State Department probes computer break-ins
The U.S. State Department has apparently detected large-scale break-ins of computers in its headquarters and offices that deal with China and North Korea. According to Reuters and The Associated Press, a State Department spokeswoman would only confirm that the problem was not a computer virus and that an investigation was underway. "The department detected anomalies in network traffic and we felt it prudent to take measures to ensure our system's integrity," she said. "We take each and every potential threat very seriously. Cybersecurity contingency plans were in place and we activated them immediately."
Like the private sector and other government agencies, the State Department has been constantly battling attempts by multiple sources to penetrate its computer system. The AP quoted sources saying investigators believe hackers may have stolen sensitive information and passwords and installed backdoors that may allow them to return to unclassified government computers.
Adobe Acrobat, Reader flaws repaired
Adobe Systems Inc. has closed security holes in its Acrobat and Reader programs that attackers could exploit to cause a buffer overflow and tamper with files. The vendor said
The second problem affects Adobe Acrobat and Adobe Reader and is caused by insecure default file permissions being set on the installed files and folders. Attackers could exploit this to bypass security restrictions and remove or replace files. The problem affects Adobe Acrobat 6.0.4 and Adobe Reader 6.0.4 for Mac OS, and users are advised to upgrade to Adobe Acrobat 6.0.5 or Adobe Reader 6.0.5.
Flaws surface in Juniper programs
Users of Juniper Network's JUNOS software should upgrade to versions built on or after May 10, 2006, in order to close a security hole. Attackers could exploit the issue to consume all kernel packet memory and cause a vulnerable router to crash. The French Security Incident Response Team (FrSIRT) said in an advisory that the flaw is due to an error when handling malformed IPv6 packets. This affects JUNOS version 6.4 through 8.0 running on M-series, T-series, and J-series routers and built before May 10, 2006.
Separately, FrSIRT warned of a second vulnerability affecting Juniper Networks DX versions 5.1.x and prior.
"This flaw is due to an input validation error in the logging feature that does not validate user-supplied parameters [such as user names] before being stored in the log file and displayed via the administrative interface," FrSIRT said. Attackers could exploit this "to cause arbitrary scripting code to be executed by the administrator's browser in the security context of an affected Web site."
FrSIRT said it is not aware of any official supplied patch for this issue.