[IS&T Security-FYI] Newsletter, January 18, 2008

Monique Yeaton myeaton at MIT.EDU
Fri Jan 18 14:15:59 EST 2008


In this issue:

1. Apple QuickTime Update 7.4
2. Firefox Hit with Spoofing Bug
3. How Safe is our Wireless Network?

----------------------------------------
1. Apple QuickTime Update 7.4
----------------------------------------

Apple released an update for QuickTime to fix multiple  
vulnerabilities. Exploitation of these vulnerabilities could allow a  
remote attacker to execute arbitrary code or cause a denial-of- 
service condition.

Systems Affected

      * Apple Mac OS X running versions of QuickTime prior to 7.4*
      * Microsoft Windows running versions of QuickTime prior to 7.4*

Apple QuickTime 7.4 resolves multiple vulnerabilities in the way  
different types of image and media files are handled. An attacker  
could exploit these vulnerabilities by convincing a user to access a  
specially crafted image or media file that could be hosted on a web  
page.

*Note that Apple iTunes installs QuickTime, so any system with iTunes  
is vulnerable.

For further information, please see 'About the security content of  
QuickTime 7.4': <http://docs.info.apple.com/article.html?artnum=307301>

----------------------------------------
2. Firefox Hit with Spoofing Bug
----------------------------------------

According to an article on Networkworld.com, Firefox 2.0.0.11 has a  
vulnerability that could be used by identity thieves to dupe users  
into disclosing passwords. In one scenario described by the security  
researcher who found this vulnerability, "a link to a trusted site --  
a well-known bank, say, or a Web e-mail service such as Gmail or  
Hotmail -- when clicked would display its usual log-on dialog. In the  
background, however, the attacker would have crafted a script that  
exploited the Firefox vulnerability to redirect the username and  
password entered by the user to the hacker's server instead of the  
real deal."

His advice: "Until Mozilla fixes this vulnerability, I recommend not  
to provide username and password to Web sites which show this dialog."

Read the full story here: <http://www.networkworld.com/news/ 
2008/010308-firefox-hit-with-spoofing.html?fsrc=rss-security>

------------------------------------------------
3. How Safe is our Wireless Network?
------------------------------------------------

I'm sure many of you have read about the risks of using wireless  
networks (Wi-Fi). The phenomenon of so-called "wardriving" is  
popular: driving or moving around a wireless network area until an  
Internet connection is found. Some people do this from within their  
homes, hoping neighbors haven't password-protected their networks.  
But the bad guys do this to "snif" out information that is being  
transfered over those networks.

We have Wi-Fi at MIT as well. However, the way our network is set up  
doesn't require a password for access (although you do have to be  
registered with an account to use the network). Therefore, most of  
the applications that you use to transfer information over our  
network have been designed with security in mind. Even with potential  
eavesdroppers out there we are relatively safe, as MIT provides many  
web applications that require X.509 certificate authentication  
(requires an SSL protected session). To make sure your connection is  
secure, look for the HTTPS in the URL or a padlock. In addition,  
Kerberos provides security with email and other network services  
which you as an MIT community member have access to.

Remember, you are only as secure as your activities allow you to be.  
Pause and think about the risks you are accepting, whether using a  
public or private network. Some tips to help you:

- Keep your system patched
- Turn on the built-in firewall in your operating system
- Use VPN (http://itinfo.mit.edu/product.php?name=vpn)
- Disable peer-to-peer functionality when not in use
- Disable network cards or connections when working offline
- Don't let anyone shoulder surf (peek over your shoulder)


=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security






More information about the ist-security-fyi mailing list