[virusinfo] virusinfo Digest V4 #104

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Mon, 18 Apr 2005 10:18:27 -0700




virusinfo Digest        Sun, 17 Apr 2005        Volume: 04  Issue: 104

In This Issue:
                [virusinfo] Panda Oxygen3 24h-365d [Weekly summary - 4/16/05
                [virusinfo] Trend: Pattern File Alerts

----------------------------------------------------------------------

Date: Sun, 17 Apr 2005 16:35:05 -0700
From: "Mike" <mikebike@xxxxxxxxx>
Subject: [virusinfo] Panda Oxygen3 24h-365d [Weekly summary - 4/16/05]



From: Panda Oxygen3:

"A proverb is a short sentence based on long experience."
        Miguel de Cervantes Saavedra (1547-1616), escritor español.

                        - Weekly summary -
   Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, April 16th, 2005 - This week Oxygen3 24h-365d has reported the news
summarized below, which can be accessed at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp:

- DNS Cache Poisoning Attacks (4/11/2005)
"@RISK" (the SANS community's consensus bulletin) has reported a problem in
the default configuration of the DNS servers in the DNS system in Windows
NT and Windows 2000 (prior to SP3). Other configurations are also
reportedly vulnerable and being studied. 

- Address spoofing in various Microsoft mail clients (4/12/2005)
A vulnerability has been reported in the email clients Microsoft Outlook
and Microsoft Outlook Web Access, which could allow an attacker to easily
spoof or hide the real address.

- New Microsoft Security Bulletins (4/13/2005)
Last tuesday, Microsoft released eight security bulletins for its products,
including five vulnerabilities rated as 'critical'.

- Multiple vulnerabilities in Lotus Notes and Domino (4/14/2005)
IBM has confirmed four vulnerabilities in Lotus Notes and Domino, which can
be exploited to cause a denial of service.

- Multiple vulnerabilities in Oracle servers (4/15/05)
Oracle has released a security bulletin confirming multiple vulnerabilities
in the Oracle family of servers. A remote user could obtain information
from the database and modify it or cause a denial of service.

NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.

------------------------------------------------------------
To contact with Panda Software, please visit:
http://www.pandasoftware.com/about/contact/
------------------------------------------------------------

*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike


------------------------------

Date: Sun, 17 Apr 2005 17:54:49 -0700
From: "Mike" <mikebike@xxxxxxxxx>
Subject: [virusinfo] Trend: Pattern File Alerts



******* Mike's  REPLY SEPARATOR *********

On 4/17/2005 at 4:45 PM Trend Micro Newsletters Editor wrote:

Dear Trend Micro customer,

As of April 17, 2005 PDT (Pacific Daylight Time/GMT -7:00), TrendLabs has
released Official Pattern file 2.578.00. 

If you are running a Trend Micro antivirus product, it should automatically
update to this latest pattern file. You may also manually download this new
pattern file from http://www.trendmicro.com/download/pattern.asp.

----------------------------------------------o0o----
Important Note: 
Users of non-NPF (i.e., old 3-digit pattern format) compliant products will
not be able to update to the pattern release indicated in this email.
Non-NPF compliant products can only update to pattern 991, which was
released March 7, 2005. TrendLabs urges all affected customers to apply the
New Pattern Format solution at
http://www.trendmicro.com/en/support/npf/overview.htm or upgrade to the
latest product version to address this limitation. 
______________________________________________________________________
This message was sent by Trend Micro's Newsletters Editor using Responsys
Interact (TM).


To view our permission marketing policy:
    http://www.rsvp0.net
Copyright 1989-2005 Trend Micro, Inc.  All rights reserved
Trend Micro, Inc., 10101 N. De Anza Blvd., Suite 200, Cupertino, CA 95014

*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 



------------------------------

End of virusinfo Digest V4 #104
*******************************




Other related posts:

  • » [virusinfo] virusinfo Digest V4 #104