Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Yahoo Messenger Heap Overflow in Webcam component

http://research.eeye.com/html/alerts/zeroday/20070812.html - There exists a heap overflow in Yahoo Messenger 8.1.0.413. It allows for remote code execution for users who accept a webcam invite from a malicious source. A patch is currently not available; please verify the person with whom you are chatting before accepting webcam invites.

Yahoo Messenger Heap Overflow in Webcam component

http://research.eeye.com/html/alerts/zeroday/20070812.html - There exists a heap overflow in Yahoo Messenger 8.1.0.413. It allows for remote code execution for users who accept a webcam invite from a malicious source. A patch is currently not available; please verify the person with whom you are chatting before accepting webcam invites.

Yahoo Messenger Heap Overflow in Webcam component

http://research.eeye.com/html/alerts/zeroday/20070812.html - There exists a heap overflow in Yahoo Messenger 8.1.0.413. It allows for remote code execution for users who accept a webcam invite from a malicious source. A patch is currently not available; please verify the person with whom you are chatting before accepting webcam invites.

Integer overflow in gpdf could allow for malicious code execution in PDFs

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 - gpdf is used in various programs including (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS and (6) tetex, and others. This vulnerability is in gpdf prior to version 2.8.2. Please check with your OS provider for updates of any programs with the ability to read PDFs.

Integer overflow in gpdf could allow for malicious code execution in PDFs

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 - gpdf is used in various programs including (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS and (6) tetex, and others. This vulnerability is in gpdf prior to version 2.8.2. Please check with your OS provider for updates of any programs with the ability to read PDFs.

Integer overflow in gpdf could allow for malicious code execution in PDFs

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 - gpdf is used in various programs including (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS and (6) tetex, and others. This vulnerability is in gpdf prior to version 2.8.2. Please check with your OS provider for updates of any programs with the ability to read PDFs.

Pages