Severity Rating: Critical
Revision Note: V1.0 (January 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Monthly Archives: January 2016
Bugtraq: Re: Mozilla Firefox 44.0b2 Cross-site Scripting Vulnerability
Re: Mozilla Firefox 44.0b2 Cross-site Scripting Vulnerability
Bugtraq: Exploiting XXE vulnerabilities in AMF libraries
Exploiting XXE vulnerabilities in AMF libraries
Bugtraq: [SECURITY] [DSA 3440-1] sudo security update
[SECURITY] [DSA 3440-1] sudo security update
Bugtraq: [SECURITY] [DSA 3441-1] perl security update
[SECURITY] [DSA 3441-1] perl security update
Re: Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege
Posted by Sarah Allen on Jan 11
TrueCrypt ceased development back in 2014.
Please refer to the below link to migrate to an alternative (BitLocker) from TrueCrypt.
http://truecrypt.sourceforge.net/
Re: Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege
Posted by Stefan Kanthak on Jan 11
“Sarah Allen” <sarah () accesspositive com au> wrote:
Which but does not mean/imply that everybody abandons TrueCrypt.
STOP posting on top, but DON’T stop reading on top, read that
page COMPLETELY and notice the download(s) offered at its end!
OUCH!
Also notice the MANY download sites that still offer TrueCrypt 7.1a
and its vulnerable executable installer:
<https://truecrypt.ch/downloads/>
<…
Re: Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege
Posted by Douglas Held on Jan 11
Stefan,
I really enjoy your submissions. This is great work.
But how did you expect to get a response from the TrueCrypt developers? I
think it is widely understood they are already pwned.
Regards,
Doug
Message: 10
Date: Fri, 8 Jan 2016 14:32:51 +0100
From: “Stefan Kanthak” <stefan.kanthak () nexgo de>
To: <fulldisclosure () seclists org>
Cc: <bugtraq () securityfocus com>
Subject: [FD] Executable installers are…
Five things to learn from 2015
Here are my five things we discovered in the last 12 months.
- Big brands being hacked grabs headlines – but the story can start with a small business.
The hack and release of personal data from the adult dating site Ashley Madison probably got the most media attention of all the security breaches in 2015, but it was far from the only one. The list of familiar brands and organizations that suffered confidential data breaches ranged from VTech the children’s toy manufacturer, to the US Internal Revenue Service, to the UK’s phone and broadband internet provider, Talk Talk. There was even a “live demo” of a Chrysler-Jeep being hacked on the highway. How do hackers get in? A common tactic is via employees innocently clicking bogus links in emails or bringing malware-infected personal devices into the workplace. Crucially, hackers can find their way into big brands via small company suppliers where security may be weaker. The message is simple: all businesses need to ensure their online defences are as strong as possible.
- New payment methods: faster transactions but new threats
2015 was the year that new payment methods really seemed to take off. On the one hand, “contactless” bank cards allowed consumers to make payments by tapping a card against a terminal without having to swipe and enter a PIN. But this use of RFID technology also gives cybercriminals a new opportunity to steal data – if they can get close enough.Likewise, smartphone payments – such as Apple Pay and Android Pay – are turning phones into wallets. That means thinking about your phone’s physical and cyber security. So is your business taking every possible step to keep its data – and customers’ data – as safe as possible in this new world of faster and mobile payments?
- Bring your own device can allow hackers through the office door
How many of your employees bring their own mobile devices to work and use them to check and send work-related emails, access spreadsheets or other company data? So don’t forget to protect mobile devices in business, they are as vulnerable as desktop devices and carry business critical data. Two mobile hacks in 2015 reminded us all of how vulnerable smartphones can be: the MMS messages with a hidden sting, and the Stagefright 2.0 vulnerabilities in the Android operating system.
- Don’t think your Mac device is a safe bet!
Part of the Apple myth is that its devices are always malware free; indeed, remember those old “I’m a Mac, I’m a PC” ads from the late 90s with the actor representing the PC catching a terrible cold versus the healthy young Mac? That myth was truly tested in 2015 when fake developer tools that were used to create iOS apps containing malicious code known as “XcodeGhost” made their way onto the Apple App Store. The moral of the story? If you’re using Apple tech, make sure you’re taking security seriously … you can still catch a cold.
- We’re only human!
An error this year by an individual at the UK holiday firm Thomson was a timely reminder that however tight your online security, human beings make mistakes. Data about the name, home address, telephone number and flight information of 458 people were attached in error to an email. The simple lesson? Everyone should take a moment to think twice before attaching documents to an email and hitting send. Just ask the question: what I am sending and should this be shared in this way?
So there we are: five lessons from the outgoing year to remind us of the critical need to keep business security top of mind.
For more tips, insights and product information to keep your business protected, check out our web site at http://www.avg.com/internet-security-business. We look forward to helping keep you and your business safe as we head into the 2016!
RHSA-2016:0018-1: Important: openstack-nova security update
Red Hat Enterprise Linux: Updated openstack-nova packages that fix one security issue are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0, 6.0,
and 7.0 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-7548