Skip to content

customize
Current Activity Calendar
Left Arrow
January 2009
Su M Tu W Th F Sa
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Please click on a date above to see current activity for that day.

  • Latest Current Activity
  • January 13, 2009 - Current Activity

    This is an archived copy of current activity, if you would like to see the most recent version, please click here.

    January 13Oracle Releases Critical Patch Update for January 2009
    January 13Microsoft Releases January Security Bulletin
    January 13BlackBerry Security Advisories
    January 12Oracle Issues Pre-Release Announcement for January Critical Patch Update
    January 9Malicious Code Circulating via Israel/Hamas Conflict Spam Messages
    January 8Microsoft Releases Advance Notification for January Security Bulletin
    January 8Cisco Releases Security Advisory for Global Site Selector
    January 8OpenSSL Releases Security Advisory
    December 31Rogue MD5 SSL Certificate Vulnerability
    December 31Worm Exploiting Vulnerability described in MS08-067



    Oracle Releases Critical Patch Update for January 2009

    added January 13, 2009 at 04:08 pm

    Oracle has released their Critical Patch Update for January 2009 to address 41 vulnerabilities across several products. This update contains the following security fixes:

    • 10 updates for Oracle Database
    • 1 update for Oracle Times Ten Data Server
    • 9 updates for Oracle Secure Backup
    • 4 updates for Oracle Application Server
    • 1 update for Oracle Collaboration Suite
    • 4 updates for Oracle Application Suite
    • 1 update for Oracle Enterprise Manager
    • 6 updates for PeopleSoft and JDEdwards Suite
    • 5 updates for BEA Products Suite
    US-CERT encourages users to review the January Critical Patch Update and apply any necessary updates.


    Microsoft Releases January Security Bulletin

    added January 13, 2009 at 02:09 pm

    Microsoft has released the Microsoft Security Bulletin Summary for January 2009. Included in this bulletin is an update to address a vulnerability in Microsoft Windows. This vulnerability may allow an attacker to execute arbitrary code.

    US-CERT encourages users and administrators to review the bulletin and follow best-practice security policies to determine which updates should be applied.


    BlackBerry Security Advisories

    added January 13, 2009 at 10:23 am

    Research In Motion has released Security Advisories KB17118 and KB17119 to address vulnerabilities in the PDF Distiller of the BlackBerry Attachment Service for BlackBerry Unite and BlackBerry Enterprise Server. The vulnerabilities are due to the improper processing of PDF files within the Distiller component of the BlackBerry Attachment Service. By convincing a user to open a maliciously crafted PDF attachment on a BlackBerry smartphone, an attacker may be able to execute arbitrary code on the system running the BlackBerry Attachment Service.

    US-CERT encourages users to review BlackBerry Security Advisories KB17118 and KB17119 and apply the updates or implement the workarounds listed in the documents to help mitigate the risk.

    US-CERT will provide additional information as it becomes available.


    Oracle Issues Pre-Release Announcement for January Critical Patch Update

    added January 12, 2009 at 09:09 am

    Oracle has issued a Pre-Release Announcement indicating that its January Critical Patch Update (CPU) will contain 41 new security fixes across hundreds of products.

    The announcement further states that there is/are:

    • 10 updates for Oracle Database
    • 1 update for Oracle Times Ten Data Server
    • 9 updates for Oracle Secure Backup
    • 4 updates for Oracle Application Server
    • 1 update for Oracle Collaboration Suite
    • 4 updates for Oracle Application Suite
    • 1 update for Oracle Enterprise Manager
    • 6 updates for PeopleSoft and JDEdwards Suite
    • 5 updates for BEA Products Suite
    The release is scheduled for Tuesday, January 13, 2009.

    US-CERT will provide additional information as it becomes available.


    Malicious Code Circulating via Israel/Hamas Conflict Spam Messages

    added January 9, 2009 at 09:25 am

    US-CERT is aware of public reports of malicious code circulating via spam email messages related to the Israel/Hamas conflict in Gaza. These messages may contain factual information about the conflict and appear to come from CNN. Additionally, the messages indicate that additional news coverage of the conflict can be viewed by following a link provided in the email body. If users click on this link, they are redirected to a bogus CNN website that appears to contain a video.  Users who attempt to view this video will be prompted to update to a new version of Adobe Flash Player in order to view the video. This update is not a legitimate Adobe Flash Player update; it is malicious code. If users download this executable file, malicious code may be installed on their systems.

    US-CERT encourages users and administrators to take the following preventative measures to help mitigate the security risks:

    • Install antivirus software, and keep the virus signatures up to date.
    • Do not follow unsolicited links and do not open unsolicited email messages.
    • Use caution when visiting untrusted websites.
    • Use caution when downloading and installing applications.
    • Obtain software applications and updates directly from the vendor's website.
    • Refer to the Recognizing and Avoiding Email Scams (pdf) document for more information on avoiding email scams.
    • Refer to the Avoiding Social Engineering and Phishing Attacks document for more information on social engineering attacks.


    Microsoft Releases Advance Notification for January Security Bulletin

    added January 8, 2009 at 01:22 pm

    Microsoft has issued a Security Bulletin Advance Notification indicating that the January release cycle will contain one bulletin, which will have a severity rating of Critical. The notification states that this Critical bulletin is for Microsoft Windows. Release of this bulletin is scheduled for Tuesday, January 13.

    US-CERT will provide additional information as it becomes available.


    Cisco Releases Security Advisory for Global Site Selector

    added January 8, 2009 at 09:03 am

    Cisco has released a Security Advisory to address a vulnerability in the Application Control Engine Global Site Selector (GSS). By sending a specially crafted sequence of DNS requests, a remote attacker may be able to cause a denial-of-service condition.

    US-CERT encourages users and administrators to review Cisco Security Advisory cisco-sa-20090107-gss and apply any necessary updates or workarounds to help mitigate the risks.


    OpenSSL Releases Security Advisory

    added January 8, 2009 at 08:47 am

    The OpenSSL project has released a Security Advisory to address a vulnerability in OpenSSL. This vulnerability results from several incorrect checks of the result of the EVP_VerifyFinal function when performing signature checks on DSA and ECDSA keys used with SSL/TLS. As a result, a malformed signature could be treated as valid. Exploitation of this vulnerability may allow a remote attacker to bypass signature checks and conduct spoofing attacks.

    US-CERT encourages users and administrators to review the OpenSSL Security Advisory and apply any vendor released updates for the OpenSSL package or upgrade to the newest version of the software as described in the OpenSSL advisory.


    Rogue MD5 SSL Certificate Vulnerability

    added December 30, 2008 at 05:05 pm | updated December 31, 2008 at 05:54 pm

    US-CERT is aware of a public report describing how MD5 collisions can be leveraged to generate rogue SSL CA certificates. A rogue CA certificate could be used by an attacker to generate valid SSL certificates for arbitrary web sites. Using these certificates in DNS redirection attacks, an attacker could spoof an SSL protected web site and obtain sensitive information.

    US-CERT encourages users to review VU#836068 in the Vulnerability Notes Database. 

    US-CERT will provide additional information as it becomes available.


    Worm Exploiting Vulnerability described in MS08-067

    added December 31, 2008 at 02:04 pm | updated December 31, 2008 at 05:54 pm

    US-CERT is aware of a public report of a worm circulating that has the capability of exploiting the patched vulnerability described in Microsoft Security Bulletin MS08-067.

    US-CERT encourages users to do the following to help mitigate the risks:

    • Review Microsoft Security Bulletin MS08-067 and apply the update or workarounds listed.
    • Install antivirus software, and keep the virus signatures up to date.

    US-CERT will continue to monitor this activity and provide updates as needed.