Facebook was quick to fix an issue earlier this month that could’ve let an attacker break into four percent of all active, locked accounts.
Monthly Archives: March 2016
POS Malware Tool ‘Treasurehunt’ Targets Small US-Based Banks, Retailers
Hackers called Bears Inc. are targeting small US-based banks and retailers slow to comply to new rules regarding a transition to chip-and-PIN bankcard technology.
CVE-2014-9769 (pcre)
pcre_jit_compile.c in PCRE 8.35 does not properly use table jumps to optimize nested alternatives, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via a crafted string, as demonstrated by packets encountered by Suricata during use of a regular expression in an Emerging Threats Open ruleset.
Bugtraq: [SECURITY] [DSA 3532-1] quagga security update
[SECURITY] [DSA 3532-1] quagga security update
Bugtraq: Validation Bypass in C2Box application : CVE – 2015-4626
Validation Bypass in C2Box application : CVE – 2015-4626
SSLsplit 0.5.0
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.
Debian Security Advisory 3532-1
Debian Linux Security Advisory 3532-1 – Kostya Kortchinsky discovered a stack-based buffer overflow vulnerability in the VPNv4 NLRI parser in bgpd in quagga, a BGP/OSPF/RIP routing daemon. A remote attacker can exploit this flaw to cause a denial of service (daemon crash), or potentially, execution of arbitrary code, if bgpd is configured with BGP peers enabled for VPNv4.
Trend Micro Deep Discovery Inspector 3.7 / 3.8 CSRF
Trend Micro Deep Discovery versions 3.7 and 3.8 suffer from multiple cross site request forgery vectors. If an authenticated user visits a malicious webpage attackers will have ability to modify many settings of the Deep Discovery application to that of the attackers choosing.
IP-Array IPTables Firewall Script 1.2.2
A Linux IPv4 firewall and traffic shaper for single hosts to small and mid-sized networks. It allows flexible rule creation, while also shipping with presets for common needs. Rules are written in simple XML, allowing various ways to group and nest the iptables arguments. An interactive mode is available in order to build configuration files in a wizard based manner. Extensive documentation is also included.
IPSet List 3.5.1
ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.