Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder.
Monthly Archives: March 2015
CVE-2015-2790
Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image.
CVE-2015-2791
The “menu sync” function in the WPML plugin before 3.1.9 for WordPress allows remote attackers to delete arbitrary posts, pages, and menus via a crafted request to sitepress-multilingual-cms/menu/menus-sync.php.
CVE-2015-2792
The WPML plugin before 3.1.9 for WordPress does not properly handle multiple actions in a request, which allows remote attackers to bypass nonce checks and perform arbitrary actions via a request containing an action POST parameter, an action GET parameter, and a valid nonce for the action GET parameter.
DDoS Attack Against GitHub Continues After More Than Four Days
More than four days after it began, the massive DDoS attack on GitHub is still ongoing. The attack has evolved significantly since it started and GitHub officials said they believe that the goal of the operation is to force the site to remove some specific content. In the evening hours of March 25, DDoS attack […]
Employee Testimonials: 29 Years of Avira
A company builds its success on quality products & services brought to people by talented, dedicated employees. We are no exception to that rule, the Avira employees being…simply awesome.
We are lucky enough to count among Avira employees people who have been with the company for 9, 10 or even 18 years. Despite the fact that some of them were just kids when our business was in the process of being created, when the moment came, they joined Avira and their time spent here rewarded them with beautiful memories and unforgettable successes. The company thrived simultaneously, becoming the chosen Antivirus provider for millions of users around the world.
At Avira we are more than a team, we are a family.
PS: Word to the wise, whenever in doubt about whatever makes your company be successful… just ask THEM.
The post Employee Testimonials: 29 Years of Avira appeared first on Avira Blog.
Ad Networks Ripe for Abuse Via Malvertising
Criminals have found a safe haven abusing legitimate processes, such as real-time bidding, implemented by online advertising networks to move exploits and malware, and build botnets and fraud campaigns.
Do you use uTorrent? Careful with what it installs in your computer!
If you love downloading things of the Internet, probably you know uTorrent, one of the most famous clients of BitTorrent, which allows us to download files quickly and free. In spite of the annoying banners that constantly accost users. There are many webs where you can check how to eliminate these sponsored advertisements.
Nevertheless, Bit Torrent, with 150 millions of users per month, suffered strong reviews in the last few days because of their latest update design. As one user explained in the uTorrent forums, they had installed new software, without warning him. He only realized it when he saw that his processor was consuming more resources than it should.
In this particular case, the program that sneaked into his computer was EpicScale, a mining bitcoins software. To those who don’t know how the Cryptocurrency works, mining is the process that replaces currency issuance. Users offer part of their computer resources for the community’s benefit and then obtain some cryptocoins.
After the first message, many more users protested, ensuring that EpicScale was installed on their computers without them knowing it. Bit Torrent, uTorrent’s parent company, confirmed the service’s inclusion in the last update, but assures the users were notified. “We have reviewed the issue closely and can confirm there is no silent install happening…. Most likely these users accepted the offer during install,” the company explained.
Therefore, or users are mistaken or there is a lack of transparency in the system. After revising the whole process experts at Trusted Reviews concluded that because the system design, users were misinformed. Now, they don’t dismiss that the problem may be due to a faulty installation. So if you are uTorrent user check if it has also installed EpicScale and, if you want, remove it so it stops consuming your computers resources.
Some users stated that they couldn’t uninstall the program completely with the Control Panel feature “Add/ Remove Programs” nor erasing the program’s data. One of the recommendations already spreading through the Internet is to uninstall EpicScale with the help of CCleaner.
Another option is logically stop using uTorrent. Torrent Freak has already included a list of ten possible alternatives that you can use if you want to abandon this P2P client and continue downloading “torrents” safely: qBittorrent, BitTornado, Vuze or Tribler are some of the options available to continue downloading.
What can we draw from this? It is always advisable to read carefully all the steps in the installation wizard, just in case anyone tries to sneak a service partner, to consume your resources or for other purposes.
The post Do you use uTorrent? Careful with what it installs in your computer! appeared first on MediaCenter Panda Security.
[ MDVSA-2015:184 ] setup
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:184 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : setup Date : March 30, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated setup package fixes security vulnerability: An issue has been identified in Mandriva Business Server 2's setup package where the /etc/shadow and /etc/gshadow files containing password hashes were created with incorrect permissions, making them world-readable (mga#14516). This update fixes this issue by enforcing that those files are owned by the root user and shadow group, and are only readable by those two entities. Note that this issue only affected new Mandriva Business Server 2 installations. System
[ MDVSA-2015:183 ] wireshark
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:183 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : wireshark Date : March 30, 2015 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: Updated wireshark package fixes security vulnerabilies: The WCP dissector could crash (CVE-2015-2188). The pcapng file parser could crash (CVE-2015-2189). The TNEF dissector could go into an infinite loop (CVE-2015-2191). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191 http://advisories.mageia.org/M