search menu icon-carat-right cmu-wordmark

CERT/CC Blog

Vulnerability Insights

Latest Posts

Conficker.C: How Many Are There?

Conficker.C: How Many Are There?

• CERT/CC Blog
Sid Faber

Hello, Sid Faber from the Network Situational Awareness group at CERT. Like just about everyone else, we've been following the Conficker worm for a while and thought some updated stats on the Conficker.C variant might be useful....

Read More
Windows Installer Application Resiliency

Windows Installer Application Resiliency

• CERT/CC Blog
Will Dormann

Hi, it's Will again. Recently, I was investigating the effectiveness of the workarounds for the Adobe Reader JBIG2 vulnerability, and I encountered an unexpected situation. In certain situations, the application resiliency feature of Windows Installer can actually undo some of the steps taken to mitigate a vulnerability....

Read More
Internet Explorer Vulnerability Attack Vectors

Internet Explorer Vulnerability Attack Vectors

• CERT/CC Blog
Will Dormann

Hey, it's Will. I noticed that several blogs, including Trend Micro and McAfee, have been talking about the recent attacks on the Internet Explorer 7 vulnerability that was fixed in MS09-002. An interesting thing about these exploits is the attack vector. The technique used in these attacks has several security impacts that may not be immediately obvious....

Read More
Reference Implementations for Securing Your Web Browser Guidelines

Reference Implementations for Securing Your Web Browser Guidelines

• CERT/CC Blog
Will Dormann

It's Will again, with the first blog entry of 2009. Our Securing Your Web Browser document describes how to make your web browser more secure, but applying all of the necessary changes can be a bit tedious. To make the process easier, we developed reference implementations of the guidelines for both Microsoft Internet Explorer and Mozilla Firefox....

Read More
Recommendations to Vendors for Communicating Product Security Information

Recommendations to Vendors for Communicating Product Security Information

• CERT/CC Blog
Chad Dougherty

Hi, this is Chad Dougherty of the Vulnerability Analysis team. One of the important roles that our team plays is coordinating vulnerability information among a broad range of vendors. Over the years, we have gained a considerable amount of experience communicating with vendors of all shapes and sizes. Based on this experience, we can offer some guidance to vendors about communicating product security issues....

Read More
Filtering ICMPv6 Using Host-Based Firewalls

Filtering ICMPv6 Using Host-Based Firewalls

• CERT/CC Blog
Ryan Giobbi

Hey, it's Ryan. This blog entry contains some quick recommendations about filtering certain ICMPv6 types using two host-based firewalls--Linux ip6tables and Microsoft Vista's advfirewall. If you have suggestions or other ideas, let me know....

Read More
Reported Vulnerability in CERT Secure Coding Standards Website

Reported Vulnerability in CERT Secure Coding Standards Website

• CERT/CC Blog
Will Dormann

Hi, it's Will. Recently, a blog author reported that the CERT® Secure Coding Standards website, which runs on Atlassian Confluence, contained a SQL injection vulnerability. After analyzing the report and discussing it with the Confluence vendor, we have concluded that the behavior described is not a vulnerability....

Read More
Ping Sweeping in IPv6

Ping Sweeping in IPv6

• CERT/CC Blog
Ryan Giobbi

Hello, its Ryan. We've noticed a misconception about IPv6 that is popular on the internet: that IPv6 addresses are hard to ping sweep because there are so many possible addresses. Ping sweeping can lead to port scanning, so this misconception is viewed as a security feature. In this post, I'll prove that, while it won't work across the internet, ping sweeping on the local network is easier in IPv6 than in IPv4....

Read More