Monthly Archives: January 2016
CEBA-2016:0022 CentOS 6 libcanberra FASTTRACKBugFix Update
CentOS Errata and Bugfix Advisory 2016:0022 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0022.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 1d46b8216b0321300d9e849ef6638cce1502e291a76cc8946a15c6f29ec49d6d libcanberra-0.22-3.el6.i686.rpm e141de513daf28e63f332218a6bad7ca87e79835dda17cc06d19c923d5e0d7b0 libcanberra-devel-0.22-3.el6.i686.rpm 744deaeb955bb2fd3c7dcb448520e59b572b8c9523e5c24666809d418e697699 libcanberra-gtk2-0.22-3.el6.i686.rpm x86_64: 1d46b8216b0321300d9e849ef6638cce1502e291a76cc8946a15c6f29ec49d6d libcanberra-0.22-3.el6.i686.rpm 2f4030352f08891a3f43b26b0c4aa78817f1cdd5cdbb1e5afcf1d5bbe7701783 libcanberra-0.22-3.el6.x86_64.rpm e141de513daf28e63f332218a6bad7ca87e79835dda17cc06d19c923d5e0d7b0 libcanberra-devel-0.22-3.el6.i686.rpm 8651ac9eb23fd345ccb1847cec52bd1767bc8f4819dc986778b133c71c649b49 libcanberra-devel-0.22-3.el6.x86_64.rpm 744deaeb955bb2fd3c7dcb448520e59b572b8c9523e5c24666809d418e697699 libcanberra-gtk2-0.22-3.el6.i686.rpm 85665af03e46af9550800d312e81446de9559bd287ee3ea57dc731d45cfdea1c libcanberra-gtk2-0.22-3.el6.x86_64.rpm Source: 6a8d5306caa39c8e272551ecbbedfaf26046890f0b93ad9ee08e7029e55ad8ef libcanberra-0.22-3.el6.src.rpm
CEBA-2016:0020 CentOS 6 logwatch FASTTRACK BugFixUpdate
CentOS Errata and Bugfix Advisory 2016:0020 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0020.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: cb9758c76a0ad8ee1ab12b5a6ffc27c72be8f88dc01359e3cb97c1754a2467d0 logwatch-7.3.6-54.el6.noarch.rpm x86_64: cb9758c76a0ad8ee1ab12b5a6ffc27c72be8f88dc01359e3cb97c1754a2467d0 logwatch-7.3.6-54.el6.noarch.rpm Source: f22084a0f4f5114cb4d38722d95ee8df3a36adf1fd0f7bae5bea88566ffc43b2 logwatch-7.3.6-54.el6.src.rpm
CEBA-2016:0021 CentOS 6 freeipmi FASTTRACK BugFixUpdate
CentOS Errata and Bugfix Advisory 2016:0021 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0021.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: bf1215c882abdfa6ebac45dbb0d701996afad41c7a35016c2d2bfc80ac8892ca freeipmi-1.2.1-7.el6.i686.rpm eb3dd2b37a3e4d29cb8e5645c4f235d3295a1e1ef74475189c1e9991889d594e freeipmi-bmc-watchdog-1.2.1-7.el6.i686.rpm 808666d9c36024a3c74754de809f27506f71d458073d51470ae1944b2d2d5740 freeipmi-devel-1.2.1-7.el6.i686.rpm 6297ec7d60e56d61613aa1752f557bbbcbf31b8f50a98f2859ea4a48bd10a837 freeipmi-ipmidetectd-1.2.1-7.el6.i686.rpm x86_64: bf1215c882abdfa6ebac45dbb0d701996afad41c7a35016c2d2bfc80ac8892ca freeipmi-1.2.1-7.el6.i686.rpm 12f33eb38f25269d76b841bf5621cd481d2f42a19ef26602dea632ccd57dab41 freeipmi-1.2.1-7.el6.x86_64.rpm baf1dfd1df735026492784bd572f7bfe7fe207e745ba9c865ed535e4b4bf47af freeipmi-bmc-watchdog-1.2.1-7.el6.x86_64.rpm 808666d9c36024a3c74754de809f27506f71d458073d51470ae1944b2d2d5740 freeipmi-devel-1.2.1-7.el6.i686.rpm 9e8e2f1fce93ea91b8c28503006f73b13bcf39a666df311da6dbff382b055ce7 freeipmi-devel-1.2.1-7.el6.x86_64.rpm a73a6523500070a91da712beb15cbcd5adfad5a3562ea8bb5012209b09f27d7b freeipmi-ipmidetectd-1.2.1-7.el6.x86_64.rpm Source: a11ff9f0fe520f17096ce63f774596d12f39346bfbb1eb7ac0aebbdce2a10193 freeipmi-1.2.1-7.el6.src.rpm
What does Fitbit hacking mean for wearables and IoT?
Wearable activity tracking devices like those made by Fitbit were one of the hottest gifts this past holiday season and it appears criminal hackers were paying attention, ESET’s Stephen Cobb reports.
The post What does Fitbit hacking mean for wearables and IoT? appeared first on We Live Security.
![]()
FingerTec Default Root Password / Remote Enrollment
FingerTec devices have a default root password that allows for remote enrollment.
FortiGate OS 5.0.7 SSH Backdoor
Fortigate OS versions 4.x through 5.0.7 remote ssh backdoor exploit.
Microsoft Office / COM Object WMALFXGFXDSP.dll DLL Planting
It is possible for an attacker to execute a DLL planting attack in Microsoft Office 2010 on Windows 7 x86 with a specially crafted OLE object.
Bypassing McAfee's Application Whitelisting For Critical Infrastructure Systems
This paper describes the results of the research conducted by SEC Consult Vulnerability Lab on the security of McAfee Application Control. This product is an example of an application whitelisting solution which can be used to further harden critical systems such as server systems in SCADA environments or client systems with high security requirements like administrative workstations. Application whitelisting is a concept which works by whitelisting all installed software on a system and after that prevent the execution of not whitelisted software. This should prevent the execution of malware and therefore protect against advanced persistent threat (APT) attacks. McAfee Application Control is an example of such a software. It can be installed on any system, however, the main field of application is the protection of highly critical infrastructures. While the core feature of the product is application whitelisting, it also supports additional security features including write and read protection as well as different memory corruption protections.
Microsoft Security Bulletin Summary For January, 2016
This bulletin summary lists nine released Microsoft security bulletins for January, 2016.