From security em unicamp.br Mon Nov 9 10:54:47 2015 From: security em unicamp.br (CSIRT - UNICAMP) Date: Mon, 9 Nov 2015 10:54:47 -0200 Subject: [SECURITY-L] IGF 2015: Participacao remota Message-ID: <20151109125447.GA29591@unicamp.br> -------- Mensagem encaminhada -------- Olá a todos, Esta semana está acontecendo em João Pessoa a décima reunião do IGF - Fórum Mundial de Governança da Internet. As discussões do IGF 2015 serão divididas em subtemas como Cibersegurança e Confiança; Economia da Internet; Inclusão e Diversidade; Abertura; Aprimorando a Cooperação Multissetorial; Internet e os Direitos Humanos; Recursos Críticos da Internet; e Questões Emergentes. De interesse especial para este grupo são as seções dos Fóruns de boas Práticas de Spam e CSIRTs e todas as seções de segurança -- incluindo seções de segurança que ocorrerão hoje à tarde e nos outros dias. O evento é transmitido ao Vivo, em diversos idiomas, sendo também possível participar remotamente: http://www.intgovforum.org/cms/igf2015-cast Os especialistas do NIC.br e CGI.br integrarão diversos workshops -- a lista com as seções com participação nossa estão disponíveis em: http://nic.br/confira-a-programacao-do-igf-2015/ Abraços, Cristine _______________________________________________ From security em unicamp.br Thu Nov 19 09:42:29 2015 From: security em unicamp.br (CSIRT - UNICAMP) Date: Thu, 19 Nov 2015 09:42:29 -0200 Subject: [SECURITY-L] [security-news@drupal.org: [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166] Message-ID: <20151119114229.GF14821@unicamp.br> ----- Forwarded message from security-news em drupal.org ----- Date: Wed, 18 Nov 2015 20:33:19 +0000 (UTC) From: security-news em drupal.org To: security-news em drupal.org Subject: [Security-news] Encrypt - Moderately Critical - Weak Encryption - SA-CONTRIB-2015-166 X-Mailer: Drupal View online: https://www.drupal.org/node/2618362 * Advisory ID: DRUPAL-SA-CONTRIB-2015-166 * Project: Encrypt [1] (third-party module) * Version: 7.x * Date: 2015-November-18 * Security risk: 11/25 ( Moderately Critical) AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:Default [2] * Vulnerability: Weak Encryption -------- DESCRIPTION --------------------------------------------------------- This module enables you to encrypt data within Drupal using a user-configurable encryption method and key provider. The module did not sufficiently validate good configurations and api usage resulting in multiple potential weaknesses depending on module usage. The default encryption method could theoretically leak the key for known plaintexts. This vulnerability is mitigated by the fact that an attacker would need to have access to the encrypted data which is generally not possible without a breach of the database. The default key provider uses the Drupal private key, which means that it could potentially be leaked which puts other elements of the site at risk. This vulnerability is mitigated by requiring the default combination of encryption method and key provider for the Drupal private key to be potentially leaked. Users of the module are likely to employ a key of their own creation, rather than use the Drupal private key. Another encryption method included with the module uses a cipher that can leak structural information about the plaintext. This vulnerability is mitigated by the fact that it would only affect encryptions of large quantities of data, such as files and data of shorter lengths would not be affected. The default key created by the module is generated by a MD5 hash, which is not as strong as using truly random bytes of data. -------- CVE IDENTIFIER(S) ISSUED -------------------------------------------- * /A CVE identifier [3] will be requested, and added upon issuance, in accordance with Drupal Security Team processes./ -------- VERSIONS AFFECTED --------------------------------------------------- * Encrypt 7.x-2.x versions prior to 7.x-2.2. Drupal core is not affected. If you do not use the contributed Encrypt [4] module, there is nothing you need to do. -------- SOLUTION ------------------------------------------------------------ Install the latest version: * If you use the Encrypt module for Drupal 7.x, upgrade to Encrypt 7.x-2.2 [5] Once installed, review your settings and alter it to use a key provider and encryption method that is not deprecated. If data was encrypted with a deprecated key provider or encryption method then you should also re-encrypt all that data. Also see the Encrypt [6] project page. -------- REPORTED BY --------------------------------------------------------- * Heine Deelstra [7] of the Drupal Security Team -------- FIXED BY ------------------------------------------------------------ * Rick Hawkins [8] the module maintainer * Greg Knaddison [9] of the Drupal Security Team * Heine Deelstra [10] of the Drupal Security Team -------- COORDINATED BY ------------------------------------------------------ * Greg Knaddison [11] of the Drupal Security Team -------- CONTACT AND MORE INFORMATION ---------------------------------------- The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact [12]. Learn more about the Drupal Security team and their policies [13], writing secure code for Drupal [14], and securing your site [15]. Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity [16] [1] https://www.drupal.org/project/encrypt [2] https://www.drupal.org/security-team/risk-levels [3] http://cve.mitre.org/ [4] https://www.drupal.org/project/encrypt [5] https://www.drupal.org/node/2618254 [6] https://www.drupal.org/project/encrypt [7] https://www.drupal.org/user/17943 [8] https://www.drupal.org/user/352283 [9] https://www.drupal.org/user/36762 [10] https://www.drupal.org/user/17943 [11] https://www.drupal.org/user/36762 [12] https://www.drupal.org/contact [13] https://www.drupal.org/security-team [14] https://www.drupal.org/writing-secure-code [15] https://www.drupal.org/security/secure-configuration [16] https://twitter.com/drupalsecurity _______________________________________________ Security-news mailing list Security-news em drupal.org Unsubscribe at https://lists.drupal.org/mailman/listinfo/security-news ----- End forwarded message ----- From security em unicamp.br Mon Nov 23 09:54:11 2015 From: security em unicamp.br (CSIRT - UNICAMP) Date: Mon, 23 Nov 2015 09:54:11 -0200 Subject: [SECURITY-L] =?iso-8859-1?q?Atualiza=E7=E3o_de_publica=E7=E3o_no_?= =?iso-8859-1?q?site_do_CSIRT_Unicamp?= Message-ID: <20151123115411.GA8733@unicamp.br> Prezados, O site do CSIRT Unicamp foi atualizado com a publicação: Túneis Automáticos IPv6 em Windows: como tratá-los? https://www.security.unicamp.br/101-tuneis-automaticos-ipv6-em-windows-como-trata-los.html Atenciosamente, Computer Security Incident Response Team - CSIRT Universidade Estadual de Campinas - Unicamp Centro de Computacao - CCUEC E-mail: security em unicamp.br GnuPG Public Key: http://www.security.unicamp.br/security.asc Contact: +55 19 3521-2289 or +55 19 3521-2290 INOC-DBA-BR: 1251*830