Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>


Security Awareness on Social Media

http://www.educause.edu/blogs/lspitzner/security-awareness-social-media

Lance Spitzner from SANS is writing about Security Awareness on Social Media this month.  This blog entry specifically reviews privacy and social media, two polar opposites in today's world of online media.  It also reviews how to spot potential scams and finally, why to keep work and your personal life separate when posting online.

This is a great read to start off CyberSecurity Awareness Month.

FreeRadius Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.

http://freeradius.org/security.html

" The CVE notification is CVE-2012-3547. The issue was found by Timo Warns, and communicated to security@freeradius.org. A sample exploit for the issue was included in the notification.

We recommend all administrators using EAP and 2.1.11, 2.1.12, or the git "master' branch upgrade immediately.

SA-CONTRIB-2012-109 - Restrict node page view - Access bypass

https://drupal.org/node/1679466

"This module enables you to disable direct access to node pages (node/XXX) based on nodetypes and permissions.

The module issues a NODE_ACCESS_ALLOW if it's permissions are met, but does not respect the "administer nodes" or "access own unpublished content" permissions. The consequence is that this module grants access to unpublished content to any role that has the "view any node page" or "view any node {type} page" permissions.

Versions affected

BIG-IP network appliances remote access vulnerability CVE-2012-1493

http://support.f5.com/kb/en-us/solutions/public/13000/600/sol13600.html

"A platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect."

F5 really outdid themselves on this one. They left a default ssh authorized key for root on all their devices.

Pages