Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>


Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections

http://www.fbi.gov/scams-safety/e-scams?utm_campaign=email-Immediate&utm...

"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

VMSA-2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues

http://www.vmware.com/security/advisories/VMSA-2012-0009.html

Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.

It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.

Thanks,
Brian

Gallery 3.0.3 and Gallery 2.3.2 Security Releases are available

http://gallery.menalto.com/gallery_3_0_3_and_gallery_2_3_2

"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."

It is recommended that gallery users upgrade to the latest version.

Thanks,
ep

Puppet predictable filename in /tmp could cause arbitrary code execution on Mac OSX systems

http://puppetlabs.com/security/cve/cve-2012-1906

"A bug in Puppet uses a predictable filename in /tmp.
When installing Mac OS X packages from a remote source, Puppet uses a predictable filename in /tmp to store the package. Using a symlink at that filename, it is possible to either overwrite arbitrary files on the system or to install an arbitrary package. (Note that OS X package installers can also execute arbitrary code.)"

phpMyAdmin 3.4.x Path disclosure due to missing verification of file presence.

http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php

"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."

This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 3.4.10.2 for other security vulnerabilities that have been patched along the way.

Thanks,
Brian

PacketFence 3.2.0 Released, Closes XSS Hole

http://www.packetfence.org/news/2012/article/packetfence-320-released.html

http://www.h-online.com/security/news/item/PacketFence-3-2-0-brings-new-...

"Reflected Cross-site scripting (XSS) in Web Admin printing system (#1362)" vulnerability was fixed in this release.

Various other non-security improvements are part of this release.

New Flashback Trojan Horse Variant Uses Novel Delivery Method to Infect Macs

http://blog.intego.com/new-flashback-trojan-horse-variant-uses-novel-del...

By using vulnerable version of Java on MacOS, the flashback Trojan installs itself without user intervention. "There is no more installer, no request for a password."

There is a patch for the Macintosh version of Java available.

We continue to suggest using anti-virus on MacOS X. Also, make sure to keep 3rd party applications up to date.

Proof of concept and Leaked exploit in the wild for Remote RDP exploit

https://technet.microsoft.com/en-us/security/bulletin/ms12-020
http://www.techworld.com.au/article/418814/leaked_exploit_prompts_resear...

For anyone who hasn't already patched their vulnerable version of Remote Desktop (RDP), here are some very good reasons to do so.

Thanks,
ep

Pages