Security Awareness on Social Media

Lance Spitzner from SANS is writing about Security Awareness on Social Media this month.  This blog entry specifically reviews privacy and social media, two polar opposites in today's world of online media.  It also reviews how to spot potential scams and finally, why to keep work and your personal life separate when posting online.

This is a great read to start off CyberSecurity Awareness Month.

FreeRadius Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.

" The CVE notification is CVE-2012-3547. The issue was found by Timo Warns, and communicated to A sample exploit for the issue was included in the notification.

We recommend all administrators using EAP and 2.1.11, 2.1.12, or the git "master' branch upgrade immediately.

SA-CONTRIB-2012-109 - Restrict node page view - Access bypass

"This module enables you to disable direct access to node pages (node/XXX) based on nodetypes and permissions.

The module issues a NODE_ACCESS_ALLOW if it's permissions are met, but does not respect the "administer nodes" or "access own unpublished content" permissions. The consequence is that this module grants access to unpublished content to any role that has the "view any node page" or "view any node {type} page" permissions.

Versions affected

BIG-IP network appliances remote access vulnerability CVE-2012-1493

"A platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect."

F5 really outdid themselves on this one. They left a default ssh authorized key for root on all their devices.

Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections

"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

VMSA-2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues

Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.

It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.