PCANYWHERE 9.0 VULNERABLE TO DOS ATTACK
Securax reported a Denial of Service (DoS) condition in PCAnywhere 9.0. By sending a large amount of data to the software's listening ports, a malicious user can crash the PCAnywhere service. Symantec is aware of this problem and is working on a fix.
VULNERABILITY IN MULTIPLE SSH IMPLEMENTATIONS
BindView RAZOR reported that implementations of Secure Shell (SSH) that include CORE SDI's deattack.c code are vulnerable to an integer overflow attack that can let arbitrary commands execute on the host server. SSH vendors are aware of the matter, and many have already released patches to correct the matter.
WINDOWS NT 4.0 PRIVILEGE ESCALATION VULNERABILITY
BindView RAZOR also reported a privilege escalation vulnerability in Windows NT 4.0. A flaw in the way the NT LAN Manager (NTLM) Security Support Provider handles client requests can let a malicious user run a program as a privileged user. Microsoft has released a patch and FAQ and will reportedly make article Q280119 available online soon.
WINDOWS 2000 PRIVILEGE ESCALATION VULNERABILITY
@Stake discovered a privilege escalation vulnerability in Win2K. A malicious user can launch commands in the SYSTEM context by exploiting the process that starts the Network Dynamic Data Exchange (DDE) Service. Microsoft has released a patch and FAQ and will make article Q285851 available online soon.
CRASH DUMP ANALYSIS
Many systems administrators forgo exploring Windows 2000's and Windows NT 4.0's crash dump options in the belief that using them is too difficult. Although Microsoft's debugger documentation has improved in the past year, it's still oriented toward device-driver developers. But even if just one crash dump in five contains information that proves useful, you'll find it worthwhile to learn at least a little about crash dump analysis. Be sure to read Mark Russinovich's primer on crash dump analysis on the included link.
WHY CAN'T MY WINDOWS 98 CLIENTS LOG ON THE WINDOWS 2000 DOMAIN?
This problem occurs when you upgrade a Windows NT 4.0-based domain to Windows 2000, and the process corrupts the SAM. Windows 98 clients receive the following message:
This device does not exist on the network. The domain password you supplied is incorrect or access to your logon server has been denied.
Currently, a fix to this problem doesn't exist. The only workaround is to back up the users, remove Active Directory (AD), recreate AD, and import the users. Perform the following steps:
1. Back up the users and groups to a text file using the addusers.exe utility (in the Win2K Resource Kit): C:\> addusers /d users.txt
2. Remove AD using the dcpromo.exe utility.
3. Reinstall AD using the dcpromo.exe utility.
4. Use the addusers.exe utility to import the users and groups contained in the text file, thus recreating the accounts: C:\> addusers /c users.txt
Obviously, in a large environment, this solution might be difficult, but it stresses the importance of making sure you test your whole range of clients when you upgrade to Win2K.
HACKERS SAY ATTACK WAS EASY
Uncovering confidential data, such as passwords and credit card numbers, on business and government leaders who attended an annual meeting in the Swiss Alps was easy, computer hackers were quoted as saying Sunday. The Zurich weekly SonntagsZeitung, which last Sunday disclosed the capture of data on 27,000 leaders, listed on the Internet the type of information that was compromised for each leader. Former President Bill Clinton's forum password and actor Dustin Hoffman's e-mail address were included. The newspaper lists the names and titles, but withholds the confidential numbers.