SANS NewsBites is a semiweekly high-level executive summary of the most important news articles that have been published on computer security during the last week. Each news item is very briefly summarized and includes a reference on the web for detailed information, if possible.
Spend five minutes per week to keep up with the high-level perspective of all the latest security news. New issues are delivered free every Tuesday and Friday.
Volume III - Issue #49
December 05, 2001
Goner is a dangerous worm that is spreading far too rapidly. However,
it caused no problem at all in those organizations that block
attachments of most malicious types. An increasing number of
organizations use filtering and secure configuration management to
protect their users and reduce the cost of cleaning up after worms
and other attacks. Makes sense to me.
The SANS Weekly Security News Overview
Volume 3, Number 49 December 5, 2001
TOP OF THE NEWS5 December 2001 Goner Worm Hits Hard
30 November 2001 Security Patch Demand is Overwhelming
28, 29 & 30 November 2001 WU-FTPD Vulnerability
28, 29 & 30 November 2001 Appeals Courts Uphold DCMA
26 & 28 November 2001 Google Search Results Could Present Security Problem
THE REST OF THE WEEK'S NEWS5 December 2001 US Cyber Security Chief Asks Vendors To Do More To Protect Users
3 December 2001 Federal Agencies Need Security Specialists
30 November 2001 Dreamcast Game Screensaver Infected with Kriz Virus
30 November 2001 Gary McGraw Interview
30 November 2001 Government Sites Defaced
26 November 2001 Sklyarov Hearing Date Set
29 November 2001 National IDs Won't Work
27 & 28 November 2001 McNealy Interview
29 November 2001 Russian Man Arrested in ATM Fraud Case
29 November 2001 Former Cisco Accountants Sentenced for Fraud
28 November 2001 GSA Team to Review GovNet Input
27 November 2001 Network Associates Denies Working with FBI
26 November 2001 Disclosure Waiting Period Wouldn't Work
26 November 2001 Security Funds Misallocated, Says Oppenheimer VP
************************ Sponsored by NetIQ **************************
Free Security Guide from NetIQ.
Learn How to Unlock Your Firewall's Secrets with Security Manager.
Find out how to maximize the return on your firewall investment.
Download NetIQ's free white paper, "Reporting and Incident Management
for Firewalls: The Keys to Unlocking Your Firewall's Secrets."
TOP OF THE NEWS
5 December 2001 Goner Worm Hits HardThe goner worm comes by email, offers a screen saver, spreads rapidly, infects large numbers of user files, and tries to delete firewall and antivirus software.
30 November 2001 Security Patch Demand is OverwhelmingIT managers are overwhelmed with patches and updates, according to a recent study. A UK-based study found that most companies would have to make an average of 5 updates every work day to keep up with the steady flow of fixes from security vendors.
28, 29 & 30 November 2001 WU-FTPD VulnerabilityCERT/CC has issued a warning about a vulnerability in the Washington University FTP daemon that could allow crackers to gain complete control of computer systems unless patches are installed. A group of vendors had agreed to release their patches on December 3, but Red Hat mistakenly released an advisory on November 27.
28, 29 & 30 November 2001 Appeals Courts Uphold DCMAA federal appeals court upheld a ruling that prohibits Eric Corley, operator of the 2600 magazine web site, from publishing or linking to code that breaks DVD encryption, marking a victory for proponents of the Digital Millennium Copyright Act (DCMA). In another DCMA-related case, a New Jersey federal district court judge dismissed a case brought by Princeton Professor Edward Felten against the Recording Industry Association of America (RIAA) and the Secure Digital Music Initiative (SDMI). Felten alleged the RIAA threatened him with legal action if he presented his code-breaking research at conferences.
26 & 28 November 2001 Google Search Results Could Present Security ProblemA new tool in the Google search engine can return results not intended for public viewing. Not only can the searches turn up credit card numbers and other sensitive information, but they are capable of pinpointing sites running software with known vulnerabilities.
**************** Also Sponsored by Cyber Defense West ****************
Turbo charge your security career with one of the great immersion
training tracks in San Francisco, December 16-20.
THE REST OF THE WEEK'S NEWS
5 December 2001 US Cyber Security Chief Asks Vendors To Do More To Potect UsersDick Clarke told software companies that their responsibility doesn't end when they fix a hole in their products and announce it on their web site. They can take more responsibility for ensuring the fixes are implemented.
3 December 2001 Federal Agencies Need Security SpecialistsGovernment agencies have had trouble attracting strong applicants for computer security jobs not only because of the significant salary discrepancies, but also because of the length of time it takes to get employees the necessary security clearances and the small pool of applicants with sufficient expertise. In addition, some agencies do not make security a priority.
[Editor's (Schultz) Note: I'm convinced that many agencies do not make security a priority because they do not really know what to do. Some of them, for example, entangle themselves in complex risk assessment methods to the degree that they divorce themselves from reality or drain a disproportionate amount of their resources on activities that do not directly result in elevated protection of systems and networks. (Murray) The problem is not nearly so much a problem of absence of technical skills as one of absence of management attention. ]
30 November 2001 Dreamcast Game Screensaver Infected with Kriz VirusA screensaver included with the Dreamcast game Atelier Marie is infected with the Kriz virus; its malicious payload includes attempts to corrupt BIOS chips and overwrite all files on hard disks and network drives. The developers have recalled the game.
30 November 2001 Gary McGraw InterviewGary McGraw, co-author of Building Secure Software, speaks to CNET News.com about his ten principles for better security, which include identifying and securing the weakest link and keeping things simple, and the five worst security problems, which include buffer overflows and misused cryptography.
[Editors' (Multiple) Note: McGraw is 100% correct. Many of the same principles have been promoted for more than a decade by people like Steve Bellovin, Gene Spafford and Matt Bishop. The fact that programmers have systematically ignored them illuminates the absence of security in the priorities set by the people who manage programmers. (Murray) Quality software is useful but not sufficient for good security. Teaching "security" in colleges will not help to get quality software; we must teach software engineering. Further, even misused cryptography is better than unused cryptography. It may be sufficient to get you off of the target of opportunity list. ]
30 November 2001 Government Sites DefacedCrackers defaced two US government sites, one belonging to the National Oceanic and Atmospheric Administration (NOAA) and the other to the National Institute of Health (NIH), with anti-American propaganda. A different cracker defaced the Army's Waterways Experiment Station home page.
26 November 2001 Sklyarov Hearing Date SetDmitry Sklyarov, the Russian programmer charged with violating the Digital Millennium Copyright Act (DMCA) for writing a program that lets Adobe eBook Reader users to copy books, will have a court hearing on April 15, 2002.
29 November 2001 National IDs Won't WorkJay Stanley and Barry Steinhardt of the American Civil Liberties Union (ACLU) offer five reasons why a national identity system is not a good idea, including the "slippery slope of surveillance" and the potential for discrimination and harassment.
27 & 28 November 2001 McNealy InterviewSun Microsystems Chairman and CEO Scott McNealy discusses last year's external memory cache problem, customer nondisclosure agreements (which have since been dropped), national ID cards, and the upcoming Solaris 9.
29 November 2001 Russian Man Arrested in ATM Fraud CaseA Russian organized crime ring stole account and personal identification numbers (PINs) from people using point of sale ATMs in Manhattan, New Your City. The group allegedly stole $1.5 million from the victims, who are largely Chase and Citibank customers. The US Treasury's Secret Service police have arrested one man in connection with the thefts and are looking for another.
29 November 2001 Former Cisco Accountants Sentenced for FraudGeoffrey Osowski and Wilson Tang, formerly accountants at Cisco, have been sentenced to nearly three years in prison for exploiting their insider status to commit computer and securities fraud.
28 November 2001 GSA Team to Review GovNet InputA General Services Administration (GSA) team will look at industry responses to the proposed GovNet, a secure voice and data network not connected to the Internet.
27 November 2001 Network Associates Denies Working with FBIAn Associated Press article alleged that McAfee has spoken with the FBI about ensuring that its antivirus software wouldn't detect the agency's Magic Lantern software. Network Associates, which makes McAfee products, was roundly criticized by security specialists and denied having contacted the FBI.
26 November 2001 Disclosure Waiting Period Wouldn't WorkComputerworld senior columnist Frank Hayes points out that had Microsoft's proposed 30-day waiting period been in place, we would only just now officially be hearing about Nimda. A waiting period for vulnerability disclosures would not reduce security risks because virus and worm writers are not likely to abide by the 30-day rule.
26 November 2001 Security Funds Misallocated, Says Oppenheimer VPMike Hager, Oppenheimer Funds VP of network security and disaster recovery, says that companies spend 80% of their security budgets guarding against outside threats while 80% of attacks come from internal sources.
[Editor's (Schultz) Note: Hager is wrong here; he is perpetrating a myth based on 1983 FBI statistics. Most attacks now come from the outside, but organizations generally deploy firewalls and other perimeter measures that stop most outside attacks. Hager should carefully examine organizations' firewall logs before making a statement such as the one he has made. I agree with the premise that insider attacks are still by far the greater source of loss, however. ]
Please feel free to share this with interested parties via email (not
on bulletin boards). For a free subscription, (and for free posters)
e-mail firstname.lastname@example.org with the subject: Subscribe NewsBites
Kathy Bradford, Dorothy Denning, Roland Grefer, Vicki Irwin,
Bill Murray, Stephen Northcutt, Alan Paller,
Marcus Ranum, Howard Schmidt, Eugene Schultz