Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Oracle Java SE Critical Patch Update (CPU) Advisory

Oracle released a CPU advisory addressing 17 security
vulnerabilities in Java SE. Nine of the vulnerabilities were rated at
10.0 on the CVSS scale (10.0 being the most severe scoring). Only one of
the remaining vulnerabilities was rated below 5.0.

Java users are recommended to upgrade to Java 6 Update 26 (v1.6.0.26)
as soon as possible.

ESX, VI Clients, and VMware products update address multiple vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

a. VMware vmkernel third party e1000 Driver Packet Filter Bypass

There is an issue in the e1000 Linux driver for Intel PRO/1000 adapters
that allows a remote attacker to bypass packet filters.

b. ESX third party update for Service Console kernel

IPv4 Remote Denial of Service An remote attacker can achieve a denial of
service via an issue in the kernel IPv4 code.

ESX, VI Clients, and VMware products update address multiple vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

a. VMware vmkernel third party e1000 Driver Packet Filter Bypass

There is an issue in the e1000 Linux driver for Intel PRO/1000 adapters
that allows a remote attacker to bypass packet filters.

b. ESX third party update for Service Console kernel

IPv4 Remote Denial of Service An remote attacker can achieve a denial of
service via an issue in the kernel IPv4 code.

Pages