ep's blog

RHSA-2009:1659-1: Moderate: kvm security and bug fix update, guest could cause DoS of host machine

http://rhn.redhat.com/errata/RHSA-2009-1659.html

A moderate security vulnerability could allow a malicious user on a
guest VM to cause a DoS attack on the underlying host.

This patch also updates a few other non-security related bugs in the
software as explained at the above link.

It is recommended to update to a version of KVM that includes these
security fixes.

NTP mode 7 denial-of-service vulnerability

http://www.kb.cert.org/vuls/id/568372

A simple 1 byte payload spoofed UDP packet could cause a DoS between two
ntp servers. The packet will cause the two ntp servers to bounce the
information back and forth, eventually exhausting resources.

"This issue is addressed in NTP 4.2.4p8."

It is also probable that this issue affects both systems and hardward
NTP appliances.

New Facebook Privacy settings could share more information than you want

http://www.sophos.com/blogs/gc/g/2009/12/10/facebook-privacy/

Facebook has just released some new privacy settings.  Make sure to read them carefully to understand how they are being shared.  If you haven't locked down your Facebook account, now is a good time.  Watch the video in the above article to see how you might be at risk.

Thanks,
ep

Moderate: expat security update

http://rhn.redhat.com/errata/RHSA-2009-1625.html

"Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5."

"Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)"

Important: acpid security update

http://rhn.redhat.com/errata/RHSA-2009-1642.html

"An updated acpid package that fixes one security issue is now available
for Red Hat Enterprise Linux 5."

"Before applying this update, make sure that all previously-released
errata relevant to your system have been applied."

This flaw could lead to a local or compromised user to escalate privileges.

It is recommended to update this package.

Attack exploits just-patched Mac security bug - Java Runtime Environment (JRE)

http://www.theregister.co.uk/2009/12/04/mac_windows_java_attack/

A proof of concept (POC) has been released that targets unpatched
Macintosh systems.

"If you haven't installed the latest security update for Mac OS X, now
would be a good time."

This is related to the security alert sent out yesterday [NET #1379]:

Study: Facebook users willingly give out data

http://news.cnet.com/8301-17939_109-10410257-2.html?tag=mncol;title

CNET reported on a recent study by Sophos about the web habits of Facebook users.  Their study found that 41-46% of users blindly accepted friend requests from two unknown people.  Sophos was then able to access "up to 89 percent of the users' full dates of birth, all of their e-mail addresses, where they went to school, and more."

Vulnerabilities in the Java Runtime Environment May Allow Privileges to be Escalated

http://sunsolve.sun.com/search/document.do?assetkey=1-66-270474-1

"Multiple buffer and integer overflow vulnerabilities in the Java
Runtime Environment with processing audio and image files may allow an
untrusted applet or Java Web Start application to escalate privileges.
For example, an untrusted applet may grant itself permissions to read
and write local files or execute local applications that are accessible
to the user running the untrusted applet."

Pages