Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>


phpMyAdmin 3.4.x Path disclosure due to missing verification of file presence.

http://www.phpmyadmin.net/home_page/security/PMASA-2012-2.php

"The show_config_errors.php scripts did not validate the presence of the configuration file, so an error message shows the full path of this file, leading to possible further attacks."

This is a non-critical update, but it may be a good time to review what version of phpMyAdmin you are running and consider upgrading to 3.4.10.2 for other security vulnerabilities that have been patched along the way.

Thanks,
Brian

PacketFence 3.2.0 Released, Closes XSS Hole

http://www.packetfence.org/news/2012/article/packetfence-320-released.html

http://www.h-online.com/security/news/item/PacketFence-3-2-0-brings-new-...

"Reflected Cross-site scripting (XSS) in Web Admin printing system (#1362)" vulnerability was fixed in this release.

Various other non-security improvements are part of this release.

New Flashback Trojan Horse Variant Uses Novel Delivery Method to Infect Macs

http://blog.intego.com/new-flashback-trojan-horse-variant-uses-novel-del...

By using vulnerable version of Java on MacOS, the flashback Trojan installs itself without user intervention. "There is no more installer, no request for a password."

There is a patch for the Macintosh version of Java available.

We continue to suggest using anti-virus on MacOS X. Also, make sure to keep 3rd party applications up to date.

Proof of concept and Leaked exploit in the wild for Remote RDP exploit

https://technet.microsoft.com/en-us/security/bulletin/ms12-020
http://www.techworld.com.au/article/418814/leaked_exploit_prompts_resear...

For anyone who hasn't already patched their vulnerable version of Remote Desktop (RDP), here are some very good reasons to do so.

Thanks,
ep

A test matrix of Android anti-virus applications by AV-TEST


http://www.av-test.org/en/tests/android/


AV-TEST, "The Independent IT-Security Institute" from Magdeburg, Germany, released a report this week reviewing Anti-Virus applications for Android devices.  Their test results can be downloaded here:


http://www.av-test.org/fileadmin/pdf/avtest_2012-02_android_anti-malware...

Protect yourself by avoiding "phishing"

Phishing is a term used to describe a scam, a malicious attempt aimed at trying to trick you into divulging sensitive information via electronic communication.  One recent avenue for this type of attack is through emails appearing to come from your IT helpdesk requesting information, such as your username and password. 

Horde Groupware contains backdoor in Horde 3.3.12 and Groupware 1.2.10

http://m.h-online.com/security/news/item/Horde-Groupware-contains-backdo...

"Unknown perpetrators infiltrated a backdoor into several installation packages during an attack on groupware provider Horde's FTP server. Horde 3.3.12, Groupware 1.2.10 and the webmail edition of the groupware product are all affected. Horde 4 was not modified. The CVS and Git servers are also unaffected.

HTC Android phones can leak Wi-Fi passwords

Security Terms: 


https://www.networkworld.com/news/2012/020112-htc-android-passwords-2556...


It looks like some HTC Android phones which install malicious applications could have their Wifi passwords stolen according to an article by Network World last week.


HTC has released some patches to their software to help fix this issue.

Apache HTTP Server 2.2.22 Released

http://www.apache.org/dist/httpd/Announcement2.2.html

Six security issues were fixed in Apache 2.2.22, including information disclosure, privilege escalation and DoS vulnerabilities.

"SECURITY: CVE-2011-3368 (cve.mitre.org) Reject requests where the request-URI does not match the HTTP specification, preventing unexpected expansion of target URLs in some reverse proxy configurations.

Pages