Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Google Chrome prior to 4.0.249.89 Multiple Security Vulnerabilities

http://www.securityfocus.com/bid/38177/info

"Google Chrome is prone to multiple vulnerabilities:

- multiple remote code-execution issues
- multiple information-disclosure issues
- a code-execution issue
- a cross-origin information-disclosure issue

Attackers can exploit these issues to obtain sensitive information,
execute arbitrary code in the context of the browser, and carry out
other attacks.

Versions prior to Chrome 4.0.249.89 are vulnerable."

gnome-screensaver Monitor Removal Lock Bypass Vulnerability

http://www.securityfocus.com/bid/38149/info

If you have a machine with dual-heads, it is possible to crash
gnome-screensaver with physical access. This could allow for
unauthorized access on a locked machine.

It is recommended to update your gnome-screensaver packages immediately
to avoid possible compromise.

Thanks,
ep

Samba Symlink Directory Traversal Vulnerability

http://www.securityfocus.com/bid/38111/info

"Samba is prone to a directory-traversal vulnerability because the
application fails to sufficiently sanitize user-supplied input.

Exploits would allow an attacker to access files outside of the Samba
user's root directory to obtain sensitive information and perform other
attacks.

Final Apache 1.3 release includes security fixes and a recommendation to upgrade to 2.0

http://www.h-online.com/security/news/item/Apache-HTTP-Server-1-3-s-fina...

Apache HTTP Server developers released the final version (1.3.42) of
their webserver. It is a bugfix and securety release (for mod_proxy).

The developers warn that although security patches may be still be
released for 1.3, they strongly recommend users update to 2.2 as soon as
possible.

I recommend the same.

Thanks,
Brian

Final Apache 1.3 release includes security fixes and a recommendation to upgrade to 2.0

http://www.h-online.com/security/news/item/Apache-HTTP-Server-1-3-s-fina...

Apache HTTP Server developers released the final version (1.3.42) of
their webserver. It is a bugfix and securety release (for mod_proxy).

The developers warn that although security patches may be still be
released for 1.3, they strongly recommend users update to 2.2 as soon as
possible.

I recommend the same.

Thanks,
Brian

Thunderbird 3.0.1 Security Update Now Available

http://www.mozilla.org/security/known-vulnerabilities/thunderbird30.html

3.0.1 fixes three MFSA's.

* MFSA 2009-65: (Critical) Crashes with evidence of memory
corruption (rv:1.9.1.6/ 1.9.0.16)

* MFSA 2009-66: (Critical) Memory safety fixes in liboggplay media library

* MFSA 2009-67: (Critical) Integer overflow, crash in libtheora video
library

It is recommended that Thunderbird 3 users update to this latest version.

Thanks,
Brian

Thunderbird 3.0.1 Security Update Now Available

http://www.mozilla.org/security/known-vulnerabilities/thunderbird30.html

3.0.1 fixes three MFSA's.

* MFSA 2009-65: (Critical) Crashes with evidence of memory
corruption (rv:1.9.1.6/ 1.9.0.16)

* MFSA 2009-66: (Critical) Memory safety fixes in liboggplay media library

* MFSA 2009-67: (Critical) Integer overflow, crash in libtheora video
library

It is recommended that Thunderbird 3 users update to this latest version.

Thanks,
Brian

Pages