copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Publications
»
AusCERT Web Log
» Breathe easy
Breathe easy
Date:
03 April 2009
Click here for printable version
Greetings,
After a week on tenterhooks expecting revolutionary activity sparked by the April 1, 2009 frenzy of Conficker-C, it seems the lack of impact has allowed the security community a brief sigh of relief, though one would be advised to maintain vigilance with eyes peeled for unpatched systems and vulnerable machines. Scanning tools were
updated
to identify the presence of Conficker, including Nmap, Nessus and more.
An easy and useful guide to test for infection on a local machine is the
Conficker Eye Chart
. The Conficker Eye Chart displays various logos from web sites that conficker attempts to block. If images are missing then you may be infected. The site gives more details about what different images mean if they are present or missing.
A burst of emails
disguised as Facebook Friend Requests
have wreaked havoc over the last few days, luring unsuspecting readers into clicking onto a link that hooks them with a "Flash" update which installs trojan malware onto their machines.
AusCERT2009 Asia Pacific Information Security Conference
Don't miss out. The
early bird registration
discount closes Sunday 19th April 2009.
Some critical vulnerabilities that surfaced this week were:
-
Mozilla Firefox
: Remote Code Execution Vulnerability
Fixed in version 3.0.8
**Exploit code for this vulnerability has already been developed and is in
circulation**
-
SAP AG SAPgui
EAI WebViewer3D ActiveX Control: Buffer Overflow Vulnerability
-
PowerPoint
: Execute Arbitrary Code/Commands
Have a good weekend,
Patrick
Comments? Click here
http://www.auscert.org.au/render.html?cid=7066&it=10761