Ubuntu Security Notice 2964-1 – Multiple vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service, expose sensitive data over the network, or possibly execute arbitrary code. A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. Various other issues were also addressed.
Monthly Archives: May 2016
Debian Security Advisory 3567-1
Debian Linux Security Advisory 3567-1 – It was discovered that libpam-sshauth, a PAM module to authenticate using an SSH server, does not correctly handle system users. In certain configurations an attacker can take advantage of this flaw to gain root privileges.
Cisco Security Advisory 20160504-openssl
Cisco Security Advisory – On May 3, 2016, the OpenSSL Software Foundation released a security advisory that included six vulnerabilities. Out of the six vulnerabilities disclosed, four of them may cause a memory corruption or excessive memory usage, one could allow a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server supports AES-NI, and, lastly, one is specific to a product performing an operation with Extended Binary Coded Decimal Interchange Code (EBCDIC) encoding. Multiple Cisco products incorporate a version of the OpenSSL package affected by one or more vulnerabilities. This advisory will be updated as additional information becomes available.
FreeBSD Security Advisory – FreeBSD-SA-16:17.openssl
FreeBSD Security Advisory – The padding check in AES-NI CBC MAC was rewritten to be in constant time by making sure that always the same bytes are read and compared against either the MAC or padding bytes. But it no longer checked that there was enough data to have both the MAC and padding bytes. [CVE-2016-2107] An overflow can occur in the EVP_EncodeUpdate() function which is used for Base64 encoding of binary data. [CVE-2016-2105] An overflow can occur in the EVP_EncryptUpdate() function, however it is believed that there can be no overflows in internal code due to this problem. [CVE-2016-2106] When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio() a short invalid encoding can casuse allocation of large amounts of memory potentially consuming excessive resources or exhausting memory. [CVE-2016-2109] ASN1 Strings that are over 1024 bytes can cause an overread in applications using the X509_NAME_oneline() function on EBCDIC systems. [CVE-2016-2176] FreeBSD does not run on any EBCDIC systems and therefore is not affected. A MITM attacker can use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI. [CVE-2016-2107] If an attacker is able to supply very large amounts of input data then a length check can overflow resulting in a heap corruption. [CVE-2016-2105] Any application parsing untrusted data through d2i BIO functions are vulnerable to memory exhaustion attack. [CVE-2016-2109] TLS applications are not affected.
272 million email accounts compromised in major data breach
Hundreds of millions of email usernames and passwords are ‘up for grabs’ in Russia’s criminal underworld, thanks to a major data breach.
The post 272 million email accounts compromised in major data breach appeared first on We Live Security.
![]()
Diary of a Ransomware Victim
A major online casino ran headfirst into a ransomware infection and learned about how simple mistakes can lead to complicated problems.
Phantom VPN –The art of hiding in plain sight
Our Avira Phantom VPN lets you stay covered from wherever you connect to the internet. Phantom VPN is designed to keep you covered – virtually – by encrypting all communication between your device and the Internet, shutting eavesdroppers out from your private communication, and stopping cybercriminals from capturing your data.
The post Phantom VPN –The art of hiding in plain sight appeared first on Avira Blog.
Want to Use Quantum Computer? IBM launches One for Free
In Brief
What would you do if you get access to a Quantum Computer? IBM Scientists launches the world’s first cloud-based quantum computing technology, calling the IBM Quantum Experience, for anyone to use. It is an online simulator that lets anyone run algorithms and experiments on the company’s five-qubit quantum computer.
Quantum computers are expected to take the computing technology to
![]()
Forget about passwords: You need a passphrase!
Forget about passwords – it’s all about passphrases. Longer, more complex and easy to remember, they will help you be more safe and secure. Our guide shows you how to create a passphrase.
The post Forget about passwords: You need a passphrase! appeared first on We Live Security.
![]()
Critical vulnerabilities in ImageMagick
For image manipulation TYPO3 CMS makes use of either one of the third party tools GraphicsMagick or ImageMagick.
Recently it has been discovered, that ImageMagick exposes multiple vulnerabilities, Remote Code Execution (RCE) being one of them. It is known, that these vulnerabilities have already been exploited in the wild.
An attacker needs the possibility to upload malicious image files (which are then processed) to exploit the vulnerabilities.
Further details are found on the vulnerability disclosure website.
TYPO3 CMS users who have configured ImageMagick for image manipulation, are strongly encouraged to apply one of the following mitigation strategies:
- Change TYPO3 CMS configuration to use GraphicsMagick for image manipulation
Install Tool -> Configuration Presets -> Image handling settings -> Graphicks Magick - Use a policy file to disable the vulnerable ImageMagick coders as described at the vulnerability disclosure website
