Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>

 

Gallery 3.0.3 and Gallery 2.3.2 Security Releases are available

http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2

"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."

It is recommended that gallery users upgrade to the latest version.

Thanks,
ep

Puppet predictable filename in /tmp could cause arbitrary code execution on Mac OSX systems

http://puppetlabs.com/security/cve/cve-2012-1906

"A bug in Puppet uses a predictable filename in /tmp.
When installing Mac OS X packages from a remote source, Puppet uses a predictable filename in /tmp to store the package. Using a symlink at that filename, it is possible to either overwrite arbitrary files on the system or to install an arbitrary package. (Note that OS X package installers can also execute arbitrary code.)"

phpMyAdmin 3.4.x Path disclosure due to missing verification of file presence.

http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php

"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."

This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 3.4.10.2 for other security vulnerabilities that have been patched along the way.

Thanks,
Brian

PacketFence 3.2.0 Released, Closes XSS Hole

http://www.packetfence.org/news/2012/article/packetfence-320-released.html

http://www.h-online.com/security/news/item/PacketFence-3-2-0-brings-new-...

"Reflected Cross-site scripting (XSS) in Web Admin printing system (#1362)" vulnerability was fixed in this release.

Various other non-security improvements are part of this release.

New Flashback Trojan Horse Variant Uses Novel Delivery Method to Infect Macs

http://blog.intego.com/new-flashback-trojan-horse-variant-uses-novel-del...

By using vulnerable version of Java on MacOS, the flashback Trojan installs itself without user intervention. "There is no more installer, no request for a password."

There is a patch for the Macintosh version of Java available.

We continue to suggest using anti-virus on MacOS X. Also, make sure to keep 3rd party applications up to date.

Proof of concept and Leaked exploit in the wild for Remote RDP exploit

https://technet.microsoft.com/en-us/security/bulletin/ms12-020
http://www.techworld.com.au/article/418814/leaked_exploit_prompts_resear...

For anyone who hasn't already patched their vulnerable version of Remote Desktop (RDP), here are some very good reasons to do so.

Thanks,
ep

A test matrix of Android anti-virus applications by AV-TEST


http://www.av-test.org/en/tests/android/


AV-TEST, "The Independent IT-Security Institute" from Magdeburg, Germany, released a report this week reviewing Anti-Virus applications for Android devices.  Their test results can be downloaded here:


http://www.av-test.org/fileadmin/pdf/avtest_2012-02_android_anti-malware...

Protect yourself by avoiding "phishing"

Phishing is a term used to describe a scam, a malicious attempt aimed at trying to trick you into divulging sensitive information via electronic communication.  One recent avenue for this type of attack is through emails appearing to come from your IT helpdesk requesting information, such as your username and password. 

Pages