Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Gpg4win Remote Denial of Service Vulnerability

http://www.securityfocus.com/bid/36811/info

"Gpg4win is prone to a remote denial-of-service vulnerability.

An attacker can exploit this issue to cause an affected application to
crash, denying service to legitimate users. "

This can be exploited by sending a specially crafted GPG message via
email to a user of Gpg4win. It will create a DoS by crashing Gpg4win.

Mozilla Firefox and SeaMonkey MFSA 2009-{52..64} Multiple Vulnerabilities

http://www.securityfocus.com/bid/36843/info

"The Mozilla Foundation has released multiple advisories to address
vulnerabilities in Firefox and SeaMonkey.

An attacker can exploit these issues to obtain potentially sensitive
information, execute arbitrary code, elevate privileges, and cause
denial-of-service conditions."

US-CERT warns about free BlackBerry spyware app

http://news.cnet.com/8301-27080_3-10384179-245.html?tag=mncol;title

A security director from Indonesia has created an application called
PhoneSnoop for the BlackBerry operating system that allows for remote
eavesdropping on phone calls. The software was written as a proof of
concept in order to show possibility attack methods for the platform.

The software would have to be installed through physical access or by
tricking the user.

New smarty packages fix several vulnerabilities

http://seclists.org/fulldisclosure/2009/Oct/326

CVE-2008-4810, CVE-2009-1669, Vulnerabilities in Smarty can lead to
remote code exploitation.

Although this vulnerability specifically targets Debian installations,
it is a good time to check your current Smarty version. Also, if you
use Smarty, it is recommended that you subscribe to the Smarty announce
mailing list. This is a low-traffic list that will notify you of new
releases and bug fixes.

Google closes vulnerability in Chrome 3

http://www.h-online.com/security/Google-closes-vulnerability-in-Chrome-3...

"Google released Chrome v3.0.195.24 to address a vulnerability that
could potentially be exploited by attackers to execute arbitrary
code. A user would need to visit a maliciously crafted page for the
vulnerability to be exploited. Chrome should automatically update to
the new version."

Google closes vulnerability in Chrome 3

http://www.h-online.com/security/Google-closes-vulnerability-in-Chrome-3...

"Google released Chrome v3.0.195.24 to address a vulnerability that
could potentially be exploited by attackers to execute arbitrary
code. A user would need to visit a maliciously crafted page for the
vulnerability to be exploited. Chrome should automatically update to
the new version."

Google closes vulnerability in Chrome 3

http://www.h-online.com/security/Google-closes-vulnerability-in-Chrome-3...

"Google released Chrome v3.0.195.24 to address a vulnerability that
could potentially be exploited by attackers to execute arbitrary
code. A user would need to visit a maliciously crafted page for the
vulnerability to be exploited. Chrome should automatically update to
the new version."

Pages