copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

AusCERT Update



An Update usually follows a previous Security Bulletin.

Updates provide additional information or corrections to an existing Security Bulletin. They are a mechanism for quick release of important information in a less structured way. Updates are often member-only access.


Further Information
AU-2004.010 -- AusCERT Update - High levels of activity due to MyDoom.M/O variants - AusCERT has been informed of high levels of activity due to the MyDoom variants known as MyDoom.M or MyDoom.O. This mass-mailing virus which masquerades as variety of mail delivery and virus infection error messages designed to entice a user to run a malicious attachement. It also spreads through peer-to-peer (P2P) file sharing programs. (27/07/2004)

AU-2004.009 -- AusCERT Update - Worm activity against Microsoft MS04-011 LSASS vulnerability - AusCERT has learned that a new variant of PhatBot/Agobot/Gaobot is attacking unpatched Microsoft Windows 2000 and XP hosts, exploiting the vulnerability in the Microsoft Local Security Authority Subsystem Service (LSASS), described in Microsoft Security Bulletin MS04-011. (29/04/2004)

 denotes AusCERT member only content. AU-2004.008 -- AusCERT Update - Exploit Code Publicly Available For Microsoft Vulnerability MS04-011 - AusCERT advises that unverified exploit code has now been published for a recent vulnerability in Microsoft's IIS web server, which may result in the execution of arbitrary code with SYSTEM level privileges. (22/04/2004)

AU-2004.007 -- AusCERT Update - Vulnerability in Internet Explorer Allows Program Execution - A vulnerability in the handling of "Windows Help" files by Internet Explorer allows the remote execution of arbitrary code on a local computer by a malicious web site. This vulnerability is currently being exploited against Australian users using the bogus bank email reported in AusCERT Alert AL-2004.10 (05/04/2004)

 denotes AusCERT member only content. AU-2004.006 -- AusCERT Update - Exploit activity for Linux kernel memory management problem via mremap() - AusCERT advises that working exploit code has been published for the Linux kernel memory management code inside the mremap(2) system call. (27/02/2004)

AU-2003.021 -- AusCERT Update - Oracle updates to correct TSL/SSL vulnerabilities - (08/12/2003)

AU-2003.020 -- AusCERT Update - Novell eDirectory SSL/TLS ASN.1 Parser and Novell NFS Server Incorrect Hostname Alias Handling Vulnerabilities - (08/12/2003)

 denotes AusCERT member only content. AU-2003.019 -- AusCERT Update - Exploit Code Publicly Available for Microsoft Internet Explorer Cross Domain Scripting Vulnerabilities. - AusCERT advises that working proof of concept exploit code has now been published for several versions of Microsoft Internet Explorer. (27/11/2003)

 denotes AusCERT member only content. AU-2003.018 -- AusCERT Update - Exploit code publically available for Microsoft vulnerabilities MS03-049 and MS03-051 - (19/11/2003)

 denotes AusCERT member only content. AU-2003.017 -- AusCERT Update - New Worm: W32.Paylap - (14/11/2003)

 denotes AusCERT member only content. AU-2003.016 -- AusCERT Update - Exploit Code Publicly Available For Microsoft Vulnerability MS03-043 - AusCERT advises that working exploit code has now been published for the Microsoft Windows Messenger Service vulnerability described in AusCERT ALERT AL-2003.22 (22/10/2003)

AU-2003.015 -- AusCERT Update - New email virus/worm "Swen" masquerades as Microsoft Update - Users and system administrators should be aware of a new mass-mailer worm that claims to be either the "September 2003, Cumulative Patch" or a qmail delivery failure notice with an executable attachment. (19/09/2003)

 denotes AusCERT member only content. AU-2003.014 -- AusCERT Update - Exploit Code Publicly Available For Microsoft Vulnerability MS03-039 - AusCERT advises that working exploit code has now been published for the most recent Microsoft Remote Procedure Call (RPC) vulnerability described in AusCERT ALERT AL-2003.15 , "Buffer Overrun In RPCSS Service Could Allow Code Execution (824146)" (17/09/2003)

 denotes AusCERT member only content. AU-2003.012 -- AusCERT Update - RealNetworks Server Suite Remote Buffer Overflow Vulnerability - RealNetworks have confirmed a vulnerability which allows an unauthorised remote user to gain root/administrator privileges. An exploit is publically available and AusCERT has become aware of increasing scanning activity for this particular vulnerability (02/09/2003)

AU-2003.011 -- AusCERT Update - Worm (MSBLASTER) propagation for recent Microsoft RPC vulnerability - AusCERT has received reports of the wide spread propagation of a new worm: MSBLASTER. This worm exploits the Microsoft Windows DCOM RPC vulnerability announced July 16, 2003. (18/08/2003)

AU-2003.010 -- AusCERT Update - Exploit Code Publicly Available For Recent Microsoft RPC Vulnerability - AusCERT advises that an exploit has now been published for the Microsoft Remote Procedure Call (RPC) vulnerability described in AusCERT ALERT AL-2003.11, "Buffer Overrun In RPC Interface Could Allow Code Execution (Q823980) - Microsoft Security Bulletin MS03-026" (UPDATED) (29/07/2003)

AU-2003.009 -- AusCERT Update - Exploit Code Publicly Available For Recent Cisco DoS Vulnerability - AusCERT has confirmed that working exploit code for the "Cisco IOS Interface Blocked by IPv4 Packet" vulnerability has now been made publicly available. (18/07/2003)

AU-2003.008 -- AusCERT Update - Media Reports on the "DEFACEMENT CHALLENGE" - AusCERT has observed an increase in the number of media reports regarding the "defacement challenge". This is a loosely arranged competition where contestants attempt to deface as many websites in the shortest possible time. The competition is scheduled to occur on July 6, 2003. (03/07/2003)

 denotes AusCERT member only content. AU-2003.007 -- AusCERT Update - WORM_SOBIG.E activity increase - AusCERT has noticed activity by a new variant of the W32/SOBIG worm. WORM_SOBIG.E is spread by network shares and e-mail using its own SMTP engine. (26/06/2003)

 denotes AusCERT member only content. AU-2003.006 -- AusCERT Update - Update to Recent Samba and Microsoft WebDAV Security Bulletins - This AusCERT Update is to provide you with additional information regarding two recent security bulletins; ESB-2003.0171 "Samba" and AL-2003.02 "Microsoft IIS WebDAV Remote Compromise Vulnerability". Both bulletins discuss vulnerabilities with impacts of root/Administrator compromise. (19/03/2003)

 denotes AusCERT member only content. AU-2003.005 -- AusCERT Update - W32/Deloder-A worm activity - (10/03/2003)

 denotes AusCERT member only content. AU-2003.004 -- AusCERT Update - Possible False Positive Attack Signatures in Sendmail Error Logs - (05/03/2003)

 denotes AusCERT member only content. AU-2003.003 -- AusCERT Update - Sendmail Proof of Concept Code Available - New Version of BIND - (05/03/2003)

AU-2003.002 -- AusCERT Update - "Slammer" Worm Causing Wide Spread DDoS Effect - (25/01/2003)

 denotes AusCERT member only content. AU-2003.001 -- AusCERT Update - Information Leakage from Padding of Undersized Ethernet Frames - (10/01/2003)

 denotes AusCERT member only content. AU-2002.011 -- AusCERT Update - Networks affected negatively by FriendGreetings E-Card program - (30/10/2002)

 denotes AusCERT member only content. AU-2002.010 -- AusCERT Update - Recent Increase in Malicious Activity Targeting Windows Hosts - AusCERT has seen a recent increase in system compromises which follow closely to the pattern of activity described in AusCERT Advisory AA-2002.03 [1]. The cause of these compromise appears to be a new worm-like tool targeting Windows NT/2002/XP hosts. (25/10/2002)

 denotes AusCERT member only content. AU-2002.009 -- AusCERT Update - False Positive Virus Reports Using McAfee Anti-Virus Products - This update is meant to draw your attention to a recent issue discovered with the McAfee anti-virus product line. McAfee have received reports of false positive detections of the W32/Insane.dam virus while using the VirusScan, Netshield, and Virex anti-virus products. (23/10/2002)

AU-2002.008 -- AusCERT Update - Updated Information Regarding BugBear Virus - (03/10/2002)

 denotes AusCERT member only content. AU-2002.007 -- AusCERT Update - Serious Vulnerability Fixed in Microsoft Windows XP Service Pack 1 - (12/09/2002)

 denotes AusCERT member only content. AU-2002.006 -- AusCERT Update - Public DoS Exploit Tools for Vulnerabilities in Windows SMB - (30/08/2002)

 denotes AusCERT member only content. AU-2002.005 -- AusCERT Update - SSL Vulnerabilities in IE and Konqueror (UPDATE) - (16/08/2002)

 denotes AusCERT member only content. AU-2002.004 -- AusCERT Update - SSL Vulnerabilities in Internet Explorer and Konqueror - (13/08/2002)

 denotes AusCERT member only content. AU-2002.003 -- AusCERT Update - Updated information regarding SNMP vulnerabilities - (18/03/2002)

 denotes AusCERT member only content. AU-2002.002 -- AusCERT Update - Multiple Vulnerabilities in Oracle Products - (12/03/2002)


Previous  1, 2, 3, 4, 5  Next denotes AusCERT member only content.