Hackin9

A remote code execution in nmbd (the NetBIOS name services daemon) has been found in Samba versions 4.0.0 to 4.1.10. ( assgined CVE-2014-3560) and a patch has been release by the team at samba.org.

Here's the details from http://www.samba.org/samba/security/CVE-2014-3560

===========
Description
===========
All current versions of Samba 4.x.x are vulnerable to a remote code execution vulnerability in the nmbd NetBIOS name services daemon.

A malicious browser can send packets that may overwrite the heap ofthe target nmbd NetBIOS name services daemon. It may be possible to use this to generate a remote code execution vulnerability as the superuser (root).
 
==================
Patch Availability
==================

A patch addressing this defect has been posted to

  http://www.samba.org/samba/security/

Additionally, Samba 4.1.11 and 4.0.21 have been issued as security releases to correct the defect. Patches against older Samba versions are available at http://samba.org/samba/patches/. Samba vendors and administrators running affected versions are advised to upgrade or apply the patch as soon as possible.

==========
Workaround
==========

Do not run nmbd, the NetBIOS name services daemon.

 

Chris Mohan --- Internet Storm Center Handler on Duty

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
The right to unlock your cellphone became law on Friday as President Barack Obama signed a bill that rapidly passed both houses of the U.S. Congress.
 
Microsoft filed suit against Samsung on Friday, claiming the device maker has backed out of an agreement that requires it to pay licensing fees to Microsoft for the Android phones it sells.
 
Twitter is moving the goal posts and Wall Street likes the new numbers it sees up on the scoreboard. The company's monthly active user base grew 24 percent from the year-ago period to 271 million, but the actual reach of Twitter goes well beyond that, the social media company claims.
 
A U.S. district court judge has given preliminary approval for Apple to pay a $450 million settlement for its role in an e-books price-fixing conspiracy.
 
Panasonic has agreed to help set up the factory that Tesla Motors plans to build for making batteries for Tesla and other electric cars.
 
Hewlett-Packard's SlateBook 14 laptop with the Android OS has started shipping on schedule, but it's priced at $429, which is $30 more than the company had said it would cost.
 
The National Institute of Standards and Technology (NIST) has issued for public comment a draft update of its primary guide to assessing the security and privacy controls that safeguard federal information systems and networks. Public ...
 
A coalition of retail industry trade groups this week called for the creation of an open tokenization standard for protecting credit and debit card data from theft and misuse.
 

There's a trivial way for drive-by exploit developers to bypass the security sandbox in almost all versions of Internet Explorer, and Microsoft says it has no immediate plans to fix it, according to researchers from Hewlett-Packard.

The exploit technique, laid out in a blog post published Thursday, significantly lowers the bar for attacks that surreptitiously install malware on end-user computers. Sandboxes like those included in IE and Google Chrome effectively require attackers to devise two exploits, one that pierces the sandbox and the other that targets a flaw in some other part of the browser. Having a reliable way to clear the first hurdle drastically lessens the burden of developing sophisticated attacks.

The bypass technique "does give the attacker a significant advantage by giving them higher-level access than a typical exploit might in Internet Explorer, by allowing them to escape the sandbox," Robert "Rsnake" Hansen, a vice president at security firm WhiteHat Labs, wrote in an e-mail to Ars. "In practical terms this is a very important finding, because it can be tied into existing exploits that might otherwise not be able to escape the IE sandbox."

Read 7 remaining paragraphs | Comments

 
RETIRED: WordPress A Page Flip Book Plugin 'pageflipbook.php' Local File Include Vulnerability
 
WordPress PageflipBook Plugin 'pageflipbook_language' Parameter Local File Include Vulnerability
 
Don't program robots -- train them. That's the stated goal of Brain Corporation, whose operating system is designed to allow robots to learn how to dump trash or open doors via hands-on training, not programming.
 
The Boston-based barge and marine contracting company that bought one of Google's mystery barges is still trying to figure out what to do with it.
 
Facebook said its website is back up after suffering a widespread outage for nearly two hours today.
 
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
 
Hewlett-Packard has agreed to pay US$32.5 million to settle allegations that it overbilled the U.S. Postal Service on a IT hardware contract.
 
Oregon's effort to transition its health insurance exchange from a problem-wracked website originally developed by Oracle to the federal Healthcare.gov platform is going according to schedule and expectations, state officials said this week.
 
Linux Kernel CVE-2014-3534 Local Privilege Escalation Vulnerability
 
The decision by HP to license OpenVMS source code to a new engineering firm is getting mostly positive reaction from the likes of user groups such as HP-Interex France.
 
Facebook is reporting 'increased errors' on all of its platforms.
 

Security researchers announced Friday that they have found new evidence to bolster claims from the National Security Agency that terrorists have altered their countermeasures in the wake of the Edward Snowden revelations.

"Al-Fajr, one of Al-Qaeda’s media arms, released a new Android encryption application [in] early June 2014 on their website, referring to how it follows the “latest technological advancements” and provides '4096 bit public key' encryption," intelligence firm Recorded Future said in a Friday report.

The report added that Global Islamic Media Front, another arm of Al Qaeda, just released a "new version" of Android crypto software.

Read 9 remaining paragraphs | Comments

 
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
 
ejabberd 'mod_pubsub' Module Denial of Service Vulnerability
 

Posted by InfoSec News on Aug 01

http://news.techworld.com/security/3533895/hacker-group-targets-video-game-companies-to-steal-source-code/

By Lucian Constantin
Techworld.com
31 July 2014

A group of attackers with links to the Chinese hacking underground has
been targeting companies from the entertainment and video game industries
for years with the goal of stealing source code.

The stolen intellectual property is used to "crack" games so they can be
used for...
 
LinuxSecurity.com: Updated openstack-keystone packages that fix two security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0 and 4.0. The Red Hat Security Response Team has rated this update as having [More...]
 
LinuxSecurity.com: kauth could be tricked into bypassing polkit authorizations.
 
LinuxSecurity.com: The Unity lock screen could possibly be bypassed in certain circumstances.
 
LinuxSecurity.com: Updated dbus packages fix security vulnerabilities: A flaw was reported in D-Bus's file descriptor passing feature. A local attacker could use this flaw to cause a service or application to disconnect from the bus, typically resulting in that service or [More...]
 
LinuxSecurity.com: Updated sendmail packages fix security vulnerability: Sendmail before 8.14.9 does not properly closing file descriptors before executing programs. This bug could enable local users to interfere with an open SMTP connection if they can execute their own [More...]
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: A vulnerability has been found and corrected in file: file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers [More...]
 
LinuxSecurity.com: A vulnerability has been found and corrected in php-ZendFramework: The implementation of the ORDER BY SQL statement in Zend_Db_Select of Zend Framework 1 contains a potential SQL injection when the query string passed contains parentheses (CVE-2014-4914). [More...]
 
[security bulletin] HPSBMU03081 rev.1 - HP Enterprise Maps, Remote Information Disclosure
 
[ MDVSA-2014:148 ] dbus
 
Download this handy PDF to learn all the ins and outs of the two major cloud productivity suites and decide which option is best for you
 
There's no question the cloud has revolutionized the way global business is done - increasing efficiency, cutting costs and making collaboration simpler, even when customers and partners are half a world away. Vince Sarrubi, CIO of Webcor Builders, talks with CIO.com about changing older workers' minds, finding technology "cheerleaders," and how his company has leveraged cloud technology to take a bricks-and-mortar business to new heights.
 

Posted by InfoSec News on Aug 01

http://healthitsecurity.com/2014/07/30/mitigating-cyber-risk-as-healthcare-data-sharing-accelerates/

By Greg Michaels
HealthITSecurity.com
July 30, 2014

When it comes to protecting their data, healthcare organizations are
increasingly finding themselves caught between the proverbial rock and a
hard place.

On the one hand, healthcare reform has not only led to organizations
generating vast amounts of electronic data, but has also driven the...
 
Wireshark RTP Dissector CVE-2014-2907 Remote Denial of Service Vulnerability
 
Photo WiFi Transfer 1.01 - Directory Traversal Vulnerability
 
C++11 <regex> insecure by default
 
[SECURITY] [DSA 2993-1] tor security update
 
[ MDVSA-2014:146 ] file
 

Posted by InfoSec News on Aug 01

http://krebsonsecurity.com/2014/07/sandwich-chain-jimmy-johns-investigating-breach-claims/

By Brian Krebs
Krebs on Security
July 31, 2014

Sources at a growing number of financial institutions in the United States
say they are tracking a pattern of fraud that indicates nationwide
sandwich chain Jimmy John’s may be the latest retailer dealing with a
breach involving customer credit card data. The company says it is working
with authorities...
 

Posted by InfoSec News on Aug 01

http://arstechnica.com/security/2014/07/stealthy-new-malware-snatching-credit-cards-from-retailers-pos-systems/

By Sean Gallagher
Ars Technica
July 31, 2014

US Computer Emergency Response Team, in cooperation with the Secret
Service and researchers at Trustwave’s Spiderlabs, have issued an alert
about a newly identified variant of malware installed on point-of-sale
(POS) systems that was used in a series of recent attacks by cyber...
 

Posted by InfoSec News on Aug 01

http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/

By Kim Zetter
Threat Level
Wired.com
07.31.14

A lot of concern about the NSA’s seemingly omnipresent surveillance over
the last year has focused on the agency’s efforts to install back doors in
software and hardware. Those efforts are greatly aided, however, if the
agency can piggyback on embedded software already on a system that can be...
 
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
 
Microsoft has been ordered to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland.
 

Chris Mohan --- Internet Storm Center Handler on Duty

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Internet Storm Center Infocon Status