[RootedHONGKONG 2016] Call for papers opened today!

Posted by Román Ramírez Giménez on Oct 03

Hello all:

RootedCON, the biggest security event in Spain and one of the biggest in Europe is opening in Hong Kong this year
(November, 17-18).

Here you can find attached the Call-for-papers text for your convenience.

The main topics for this edition are Security in general, IoT and Fintech. Join us in Hong Kong!

Thanks!

______ _ _ _ _ _ __ ____ ___ _ __
/ / _ ___ ___ | |_ ___ __| | | | | |/ /…

Re: Critical Vulnerability in Ubiquiti UniFi

Posted by Gregory Sloop on Oct 03

So, while I’ve not attempted to reproduce the “exploit”* POC below, I have some observations/questions.

The exploit, if I’m reading things correctly depends on MongoDB being configured to accept remote database connections.
Yet, at least on Ubuntu [the vendor recommended Linux distro], it’s only configured to accept connections from
127.0.0.1. [bind_ip = 127.0.0.1]

So, it’s not a remote exploit – in at least…

Onapsis Security Advisory ONAPSIS-2016-042: SAP OS Command Injection in SCTC_REFRESH_CHECK_ENV

Posted by Matías Mevied on Oct 03

Onapsis Security Advisory ONAPSIS-2016-042: SAP OS Command Injection in SCTC_REFRESH_CHECK_ENV

1. Impact on Business
=====================
By exploiting this vulnerability an authenticated user will be able to take full control of the system.

Risk Level: Critical

2. Advisory Information
=======================
– Public Release Date: 09/22/2016
– Last Revised: 09/22/2016
– Security Advisory ID: ONAPSIS-2016-042
– Onapsis SVS ID: ONAPSIS-00251
-…

CVE-2016-1240 – Tomcat packaging on Debian-based distros – Local Root Privilege Escalation

Posted by Dawid Golunski on Oct 03

CVE: CVE-2016-1240
Vulnerability: Tomcat packaging on Debian-based distros – Local Root
Privilege Escalation
Affected packages: Tomcat 6/7/8 deb packages (up to 8.0.36-2)
Systems affected: Debian & Ubuntu & possibly others (using the
affected deb packages)

Discovered by:
Dawid Golunski (http://legalhackers.com)

Tomcat (6, 7, 8) packages provided by default repositories on Debian-based
distributions (including Debian, Ubuntu etc.)…

Red Hat Security Advisory 2016-1991-01

Red Hat Security Advisory 2016-1991-01 – In accordance with the Red Hat Enterprise Linux Errata Support Policy, Advanced Mission Critical for Red Hat Enterprise Linux 5.6 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Red Hat Enterprise Linux 5.6 AMC after March 31, 2017.

Red Hat Security Advisory 2016-1990-01

Red Hat Security Advisory 2016-1990-01 – In accordance with the Red Hat Enterprise Linux Errata Support Policy, support for Red Hat Enterprise Linux 5 will be retired on March 31, 2017, at the end of Production Phase 3. Until that date, customers will continue to receive Critical impact security patches and selected Urgent priority bug fixes for RHEL 5.11. On that date, active support included with your RHEL Premium or Standard subscription will conclude. This means that customers will continue to have access to all previously released content.

Red Hat Security Advisory 2016-1989-01

Red Hat Security Advisory 2016-1989-01 – In accordance with the Red Hat Enterprise Developer Toolset Life Cycle policy, the Red Hat Developer Toolset Version 3.x offering will be retired as of October 31, 2016, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Developer Toolset Version 3.x after October 31, 2016.

Red Hat Security Advisory 2016-1986-01

Red Hat Security Advisory 2016-1986-01 – In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Life Cycle Support for Red Hat Enterprise Linux 4 will be retired as of March 31, 2017, and active support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or Urgent priority bug fixes, for Red Hat Enterprise Linux 4 ELS after March 31, 2017.