Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


NTP mode 7 denial-of-service vulnerability

http://www.kb.cert.org/vuls/id/568372

A simple 1 byte payload spoofed UDP packet could cause a DoS between two
ntp servers. The packet will cause the two ntp servers to bounce the
information back and forth, eventually exhausting resources.

"This issue is addressed in NTP 4.2.4p8."

It is also probable that this issue affects both systems and hardward
NTP appliances.

NTP mode 7 denial-of-service vulnerability

http://www.kb.cert.org/vuls/id/568372

A simple 1 byte payload spoofed UDP packet could cause a DoS between two
ntp servers. The packet will cause the two ntp servers to bounce the
information back and forth, eventually exhausting resources.

"This issue is addressed in NTP 4.2.4p8."

It is also probable that this issue affects both systems and hardward
NTP appliances.

Gnome Screensaver authentication bypass vulnerability (Ubuntu, maybe others)

http://www.securityfocus.com/bid/37240/info

This reminds me of the days of Windows 95/3.1 where you could bypass the
screensaver just by hitting the right sequence of keys.

This vulnerability specifically targets Ubuntu, but may be applicable to
other installations of v2.28 as well.

Testing the exploit under Fedora 11 and 12 does not duplicate the issue.

It is recommended for Ubuntu users to update their machines to the
latest version of gnome-screensaver to avoid this issue.

RHSA-2009:1659-1: Moderate: kvm security and bug fix update, guest could cause DoS of host machine

http://rhn.redhat.com/errata/RHSA-2009-1659.html

A moderate security vulnerability could allow a malicious user on a
guest VM to cause a DoS attack on the underlying host.

This patch also updates a few other non-security related bugs in the
software as explained at the above link.

It is recommended to update to a version of KVM that includes these
security fixes.

New Facebook Privacy settings could share more information than you want

http://www.sophos.com/blogs/gc/g/2009/12/10/facebook-privacy/

Facebook has just released some new privacy settings.  Make sure to read them carefully to understand how they are being shared.  If you haven't locked down your Facebook account, now is a good time.  Watch the video in the above article to see how you might be at risk.

Thanks,
ep

NTP mode 7 denial-of-service vulnerability

http://www.kb.cert.org/vuls/id/568372

A simple 1 byte payload spoofed UDP packet could cause a DoS between two
ntp servers. The packet will cause the two ntp servers to bounce the
information back and forth, eventually exhausting resources.

"This issue is addressed in NTP 4.2.4p8."

It is also probable that this issue affects both systems and hardward
NTP appliances.

Moderate: expat security update

http://rhn.redhat.com/errata/RHSA-2009-1625.html

"Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5."

"Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)"

Moderate: expat security update

http://rhn.redhat.com/errata/RHSA-2009-1625.html

"Updated expat packages that fix two security issues are now available for
Red Hat Enterprise Linux 3, 4, and 5."

"Two buffer over-read flaws were found in the way Expat handled malformed
UTF-8 sequences when processing XML files. A specially-crafted XML file
could cause applications using Expat to crash while parsing the file.
(CVE-2009-3560, CVE-2009-3720)"

Important: acpid security update

http://rhn.redhat.com/errata/RHSA-2009-1642.html

"An updated acpid package that fixes one security issue is now available
for Red Hat Enterprise Linux 5."

"Before applying this update, make sure that all previously-released
errata relevant to your system have been applied."

This flaw could lead to a local or compromised user to escalate privileges.

It is recommended to update this package.

Pages