From security em unicamp.br Mon Feb 10 11:35:15 2014 From: security em unicamp.br (CSIRT - UNICAMP) Date: Mon, 10 Feb 2014 13:35:15 +0000 Subject: [SECURITY-L] TA14-017A: UDP-based Amplification Attacks Message-ID: <20140210133515.GA16438@unicamp.br> -------- Original Message -------- Subject: TA14-017A: UDP-based Amplification Attacks Date: Sun, 09 Feb 2014 12:24:40 -0600 From: US-CERT Reply-To: US-CERT em ncas.us-cert.gov To: security em .unicamp.br TA14-017A: UDP-based Amplification Attacks NCCIC / US-CERT National Cyber Awareness System: TA14-017A: UDP-based Amplification Attacks 01/17/2014 03:22 PM EST Original release date: January 17, 2014 | Last revised: February 09, 2014 Systems Affected Certain UDP protocols have been identified as potential attack vectors: * DNS * NTP * SNMPv2 * NetBIOS * SSDP * CharGEN * QOTD * BitTorrent * Kad * Quake Network Protocol * Steam Protocol Overview A Distributed Reflective Denial of Service (DRDoS) attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible UDP servers, as well as bandwidth amplification factors, to overwhelm a victim system with UDP traffic. Description UDP, by design, is a connection-less protocol that does not validate source IP addresses. Unless the application-layer protocol uses countermeasures such as session initiation, it is very easy to forge the IP packet datagram to include an arbitrary source IP address [7]. When many UDP packets have their source IP address forged to a single address, the server responds to that victim, creating a reflected Denial of Service (DoS) Attack. Recently, certain UDP protocols have been found to have particular responses to certain commands that are much larger than the initial request. Where before, attackers were limited linearly by the number of packets directly sent to the target to conduct a DoS attack, now a single packet can generate tens or hundreds of times the bandwidth in its response. This is called an amplification attack, and when combined with a reflective DoS attack on a large scale it makes it relatively easy to conduct DDoS attacks. To measure the potential effect of an amplification attack, we use a metric called the bandwidth amplification factor (BAF). BAF can be calculated as the number of UDP payload bytes that an amplifier sends to answer a request, compared to the number of UDP payload bytes of the request. The list of known protocols, and their associated bandwidth amplification factors, is listed below. US-CERT would like to offer thanks to Christian Rossow for providing this information to us. *Protocol* *Bandwidth Amplification Factor* *Vulnerable Command* DNS 28 to 54 see: TA13-088A [1] NTP 556.9 see: TA14-013A [2] SNMPv2 6.3 GetBulk request NetBIOS 3.8 Name resolution SSDP 30.8 SEARCH request CharGEN 358.8 Character generation request QOTD 140.3 Quote request BitTorrent 3.8 File search Kad 16.3 Peer list exchange Quake Network Protocol 63.9 Server info exchange Steam Protocol 5.5 Server info exchange Impact Attackers can utilize the bandwidth and relative trust of large servers that provide the above UDP protocols to flood victims with unwanted traffic, a DDoS attack. Solution DETECTION Detection of DRDoS attacks is not easy, due to their use of large, trusted servers that provide UDP services. As a victim, traditional DoS mitigation techniques may apply. As a network operator of one of these exploitable services, look for abnormally large responses to a particular IP address. This may indicate that an attacker is using your service to conduct a DRDoS attack. MITIGATION *Source IP Verification* Because the UDP requests being sent by the attacker-controlled clients must have a source IP address spoofed to appear as the victim?s IP, the first step to reducing the effectiveness of UDP amplification is for Internet Service Providers to reject any UDP traffic with spoofed addresses. The Network Working Group of the Internet Engineering Task Force (IETF) released Best Current Practice 38 document in May 2000 and Best Current Practice 84 in March 2004 that describes how an Internet Service Provider can filter network traffic on their network to reject packets with source addresses not reachable via the actual packet?s path [3][4]. The changes recommended in these documents would cause a routing device to evaluate whether it is possible to reach the source IP address of the packet via the interface that transmitted the packet. If it is not possible, then the packet most likely has a spoofed source IP address. This configuration change would substantially reduce the potential for most popular types of DDoS attacks. As such, we highly recommend to all network operators to perform network ingress filtering if possible. Note that it will not explicitly protect a UDP service provider from being exploited in a DRDoS (all network providers must use ingress filtering in order to completely eliminate the threat). To verify your network has implemented ingress filtering, download the open source tools from the Spoofer Project [5]. *Traffic Shaping* Limiting responses to UDP requests is another potential mitigation to this issue. This may require testing to discover the optimal limit that does not interfere with legitimate traffic. The IETF released Request for Comment 2475 and Request for Comment 3260 that describes some methods to shape and control traffic [6] [8]. Most network devices today provide these functions in their software. References * [1] DNS Amplification Attacks * [2] NTP Amplification Attacks Using CVE-2013-5211 * [3] Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing * [4] Ingress Filtering for Multihomed Networks * [5] The Spoofer Project * [6] An Architecture for Differentiated Services * [7] SIP: Session Initiation Protocol * [8] New Terminology and Clarifications for Diffserv Revision History * January 17, 2014 - Initial Release ------------------------------------------------------------------------ This product is provided subject to this Notification and this Privacy & Use policy. ------------------------------------------------------------------------ OTHER RESOURCES: Contact Us | Security Publications | Alerts and Tips | Related Resources ------------------------------------------------------------------------ This email was sent to security em unicamp.br using GovDelivery, on behalf of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray Lane SW Bldg 410 · Washington, DC 20598 · (703) 235-5110 Powered by GovDelivery ----- End forwarded message ----- From security em unicamp.br Wed Feb 12 11:23:56 2014 From: security em unicamp.br (CSIRT - UNICAMP) Date: Wed, 12 Feb 2014 13:23:56 +0000 Subject: [SECURITY-L] Fwd: Microsoft Security Bulletin Summary for February 2014] Message-ID: <20140212132356.GA30707@unicamp.br> -------- Original Message -------- Subject: Microsoft Security Bulletin Summary for February 2014 Date: Tue, 11 Feb 2014 12:40:40 -0600 From: Microsoft Reply-To: Microsoft To: ******************************************************************** Microsoft Security Bulletin Summary for February 2014 Issued: February 11, 2014 ******************************************************************** This bulletin summary lists security bulletins released for February 2014. The full version of the Microsoft Security Bulletin Summary for February 2014 can be found at https://technet.microsoft.com/security/bulletin/ms14-feb. With the release of the bulletins for February 2014, this bulletin summary replaces the bulletin advance notification originally issued on February 10, 2014. For more information about the bulletin advance notification service, see http://technet.microsoft.com/security/bulletin/advance. To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications at http://technet.microsoft.com/security/dd252948. Microsoft is hosting a webcast to address customer questions on these bulletins on February 12, 2014, at 11:00 AM Pacific Time (US & Canada). Register for the Security Bulletin Webcast at http://technet.microsoft.com/security/bulletin. Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates. Please see the section, Other Information. Critical Security Bulletins ============================ MS14-010 - Affected Software: - Windows XP Service Pack 3: - Internet Explorer 6 - Internet Explorer 7 - Internet Explorer 8 - Windows XP Professional x64 Edition Service Pack 2: - Internet Explorer 6 - Internet Explorer 7 - Internet Explorer 8 - Windows Server 2003 Service Pack 2: - Internet Explorer 6 - Internet Explorer 7 - Internet Explorer 8 - Windows Server 2003 x64 Edition Service Pack 2: - Internet Explorer 6 - Internet Explorer 7 - Internet Explorer 8 - Windows Server 2003 with SP2 for Itanium-based Systems: - Internet Explorer 6 - Internet Explorer 7 - Windows Vista Service Pack 2: - Internet Explorer 7 - Internet Explorer 8 - Internet Explorer 9 - Windows Vista x64 Edition Service Pack 2: - Internet Explorer 7 - Internet Explorer 8 - Internet Explorer 9 - Windows Server 2008 for 32-bit Systems Service Pack 2: - Internet Explorer 7 - Internet Explorer 8 - Internet Explorer 9 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for x64-based Systems Service Pack 2: - Internet Explorer 7 - Internet Explorer 8 - Internet Explorer 9 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2: - Internet Explorer 7 - Windows 7 for 32-bit Systems Service Pack 1: - Internet Explorer 8 - Internet Explorer 9 - Internet Explorer 10 - Internet Explorer 11 - Windows 7 for x64-based Systems Service Pack 1: - Internet Explorer 8 - Internet Explorer 9 - Internet Explorer 10 - Internet Explorer 11 - Windows Server 2008 R2 for x64-based Systems Service Pack 1: - Internet Explorer 8 - Internet Explorer 9 - Internet Explorer 10 - Internet Explorer 11 (Windows Server 2008 R2 Server Core installation not affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1: - Internet Explorer 8 - Windows 8 for 32-bit Systems: - Internet Explorer 10 - Windows 8 for x64-based Systems: - Internet Explorer 10 - Windows Server 2012: - Internet Explorer 10 (Windows Server 2012 Server Core installation not affected) - Windows RT: - Internet Explorer 10 - Windows 8.1 for 32-bit Systems: - Internet Explorer 11 - Windows 8.1 for x64-based Systems: - Internet Explorer 11 - Windows Server 2012 R2: - Internet Explorer 11 (Windows Server 2012 R2 Server Core installation not affected) - Windows RT 8.1: - Internet Explorer 11 - Impact: Remote Code Execution - Version Number: 1.0 MS14-011 - Affected Software: - Windows XP Service Pack 3 - VBScript 5.7 - VBScript 5.8 - Windows XP Professional x64 Edition Service Pack 2 - VBScript 5.6 - VBScript 5.7 - VBScript 5.8 - Windows Server 2003 Service Pack 2 - VBScript 5.6 - VBScript 5.7 - VBScript 5.8 - Windows Server 2003 x64 Edition Service Pack 2 - VBScript 5.6 - VBScript 5.7 - VBScript 5.8 - Windows Server 2003 with SP2 for Itanium-based Systems - VBScript 5.6 - VBScript 5.7 - Windows Vista Service Pack 2 - VBScript 5.7 - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - Windows Vista x64 Edition Service Pack 2 - VBScript 5.7 - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - Windows Server 2008 for 32-bit Systems Service Pack 2 - VBScript 5.7 (Windows Server 2008 Server Core installation affected) - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - Windows Server 2008 for x64-based Systems Service Pack 2 - VBScript 5.7 (Windows Server 2008 Server Core installation affected) - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - Windows Server 2008 for Itanium-based Systems Service Pack 2 - VBScript 5.7 - Windows 7 for 32-bit Systems Service Pack 1 - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - VBScript 5.8 for systems running Internet Explorer 10 - VBScript 5.8 for systems running Internet Explorer 11 - Windows 7 for x64-based Systems Service Pack 1 - VBScript 5.8 for systems running Internet Explorer 8 - VBScript 5.8 for systems running Internet Explorer 9 - VBScript 5.8 for systems running Internet Explorer 10 - VBScript 5.8 for systems running Internet Explorer 11 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 - VBScript 5.8 for systems running Internet Explorer 8 (Windows Server 2008 R2 Server Core installation affected) - VBScript 5.8 for systems running Internet Explorer 9 - VBScript 5.8 for systems running Internet Explorer 10 - VBScript 5.8 for systems running Internet Explorer 11 - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - VBScript 5.8 for systems running Internet Explorer 8 - Windows 8 for 32-bit Systems - VBScript 5.8 for systems running Internet Explorer 10 - Windows 8 for x64-based Systems - VBScript 5.8 for systems running Internet Explorer 10 - Windows 8.1 for 32-bit Systems - VBScript 5.8 for systems running Internet Explorer 11 - Windows 8.1 for x64-based Systems - VBScript 5.8 for systems running Internet Explorer 11 - Windows Server 2012 - VBScript 5.8 for systems running Internet Explorer 10 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 - VBScript 5.8 for systems running Internet Explorer 11 (Windows Server 2012 R2 Server Core installation affected) - Windows RT - VBScript 5.8 for systems running Internet Explorer 10 - Windows RT 8.1 - VBScript 5.8 for systems running Internet Explorer 11 - Impact: Remote Code Execution - Version Number: 1.0 MS14-007 - Affected Software: - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation not affected) - Windows 8 for 32-bit Systems - Windows 8 for x64-based Systems - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation not affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation not affected) - Windows RT - Windows RT 8.1 - Impact: Remote Code Execution - Version Number: 1.0 MS14-008 - Affected Software: - Microsoft Forefront Protection 2010 for Exchange Server - Impact: Remote Code Execution - Version Number: 1.0 Important Security Bulletins ============================ MS14-009 - Affected Software: - Windows XP Service Pack 3 - Microsoft .NET Framework 1.0 Service Pack 3 (Media Center Edition 2005 Service Pack 3 and Tablet PC Edition 2005 Service Pack 3 only) - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows XP Professional x64 Edition Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows Server 2003 Service Pack 2 - Microsoft .NET Framework 1.1 Service Pack 1 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows Server 2003 x64 Edition Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows Server 2003 with SP2 for Itanium-based Systems - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows Vista Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows Vista x64 Edition Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows Server 2008 for 32-bit Systems Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for x64-based Systems Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4 - Windows 7 for 32-bit Systems Service Pack 1 - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows 7 for x64-based Systems Service Pack 1 - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4 - Windows 8 for 32-bit Systems - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows 8 for x64-based Systems - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows 8.1 for 32-bit Systems - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.1 - Windows 8.1 for x64-based Systems - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.1 - Windows Server 2012 - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.1 (Windows Server 2012 R2 Server Core installation affected) - Windows RT - Microsoft .NET Framework 4.5 - Microsoft .NET Framework 4.5.1 - Windows RT 8.1 - Microsoft .NET Framework 4.5.1 - Impact: Elevation of Privilege - Version Number: 1.0 MS14-005 - Affected Software: - Windows XP Service Pack 3 - Windows XP Professional x64 Edition Service Pack 2 - Windows Server 2003 Service Pack 2 - Windows Server 2003 x64 Edition Service Pack 2 - Windows Server 2003 with SP2 for Itanium-based Systems - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Windows 8 for 32-bit Systems - Windows 8 for x64-based Systems - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT - Windows RT 8.1 - Impact: Information Disclosure - Version Number: 1.0 MS14-006 - Affected Software: - Windows 8 for 32-bit Systems - Windows 8 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows RT - Impact: Denial of Service - Version Number: 1.0 Other Information ================= Follow us on Twitter for the latest information and updates: http://twitter.com/msftsecresponse Microsoft Windows Malicious Software Removal Tool: ================================================== Microsoft has released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. Non-Security Updates on MU, WU, and WSUS: ======================================================== For information about non-security releases on Windows Update and Microsoft Update, please see: * https://support.microsoft.com/kb/894199: Microsoft Knowledge Base Article 894199, Description of Software Update Services and Windows Server Update Services changes in content. Includes all Windows content. * http://technet.microsoft.com/wsus/bb456965: Updates from Past Months for Windows Server Update Services. Displays all new, revised, and rereleased updates for Microsoft products other than Microsoft Windows. Microsoft Active Protections Program (MAPP) =========================================== To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed at http://www.microsoft.com/security/msrc/collaboration/mapp.aspx. Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at https://technet.microsoft.com/security/bulletin/pgp. To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** To manage or cancel your subscription to this newsletter, visit the Microsoft.com Profile Center at and then click Manage Communications under My Subscriptions in the Quicklinks section. For more information, see the Communications Preferences section of the Microsoft Online Privacy Statement at: . For the complete Microsoft Online Privacy Statement, see: . For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 ----- End forwarded message ----- From security em unicamp.br Mon Feb 24 15:08:23 2014 From: security em unicamp.br (CSIRT Unicamp) Date: Mon, 24 Feb 2014 15:08:23 -0300 Subject: [SECURITY-L] =?iso-8859-1?q?Seguran=E7a_em_Wordpress?= Message-ID: <530B8A97.70308@unicamp.br> Caros, Publicamos em nosso site um artigo sobre segurança em websites com wordpress, segue link abaixo: http://www.security.unicamp.br/artigos/23-seguranca-site-wordpress.html Att. -- Gesiel Galvão Bernardes === Computer Security Incident Response Team - CSIRT Universidade Estadual de Campinas - Unicamp Centro de Computacao - CCUEC Contato: +55 19 3521-2289 ou INOC-DBA: 1251*830 From security em unicamp.br Fri Feb 28 10:46:35 2014 From: security em unicamp.br (CSIRT - UNICAMP) Date: Fri, 28 Feb 2014 10:46:35 -0300 Subject: [SECURITY-L] =?iso-8859-1?q?Artigo=3A_Ataques_de_amplifica=E7=E3o?= =?iso-8859-1?q?_UDP?= Message-ID: <20140228134634.GE17977@unicamp.br> Caros, Atualizamos nosso site com o artigo "Ataques de amplificação UDP". Consulte em: http://www.security.unicamp.br/artigos/24-amplificacao-udp.html === Computer Security Incident Response Team - CSIRT Universidade Estadual de Campinas - Unicamp Centro de Computacao - CCUEC E-mail: security em unicamp.br GnuPG Public Key: http://www.security.unicamp.br/security.asc Contact: +55 19 3521-2289 or +55 19 3521-2290 INOC-DBA-BR: 1251*830