Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Security updates available for Adobe Reader and Acrobat

http://www.adobe.com/support/security/bulletins/apsb11-16.html

"Critical vulnerabilities have been identified in Adobe Reader X
(10.0.1) and earlier versions for Windows, Adobe Reader X (10.0.3) and
earlier versions for Macintosh, and Adobe Acrobat X (10.0.3) and earlier
versions for Windows and Macintosh. These vulnerabilities could cause
the application to crash and potentially allow an attacker to take
control of the affected system."

Oracle Java SE Critical Patch Update (CPU) Advisory

Oracle released a CPU advisory addressing 17 security
vulnerabilities in Java SE. Nine of the vulnerabilities were rated at
10.0 on the CVSS scale (10.0 being the most severe scoring). Only one of
the remaining vulnerabilities was rated below 5.0.

Java users are recommended to upgrade to Java 6 Update 26 (v1.6.0.26)
as soon as possible.

ESX, VI Clients, and VMware products update address multiple vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

a. VMware vmkernel third party e1000 Driver Packet Filter Bypass

There is an issue in the e1000 Linux driver for Intel PRO/1000 adapters
that allows a remote attacker to bypass packet filters.

b. ESX third party update for Service Console kernel

IPv4 Remote Denial of Service An remote attacker can achieve a denial of
service via an issue in the kernel IPv4 code.

ESX, VI Clients, and VMware products update address multiple vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2011-0009.html

a. VMware vmkernel third party e1000 Driver Packet Filter Bypass

There is an issue in the e1000 Linux driver for Intel PRO/1000 adapters
that allows a remote attacker to bypass packet filters.

b. ESX third party update for Service Console kernel

IPv4 Remote Denial of Service An remote attacker can achieve a denial of
service via an issue in the kernel IPv4 code.

Pages