[IS&T Security-FYI] Newsletter, December 7, 2007

Monique Yeaton myeaton at MIT.EDU
Fri Dec 7 09:28:34 EST 2007


In this issue:

1. Mozilla Bugs Fixed
2. Apple QuickTime Flaw Remains Unfixed
3. Regular File Backups
4. Tip of the Week: Online Shoppers Beware

---------------------------
1. Mozilla Bugs Fixed
---------------------------

Software affected:
  * Mozilla Firefox versions prior to 2.0.0.10
  * Mozilla SeaMonkey versions priot to 1.1.7
  * Netscape Navigator versions prior to 9.0.4

Memory corruption vulnerabilities: Web browsers based on the Mozilla  
suite, including Firefox, contain multiple vulnerabilities in their  
handling of web content. A specially crafted web page or script could  
trigger one of these vulnerabilities. Successfully exploiting one of  
these vulnerabilities would allow an attacker to execute arbitrary  
code with the privileges of the current user. Note that other  
browsers or applications based on the Mozilla framework could be  
vulnerable.

A patch has since been issued for these vulnerabilities. Firefox  
2.0.0.11 was released last week to fix an unrelated bug. If you are  
using Firefox, I recommend taking the update to mitigate the risk to  
this and other bugs affecting earlier versions.

To download the latest Mozilla product, visit <http://www.mozilla.org/ 
download.html>

------------------------------------------------------
2. Apple QuickTime Flaw Remains Unfixed
------------------------------------------------------

Software affected:
  * Apple QuickTime 7.3 and earlier for Windows and Mac
  * iTunes versions 7.5 and earlier for Windows and Mac

Remote Buffer Overflow: Apple QuickTime contains a buffer overflow  
vulnerability in the way QuickTime processes Real Time Streaming  
Protocol (RTSP) streams. This vulnerability could allow a remote,  
unauthenticated attacker to execute arbitrary code or commands and  
cause a denial-of-service condition. Common web browsers, including  
Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari can be  
used to pass RTSP streams to QuickTime and exploit the vulnerability.

A QuickTime update for this vulnerability is not available. Since  
QuickTime is a component of Apple iTunes, iTunes installations are  
also affected by this vulnerability.

Ways to block a possible attack are referenced below. In the meantime  
I recommend you do not open QuickTime files from any untrusted  
sources, including unsolicited files or links received in email,  
instant messages, web forums, or internet relay chat (IRC) channels.

* Securing Your Web Browser - <http://www.us-cert.gov/reading_room/ 
securing_browser/>
* Mozilla Uninstalling Plugins - <http://plugindoc.mozdev.org/faqs/ 
uninstall.html>
* How to stop an ActiveX control from running in Internet Explorer -  
<http://support.microsoft.com/kb/240797>


------------------------------
3. Regular File Backups
------------------------------

Have you done your "1st of the month" backups yet? Whether you back  
up your files monthly, weekly, or daily, it is a good idea to have a  
reminder marked on your calendar or to have your backup software set  
up for regularly scheduled backups. Lost files, whether they are  
email messages or documents you worked on, can mean not only an  
enormous inconvenience for you, but may also mean loss of finances if  
for instance those finances relied on those work files.

At MIT, Tivoli Storage Manager (TSM) is available for both Windows  
and Macs and lets you backup and restore files from/to a secure  
server <http://web.mit.edu/ist/topics/backup/>.

IS&T will be making a new service system and pricing structure  
available in January 2008, adding a basic service (for free) and an  
enterprise service (for a monthly fee) to the existing standard  
service in place for over twelve years.

More information on these services will be posted in the next IS&T  
newsletter which arrives in your mailbox once every other month or  
can be viewed online at <http://web.mit.edu/ist/isnews/>. Or you can  
contact <tsm-systems at mit.edu> to learn more.


---------------------------------------------------------
4. Tip of the Week: Online Shoppers Beware
---------------------------------------------------------

Each holiday season there are criminals lurking out there ready to  
snare the unsuspecting shopper. Sales notifications sent via email by  
retailers, online discounts, and once-in-a-lifetime online deals  
could get you more than you've bargained for.

Hackers will try to trick you into downloading a virus, worm, or  
spyware to your computer. Or they will actually take your money or  
steal your identity. Beware the fake website, untrustworthy download,  
and suspect email link or attachment!

Read a related story here: <http://www.usatoday.com/tech/news/ 
computersecurity/2007-11-25-cyber-monday_N.htm>

What can you as an online shopper do? This article offers some  
suggestions for minimizing potential risks: <http:// 
netsecurity.about.com/od/newsandeditoria2/a/blackfriday.htm>


=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security






More information about the ist-security-fyi mailing list