Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Enlarge (credit: Zuzu)

In February 2014, thousands of Asus router owners found a disturbing text file saved to their devices.

"This is an automated message being sent out to everyone effected [sic]," the message read. "Your Asus router (and your documents) can be accessed by anyone in the world with an Internet connection." The anonymous sender then urged the readers to visit a site that explained more about the router vulnerability.

On Tuesday, the US Federal Trade Commission settled charges that alleged the hardware manufacturer failed to protect consumers as required by federal law. The settlement resolves a complaint that said the 2014 mass compromise was the result of vulnerabilities that allowed attackers to remotely log in to routers and, depending on user configurations, change security settings or access files stored on connected devices. Under the agreement, Asus will maintain a comprehensive security program subject to independent audits for the next 20 years.

Read 6 remaining paragraphs | Comments

 
CSNC-2016-001 - XSS in OpenAM
 
CSNC-2016-002 - Open Redirect in OpenAM
 
CVE-2015-0955 - Stored XSS in Adobe Experience Manager (AEM)
 
InstantCoder v1.0 iOS - Multiple Web Vulnerabilities
 
Linux Kernel CVE-2015-7550 Null Pointer Deference Local Denial of Service Vulnerability
 
Linux Kernel 'fs/fuse/file.c' Local Denial of Service Vulnerability
 
Linux Kernel CVE-2013-4312 Multiple Local Denial of Service Vulnerabilities
 
Linux Kernel CVE-2016-2069 TLB Flush Local Security Bypass Vulnerability
 
ISC BIND CVE-2015-8704 Remote Denial of Service Vulnerability
 

VMware issued yesterday the following security advisory:VMSA-2016-0002[1]. It addresses the CVE-2015-7547[2](getaddrinfo() in glibc)which affects the following products:

  • VMware ESXi5.5without patch ESXi550-201602401-SG
  • VMware virtual appliances

Note that a patch is still pending for ESXi 6.0.

[1] http://www.vmware.com/security/advisories/VMSA-2016-0002.html
[2]https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7547

Xavier Mertens
ISC Handler - Freelance Security Consultant
PGP Key

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Internet Storm Center Infocon Status