VMWare Security Advisories

Published: 2016-05-25. Last Updated: 2016-05-25 20:23:16 UTC
by Rick Wanner (Version: 1)
0 comment(s)
VMware has released the following new and updated security advisories:
 
New
VMware VCenter Server - VMSA-2016-0006: http://www.vmware.com/security/advisories/VMSA-2016-0006.html
 
Updated

VMware vCenter and ESXi - VMSA-2015-0007.5: http://www.vmware.com/security/advisories/VMSA-2015-0007.html

Various VMWare Products - VMSA-2016-0005.1 http://www.vmware.com/security/advisories/VMSA-2016-0005.html

 

-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - http://namedeplume.blogspot.com/ - Twitter:namedeplume (Protected)

Keywords: VMware
0 comment(s)
ISC Stormcast For Wednesday, May 25th 2016 http://isc.sans.edu/podcastdetail.html?id=5011

Stop Using "internal" Top Level Domain Names

Published: 2016-05-25. Last Updated: 2016-05-25 02:40:01 UTC
by Johannes Ullrich (Version: 1)
4 comment(s)

Cert.org this week warned again that internal top level domain names can be used against you, if one of these domains happens to be registered as a new "generic top level domain" (gTLD). Currently, there are about 1200 approved gTLDs , and the number will only increase even though the initial "gold rush" seems to have leveled off somewhat [1] 

US-Cert just sent out a reminder again regarding the use of internal domain names for automatic proxy configuration via WPAD. If this internal, but not officially assigned TLD is all for sudden used on the public internet, then requests may got to a host within that official TLD, instead of your internal TLD. This is in particular a problem for mobile devices that leave your network.

US Cert points out a couple of options, most importantly the use of an actual assigned domain, which should be the preferred solution to this problem. On the other hand, this can be difficult to roll out in a larger network where the internal TLD is used for various purposes. In this case, make sure that at least internally, all queries to this internal TLD are directed to your internal name server.

Regarding gTLDs in general, you may also want to consider blocking some from resolving anyway:

- .zip : This gTLD appears to be assigned to Google, and is currently not used. It could lead to the leaking of .zip file names if mail software and the like interprets the file name as a URL and adds a hyperlink to it.
- .top : From my own experience, this TLD is exclusively used for spam. Let me know if you find  legitimate use of this gTLD
 

[1] https://newgtlds.icann.org/en/applicants/agb/base-agreement-contracting#stats 
[2] https://www.us-cert.gov/ncas/alerts/TA16-144A

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

Keywords:
4 comment(s)

Comments


Diary Archives