Showing posts with label Patches. Show all posts
Showing posts with label Patches. Show all posts

Monday, May 8, 2017

How does Ticketbleed affect session ID security?

Looks like this one is going to get a lot of media coverage.  From Search Security:

How does Ticketbleed affect session ID security?

"The Ticketbleed bug in some F5 Networks products caused session IDs and uninitialized memory to leak. Expert Judith Myerson explains what a session ID is and how attackers use it.

Friday, May 5, 2017

ATM Security Software Found to Have Serious Vulnerability

From DataBreach Today:

ATM Security Software Found to Have Serious Vulnerability

"A security application for ATMs that's designed to thwart "jackpotting" attacks, where cash machines are commanded to surrender their holdings, has been found to have a serious vulnerability.

The software called Checker ATM, developed by the Spanish company GMV, now has a patch. Positive Technologies, a security company, found the vulnerability (CVE-2017-6968), which is a type of memory-related hiccup known as a buffer overflow, in versions 4.x and 5.x."

Cisco Patches Critical Flaw in Small Business Router

From SecurityWeek:

Cisco Patches Critical Flaw in Small Business Router

"Cisco has released a firmware update for one of its small business routers to address a critical vulnerability that can be exploited for denial-of-service (DoS) attacks and arbitrary code execution.

The vulnerability, discovered by researchers from GeekPwn, a China-based IoT-focused hacking competition, affects CVR100W Wireless-N VPN routers. The company said there was no evidence of malicious exploitation."

Unpatched WordPress Password Reset Vulnerability Lingers

From ThreatPost:

Unpatched WordPress Password Reset Vulnerability Lingers

"A zero-day vulnerability exists in WordPress Core that in some instances could allow an attacker to reset a user’s password and gain access to their account.

Researcher Dawid Golunski of Legal Hackers disclosed the vulnerability on Wednesday via his new ExploitBox service. All versions of WordPress, including the latest, 4.7.4, are vulnerable, the researcher said."

Thursday, May 4, 2017

How does the boot mode vulnerability in Android work?

From SearchSecurity:

How does the boot mode vulnerability in Android work?

"Google recently shut down the boot mode vulnerability in Android that allowed hackers to eavesdrop on calls. Can you explain how this exploit works?

It takes a few steps for the boot mode vulnerability exploit to work. First, the attacker infects a PC with malware through the internet. Then, the attacker waits for the victim to enable Android Debug Bridge (ADB) after manually connecting his Nexus 6 or 6P phone to the infected PC."

Wednesday, May 3, 2017

Netgear Patches RCE Flaws in Routers, Switches

From SecurityWeek:

Netgear Patches RCE Flaws in Routers, Switches

"Netgear recently informed customers that it has released firmware updates for some of its routers and switches to address remote code execution and other types of vulnerabilities.

Netgear announced the launch of a bug bounty program in early January and the company has been regularly publishing security advisories and notifications over the past months. The firm has been offering between $150 and $15,000 for responsibly disclosed vulnerabilities, and it already claims to have rewarded more than 150 bug reports."

Tuesday, May 2, 2017

Active Scans for Intel AMT Chipset Vulnerability Begin...

From SANS ISC:

Active Scans for Intel AMT Chipset Vulnerability Begin...

US-CERT Alert: Intel Firmware Vulnerability

From US-CERT:

Intel Firmware Vulnerability

"Intel has released recommendations to address a vulnerability in the firmware of the following Intel products: Active Management Technology, Standard Manageability, and Small Business Technology, firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6. This vulnerability does not affect Intel-based consumer PCs. An attacker could exploit this vulnerability to take control of an affected system."

Monday, May 1, 2017

Iranian Hackers Exploit Recent Office 0-Day in Attacks: Report

Glad to see they are putting the billion plus cash payment the US gave them last year is being put to good use. </sarcasm>

From SecurityWeek:

Iranian Hackers Exploit Recent Office 0-Day in Attacks: Report

"A recently patched vulnerability in Microsoft Office has been abused by Iranian threat actors in attacks against Israeli organizations, researchers from security firm Morphisec reveal.

Carried out between April 19 and April 24, 2017, the politically-motivated, targeted campaign was leveraging the CVE-2017-0199 vulnerability in Office that Microsoft patched earlier this month, after it had been already abused in live attacks. Because many organizations failed to apply the patch, however, the vulnerability continues to offer a viable attack surface."

New OWASP Top 10 Reveals Critical Weakness in Application Defenses

From Dark Reading:

New OWASP Top 10 Reveals Critical Weakness in Application Defenses

"It's time to move from a dependence on the flawed process of vulnerability identification and remediation to a two-pronged approach that also protects organizations from attacks.

When I wrote the first OWASP Top 10 list in 2002, the application security industry was shrouded in darkness. The insight that a few other engineers and I had gained through hand-to-hand combat with a wide variety of applications lived only within us. We recognized that for the industry to have a future, we had to make our knowledge public."

Thursday, April 27, 2017

PassFreely Attack Bypasses Oracle Database Authentication

From DataBreach Today:

PassFreely Attack Bypasses Oracle Database Authentication

"The attack tool in question, called PassFreely, dates from 2013. Based on leaked documents, tools and exploits tied to the Equation Group - the nickname for a group of hackers that experts believe is part of the National Security Agency's Tailored Access Operations group - it appears that PassFreely may have been used to hack into two or more SWIFT service bureaus (see Hackers Reveal Apparent NSA Targeting of SWIFT Bureaus).

The interbank messaging system from Brussels-based SWIFT - formally known as the Society for Worldwide Interbank Financial Telecommunication - is designed to guarantee that money-moving messages between more than 11,000 banks worldwide are authentic. While some banks host the related infrastructure themselves, many instead use one of 74 accredited SWIFT bureaus."

Hackers exploited Word flaw for months while Microsoft investigated

From Reuters:

Hackers exploited Word flaw for months while Microsoft investigated

"To understand why it is so difficult to defend computers from even moderately capable hackers, consider the case of the security flaw officially known as CVE-2017-0199.

The bug was unusually dangerous but of a common genre: it was in Microsoft software, could allow a hacker to seize control of a personal computer with little trace, and was fixed April 11 in Microsoft's regular monthly security update."

Wednesday, April 26, 2017

Display Software Flaw Affects Millions of Devices

From SecurityWeek:

Display Software Flaw Affects Millions of Devices


"A potentially serious vulnerability has been found in third-party software shipped by several major vendors for their displays. The developer has rushed to release a patch for the flaw, which is believed to affect millions of devices worldwide.

The security hole was identified by researchers at SEC Consult in display software developed by Portrait Displays. The impacted product allows users to configure their displays (e.g. rotation, alignment, colors and brightness) via a software application instead of hardware buttons.

Portrait Displays’ products are used by several major vendors, including Sony, HP, Acer, Fujitsu, Philips, Dell, Benq, Lenovo, Sharp and Toshiba. However, SEC Consult could only confirm the vulnerability for Fujitsu’s DisplayView, HP’s Display Assistant and My Display, and Philips’ SmartControl applications. The apps, which are pre-installed on millions of devices, have been classified by the security firm as bloatware."

Tuesday, April 25, 2017

What happens when a vendor doesn’t patch its software?

From Sophos Naked Security:

What happens when a vendor doesn’t patch its software?

"Microsoft engineers won’t be happy this month, thanks to the community-minded actions of a Github user named Zeffy. Not content with the way that Redmond was updating its software, he decided to patch Microsoft’s patch.

Zeffy is irritated with Microsoft’s decision to stop updating Windows 7 and 8.1 on newer CPUs. The company, which worked hard to push users to upgrade to Windows 10, announced in January last year that it would not update versions of these older operating systems running on seventh-generation processors (that’s Kaby Lake silicon from Intel, and Bristol Ridge silicon from AMD). A select set of products using sixth-generation Skylake processors would continue to get support until the middle of this year, it said."

Monday, April 24, 2017

Multiple security holes discovered in Linksys routers

From Sophos Naked Security:

Multiple security holes discovered in Linksys routers

"Do home router makers devote enough resources to finding security vulnerabilities in their products before they ship?

One could be forgiven for having doubts after this week’s news that research outfit IOActive had found 10 significant flaws affecting almost every home router currently sold by Linksys.
"

Thursday, May 7, 2015

Patch Tuesday Facelift End of an Era

From ThreatPost:


Patch Tuesday Facelift End of an Era


Scheduled patch deliveries are so last decade—and thankfully, it looks like they’re over when it comes to Microsoft Patch Tuesday.

Wednesday, April 29, 2015

Thursday, January 29, 2015

Apple fixes Thunderstrike and 3 Project Zero bugs in OS X 10.10.2 Yosemite

From Sophos Naked Security:

Apple fixes Thunderstrike and 3 Project Zero bugs in OS X 10.10.2 Yosemite

Apple is readying a series of fixes to defend Yosemite, its flagship operating system, from so-called 'evil maid' attacks.

'Ghost' flaws poses high risk to Linux distributions

From ComputerWorld:

'Ghost' flaws poses high risk to Linux distributions

A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.

Monday, December 15, 2014

New Windows 7 Patch Is Badware, Disables Graphics Driver Updates And Windows Defender

From Forbes:

New Windows 7 Patch Is Badware, Disables Graphics Driver Updates And Windows Defender

As with the author, I find this to be most troubling "Perhaps most troubling is that the Windows Defender service – crucial software that blocks viruses and malware — has been disabled by the update."