[IS&T Security-FYI] Newsletter, January 11, 2008

Monique Yeaton myeaton at MIT.EDU
Fri Jan 11 12:07:07 EST 2008


In this issue:

1. Microsoft's January 2008 Security Updates
2. Various Vulnerabilities
3. NERCOMP Security and Policy Conference
4. Poll results: Keep Newsletter As Is


---------------------------------------------------------
1. Microsoft's January 2008 Security Updates
---------------------------------------------------------

Products affected:

  - All supported versions of Windows

The Security Bulletin from Microsoft released this week was small.  
Microsoft released one critical and one important level security  
patch for the Windows operating system. These patches are now  
approved for deployment via MIT WAUS.

The critical patches in this release address network based  
vulnerabilities for users running multicast applications and the  
Router Discovery Protocol. Another patch addresses an elevation of  
privilege vulnerability in how LSASS handles LCP requests. The most  
severe vulnerabilities could allow a remote, unauthenticated attacker  
to execute arbitrary code.

For more info: <http://www.microsoft.com/technet/security/bulletin/ 
ms08-jan.mspx>


--------------------------------
2. Various Vulnerabilities
--------------------------------

In the past few weeks two major products were found to have  
vulnerabilities. They were:

  - Adobe Flash Player

Adobe Flash Player is the most popular platform for rich internet  
content. The Adobe Flash Player web browser plugin is bundled with  
Microsoft Windows, Apple Mac OS X, and various Unix and Linux-based  
operating systems. The Flash plugin contains multiple vulnerabilities  
in its handling of Flash content and network requests. A specially  
crafted web page with embedded Flash content could exploit one of  
these vulnerabilities to allow an attacker to execute arbitrary code  
with the privileges of the current user, perform cross site scripting  
attacks, or execute other attacks. Note that Flash content is  
generally loaded automatically upon receipt, therefore no user  
interaction other than viewing a malicious web page would be  
necessary to exploit these vulnerabilities.

Status: Adobe confirmed, updates available.
<http://www.adobe.com/support/security/bulletins/apsb07-20.html>

  - Real Networks RealPlayer

Real Networks RealPlayer, a popular streaming media player, and Helix  
Server, a popular streaming media server, contain an
undisclosed remote code execution vulnerability. A specially crafted  
RealPlayer datastream or Real Time Streaming Protocol (RTSP) request  
could trigger one of these vulnerabilities and allow an attacker to  
execute arbitrary code with the privileges of the vulnerable process.  
RealPlayer content is generally displayed by default, without first  
prompting the user, and Helix Server generally accepts arbitrary  
requests. It is believed that RealPlayer on all supported platforms  
is vulnerable.

Status: Real Networks has not confirmed, no updates available. For  
this reason, we recommend that you avoid using these products until  
an update has been released.


----------------------------------------------------------
3. NERCOMP Security and Policy Conference
----------------------------------------------------------

Registration is now open for NERCOMP's upcoming workshop: "Security  
and Policy"

DATE:
February 5, 2008

TIME:
9:15am - 3:00pm (Coffee and Registration start at 8:00)

PRICE:
NERCOMP Members: $72, Non-Members: $172

LOCATION:
The College of the Holy Cross, Worcester, MA.

DESCRIPTION:
Security is essential to planning and managing effective information  
and network systems. Effective security efforts are composed of a  
complex set of interrelated components including policies,  
procedures, and technical controls. Information Security Policy  
outlines the legal, privacy, and security-related responsibilities  
the govern use of IT systems and data by members of the campus  
community. The implementation of policy covers many facets and  
requires a broad set of skills to effectively manage. The SIG will  
cover the role of policy as it impacts the deployment of information  
security processes, tools and technologies. Specific topics include  
how to effectively leverage resources to build a security program,  
the role of policy in a security program, and complying with PCI-DSS.

For those interested in attending, team members of IT Security  
Support also plan to attend, so we'll see you there.
For a full schedule and registration information, please go to:  
<http://www.nercomp.org/events/event_single.aspx?id=1306>


-----------------------------------------------
4. Poll results: Keep Newsletter As Is
-----------------------------------------------

Several weeks ago I asked our readers to let me know if they would  
like to see this newsletter change format to include html and images.  
While some of you liked the idea, the majority of the responses I  
received showed that you like the format as is, and asked to not  
change a thing. I'm sure that says something positive so thank you  
all for your feedback and for helping me to make this decision.


Thanks,

Monique

=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security






More information about the ist-security-fyi mailing list