Gregg's Security News Aggregator

Currently, this "blog" is nothing more than a news aggregator which

gets security information from over 30 sources. As you'll note,

a number of the sources are not specific to security. Advanced

filtering is definitely needed.






Subscribe to "Gregg's Security News Aggregator" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Saturday, April 24, 2004
 

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Low-carbers booted out of buffet for meat-centric consumption. A couple who were on a low-carb diet were ejected from a Utah all-you-can-eat buffet restaurant for eating too much meat.

"We've never claimed to be an all-you-can-eat establishment," said Johanson. "Our understanding is a buffet is just a style of eating."

The general manager was carving the meat, and became concerned about having enough for other patrons, Johanson said. So when Amaama went up for his 12th slice, the manager asked Amaama to stop.

Link

(Thanks, George!)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Towards Silent Supersonic Planes
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
3.  BugTraq: Apache - all versions vulnerability in OLD procesors.. Sender: Adam Zabrocki [pi3ki31ny at wp dot pl]
4.  Vulns: PHProfession Multiple Vulnerabilities. phProfession is a third-party job posting module for PostNuke.

Multiple vulnerabilities were reported to exist in phProfession. The following specific vulnerabilities w...

----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Apache - all versions vulnerability in OLD procesors.
6.  Security Tracker: Linux Kernel panic() Buffer Overflow Has Unspecified Impact "Red Hat reported ...
7.  News Factor: Core Flaw Could Cause Internet Traffic Jam "Any application protocol which relies o...

7:19:54 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Operation FastLink Yields Three Arrests
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  [ GLSA 200404-17 ] ipsec-tools and iputils contain a remote DoS vulnerability

6:19:34 PM    comment []

----------------------------------------------------------------------
Ars Technica
----------------------------------------------------------------------
1.  First US cyberstalking case taking shape. Robert James Murphy is the first person in the United States to be charged with what many are calling "cyberstalking." Technically, Murphy has been charged with violating Title 47 of the US Code, section 223. By Ken "Caesar" Fisher.
----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
2.  Woody Woodpecker laugh-guy is dead. Harry Babbit, the voice of Woody Woodpecker's laugh in the Woody Woodpecker novelty song, is dead.

Dubbed "Handsome Harry" by Kyser, Babbitt sang on several hits, including "Three Little Fishies,""On A Slow Boat to China,""(Lights Out) 'Til Reveille,""He Wears a Pair of Silver Wings,""Jingle, Jangle, Jingle" and "The Umbrella Man."

Babbitt's high voice was later used on a solo recording of "All I Want for Christmas Is My Two Front Teeth," for which he included a lisp. He was even responsible for the laugh on "Woody Woodpecker," Kyser's 1948 hit novelty tune.

Link

(Thanks, Amanda!)

3.  Spanish translation and augmentation of Ebooks: Neither E nor Books. This is screamingly cool: I gave a talk at this year's Emerging Tech conference called Ebooks: Neither E nor Books and released the text into the public domain. Alas, the slides that accompanied the talk were full of copyrighted images that I was in no position to release into the public domain with the talk.

Now, José Antonio Millán has taken the public domain text and translated it into Spanish. But José went one better -- several better, in fact -- he used my notes about the slides I'd used to "illuminate" his translation with clip art he discovered on the Net, and then went through the piece and added extensive footnotes. My Spanish is wildly imperfect, but it's good enough to see that this is a good, thoughtful translation, and the illustrations and citations are tremendous.

Link

(Thanks (a lot!) Javier!)

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
4.  Does A Good Game Make A Good Movie Idea?
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
5.  Vulns: OpenSSL Denial of Service Vulnerabilities. Three security vulnerabilities have been reported to affect OpenSSL. Each of these remotely exploitable issues may result in a denial of service in applications which us...

5:19:14 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Biometric Voice Recognition Credit Cards
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
2.  BugTraq: [ GLSA 200404-17 ] ipsec-tools and iputils contain a remote DoS vulnerability. Sender: Kurt Lieber [klieber at gentoo dot org]
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Network Query Tool Input Validation Flaw in 'portNum' Lets Remote Users Conduct Cross-Site Scripting Attacks
4.  Protector System SQL Protection Mechanism Can Be Bypassed By Remote Users
5.  Mozilla Bonsai cvsqueryform.cgi module Variable XSS
6.  Vixie cron Long Username Overflow
7.  Viking Web Server Multiple Header Overflow
8.  BIND HMAC-MD5 Shared Secret Key File Disclosure
9.  PostNuke openwindow.php hlpfile Variable XSS
10.  Heimdal Kerberos kadmind Multiple Buffer Overflows
11.  Heimdal Kerberos kadmind Multiple Nondescript
12.  Heimdal Kerberos kf and kfd Multiple Buffer Overflows
13.  McAfee ePolicy Orchestrator POST Parameters Overflow
14.  McAfee ePolicy Orchestrator POST Format String
15.  McAfee ePolicy Orchestrator MSDE SA Account Compromise

4:18:55 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  JPEG Patent Could Impact The Gimp
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
2.  Vulns: Sun Fire/Netra Remote TOS IP Packet Denial Of Service Vulnerability. Sun Fire/Netra products are general-purpose server hardware platforms, which can be used for a variety of applications.

A denial of service vulnerability has been report...


3:18:34 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Google's Sergey Brin Talks on Gmail's Future
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
2.  Vulns: Linux Kernel R128 Device Driver Unspecified Privilege Escalation Vulnerability. The Linux Kernel supports numerous driver modules; one such is the R128 ATI Rage 128 bit video card driver module.

It has been reported that the Linux Kernel is prone to...

3.  Vulns: Linux Kernel EXT3 File System Information Leakage Vulnerability. An information leakage vulnerability has been reported to exist in the Linux kernel when writing to an ext3 file system. This issue is due to a design error that causes ...
4.  Vulns: BEA WebLogic Server And WebLogic Express Configuration Log Files Plain Text Password Vulnerability. WebLogic Server and WebLogic Express are enterprise application server products distributed by BEA Systems. Configuration of the software is done, in part, through the u...

2:18:13 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  IBM Subpoenas Several Companies in SCO Case
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
2.  Vulns: BEA WebLogic Authentication Provider Privilege Inheritance Vulnerability. BEA WebLogic Server and Express are prone to an issue that may cause administrative privileges to be inherited by a secondary group that these permissions have not been e...
3.  Vulns: Journalness Unspecified Post Access Vulnerability. Journalness is web-based journal software that is written in PHP. It is available for Unix and Linux variants.

Journalness version 3.0.8 was released to address a vulne...

----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
4.  Broke telcos doing everything they can - Qwest exec. Wringing bits By Ashlee Vance .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
5.  Myster Public Release 8

1:17:53 PM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  HDTV TiVo Now Shipping
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
2.  Vulns: PostNuke Pheonix Multiple Module SQL Injection Vulnerabilities. PostNuke Pheonix is a freely available web-based content management system. It is implemented in PHP and available for Unix/Linux variants as well as Microsoft Windows pl...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Advanced Guestbook Input Validation Hole in Password String Permits SQL Injection
4.  Modular Site Management System (MSMS) 'ver.asp' May Disclose System Information to Remote Users
5.  artmedic hpmaker Include File Error Lets Remote Users Execute Arbitrary Commands
6.  Linux Kernel panic() Buffer Overflow Has Unspecified Impact

12:17:34 PM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Here, There, WiFi Anywhere (washingtonpost.com). washingtonpost.com - Peter Kastner moved from the suburbs to an apartment in Boston last summer while his new home was under construction. As soon as he got set up in the temporary digs, Kastner -- chief technology analyst at the research firm Aberdeen Group -- set up his WiFi home network to enjoy some wireless Web surfing.
2.  Flexibility Comes Relatively Cheap (washingtonpost.com). washingtonpost.com - At its most basic, WiFi is the Internet equivalent of a cordless phone. Instead of replacing a coiled-up phone cord, WiFi takes the place of Ethernet cable, the thick wiring that stretches under desks in offices.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  How to: Use a GPS watch, XML and Satellite photos
----------------------------------------------------------------------
SecurityFocus Vulns
----------------------------------------------------------------------
4.  Vulns: Symantec Firewall Products Remote Denial Of Service Vulnerability. eEye Digital Security has reported a remotely exploitable denial of service vulnerability in Symantec Norton Internet Security, Norton Personal Firewall. Client Firewall ...
5.  Vulns: Symantec Firewall Products WrapNISUM Class Remote Command Execution Vulnerability. Symantec firewall products such as Norton Internet Security, Norton Personal Firewall, Client Firewall and Client Security are prone to a vulnerability that may potential...
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Symantec Client Security SYMNDIS.SYS TCP Options Parsing Flaw Lets Remote Users Deny Service
7.  Symantec Client Firewall SYMNDIS.SYS TCP Options Parsing Flaw Lets Remote Users Deny Service
8.  US defends cybercrime treaty

11:17:14 AM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  SCO's Biggest Investor Admits It Loves IP Lawsuits
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  La «Convention sur la cybercriminalité» entrera en vigueur le 1er juillet
3.  Traduction des manuels d'aide de SpywareGuard et SpywareBlaster
4.  Top Port: mydoom 3127

10:16:54 AM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Appreciating Your Stressful IT Job?
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Linux Kernel cpufreq Signed Integer Assignment Flaw Discloses Memory to Local Users
3.  Outside firms to help with online ID checks
4.  More smart card standards, please
5.  Stenbit advises Cryptek

9:16:34 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Programs: 'Scooby Doo' Console Game Is No Dog (Reuters). Reuters - (Gene Emery is a columnist who covers science and technology. His Internet address is GEmery(at)Cox.net. Any opinions in the column are his alone.)
2.  Telmex to Launch Online Video Games with Microsoft (Reuters). Reuters - Mexico's leading telephone company, Telmex, said on Friday it plans to launch an online video game service with Microsoft as it seeks to diversify its revenue sources and boost broadband usage.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
3.  Unreal Game Engine UMOD '..' Input Validation Flaw Lets Remote Users Overwrite Files on the Target System
4.  Trusted Computing/DMCA vs. Diebold Pentagon Paper
5.  Diebold knew of legal risks
6.  Judge: Tribune must turn over legal memos
7.  WormRadar Node Volunteers Help Graph Attacks
8.  WormRadar
9.  Call for volunteers to run WormRadar nodes

8:16:15 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Tech sleuth tracked down Net flaw just for the `thrill' (SiliconValley.com). SiliconValley.com - Paul Watson is still digesting his flash of Internet fame this week, when he became the talk of the cybersecurity world.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  Physics Goes To Hollywood
----------------------------------------------------------------------
The Register
----------------------------------------------------------------------
3.  SEC rules drag reluctant Google to market. 'And these little piggies forgot about their disclosure requirements' By Andrew Orlowski .
4.  US defends cybercrime treaty. Your secrets are safe with us By Kevin Poulsen, SecurityFocus .
5.  Yahoo! calls for uniform EU music licensing. Stop start By electricnews.net .
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
6.  Netegrity SiteMinder Affiliate Agent Heap Overflow Vulnerability
7.  Gentoo update for net-firewall/ipsec-tools
8.  WORM_SDBOT.MY

7:15:45 AM    comment []

----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
1.  E-mail scams cost banks £1m. E-mail scams have so far cost UK banks more than £1m and there is concern the bill could rise as they become more sophisticated.
----------------------------------------------------------------------
Wired News
----------------------------------------------------------------------
2.  Playing Games With a Conscience. Groups bemoan the proliferation of 'hate' games, but some of them foster cooperation, understanding and tolerance. By Daniel Terdiman.
3.  The Net: To Tax or Not to Tax?. Senators revive the Internet tax-ban question and schedule a debate for Monday. It'll be the first debate since Republican leaders pulled a bill banning Net taxes from consideration last fall, when lawmakers failed to strike a deal.
4.  Diebold May Face Criminal Charges. A panel that recommended decertifying Diebold's touch-screen voting machines in California also wants to see the company face charges for violating the state's election laws. Kim Zetter reports from Sacramento, California.
5.  Hubble's Anniversary Ring. NASA commemorates the 14th anniversary of the launch of the Hubble Space Telescope with a picture, taken by Hubble, depicting a 'ring galaxy.' By Lore Sjöberg.
6.  The Onion Sells More Laughs. For the price of a $30 cup of coffee, The Onion will offer readers a subscription version of its site with more content and no ads. But don't worry, the rest of the satire site remains unchanged. By Katie Dean.
7.  Gmail Still Sparking Debates. At a privacy conference, participants say Google's Gmail service raises lots of questions about how the law should handle e-mail scans and searches. Ryan Singel reports from Berkeley, California.
8.  Forgent Sues Over JPEG Patent. Forgent Networks says it owns a key algorithm in the JPEG picture format, and intends to get 31 of the computing industry's biggest companies to pay for it. By Amit Asaravala.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
9.  Operation Fastlink contre plusieurs groupes de pirates.
10.  Effacer les listes de derniers fichiers ouverts sous Windows
11.  Netegrity SiteMinder Affiliate Agent Heap Overflow Vulnerability
12.  Netegrity SiteMinder Affiliate Agent Heap Overflow Vulnerability
13.  Gentoo update for net-firewall/ipsec-tools
14.  Gentoo update for net-firewall/ipsec-tools

6:15:24 AM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Time Magazine launches a blog. "Techno File" is a new big-media-blog authored by TIME Magazine writer Eric Roston, described as "a daily commentary on the technology that will carry us through tomorrow -- and the stuff that keeps us stuck in yesterday." Here it is, on TypePad. Link (Thanks, Jean-Luc )
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
2.  WiX Project Lead Interviewed On CPL Licensing
----------------------------------------------------------------------
BBC News | Technology | UK Edition
----------------------------------------------------------------------
3.  Games make for awkward films. Film-makers have a patchy record in transferring games to the cinema screen, says BBCi's Daniel Etherington.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  Computer World: Seven lessons learned about single sign-on
5.  GCN: NIST - Standardize smart card policy "Standardization also can pose security problems becau...
6.  The Register: Network Associates sells Sniffer "to private investors and to concentrate on the s...
7.  ZDNet: Code exists to exploit TCP flaw "Symantec has confirmed that malicious code that can take...
8.  Linux: Securing a fresh Linux install
9.  Seven lessons learned about single sign-on
10.  Network Associates to change name to McAfee
11.  BKDR_DELF.MR

5:15:05 AM    comment []

----------------------------------------------------------------------
Boing Boing
----------------------------------------------------------------------
1.  Chair with hidden ironing board, dryer, iron.

The Real Lady chair is clad in beige vinyl, and has a secret compartment in the back that opens to reveal a hair-dryer, iron and ironing board. This is one hell of a thrift-store find.

Link

(Thanks, Dan!)


2.  Questionnaire for mind-control perpetrators. Here's a questionnaire posted by a "mind control victim" (who believes there's a controlling microchip in his skull) addressed to "perpetrators" of "mind-control/electronic harassment." It stresses that this is an anonymous opportunity for mind-controller to come clean abotu their motives, with questions like, "Will you tell us why you are a harassment agent?", "Are you also controlled?" and "Are you in fear for your life?"

Link

(via Making Light)

3.  References in Kill Bill. Here's a pretty exhaustive-looking catalogue of film references in Tarantino's Kill Bill duology.

Link

(via Kottke)

4.  Woody Woodpecker laugh-guy is dead. Harry Babbit, the voice of Woody Woodpecker's laugh, is dead.

Dubbed "Handsome Harry" by Kyser, Babbitt sang on several hits, including "Three Little Fishies,""On A Slow Boat to China,""(Lights Out) 'Til Reveille,""He Wears a Pair of Silver Wings,""Jingle, Jangle, Jingle" and "The Umbrella Man."

Babbitt's high voice was later used on a solo recording of "All I Want for Christmas Is My Two Front Teeth," for which he included a lisp. He was even responsible for the laugh on "Woody Woodpecker," Kyser's 1948 hit novelty tune.

Link

(Thanks, Amanda!)

5.  Obsessive spreadsheet community. Noting geeks' propensity for creating spreadsheets to track random crap ("number of consecutive sunny days, the types and prices of the cups of coffee they drink, or just straightforward charts about their boss's mood"), Anil Dash proposes "ExcelPile" -- a place to put your obsessive spreadsheets.

Link

----------------------------------------------------------------------
Dilbert
----------------------------------------------------------------------
6.  Dilbert for 24 Apr 2004.
----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
7.  Release Of New Java Spec May Not Be Cause For Celebration (TechWeb). TechWeb - Sun Microsystems and partners have a J2EE 1.4 kickoff event next week, but some vendors seem more nonchalant about adopting the new spec than they had in the past.
8.  Telelogic Finds Growth Outside Europe (TechWeb). TechWeb - Telelogic AB, which makes tools for software-requirements management, is finding greater growth outside its traditional European stronghold.

4:14:05 AM    comment []

----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
1.  Build Your Own Imperial Star Destroyer
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Korsanla mücadele yasasý Resmi Gazete'de yayýmlandý
3.  [CISCO] OpenSSL implementasyonu güvenlik açýðý
4.  Ýlk Türkçe FreeBSD Kitabý Yayýnda
5.  [CERT] Cisco IOS SNMP güvenlik açýðý
6.  Vicious Worm Infects Without Attachment
7.  Southern Road Trip (interview #7)
8.  John Gantz predicted cyber-terror would occur in 2003...

3:13:45 AM    comment []

----------------------------------------------------------------------
New York Times: Technology
----------------------------------------------------------------------
1.  Google Flirts; Investors Wonder About Date. Google, the popular Web search company, is expected to take a tentative first step next week toward a public stock offering. By John Markoff.
2.  Sales Abroad Help Amazon Post a Profit in 1st Quarter. Amazon.com reported first-quarter earnings of $111 million, its first profit in a nonholiday quarter, led by lower prices and surging international sales. By Laurie J. Flynn.
----------------------------------------------------------------------
Slashdot
----------------------------------------------------------------------
3.  XCor Receives Sub-Orbital Launch Permit
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
4.  WORM_SDBOT.BC
5.  BKDR_SDBOT.IC
6.  Homeland Security: a little more sensitivity training, please!
7.  phatbot becomes open source
8.  Move to Yellow, Potential PCT worm, No Osama has NOT been captured, New Virus, Symantec Firewall Vulnerability
9.  Exclusive: Oblix's ShareID 2.0 a first-rate authentication middleman
10.  TCP catastrophe?
11.  Libya missed, iPod dissed
12.  WORM_AGOBOT.IK

2:13:24 AM    comment []

----------------------------------------------------------------------
Yahoo! News - Technology
----------------------------------------------------------------------
1.  Army Confronts Enemies Within in Cyber War Game (Reuters). Reuters - The mission: to secure an entire computer network for the United States and its allies against a vague enemy force.
----------------------------------------------------------------------
NewsIsFree: Security
----------------------------------------------------------------------
2.  Cisco To Buy Riverhead Networks
3.  How Secure Is OS X?
4.  Witty Worm Overwrites Hard Disks
5.  WORM_RANDBOT.B
6.  Secret Repairs Preceded TCP Flaw Release
7.  Secret Repairs Preceded TCP Flaw Release
8.  The Woz to Keynote at Next HOPE Conference
9.  The Fifth HOPE (Hackers on Planet Earth) conference
10.  Computers, Freedom & Privacy Conference 2004
11.  Computer Freedom & Privacy Conference - program info
12.  Diebold May Face Criminal Charges
13.  Computer Security and Online Privacy Geared to the Home and Small Office User
14.  Bush: Privacy of Families Outweighs Photos
15.  News: U.S. defends cybercrime treaty

12:21:25 AM    comment []


Click here to visit the Radio UserLand website. © Copyright 2004 Gregg Doherty.
Last update: 5/3/2004; 12:27:04 AM.
This theme is based on the SoundWaves (blue) Manila theme.
April 2004
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30  
Mar   May