- really wrote the warning and if he/she really touched the virus. If he/she is
- passing on a rumor or if the address of the person does not exist or if
- there is any questions about theauthenticity or the warning, do not circulate
- it to others. Instead, send the warning to your computer security manager or
- incident response team and let them validate it. When in doubt, do not send
- it out to the world. Your computer security managers and the incident response
- teams teams have experts who try to stay current on viruses and their warnings.
- In addition, most anti-virus companies have a web page containing information
- about most known viruses and hoaxes. You can also call or check the web site
- of the company that produces the product that is supposed to contain the virus.
- Checking the PKWARE site for the current releases of PKZip would stop the
- circulation of the warning about PKZ300 since there is no released version 3
- of PKZip. Another useful web site is the "Computer Virus Myths home page"
- (http://www.kumite.com/myths/) which contains descriptions of several known
- hoaxes. In most cases, common sense would eliminate Internet hoaxes.
-
- - -----------------------------------------------------------------------------
-
- CIAC, the Computer Incident Advisory Capability, is the computer
- security incident response team for the U.S. Department of Energy
- (DOE) and the emergency backup response team for the National
- Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
- National Laboratory in Livermore, California. CIAC is also a founding
- member of FIRST, the Forum of Incident Response and Security Teams, a
- global organization established to foster cooperation and coordination
- among computer security teams worldwide.
-
- CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
- can be contacted at:
- Voice: +1 510-422-8193
- FAX: +1 510-423-8002
- STU-III: +1 510-423-2604
- E-mail: ciac@llnl.gov
-
- For emergencies and off-hour assistance, DOE, DOE contractor sites,
- and the NIH may contact CIAC 24-hours a day. During off hours (5PM -
- 8AM PST), call the CIAC voice number 510-422-8193 and leave a message,
- or call 800-759-7243 (800-SKY-PAGE) to send a Sky Page. CIAC has two
- Sky Page PIN numbers, the primary PIN number, 8550070, is for the CIAC
- duty person, and the secondary PIN number, 8550074 is for the CIAC
- Project Leader.
-
- Previous CIAC notices, anti-virus software, and other information are
- available from the CIAC Computer Security Archive.
-
- World Wide Web: http://ciac.llnl.gov/
- Anonymous FTP: ciac.llnl.gov (128.115.19.53)
- Modem access: +1 (510) 423-4753 (28.8K baud)
- +1 (510) 423-3331 (28.8K baud)
-
- CIAC has several self-subscribing mailing lists for electronic
- publications:
- 1. CIAC-BULLETIN for Advisories, highest priority - time critical
- information and Bulletins, important computer security information;
- 2. CIAC-NOTES for Notes, a collection of computer security articles;
- 3. SPI-ANNOUNCE for official news about Security Profile Inspector
- (SPI) software updates, new features, distribution and
- availability;
- 4. SPI-NOTES, for discussion of problems and solutions regarding the
- use of SPI products.
-
- Our mailing lists are managed by a public domain software package
- called ListProcessor, which ignores E-mail header subject lines. To
- subscribe (add yourself) to one of our mailing lists, send the
- following request as the E-mail message body, substituting
- CIAC-BULLETIN, CIAC-NOTES, SPI-ANNOUNCE or SPI-NOTES for list-name and
- valid information for LastName FirstName and PhoneNumber when sending
-
- E-mail to ciac-listproc@llnl.gov:
- subscribe list-name LastName, FirstName PhoneNumber
- e.g., subscribe ciac-notes OHara, Scarlett W. 404-555-1212 x36
-
- You will receive an acknowledgment containing address, initial PIN,
- and information on how to change either of them, cancel your
- subscription, or get help.
-
- PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
- communities receive CIAC bulletins. If you are not part of these
- communities, please contact your agency's response team to report
- incidents. Your agency's team will coordinate with CIAC. The Forum of
- Incident Response and Security Teams (FIRST) is a world-wide
- organization. A list of FIRST member organizations and their
- constituencies can be obtained by sending email to
- docserver@first.org with an empty subject line and a message body
- containing the line: send first-contacts.
-
- This document was prepared as an account of work sponsored by an
- agency of the United States Government. Neither the United States
- Government nor the University of California nor any of their
- employees, makes any warranty, express or implied, or assumes any
- legal liability or responsibility for the accuracy, completeness, or
- usefulness of any information, apparatus, product, or process
- disclosed, or represents that its use would not infringe privately
- owned rights. Reference herein to any specific commercial products,
- process, or service by trade name, trademark, manufacturer, or
- otherwise, does not necessarily constitute or imply its endorsement,
- recommendation or favoring by the United States Government or the
- University of California. The views and opinions of authors expressed
- herein do not necessarily state or reflect those of the United States
- Government or the University of California, and shall not be used for
- advertising or product endorsement purposes.
-
- LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
-
- G-43: Vulnerabilities in Sendmail
- G-44: SCO Unix Vulnerability
- G-45: Vulnerability in HP VUE
- G-46: Vulnerabilities in Transarc DCE and DFS
- G-47: Unix FLEXlm Vulnerabilities
- G-48: TCP SYN Flooding and IP Spoofing Attacks
- H-01: Vulnerabilities in bash
- H-02: SUN's TCP SYN Flooding Solutions
- H-03: HP-UX_suid_Vulnerabilities
- H-04: HP-UX Ping Vulnerability
-
- RECENT CIAC NOTES ISSUED (Previous Notes available from CIAC)
-
- Notes 07 - 3/29/95 A comprehensive review of SATAN
-
- Notes 08 - 4/4/95 A Courtney update
-
- Notes 09 - 4/24/95 More on the "Good Times" virus urban legend
-
- Notes 10 - 6/16/95 PKZ300B Trojan, Logdaemon/FreeBSD, vulnerability
- in S/Key, EBOLA Virus Hoax, and Caibua Virus
-
- Notes 11 - 7/31/95 Virus Update, Hats Off to Administrators,
- America On-Line Virus Scare, SPI 3.2.2 Released,
- The Die_Hard Virus
-
- Notes 12 - 9/12/95 Securely configuring Public Telnet Services, X
- Windows, beta release of Merlin, Microsoft Word
- Macro Viruses, Allegations of Inappropriate Data
- Collection in Win95
-
- Notes 96-01 - 3/18/96 Java and JavaScript Vulnerabilities, FIRST
- Conference Announcement, Security and Web Search
- Engines, Microsoft Word Macro Virus Update
-
- - ----BEGIN PGP SIGNATURE-----
- Version: 2.6.1
- Comment: Processed by Mailcrypt 3.3, an Emacs/PGP interface
-
- iQCVAwUBMpN8qrnzJzdsy3QZAQHpZgP/V+NTN7AwEtWCM46sSBMFnEuz0NxmN9X2
- DMOFnATcUSNvukXBPAMc3LMYmnjhp+CrqDyfQCWVBUaHDTmb3yKTTsexYev5alyd
- cSR4uZjQrMjO1pu16HG7BS+faxaP+E/FVEcbAof9a+tjX4aj9LTOM/Nt8Hb6Aazo
- eRHTBH+AYy4=
- =fBQM
- - ----END PGP SIGNATURE-----
-
- ------------------------------
-
- Date: Thu, 21 Mar 1996 22:51:01 CST
- From: CuD Moderators <cudigest@sun.soci.niu.edu>
- Subject: File 4--Cu Digest Header Info (unchanged since 1 Dec, 1996)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send post with this in the "Subject:: line:
-
- SUBSCRIBE CU-DIGEST
- Send the message to: cu-digest-request@weber.ucsd.edu
-
- DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
-
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- To UNSUB, send a one-line message: UNSUB CU-DIGEST
- Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
- (NOTE: The address you unsub must correspond to your From: line)
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (860)-585-9638.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: ZERO! BBS: +39-11-6507540
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/CuD
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
-
- The most recent issues of CuD can be obtained from the
- Cu Digest WWW site at:
- URL: http://www.soci.niu.edu/~cudigest/
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-persor..
-
-