Threat Level: green Handler on Duty: Manuel Pelaez

SANS ISC InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

RedHat compromise sparks a Critical openssh security update

Published: 2008-08-22
Last Updated: 2008-08-22 15:45:39 UTC
by Patrick Nolan (Version: 2)
0 comment(s)

Critical: openssh security update

"Last week Red Hat detected an intrusion on certain of its computer systems and took immediate action". "In connection with the incident, the intruder was able to sign a small number of OpenSSH packages relating only to Red Hat Enterprise Linux 4  (i386 and x86_64 architectures only) and Red Hat Enterprise Linux 5 (x86_64 architecture only)".

"processes and efforts to date indicate that packages obtained by Red Hat Enterprise Linux subscribers via Red Hat Network are not at risk".

Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux AS (v. 4.5.z)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux ES (v. 4.5.z)
Red Hat Enterprise Linux WS (v. 4)

CVEs (cve.mitre.org): CVE-2007-4752

Update - RedHat OpenSSH blacklist script released

RedHat has released "shell script which lists the affected packages and can verify that none of them are installed on a system".

Keywords:
0 comment(s)

RedHat - Fedora Servers Compromised

Published: 2008-08-22
Last Updated: 2008-08-22 14:51:00 UTC
by Patrick Nolan (Version: 1)
0 comment(s)

A RedHat list post acknowledges that last week "some Fedora servers were illegally accessed. The intrusion into the servers was quickly discovered, and the servers were taken offline.

Security specialists and administrators have been working since then to analyze the intrusion and the extent of the compromise as well as reinstall Fedora systems".

Keywords:
0 comment(s)

MS08-051 V2.0 Patch issued August 20, 2008

Published: 2008-08-22
Last Updated: 2008-08-22 00:30:51 UTC
by Patrick Nolan (Version: 1)
0 comment(s)

"Microsoft has posted new update packages, labeled Version 2, for Microsoft Office PowerPoint 2003 Service Pack 2 and Microsoft Office PowerPoint 2003 Service Pack 3" described in MS08-051, Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (949785)

"Customers who manually installed Version 1 of this update from Microsoft Download Center need to reinstall Version 2 of this update.

Customers who have installed this update using Microsoft Update or Office Update do not need to reinstall".

Others should check with their patch management vendors.

The original patch "contained incorrect versions of the binaries. While these versions did protect against the vulnerabilities discussed in the bulletin, they lacked other important security and reliability updates".

 

Keywords: MS08051
0 comment(s)
Diary Archives