| 

All the world's a Stagefright

  • Post author: Omid Farhang
  • Post published: October 9, 2015
  • Reading Time: 1 min
  • Word Count: 202 words

Here’s how security vulnerabilities are supposed to be handled. One, a researcher discovers an issue. Two, the people who make the software find a solution. And three, the solution is then made available, ideally by automatic update. That’s what Windows does, and what Apple does. It isn’t always as fast as it should be, but at least once the fix exists it’s available almost instantly. Here’s how it works with Android. ...

Continue Reading All the world's a Stagefright

Apple closes QuickTime vulnerabilities on Windows

  • Post author: Omid Farhang
  • Post published: May 23, 2013
  • Reading Time: 1 min
  • Word Count: 162 words

Apple has released a security update for its QuickTime media framework for Windows. Version 7.7.4 of the software closes 12 critical security holes causing memory corruption and buffer overflows when processing a number of media formats. The vulnerabilities affect Windows 7, Vista and XP SP2 or later and could be exploited to cause arbitrary code execution and application crashes. The vulnerabilities affected the playback of MP3, H.263, H.264, TeXML, JPEG, QTIF, Sorenson Video and FPX files as well as the handling of dref, enof and mvhd atoms within the program. All of the problems were reported by researchers working with HP’s Zero Day Initiative, five of them by Tom Gallagher and Paul Bates from Microsoft. ...

Continue Reading Apple closes QuickTime vulnerabilities on Windows

New Adobe Vulnerabilities Being Exploited in the Wild

  • Post author: Omid Farhang
  • Post published: February 14, 2013
  • Reading Time: 1 min
  • Word Count: 176 words

Adobe posted a vulnerability report warning that vulnerabilities in Adobe Reader and Acrobat XI (11.0.1) and earlier versions are being exploited in the wild. Adobe is currently investigating this issue. According to the FireEye blog posted earlier today, the malicious file arrives as a PDF file. Upon successful exploitation of the vulnerabilities, two malicious DLL files are dropped. Symantec detects the malicious PDF file as Trojan.Pidief and the two dropped DLL files as Trojan Horse. ...

Continue Reading New Adobe Vulnerabilities Being Exploited in the Wild

Internet Explorer security hole: Use other browser

  • Post author: Omid Farhang
  • Post published: September 18, 2012
  • Reading Time: 1 min
  • Word Count: 174 words

TheTelegraph: Internet Explorer users might want to consider upgrading or switching to another browser after a massive security hole was discovered in Windows’ native web browser. According to security forum, Rapid7 , Internet Explorer 7, 8 and 9 operating on Windows XP, Vista and Seven contains what is known as a “zero day exploit” which allows attackers to gain access to your personal data while you browse. The forum claimed the exploit would give cyber criminals “the same privileges as the current user”. ...

Continue Reading Internet Explorer security hole: Use other browser

Adobe fixes ColdFusion security vulnerability

  • Post author: Omid Farhang
  • Post published: September 12, 2012
  • Reading Time: 1 min
  • Word Count: 126 words

h-Online: On the same day as Microsoft’s September Patch Tuesday, Adobe released an update for ColdFusion to close a security hole in its rapid web application development software. The hotfix for ColdFusion addresses a vulnerability (CVE-2012-2048), which the company rates as important, that could be exploited by a remote attacker to cause a denial-of-service (DoS) condition. According to Adobe, the unspecified error affects versions 8.0, 8.0.1, 9.0 to 9.0.2, and 10 of ColdFusion for Windows, Mac OS X and UNIX. Installing the provided hotfix corrects the problem; download links and installation instructions for each affected version are provided on the APSB12-21 technote page. All users are advised to download and apply the hotfix. Adobe credits UK developer David Boyer for finding and reporting the problem. ...

Continue Reading Adobe fixes ColdFusion security vulnerability

Oracle rushes out patch for critical 0-day Java exploit

  • Post author: Omid Farhang
  • Post published: August 31, 2012
  • Reading Time: 2 min
  • Word Count: 370 words

TheRegister: In an uncommon break with its thrice-annual security update schedule, Oracle has released a patch for three Java 7 security flaws that have recently been targeted by web-based exploits. “Due to the high severity of these vulnerabilities, Oracle recommends that customers apply this Security Alert as soon as possible,” Eric Maurice, the company’s director of software security assurance, said in a blog post published on Thursday. Maurice said that the vulnerabilities patched only affect Java running in browsers, and not standalone desktop Java applications or Java running on servers. According to Oracle’s official advisory on the flaws: ...

Continue Reading Oracle rushes out patch for critical 0-day Java exploit

Java zero day vulnerability actively used in targeted attacks

  • Post author: Omid Farhang
  • Post published: August 27, 2012
  • Reading Time: 1 min
  • Word Count: 189 words

ZDNet: Security researchers from FireEye, AlienVault, and DeependResearch have intercepted targeted malware attacks utilizing the latest Java zero day exploit. The vulnerability affects Java 7 (1.7) Update 0 to 6. It does not affect Java 6 and below. Based on related reports, researchers were able to reproduce the exploit on Windows 7 SP1 with Java 7 Update 6. There’s also a Metasploit module available. Upon successful exploitation, the campaign drops MD5: 4a55bf1448262bf71707eef7fc168f7d – detected by 28 out of 42 antivirus scanners as Gen:Trojan.Heur.FU.bqW@a4uT4@bb; Backdoor:Win32/Poison.E ...

Continue Reading Java zero day vulnerability actively used in targeted attacks

Not so secure: Text messaging on iPhone can be hacked

  • Post author: Omid Farhang
  • Post published: August 19, 2012
  • Reading Time: 2 min
  • Word Count: 238 words

FirstPost: A hacker Friday revealed a security flaw that he claimed could make Apple’s iPhone particularly vulnerable to text message cheating. The flaw has existed since iPhone was first launched in 2007, and is still not solved in the beta version of iOS 6, the next operating system for iPhone, the hacker under the name “Pod2g” said in a blog post, reported Xinhua. ...

Continue Reading Not so secure: Text messaging on iPhone can be hacked

PostgreSQL patches XML flaws

  • Post author: Omid Farhang
  • Post published: August 19, 2012
  • Reading Time: 2 min
  • Word Count: 333 words

h-online: A flaw in the built-in XML functionality of PostgreSQL (CVE-2012-3488) and another in its optional XSLT handling (CVE-2012-3489) have been patched, and the developers have released updated versions of the open source database with relevant fixes. The holes being patched are related to insecure use of the widely used libxml2 and libxslt open source libraries and the PostgreSQL developers advise anyone using those libraries to check their systems for similar problems. ...

Continue Reading PostgreSQL patches XML flaws

LibreOffice vulnerable to multiple buffer overflows

  • Post author: Omid Farhang
  • Post published: August 2, 2012
  • Reading Time: 1 min
  • Word Count: 156 words

h-online: Three weeks after releasing LibreOffice 3.5.5, The Document Foundation has confirmed that security holes in earlier versions of the open source LibreOffice productivity suite can be exploited by attackers to compromise a victim’s system. According to the project’s security advisory, these include multiple heap-based buffer overflow vulnerabilities in the XML manifest encryption tag parsing code. Successful exploitation of the vulnerabilities could lead to the execution of arbitrary code on a system with the privileges of a local user. For an attack to be successful, a victim must first open a specially crafted Open Document Format (ODF) file. Versions up to and including LibreOffice 3.5.4 are affected; upgrading to version 3.5.5 or later fixes these problems. All users are advised to upgrade. ...

Continue Reading LibreOffice vulnerable to multiple buffer overflows