| 

QuickTime for Windows update plugs security holes

  • Post author: Omid Farhang
  • Post published: May 17, 2012
  • Reading Time: 1 min
  • Word Count: 189 words

The H-Online: Version 7.7.2 of QuickTime for Windows has been released to address a total of 17 security vulnerabilities in the media player. According to Apple, these include integer, stack and buffer overflows, as well as memory corruption issues, all of which could be could exploited by an attacker to crash the application or execute arbitrary code on a victim’s system. For an attack to be successful, a user must first open a malicious web site or a specially crafted file. ...

Continue Reading QuickTime for Windows update plugs security holes

RealPlayer update fixes security vulnerabilities

  • Post author: Omid Farhang
  • Post published: May 17, 2012
  • Reading Time: 1 min
  • Word Count: 163 words

The H-Online: RealNetworks is warning users about multiple security vulnerabilities in its RealPlayer media player application for Windows; the company says that none of the, now fixed, holes are known to have been used to compromise systems. The released update, version 15.0.4.53 of RealPlayer, closes three security holes. One hole is related to ASM RuleBook parsing that could be exploited by an attacker to remotely execute arbitrary code, another is a memory corruption problem related to MP4 file handling in the QuickTime plugin used by RealPlayer, and the third is a buffer overrun in the Media parser. ...

Continue Reading RealPlayer update fixes security vulnerabilities

Sniffer tool displays other people's WhatsApp messages

  • Post author: Omid Farhang
  • Post published: May 13, 2012
  • Reading Time: 2 min
  • Word Count: 331 words

The H-Online: WhatsApp Sniffer is an app able to display messages from other WhatsApp users connected to the same network as the app user. The tool diverts all data traffic on, for example, a Wi-Fi network through the user’s smartphone and seeks out WhatsApp messages, which are transferred in plain text. All the user requires is a rooted Android smartphone. The WhatsApp messaging service has established itself as an alternative to texting between smartphone users, because, unlike text messages, users only have to pay for data use. And if a user is in range of a free Wi-Fi point, then it is free to use. ...

Continue Reading Sniffer tool displays other people's WhatsApp messages

Microsoft Patch Tuesday more extensive than anticipated

  • Post author: Omid Farhang
  • Post published: May 10, 2012
  • Reading Time: 2 min
  • Word Count: 279 words

The H-Online: As previously announced, Microsoft has released seven bulletins to close a total of 23 vulnerabilities on its May Patch Tuesday. The total number of bulletins belies the scope of the patches, however, as the combined update MS12-034 closes various holes in numerous products. The reason for this is a critical hole in the code for processing TrueType fonts that was exploited by the Duqu spyware last year. The hole was closed in the Windows kernel on the December Patch Tuesday; however, Microsoft has since used a code scanner to track down the vulnerable code in numerous other components; among them is the gdiplus.dll library, which is used by various browsers to render web fonts. ...

Continue Reading Microsoft Patch Tuesday more extensive than anticipated

PHP patch quick but inadequate

  • Post author: Omid Farhang
  • Post published: May 5, 2012
  • Reading Time: 2 min
  • Word Count: 260 words

The H-Online: The updates to PHP versions 5.3.12 and 5.4.2 released on Thursday do not fully resolve the vulnerability that was accidentally disclosed on Reddit, according to the discoverer of the flaw. The bug in the way CGI and PHP interact with each other leads to a situation where attackers can execute code on affected servers. The issue remained undiscovered for eight years. The best protection at present is offered by setting up filter rules on the web server. However, the RewriteRule workaround described on PHP.net is also, according to security expert Christopher Kunz, inadequate. He suggests a slightly modified form of the rule as an alternative. ...

Continue Reading PHP patch quick but inadequate

Firefox WebSocket bug compromises Tor anonymity

  • Post author: Omid Farhang
  • Post published: May 3, 2012
  • Reading Time: 1 min
  • Word Count: 171 words

The current versions of the Tor Browser Bundle (TBB) include a bug that makes it possible for information about visited web sites to leak out of the anonymising layer. On version 2.2.35-9 of TBB for Windows and version 2.2.35-10 for Mac OS X and Linux, the included version of Firefox does not send DNS requests over the Tor network if the browser is using the WebSocket protocol. This means that an attacker listening in on the connection will be able to identify the servers the user is visiting. ...

Continue Reading Firefox WebSocket bug compromises Tor anonymity

Skype divulges user IP addresses

  • Post author: Omid Farhang
  • Post published: April 30, 2012
  • Reading Time: 2 min
  • Word Count: 242 words

The H-Online: According to a blog post, a modified version of the Skype VoIP software can be used to easily find out the IP address of any valid Skype user. No contact has to be made with the user in order to get the information. This IP could then be used to find out other personal details about the user, such as their location or even their employer. With a certain registry key, the manipulated version of Skype will create a log file with information including other users’ external and internal IP addresses. These IPs can be retrieved simply by opening up a user’s profile with the Skype client. In a test conducted by The H’s associates at heise Security, the log file always showed the correct IPs – and when a user was logged in with multiple clients, the IP addresses for all the clients were visible. ...

Continue Reading Skype divulges user IP addresses

Security vulnerability in NVIDIA's proprietary Linux drivers fixed

  • Post author: Omid Farhang
  • Post published: April 12, 2012
  • Reading Time: 1 min
  • Word Count: 213 words

The H-Online: A new version of NVIDIA’s proprietary UNIX graphics drivers for Linux, Solaris and FreeBSD fixes a security vulnerability (CVE-2012-0946) that allowed attackers to read and write arbitrary system memory in order to, for example, obtain root privileges. To take advantage of the vulnerability, an attacker must have access permission for some device files – which, for systems with these drivers, is typically the case for users who can launch a graphical interface as 3D acceleration and some other features cannot be used otherwise. ...

Continue Reading Security vulnerability in NVIDIA's proprietary Linux drivers fixed

Microsoft and Adobe to address critical vulnerabilities on Patch Tuesday

  • Post author: Omid Farhang
  • Post published: April 7, 2012
  • Reading Time: 1 min
  • Word Count: 202 words

The H-Online: The Tuesday after the Easter weekend, 10 April, is set to be a busy one for system administrators as Microsoft and Adobe have sent out notifications that they will both be issuing fixes for critical vulnerabilities in their products. Microsoft’s April notification says there will be four critical advisories concerning Microsoft Windows, Internet Explorer, .NET Framework, Office, SQL Server, Microsoft Server and Developer tools, which all lead to remote code execution. A fifth remote code execution vulnerability in Office is marked as important, as is a sixth information disclosure issue in Microsoft’s Forefront United Access Gateway. The critical bulletins will affect all versions of Windows, from Windows XP SP3 to Windows Server 2008R2. One critical bulletin for Internet Explorer covers IE 6, 7, 8 and 9 ...

Continue Reading Microsoft and Adobe to address critical vulnerabilities on Patch Tuesday

Google Chrome fixes seven high-risk vulnerabilities

  • Post author: Omid Farhang
  • Post published: April 6, 2012
  • Reading Time: 2 min
  • Word Count: 254 words

The H-Online: Google has announced updates to the Stable and Beta channels of their Chrome browser, fixing several bugs and twelve security vulnerabilities. Seven of the twelve security fixes were classed as high-risk problems and Google paid a total of $6000 to the researchers who discovered the bugs. The update also includes a new version of the bundled Flash Player. Adobe have revised the Flash Player advisory from the end of March to include fixes for a Chrome/Flash only pair of memory corruption issues listed as CVE-2012-0724 and CVE-2012-0725. Given that these issues only affect Chrome and Chrome manages its own update, it is unlikely that Adobe will be reissuing or updating the advisory or patches for other browsers and platforms. ...

Continue Reading Google Chrome fixes seven high-risk vulnerabilities