The DHS Daily Open Source
Infrastructure Report covers the publicly reported material for the preceding
day(s) not previously covered. This weekly summary provides a selection
of those items of greatest significance to the InfoSec professional.
Week Ending: Friday, July 24, 2009
Infrastructure Report for 20 July 2009
Are
you paying attention to the issues associated with Twitter? No.
Perhaps you should!
Infrastructure Report for 21 July 2009
So you trust Linux. You might want to read the following and
learn more!
40. July 17, The Register – (International) Clever attack exploits fully-patched Linux kernel. A recently published attack exploiting newer versions of the Linux kernel is getting plenty of notice because it works even when security enhancements are running and the bug is virtually impossible to detect in source code reviews. The exploit code was released on July 17 by an individual who works for grsecurity, a developer of applications that enhance the security of the open-source OS. While it targets Linux versions that have yet to be adopted by most vendors, the bug has captured the attention of security researchers, who say it exposes overlooked weaknesses. Linux developers “tried to protect against it and what this exploit shows is that even with all the protections turned to super max, it’s still possible for an attacker to figure out ways around this system,” said a senior security researcher at Immunity. “The interesting angle here is the actual thing that made it exploitable, the whole class of vulnerabilities, which is a very serious thing.” The vulnerability is located in several parts of Linux, including one that implements functions known as net/tun. Although the code correctly checks to make sure the tun variable does not point to NULL, the compiler removes the lines responsible for that inspection during optimization routines. The result: When the variable points to zero, the kernel tries to access forbidden pieces of memory, leading to a compromise of the box running the OS. Source: http://www.theregister.co.uk/2009/07/17/linux_kernel_exploit/
Infrastructure Report for 22 July 2009
You
would think that Adobe applies its own fixes to its downloadable products. Think again!
Infrastructure Report for 23 July 2009
Running Firefox 3.0.nn rather than
3.5.n? If so, here are some patches you
need!
35. July 21, CNET News – (International) Firefox 3.0.12 patches five critical problems. Mozilla on July 21 released Firefox 3.0.12, an update to the open-source browser that fixes five critical security vulnerabilities and fixes a handful of other bugs. “We strongly recommend that all Firefox 3.0.x users upgrade to this latest release,” Mozilla said on its developer blog. “If you already have Firefox 3, you will receive an automated update notification within 24 to 48 hours. This update can also be applied manually by selecting ‘Check for Updates...’ from the Help menu.” Version 3.0.12 fixes five critical problems and one high-level security problem, according to the Mozilla security advisory site. Mozilla is trying to move people to the newer Firefox 3.5, which offers faster JavaScript program execution, new privacy features, and a handful of technologies geared for more powerful Web applications. And Mozilla is pushing the new browser hard. Security and stability fixes for the 3.0.x series will end in January 2010. Source: http://news.cnet.com/8301-1009_3-10292587-83.html?part=rss&tag=feed&subj=News-Security
Infrastructure Report for 24 July 2009
This is one patch that needs to be
applied promptly!
30. July 23,
Computerworld – (International) Adobe promises patch for
seven-month old Flash flaw. Adobe Systems Inc. on July 23 admitted its
Flash and Reader software have a critical vulnerability and promised it would
patch both next week. One security researcher, however, said Adobe’s own
bug-tracking database shows that the company has known of the vulnerability for
nearly seven months. In a security advisory posted around 10 p.m. Eastern time
on July 22, Adobe acknowledged that earlier reports were on target. “A critical
vulnerability exists in the current versions of Flash Player (v9.0.159.0 and
v10.0.22.87) for Windows, Macintosh and Linux operating systems, and the
authplay.dll component that ships with Adobe Reader and Acrobat v9.x for Windows,
Macintosh and UNIX operating systems,” the company said. The “authplay.dll”
mentioned in the advisory is the interpreter that handles Flash content
embedded within PDF files, and is present on any machine equipped with Reader
and Acrobat. Adobe said it would patch all versions of Flash by July 30, and
Reader and Acrobat for Windows and Mac no later than July 31. Until a patch is
available, Adobe said users could delete or rename authplay.dll, or disable
Flash rendering to stymie attacks within malformed PDF files. Adobe did not
offer any similar workaround for Flash and could only recommend that “users
should exercise caution in browsing untrusted websites.” Source: http://www.computerworld.com/s/article/9135826/Adobe_promises_patch_for_seven_month_old_Flash_flaw
Note: The DHS only maintains the last ten days
of their reports online. To obtain copies of earlier reports or complete
summaries, go to: