copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

Breathe easy

Date: 03 April 2009

Click here for printable version

Greetings,

After a week on tenterhooks expecting revolutionary activity sparked by the April 1, 2009 frenzy of Conficker-C, it seems the lack of impact has allowed the security community a brief sigh of relief, though one would be advised to maintain vigilance with eyes peeled for unpatched systems and vulnerable machines. Scanning tools were updated to identify the presence of Conficker, including Nmap, Nessus and more.

An easy and useful guide to test for infection on a local machine is the Conficker Eye Chart. The Conficker Eye Chart displays various logos from web sites that conficker attempts to block. If images are missing then you may be infected. The site gives more details about what different images mean if they are present or missing.

A burst of emails disguised as Facebook Friend Requests have wreaked havoc over the last few days, luring unsuspecting readers into clicking onto a link that hooks them with a "Flash" update which installs trojan malware onto their machines.

AusCERT2009 Asia Pacific Information Security Conference
Don't miss out. The early bird registration discount closes Sunday 19th April 2009.

Some critical vulnerabilities that surfaced this week were:

- Mozilla Firefox: Remote Code Execution Vulnerability
Fixed in version 3.0.8
**Exploit code for this vulnerability has already been developed and is in
circulation**
- SAP AG SAPgui EAI WebViewer3D ActiveX Control: Buffer Overflow Vulnerability
- PowerPoint: Execute Arbitrary Code/Commands

Have a good weekend,
Patrick