Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Cisco IOS XR Software SSH Denial of Service Vulnerability

http://www.cisco.com/warp/public/707/cisco-sa-20100120-xr-ssh.shtml

"The SSH server implementation in Cisco IOS XR Software contains a
vulnerability that an unauthenticated, remote user could exploit to
cause a denial of service condition."

"Products Confirmed Not Vulnerable

SSH server implementations in Cisco IOS Software and Cisco IOS XE
Software are not affected by this vulnerability."

Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack (affects Windows NT through 7)

http://seclists.org/fulldisclosure/2010/Jan/341

"CVE-2010-0232

In order to support BIOS service routines in legacy 16bit applications,
the Windows NT Kernel supports the concept of BIOS calls in the
Virtual-8086 mode monitor code."

"Upon successful exploitation, the kernel stack is switched to an attacker
specified address." This would allow arbitrary code execution with
escalated privileges.

HP Power Manager, Remote Execution of Arbitrary Code

http://www.securityfocus.com/archive/1/509042

"Potential security vulnerabilities have been identified with HP Power
Manager. The vulnerabilities could be exploited remotely to execute
arbitrary code.

References: CVE-2009-3999, CVE-2009-4000

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Power Manager earlier than v4.2.10"

It is recommended that users of this software update immediately to
avoid risk.

Thanks,
ep

Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979352.mspx

This is the flaw that was key in the 'Operation Aurora' attack on Google
last week. There are several workarounds that could be employed to help
mitigate the attack.

Running with Internet zone set to High, running with Data Execution
Prevention (DEP) or not running Internet Explorer at all will help to
avoid this issue.

Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979352.mspx

This is the flaw that was key in the 'Operation Aurora' attack on Google
last week. There are several workarounds that could be employed to help
mitigate the attack.

Running with Internet zone set to High, running with Data Execution
Prevention (DEP) or not running Internet Explorer at all will help to
avoid this issue.

Microsoft Security Advisory (979352) Vulnerability in Internet Explorer Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979352.mspx

This is the flaw that was key in the 'Operation Aurora' attack on Google
last week. There are several workarounds that could be employed to help
mitigate the attack.

Running with Internet zone set to High, running with Data Execution
Prevention (DEP) or not running Internet Explorer at all will help to
avoid this issue.

Top Ten Web Hacking Techniques of 2009 - Jeremiah Grossman

http://jeremiahgrossman.blogspot.com/2010/01/top-ten-web-hacking-techniq...

"The diversity, volume, and innovation of the research was impressive. Competition was as fierce as ever and the judges had their work cut out. Rich Mogull, Dinis Cruz, Chris Hoff, HD Moore, Billy Rios, Dan Kaminsky, Romain Gaucher, Steven Christey, Jeff Forristal, and Michal Zalewski were tasked with ranking the field based upon novelty, impact, and overall pervasiveness."

Pages