[IS&T Security-FYI] Newsletter, May 16, 2008

Monique Yeaton myeaton at MIT.EDU
Fri May 16 14:00:10 EDT 2008


In this issue:

1. Debian Security Advisory
2. May 2008 Security Updates


-----------------------------------
1. Debian Security Advisory
-----------------------------------

This week a vulnerability was discovered in Debian's OpenSSL package.  
As a result of a Debian-specific change to the OpenSSL package, the  
cryptographic key material may be guessable.

A remote, unauthenticated attacker with minimal knowledge of the  
vulnerable system and the ability to conduct a brute force attack  
against an affected application may be able to guess secret key  
material. Secondary impacts include authenticated access to the system  
through the affected service or the ability to perform man-in-the- 
middle attacks.

Systems affected:

  * Debian GNU/Linux based operating systems
  * Other operating systems can be indirectly affected if weak keys  
are imported to them.

Affected keys include SSH keys, OpenVPN keys, DNSSEC keys, and key  
material for use in X.509 certificates and session keys used in SSL/ 
TLS connections. *MIT Personal Certificates are not risk.* All SSL and  
SSH keys generated on Debian-based systems (Ubuntu, Kubuntu, etc)  
between September 2006 and May 13th, 2008 may be affected. Keys  
generated with GnuPG or GNUTLS are not affected.

Recommended action:

MIT will be scanning the network for any compromised hosts, however it  
can not block intruders from exploiting this vulnerability on our  
network, therefore user education and awareness is the best defense.

MIT recommends that maintainers of Debian-based systems apply the  
packages and regenerate keys; the IS&T department will apply patches  
to any affected systems that it maintains.

It is strongly recommended that all cryptographic key material which  
has been generated by OpenSSL versions starting with 0.9.8c-1 on  
Debian systems is recreated from scratch. All DSA keys ever used on  
affected Debian systems for signing or authentication purposes should  
be considered compromised; the Digital Signature Algorithm relies on a  
secret random value used during signature generation.

Patches have been release by the affected vendors. For more  
information on this vulnerability and for instructions on applying  
updates and regenerating key material see:

Debian: <http://www.debian.org/security/2008/dsa-1571> and <http://www.debian.org/security/2008/dsa-1576 
 >
US-CERT: <http://www.kb.cert.org/vuls/id/925211>
Metasploit: <http://metasploit.com/users/hdm/tools/debian-openssl/>


--------------------------------------
2. May 2008 Security Updates
--------------------------------------

Microsoft and Apple have released updates this month. Below is a list  
of items affected:

-----Microsoft-----

  * Microsoft Windows
  * Microsoft Office
  * Microsoft Jet Database Engine
  * Microsoft Windows Live OneCare
  * Microsoft Antigen
  * Microsoft Windows Defender
  * Microsoft Forefront Security

The Security Bulletin from Microsoft released on May 13 included three  
critical patches for the Windows operating system and Office products.  
These patches are now approved for deployment via MIT WAUS.

The most severe vulnerabilities could allow a remote, unauthenticated  
attacker to execute arbitrary code, gain elevated privileges, or cause  
a denial of service.

For more information about these updates see:
<http://www.microsoft.com/technet/security/bulletin/ms08-may.mspx>


-----Apple-----

  * Systems running OS X 10.5 or 10.5.1 (Leopard)

The Mac OS X 10.5.2 update includes general operating system  
improvements that enhance the stability, compatibility, and security  
of your Mac. Included in this update are improvements to, among  
others, Airport, Dashboard, Desktop, iCal, and iChat. The update can  
be downloaded through Software Update.

For more information about this update see:
<http://docs.info.apple.com/article.html?artnum=307109>


Thanks,

Monique

=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security






More information about the ist-security-fyi mailing list