[ MDVSA-2015:221 ] clamav

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:221
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : clamav
 Date    : May 4, 2015
 Affected: Business Server 1.0, Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in clamav:
 
 Fix infinite loop condition on crafted y0da cryptor file. Identified
 and patch suggested by Sebastian Andrzej Siewior (CVE-2015-2221).
 
 Fix crash on crafted petite packed file. Reported and patch supplied
 by Sebastian Andrzej Siewior (CVE-2015-2222).
 
 Fix an infinite loop condition on a crafted xz archive file. This
 was reported by Dimitri Kirchner and Goulven Guiheux (CVE-2015-2668).
 
 Apply upstream patch for possible heap overflow in H

Heartbleed. Why do the vast majority of companies remain vulnerable?

heartbleedWhen you visit a webpage, your computer actually accesses the server where the files displayed on your screen are located. If you enter a password on this site, it will also go to the server, where it will be stored. Companies use secure protocols, like the popular OpenSSL, which encrypt communications of computers connected to the network.

So when in April 2014 a serious vulnerability in the software package of OpenSSL was published, companies all around the world held their breath. Since 2012, the open source SSL protocol version was not complying with its protection duty.

The ultimate responsible for the finding was Google’s engineer Neel Mehta, who found it after thoroughly reviewing the tool’s open source code. Mehta along with team members of Codenomicon gave CVE-2014-0160 a simplest name: Heartbleed. With a logo of a bleeding heart to expose the severity of the fault.

The vulnerability allowed cybercriminals to access users information (passwords, bank accounts, and other sensitive information) stored on the Internet servers using OpenSSL.

The news kept on edge thousands of companies that used this system to encrypt communications in their webpages or between internal servers. Even ‘routers’ use the SSL system. One of the affected organizations was the Community Health System (CHS) in the United States: compromising the data of 4.5 million patients until the authorities fixed the error.

keyboard

Fortunately, as with any other security breach, a fix was found. OpenSSL team developed a software update which made it disappear. Professionals had only to follow a few steps to safeguard their communications again.

However, a recent report carried out by a group of security experts revealed that 74% of the largest companies in the world are still at risk. The reason being that those companies have not yet gotten rid of the malware. In addition to installing the new version (1.0.1g or higher) they had to cancel and change the encryption keys and the library certificates. This process requires some computer skills and, in many cases, contact with the digital certificates’ suppliers. Something many of them left half done.

Although some experts doubted the test results, the fact is that Heartbleed is not a regular ‘bug’. When vulnerabilities affect only one program they can be quickly fixed but during its two years of life the OpenSSL breach infected 66% of the active pages on the Internet, according to Netcraft. Even Yahoo! or Flickr were affected and had to fix the problem.

The cryptographic library is one of the companies most used software, from an online shop to a simple user identification on a corporate platform. OpenSSL is often used to protect mail servers, chats and virtual private networks.

Internet users couldn’t do anything about it, just trust that the people responsible for their most visited websites had solved the security breach. Companies did have homework to do in order to solve the problem. We just hope that, at least, the report results make the stragglers get down to work.

 More | Heartbleed, how bad was it?

The post Heartbleed. Why do the vast majority of companies remain vulnerable? appeared first on MediaCenter Panda Security.

White House data breach: what are the risks?

The news of a security incident involving public institutions is always treated with high importance, taking into consideration the volume of sensitive information stored by these entities. The recent White House data breach didn’t involve any classified information but hacking into the West Wing computer network might have been just enough to provide the attackers with important data: correspondence with certain diplomats or details about White House visitors.

Although it’s not been officially confirmed if the authorities are up against professional cyber thieves or foreign spies, personal information of American citizens can now be used by the attackers however this may serve their purposes.

An urgent letter signed by the U.S. Senate Commerce Committee was addressed to President Barack Obama raising several concerns about the White House data breach.

Committee chairman John Thune released a statement last night expressing his concern over the hacking episode.

 ‘Just like any entity that handles personally-identifiable information, the White House has a responsibility to notify Americans if the recent, or any future breach, results in a compromise. If such information has been lost, the White House still has a responsibility to victims even if it believes the hack was perpetrated by foreign spies and not cyber thieves.’ said Committee chairman John Thune.

The letter mentions that the White House computer system contained not only personal data of the White House visitors but also sensitive information such as schedules, policy discussions and emails, including exchanges with diplomats. Do you think this type of information ending up in the hands of the attackers can do more harm than everybody initially thought?

Read more on the topic: http://www.dailymail.co.uk/news/article-3066787/U-S-Senate-panel-raises-privacy-concerns-White-House-hacking-incident.html#ixzz3ZBDTuy8h

 

The post White House data breach: what are the risks? appeared first on Avira Blog.

AVG’s Marco La Vecchia named among CRN Channel Chiefs

AVG is delighted that our own Marco LaVecchia has been recognised by CRN as a top channel chief. The nomination, which came earlier in April, underlines AVG’s commitment to excellence and expertise in the channel.

This isn’t the first time that Marco has been recognised by CRN, as he was named as among their “100 People You Don’t Know, But Should” in 2012.

With more than 10 years’ experience in the channel industry, Marco has made a big impact since joining AVG little over a year ago. He now leads a team that handles over 4,500 managed service providers (MSP) to help them get the most out of their technology.

As part of his nomination, Marco interviewed with CRN where they asked him to talk about his highlights since joining AVG.

 

The Power of Partnerships

Marco is a firm believer in the power of partnerships and has overseen more than 1,000 new partners join AVG since he arrived.

This is in no small way down to AVG’s Partner Enablement Program which helps MSPs to evolve from a reactive business model where they are responding to incidents as and when they occur to being an aware, proactive and preventative system.

 

The best tools for the job

Marco also highlighted the arrival of AVG Managed Workplace 9.0 which shows that innovation and technology are at the heart of AVG Business.

AVG Businesses’ insistence on providing powerful, cutting edge and easy to use remote management tools means that our partners can focus on what matters to them – running their business.

 

Rewarding excellence

2014 was a busy year for Marco, attending over 50 industry events. These included the inaugural AVG Business Partner Summit in Phoenix, Arizona which was attended by more than 200 partners from around the world.

They also included the first ever AVG Awards given to outstanding partners across the globe.

 

Building for the future

Looking into 2015, Marco hopes to champion partner satisfaction by making it one his key priorities for the year.