Welcome to the Network Security website at the IAS
This website is intended to bring you the latest news, how to's, tools and resources in Information Security. Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.
The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute. For a description of these principles, please see our About section.
In keeping with the spirit of the Institute, I encourage questions and open discussions about security. And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.
Brian Epstein <firstname.lastname@example.org>
"The web management interface for the APC Network Monitoring Card (NMC)
used in various APC devices contains cross-site scripting (XSS) and
cross-site request forgery (CSRF/XSRF) vulnerabilities. By convincing a
victim to load a specially crafted URL while authenticated to an NMC, an
attacker could obtain credentials or perform certain actions as the
victim, including turning off the NMC-based device and any systems
attached to it. "
"Updated openssh packages that resolve an issue are now available.
OpenSSH is OpenBSD's SSH (Secure SHell) protocol implementation. These
packages include the core files necessary for both the OpenSSH client and
These updated openssh packages fix the following bug:
"An updated sudo package that fixes two security issues is now available for
Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.
* Improved LCG entropy. (Rasmus, Samy Kamkar)
* Fixed safe_mode validation inside tempnam() when the directory path
does not end with a /). (Martin Jansen)
* Fixed a possible open_basedir/safe_mode bypass in the session
extension identified by Grzegorz Stachowiak. (Ilia)
For users of the 5.2 branch of PHP, it is recommended to update to
5.2.13. This version also includes 43 other, non-security related bug
"Pidgin is prone to multiple denial-of-service vulnerabilities.
Successful exploits will crash the application or make it unresponsive,
denying service to legitimate users.
Pidgin 2.6.6 and prior versions are affected."
It is recommended that users upgrade to the latest version of Pidgin
when it becomes available. Patches have been released.