Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
OpenSSL 'pk7_doit.c' NULL Pointer Dereference Denial of Service Vulnerability
 
X.Org libXfont 'bitmap/bdfread.c' Local Denial of Service Vulnerability
 
nbd CVE-2013-7441 Denial of Service Vulnerability
 

In a rare press release issued Wednesday morning, Hacking Team, the embattled Italian surveillance software vendor, reiterated that it did not and does not have a "backdoor" into its clients’ installations of the Remote Control System, or RCS. But new analysis of its leaked source code seems to directly contradict this claim.

Hacking team said:

There have been reports that our software contained some sort of "backdoor" that permitted Hacking Team insight into the operations of our clients or the ability to disable their software. This is not true. No such backdoors were ever present, and clients have been permitted to examine the source code to reassure themselves of this fact.

According to new research by Joseph Greenwood, a UK-based researcher with 4Armed who has been examining the leaked RCS source code in detail, this is a distinction without a difference.

Read 11 remaining paragraphs | Comments

 

A bug in the latest version of Apple's OS X gives attackers the ability to obtain unfettered root user privileges, a feat that makes it easier to surreptitiously infect Macs with rootkits and other types of persistent malware.

The privilege-escalation bug, which was reported in a blog post published Tuesday by security researcher Stefan Esser, is the type of security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications. Hacking Team, the Italian malware-as-a-service provider that catered to governments around the world, recently exploited similar elevation-of-privileges bugs in Microsoft Windows. When combined with a zero-day exploit targeting Adobe's Flash media player, Hacking Team was able to pierce security protections built into Google Chrome, widely regarded as the Internet's most secure browser by default.

According to Esser, the OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Developers didn't use standard safeguards involving additions to the OS X dynamic linker dyld, a failure that allows attackers to open or create files with root privileges that can reside anywhere in the OS X file system.

Read 4 remaining paragraphs | Comments

 
cURL/libcURL NTLM connection CVE-2015-3143 Remote Security Bypass Vulnerability
 
Cisco Security Advisory: Cisco IOS Software TFTP Server Denial of Service Vulnerability
 
Cisco Security Advisory: Cisco Unified MeetingPlace Unauthorized Password Change Vulnerability
 
Cisco Security Advisory: Cisco Application Policy Infrastructure Controller Access Control Vulnerability
 
ESA-2015-118: EMC Avamar Directory Traversal Vulnerability
 
Automount CVE-2014-8169 Local Privilege Escalation Vulnerability
 
Libxml2 CVE-2015-1819 Denial of Service Vulnerability
 
Multiple (remote and local) Vulnerabilities in Xceedium Xsuite [MZ-15-02]
 

US government officials are nearly certain that the Chinese government was involved in the theft of sensitive personal information about millions of government employees, members of the US military, and employees of government contractors requiring background checks or security clearances from the systems of the Office of Personnel Management. But according to a report by the Washington Post, the Obama administration has decided to not publicly and officially call out China for the attack—in part because it might require the administration to reveal some of the US' hacking of China to make the case, and expose other information intelligence and warfare capabilities of the National Security Agency, Department of Homeland Security, and FBI.

Ellen Nakashima, the Post's national security reporter, citied anonymous conversations with officials involved with the White House's decision-making process surrounding the OPM, and reported that the administration "has not ruled out economic sanctions or other punitive measures" for the theft of data from OPM. But US officials, including Director of National Intelligence James Clapper, have "even expressed grudging admiration for the OPM hack, saying US spy agencies would do the same against other governments," she reported.

Part of the calculus that went into the decision, one official told Nakashima, was that “we don’t see enough benefit in doing the attribution at this point to outweigh whatever loss we might [experience] in terms of intelligence-collection capabilities.” Another official said that the White House might opt to simply put sanctions in place under other justifications, and then privately communicate to the Chinese government that the sanctions were in fact in retaliation for the OPM hack.

Read 2 remaining paragraphs | Comments

 
Multiple XSS Vulnerabilities in Paid Memberships Pro WordPress Plugin
 
SQL Injection in Count Per Day WordPress Plugin
 
LinuxSecurity.com: Updated mailman packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated sudo packages that fix one security issue, three bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated net-snmp packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated libreoffice packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated hivex packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. [More...]
 
LinuxSecurity.com: Updated pki-core packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Updated gnutls packages that fix three security issues and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Updated libxml2 packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security [More...]
 
LinuxSecurity.com: Updated ipa packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: An updated wpa_supplicant package that fixes one security issue and adds one enhancement is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security [More...]
 
[SECURITY] [DSA 3312-1] cacti security update
 
NetCracker Resource Management 8.0 - SQL Injection Vulnerability
 
NetCracker Resource Management 8.0 - XSS Vulnerability
 
Open-Web-Analytics-1.5.7 Cryptographic, Password Disclosure & XSS Vulnerabilities
 

iT News

Infosec experts hack Jeep, gain control of moving car - Security - News ...
iT News
A pair of veteran cybersecurity researchers have shown they can use the internet to turn off a car's engine as it drives, sharply escalating the stakes in the debate about the safety of increasingly connected cars and trucks. Former NSA hacker Charlie ...

and more »
 
Internet Storm Center Infocon Status