EMC Documentum Content Server contains fixes for multiple privilege escalation vulnerabilities that can be potentially leveraged by a malicious attacker to compromise the affected system. Versions affected include 7.1, 7.0, 6.7 SP2, and prior to 6.7 SP2.
Monthly Archives: September 2014
Ubuntu Security Notice USN-2347-1
Ubuntu Security Notice 2347-1 – Florian Apolloner discovered that Django incorrectly validated URLs. A remote attacker could use this issue to conduct phishing attacks. David Wilson discovered that Django incorrectly handled file name generation. A remote attacker could use this issue to cause Django to consume resources, resulting in a denial of service. David Greisen discovered that Django incorrectly handled certain headers in contrib.auth.middleware.RemoteUserMiddleware. A remote authenticated user could use this issue to hijack web sessions. Various other issues were also addressed.
Red Hat Security Advisory 2014-1243-01
Red Hat Security Advisory 2014-1243-01 – Automake is a tool for automatically generating Makefile.in files compliant with the GNU Coding Standards. It was found that the distcheck rule in Automake-generated Makefiles made a directory world-writable when preparing source archives. If a malicious, local user could access this directory, they could execute arbitrary code with the privileges of the user running “make distcheck”.
OSSEC 2.8 umask Clear Text Passwords
OSSEC version 2.8 inherits the umask of the user when adding cleartext passwords to the .passlist file, allowing for them to be world-readable instead of setting the permissions explicitly.
Attackers Tapping On SNMP Door To See If It's Open
Apple Takes 'Very Different View' On Customer Privacy
Israeli Spies Rebel Over Mass-Snooping On Innocent Palestinians
Julian Assange On Snowden, Disliking Google, And His "Inevitable" Freedom
Printer security: Canon offers ‘fix’ after researcher plays Doom
Printer giant Canon is to provide a security fix âas quickly as is feasibleâ after a researcher exploited vulnerabilities in one of its wireless PIXMA products to run the classic shoot âem up game Doom on its colour display.
Security researcher Michael Jordon told the BBC in an interview, âRunning Doom: thatâs real proof you control the thing. The web interface has no username and password on it.â
Digital Trends said that the vulnerability, which allows access to printer controls via an unsecured web page, highlighted the problems not just of printer security, but that of the entire emerging âinternet of things.â
Canon said that all new products would have a fix added as soon as possible, and that the fix would retroactively apply to products launched from 2013 onwards.
âAt Canon we work hard at securing all of our products, however with diverse and ever-changing security threats we welcome input from others to ensure our customers are as well protected as possible,â the firm said.
Printer security: Deeper worries?
A search using Shodan (a specialist search engine which finds specific types of devices connected to the internet), revealed thousands of unsecured machines connected directly to the internet.
âThis interface does not require user authentication allowing anyone to connect to the interface. Â At first glance the functionality seems to be relatively benign, you could print out hundreds of test pages and use up all the ink and paper, so what?â Jordon writes.
He said that the problems (and the opportunity to run Doom) arose when you use the online interface to update the firmware, and raised serious printer security issues.
Persuading the printer to run Doom took âmonthsâ, he admits, but the issue is a serious one. Even printers not directly connected to the internet can fall victim, he said, by persuading their owners to click on a bogus link.
Vulnerable to remote attack
Jordon writes, âEven if the printer is not directly accessible from the Internet, for example behind a NAT on a userâs home network or on an office intranet, the printer is still vulnerable to remote attack.â
âA colleague (thanks Paul Stone) demonstrated this by making a web page that first scans the local network for vulnerable printers (using a technique called JavaScript port scanning). Once the printerâs IP address has been found, the web page sends a request to the web interface to modify the proxy configuration and trigger a firmware update.â
The post Printer security: Canon offers ‘fix’ after researcher plays Doom appeared first on We Live Security.
Free ebooks warning: Pirates ‘can hack into Amazon accounts’
Pirating ebooks is not just bad for the publishing industry: free ebooks available online can also be used to hack into Amazon accounts via the retail giant’s âManage Your Kindleâ page, used to deliver ebook files to Kindle Readers, according to researcher Benjamin Daniel Mussler.
Mussler writes that simply changing the title of the free ebooks allows attackers to execute code when a victim opens the âKindle Libraryâ page in a web browser, The Digital Reader reports
âAs a result, Amazon account cookies can be accessed by and transferred to the attacker and the victim’s Amazon account can be compromised,â Mussler writes.
Engadget reports that Mussler discovered the security issue last October, and the company rapidly patched it. It was reintroduced, however, when the company launched a new version of the âManage Your Kindleâ web page.
Free ebooks: a threat?
Mussler writes that the threat affects, âEveryone who uses Amazonâs Kindle Library,â but stresses that the flaw affects those who pirate free ebooks in particular.
The attack takes place, he writes, âOnce an attacker manages to have an e-book (file, document, …) with a title like <script src=”https://www.example.org/script.js”></script> added to the victim’s library.â
Mussler says, âUsers most likely to fall victim to this vulnerability are those who obtain e-books from untrustworthy sources (read: pirated e-books) and then use Amazon’s “Send to Kindle” service to have them delivered to their Kindle. From the supplier’s point of view, vulnerabilities like this present an opportunity to gain access to active Amazon accounts.â
Kindle users beware
The reappearance of the flaw was highlighted by the German ebook blog Alles Book. The site also produced a proof-of-concept ebook download to demonstrate that it worked. As of the time of writing, the flaw is still active, Mussler reports.
Mussler says, âAmazon chose not to respond to my subsequent email detailing the issue, and two months later, the vulnerability remains unfixed.â
The post Free ebooks warning: Pirates âcan hack into Amazon accountsâ appeared first on We Live Security.