Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Microsoft Exchange Multiple Vulnerabilities

http://secunia.com/advisories/25183/ - Four specific vulnerabilities allow for exploits on both clients and the server in the range of Denial of Service (DoS) to running arbitrary code. This affects Exchange 2000 Enterprise Server, Exchange 2000, 2003 and 2007. Patches are available for each of these systems and links are provided at the URL above.

Microsoft Exchange Multiple Vulnerabilities

http://secunia.com/advisories/25183/ - Four specific vulnerabilities allow for exploits on both clients and the server in the range of Denial of Service (DoS) to running arbitrary code. This affects Exchange 2000 Enterprise Server, Exchange 2000, 2003 and 2007. Patches are available for each of these systems and links are provided at the URL above.

Microsoft Exchange Multiple Vulnerabilities

http://secunia.com/advisories/25183/ - Four specific vulnerabilities allow for exploits on both clients and the server in the range of Denial of Service (DoS) to running arbitrary code. This affects Exchange 2000 Enterprise Server, Exchange 2000, 2003 and 2007. Patches are available for each of these systems and links are provided at the URL above.

Linux Kernel IPV4 Forwarding remote DoS and possible code exploitation

http://www.securityfocus.com/bid/23447/info - It appears that a bounds checking error in the IPV4 forwarding semantics stack could lead to a remote Denial of Service (DoS) or possibly malicious code execution. This has been fixed in 2.6.21-rc6. RedHat has released updates for RHEL5.

Linux Kernel IPV4 Forwarding remote DoS and possible code exploitation

http://www.securityfocus.com/bid/23447/info - It appears that a bounds checking error in the IPV4 forwarding semantics stack could lead to a remote Denial of Service (DoS) or possibly malicious code execution. This has been fixed in 2.6.21-rc6. RedHat has released updates for RHEL5.

Pages