[IS&T Security-FYI] SFYI Newsletter, December 12, 2008

Monique Yeaton myeaton at MIT.EDU
Fri Dec 12 13:56:24 EST 2008


In this issue:

1. December 2008 Security Updates
2. Zero-Day IE7 Threat
3. Cyber Security on the Agenda for the Next President


----------------------------------------------
1. December 2008 Security Updates
----------------------------------------------

This month has seen a rather large number of new vulnerabilities, most  
of them in Microsoft Windows and Office products.

---- Microsoft ----

This week Microsoft released six critical and two important level  
patches for the Windows operating system and Office products.

Affected software:

   * Microsoft Windows and related components
   * Microsoft Internet Explorer
   * Microsoft Word, Excel and related components
   * Microsoft Office SharePoint Server
   * Microsoft Visual Basic 6

All six critical patches from this month's release addresses user  
based exploits in Microsoft's Windows or Office products. A remote,  
unauthenticated attacker could gain elevated privileges, execute  
arbitrary code or cause a vulnerable application to crash. One  
important level patch addresses an elevation of privilege  
vulnerability in Microsoft Office SharePoint Server, the other patch  
addresses an NTLM credential reflection vulnerability in the Windows  
Media components. These patches are now approved for deployment via  
MIT WAUS.

For more information on this update:
<http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx>

  ---- Apple ----

This month has not yet seen any security updates from Apple.

  ---- Sun ----

Sun has released alerts to address multiple vulnerabilities affecting  
the Sun Java Runtime Environment.

Affected software:

Sun Java Runtime Environment versions

   * JDK and JRE 6 Update 10 and earlier
   * JDK and JRE 5.0 Update 16 and earlier
   * SDK and JRE 1.4.2_18 and earlier
   * SDK and JRE 1.3.1_23 and earlier

The impacts of these vulnerabilities vary. The most severe of these  
vulnerabilities could allow a remote attacker to execute arbitrary  
code. Apply the update released by Sun. If you have the vulnerable  
versions of Java on your system, it is also recommended to disable  
Java in your web browser. While this does not fix the vulnerabilities,  
it does block a common attack vector.

For more information on this update:
<http://www.us-cert.gov/cas/techalerts/TA08-340A.html>


------------------------------
2. Zero-Day IE7 Threat
------------------------------

In response to the zero-day vulnerability found in Internet Explorer  
this week, Microsoft released an advisory:

<http://www.microsoft.com/technet/security/advisory/961051.mspx>

Apparently, Microsoft has not yet publicly stated whether it will  
issue an out-of-cycle patch for the issue. However, in its advisory,  
Microsoft does indicate that a fix may be forthcoming in some capacity  
if the company decides it's necessary.


----------------------------------------------------------------------
3. Cyber Security on the Agenda for the Next President
----------------------------------------------------------------------

In a report titled "Securing Cyberspace for the 44th Presidency," the  
CSIS Commission on Cybersecurity for the 44th Presidency urges  
President-elect Barack Obama to create the National Office for  
Cyberspace, a new White House office headed by an Assistant to the  
President for Cyberspace, who would oversee 10-20 employees.  The  
report also pushes for new legislation that would allow investigations  
into cyber crime to proceed more quickly.

Among the proposals is the creation of data warrants in place of  
search warrants.  Commission member Jerry Dixon said, "We have to have  
a solid cyber doctrine" defining when incidents would require military  
action and when they would be better addressed through law enforcement  
or intelligence community channels.  The report makes numerous other  
recommendations, including moving the government away from passwords  
toward strong authentication for network access.

Read the full story here:
<http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9122903 
 >


=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security

---------------------------------------
Important: DO NOT GIVE OUT YOUR PASSWORDS!
Ignore emails asking you to provide yours. IS&T will *NEVER* ask you  
for your password.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20081212/4a76c019/attachment.htm


More information about the ist-security-fyi mailing list