Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Brian Epstein <security@ias.edu>
twitter: @epepepep

Security Awareness on Social Media


Lance Spitzner from SANS is writing about Security Awareness on Social Media this month.  This blog entry specifically reviews privacy and social media, two polar opposites in today's world of online media.  It also reviews how to spot potential scams and finally, why to keep work and your personal life separate when posting online.

This is a great read to start off CyberSecurity Awareness Month.

FreeRadius Overflow in EAP-TLS for 2.1.10, 2.1.11 and 2.1.12.


" The CVE notification is CVE-2012-3547. The issue was found by Timo Warns, and communicated to security@freeradius.org. A sample exploit for the issue was included in the notification.

We recommend all administrators using EAP and 2.1.11, 2.1.12, or the git "master' branch upgrade immediately.

SA-CONTRIB-2012-109 - Restrict node page view - Access bypass


"This module enables you to disable direct access to node pages (node/XXX) based on nodetypes and permissions.

The module issues a NODE_ACCESS_ALLOW if it's permissions are met, but does not respect the "administer nodes" or "access own unpublished content" permissions. The consequence is that this module grants access to unpublished content to any role that has the "view any node page" or "view any node {type} page" permissions.

Versions affected

BIG-IP network appliances remote access vulnerability CVE-2012-1493


"A platform-specific remote access vulnerability has been discovered that may allow a remote user to gain privileged access to affected systems using SSH. The vulnerability is caused by a configuration error, and is not the result of an underlying SSH defect."

F5 really outdid themselves on this one. They left a default ssh authorized key for root on all their devices.

Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections


"05/08/12—Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

VMSA-2012-0009 - VMware Workstation, Player, ESXi and ESX patches address critical security issues


Various issues in multiple VMware products could allow for DoS or arbitrary code execution on the host from within a VM, or remotely from the network.

It is recommended to update to the latest patches. Please see the link above for more detail as this issue affects a wide range of products and versions.


SA-CORE-2012-002 - Drupal core multiple vulnerabilities


Drupal core 7.13 was updated to correct several security issues including:

* Denial of Service (CVE: CVE-2012-1588)
* Unvalidated form redirect (CVE: CVE-2012-1589)
* Access bypass - forum listing (CVE: CVE-2012-1590)
* Access bypass - private images (CVE: CVE-2012-1591)
* Access bypass - content administration (CVE: CVE-2012-2153)

Gallery 3.0.3 and Gallery 2.3.2 Security Releases are available


"We're releasing both Gallery 3.0.3 and Gallery 2.3.2 as security releases. Several researchers, working independently, discovered possible encryption-related vulnerabilities. Low-risk XSS vulnerabilities limited to the administration area were also reported."

It is recommended that gallery users upgrade to the latest version.