Monthly Archives: January 2015
FTC Chairwoman Warns Of IoT Security And Privacy Risks
OpenSSL Toolkit 1.0.1k
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
OpenSSL Security Advisory – 8 Issues Addressed
OpenSSL suffers from a DTLS segmentation fault in dtls1_get_record, a DTLS memory leak in dtls1_buffer_record, an issue where no-ssl3 configuration sets method to NULL, ECDHE silently downgrades to ECDH [Client], RSA silently downgrades to EXPORT_RSA [Client], DH client certificates accepted without verification [Server], certificate fingerprints can be modified, and bignum squaring may produce incorrect results.
RECON 2015 Call For Papers
REcon is a computer security conference with a focus on reverse engineering and advanced exploitation techniques. It is held annually in Montreal, Canada. For 2015 it will be held June 19th through the 21st and the Call For Papers has been announced.
CMS BEdita 3.4.0 Cross Site Scripting
CMS BEdita version 3.4.0 suffers from multiple persistent cross site scripting vulnerabilities.
Good For Enterprise Android HTML Injection
Good for Enterprise Android suffers from a html injection vulnerability. A remote attacker is able to send a crafted email with a payload that redirects the user to a target url as soon as he opens the email.
PIN-Based P2P Server
This tool provides a client and a server that performs peer-to-peer file transfer using a shared, trusted PIN. The server is capable of handling simultaneous connections and transfers according to limitation set as command line argument when executing the server daemon. Written for Unix/Linux systems.
OpenSSL Patches Eight Vulnerabilities
Original release date: January 08, 2015
OpenSSL has released updates patching eight vulnerabilities, one of which may allow an attacker to cause a Denial of Service condition.
The following updates are available:
- OpenSSL 1.0.1k for 1.0.1 users
- OpenSSL 1.0.0p for 1.0.0 users
- OpenSSL 0.9.8zd for 0.9.8 users
Users and administrators are encouraged to review the OpenSSL Security Advisory for additional information and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
DSA-3123 binutils – security update
Multiple security issues have been found in binutils, a toolbox for
binary file manipulation. These vulnerabilities include multiple memory
safety errors, buffer overflows, use-after-frees and other implementation
errors may lead to the execution of arbitrary code, the bypass of security
restrictions, path traversal attack or denial of service.