Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


httpd security update fixes remote DOS and local server side includes vulnerability

http://rhn.redhat.com/errata/RHSA-2009-1075.html

Updated httpd packages that fix two security issues are now available for
Red Hat Enterprise Linux 5. The DoS bug only affects RHEL5.3.

Apache should be updated to the latest package on all RHEL machines
serving web pages.

Thanks,
Brian

httpd security update fixes remote DOS and local server side includes vulnerability

http://rhn.redhat.com/errata/RHSA-2009-1075.html

Updated httpd packages that fix two security issues are now available for
Red Hat Enterprise Linux 5. The DoS bug only affects RHEL5.3.

Apache should be updated to the latest package on all RHEL machines
serving web pages.

Thanks,
Brian

httpd security update fixes remote DOS and local server side includes vulnerability

http://rhn.redhat.com/errata/RHSA-2009-1075.html

Updated httpd packages that fix two security issues are now available for
Red Hat Enterprise Linux 5. The DoS bug only affects RHEL5.3.

Apache should be updated to the latest package on all RHEL machines
serving web pages.

Thanks,
Brian

Multiple Vulnerabilities in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Remote Arbitrary Code Execution

http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1

Solaris 8 and 9 sadmind contains heap and integer overflow
vulnerabilities. This could lead to local or remote unprivileged
execution of arbitrary code with root privilege.

This does not affect Solaris 10 or OpenSolaris which does not come with
sadmind.

Affected versions:

SPARC Platform:
- Solaris 8 without patch 116455-02
- Solaris 9 without patch 116453-03

Multiple Vulnerabilities in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Remote Arbitrary Code Execution

http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1

Solaris 8 and 9 sadmind contains heap and integer overflow
vulnerabilities. This could lead to local or remote unprivileged
execution of arbitrary code with root privilege.

This does not affect Solaris 10 or OpenSolaris which does not come with
sadmind.

Affected versions:

SPARC Platform:
- Solaris 8 without patch 116455-02
- Solaris 9 without patch 116453-03

Multiple Vulnerabilities in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Remote Arbitrary Code Execution

http://sunsolve.sun.com/search/document.do?assetkey=1-66-259468-1

Solaris 8 and 9 sadmind contains heap and integer overflow
vulnerabilities. This could lead to local or remote unprivileged
execution of arbitrary code with root privilege.

This does not affect Solaris 10 or OpenSolaris which does not come with
sadmind.

Affected versions:

SPARC Platform:
- Solaris 8 without patch 116455-02
- Solaris 9 without patch 116453-03

Multiple Symantec Products Intel Common Base Agent Remote Command Execution Vulnerability

http://www.securityfocus.com/bid/34671/info

An exploit concerning various versions of SAV is in the wild. It allows
for remote exploitation of machines with SYSTEM privileges.

Symantec has released updates and patches to fix the issue.

Please read their release notes for further information.

Multiple Symantec Products Intel Common Base Agent Remote Command Execution Vulnerability

http://www.securityfocus.com/bid/34671/info

An exploit concerning various versions of SAV is in the wild. It allows
for remote exploitation of machines with SYSTEM privileges.

Symantec has released updates and patches to fix the issue.

Please read their release notes for further information.

Multiple Symantec Products Intel Common Base Agent Remote Command Execution Vulnerability

http://www.securityfocus.com/bid/34671/info

An exploit concerning various versions of SAV is in the wild. It allows
for remote exploitation of machines with SYSTEM privileges.

Symantec has released updates and patches to fix the issue.

Please read their release notes for further information.

Pages