"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.
Welcome to the Network Security website at the IAS
This website is intended to bring you the latest news, how to's, tools and resources in Information Security. Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.
The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute. For a description of these principles, please see our About section.
In keeping with the spirit of the Institute, I encourage questions and open discussions about security. And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.
Brian Epstein <email@example.com>
Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.
It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.
"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."
It is recommended that gallery users upgrade to the latest version.
"A bug in Puppet uses a predictable filename in /tmp.
When installing Mac OS X packages from a remote source, Puppet uses a predictable filename in /tmp to store the package. Using a symlink at that filename, it is possible to either overwrite arbitrary files on the system or to install an arbitrary package. (Note that OS X package installers can also execute arbitrary code.)"
"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."
This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 18.104.22.168 for other security vulnerabilities that have been patched along the way.
"Reflected Cross-site scripting (XSS) in Web Admin printing system (#1362)" vulnerability was fixed in this release.
Various other non-security improvements are part of this release.
By using vulnerable version of Java on MacOS, the flashback Trojan installs itself without user intervention. "There is no more installer, no request for a password."
There is a patch for the Macintosh version of Java available.
We continue to suggest using anti-virus on MacOS X. Also, make sure to keep 3rd party applications up to date.
For anyone who hasn't already patched their vulnerable version of Remote Desktop (RDP), here are some very good reasons to do so.