[IS&T Security-FYI] SFYI Newsletter, January 16, 2009

Monique Yeaton myeaton at MIT.EDU
Fri Jan 16 16:01:10 EST 2009


In this issue:

1. January 2009 Security Updates
2. Vulnerabilities Addressed in MS08-067 Are Still Being Exploited
3. A Serious Flaw Found in Safari
4. Reported Breaches Up Nearly 50 Percent


-------------------------------------------
1. January 2009 Security Updates
-------------------------------------------

---- Microsoft ----

Microsoft has provided updates for just one critical vulnerability in  
the Microsoft Security Bulletin Summary for January 2009. Systems  
affected:

     * Microsoft Windows 2000, XP, and Vista
     * Microsoft Windows Server 2000, 2003, and 2008

In their bulletin for January 2009, Microsoft released updates to  
address vulnerabilities in the Server Message Block (SMB) Protocol  
that affects all supported versions of Microsoft Windows. A remote,  
unauthenticated attacker could gain elevated privileges, execute  
arbitrary code, or cause a denial of service. The threat is more  
severe for older versions of the operating system. These patches are  
now approved for deployment via MIT WAUS.

For more information on this update:
<http://www.microsoft.com/technet/security/bulletin/ms09-jan.mspx>

---- Apple ----

This month has not yet seen any security updates from Apple.

---- Oracle ----

Oracle has released updates for multiple vulnerabilities. For more  
information regarding affected product versions, please see the Oracle  
Critical Patch Update - January 2009.
<http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2009.html 
 >

Oracle has associated CVE identifiers with the vulnerabilities  
addressed in this Critical Patch Update. The impact of these  
vulnerabilities varies depending on the product, component, and  
configuration of the system. Potential consequences include the  
execution of arbitrary code or commands, information disclosure, and  
denial of service. Vulnerable components may be available to  
unauthenticated, remote attackers. An attacker who compromises an  
Oracle database may be able to access sensitive information.

-----------------------------------------------------------------------------------
2. Vulnerabilities Addressed in MS08-067 Are Still Being Exploited
-----------------------------------------------------------------------------------

On October 23, 2008, Microsoft released an out-of-cycle patch MS08-067  
for a vulnerability in Windows. All Windows users were advised to  
download the update, however, three weeks after the public disclosure,  
approximately 300 MIT machines were still vulnerable. This week there  
remain about 68 machines unpatched on the MIT network. It is important  
that users download critical patches as they are released. IT Security  
Support staff have been persistent in notifying vulnerable machine  
owners of the situation.

If there is reason to believe a Windows machine in your area has not  
been patched against this vulnerability, please take the time to do so.

Some businesses that have not yet applied the patch issued in October  
have found their systems infected with a worm that uses a dictionary  
attack to crack user passwords; user accounts are locked out of Active  
Directory while the worm tries to find their passwords.  A removal  
tool is available, and users are urged to apply the patch as soon as  
possible. Other exploits similar to this one have also been identified.

Detailed information about this bulletin is available here:
<http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx>


-------------------------------------------
3. A Serious Flaw Found in Safari
-------------------------------------------

Apple's Safari browser on Windows and Mac OS X is vulnerable to a bug  
that could allow a malicious website to read files on the user's hard  
drive, according to a security researcher. There has been no patch  
released for this vulnerability.

Read the full story here:

<http://news.zdnet.co.uk/security/0,1000000189,39591617,00.htm>

This article provides recommended workarounds:

<http://brian.mastenbrook.net/display/27>


--------------------------------------------------------
4. Reported Breaches Up Nearly 50 Percent
--------------------------------------------------------

According to statistics gathered by the Identity Theft Resource  
Center, there were 656 data breaches reported by businesses, schools  
and governments in 2008, up from 446 in 2007, an increase of nearly 50  
percent.  Breaches at businesses accounted for 37 percent of the  
total, while breaches at schools accounted for 20 percent.  The  
percentage of breaches involving current and former employees more  
than doubled to 16 percent in 2008.  The top cause of breaches was  
human error, which includes lost or stolen laptops and data storage  
devices, and inadvertent exposure of data. [Article source: SANS]

Read the full story here:
<http://www.washingtonpost.com/wp-dyn/content/article/2009/01/05/AR2009010503046_pf.html 
 >

or here:
<http://www.techweb.com/article/showArticle?articleID=212700890>

Laptop and storage device theft also occurs on MIT's campus. To reduce  
the risk of theft, contact the MIT Crime Prevention Unit at <crimebite at mit.edu 
 >.

Locks and cables for computers and electronic devices can be obtained  
from MIT-preferred vendors KSL Security <http://www.kslsecurity.com>  
or Office Depot <http://www.officedepot.com> who provide MIT users  
with substantial discounts. KSL Security will even come on campus to  
install their locks and cables for you.


=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security

---------------------------------------
Important: DO NOT GIVE OUT YOUR PASSWORDS!
Ignore emails asking you to provide yours. IS&T will *NEVER* ask you  
for your password.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20090116/2428fe19/attachment.htm


More information about the ist-security-fyi mailing list