Google Android Framework APIs CVE-2017-0383 Remote Privilege Escalation Vulnerability
Monthly Archives: January 2017
Vuln: Google Android CVE-2016-8469 Information Disclosure Vulnerability
Google Android CVE-2016-8469 Information Disclosure Vulnerability
Vuln: Google Android Framesequence Library CVE-2017-0382 Remote Code Execution Vulnerability
Google Android Framesequence Library CVE-2017-0382 Remote Code Execution Vulnerability
Vuln: C-ares CVE-2016-5180 Out of Bounds Write Denial of Service Vulnerability
C-ares CVE-2016-5180 Out of Bounds Write Denial of Service Vulnerability
CVE-2016-5024
Virtual servers in F5 BIG-IP systems 11.6.1 before 11.6.1 HF1 and 12.1.x before 12.1.2, when configured to parse RADIUS messages via an iRule, allow remote attackers to cause a denial of service (Traffic Management Microkernel restart) via crafted network traffic.
RHSA-2017:0004-1: Important: kernel security and bug fix update
Red Hat Enterprise Linux: An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-8666
RHSA-2017:0003-1: Moderate: systemd security update
Red Hat Enterprise Linux: An update for systemd is now available for Red Hat Enterprise Linux 7.1 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-7796
Kaspersky SSL Interception Differentiation
In order to inspect encrypted data streams using SSL/TLS, Kaspersky installs a WFP driver to intercept all outgoing HTTPS connections. They effectively proxy SSL connections, inserting their own certificate as a trusted authority in the system store and then replace all leaf certificates on-the-fly. This is why if you examine a certificate when using Kaspersky Antivirus, the issuer appears to be “Kaspersky Anti-Virus Personal Root”. Kaspersky’s certificate interception has previously resulted in serious vulnerabilities, but quick review finds many simple problems still exist. For example, the way leaf certificates are cached uses an extremely naive fingerprinting technique. Kaspersky cache recently generated certificates in memory in case the user agent initiates another connection. In order to do this, Kaspersky fetches the certificate chain and then checks if it’s already generated a matching leaf certificate in the cache. If it has, it just grabs the existing certificate and private key and then reuses it for the new connection. The cache is a binary tree, and as new leaf certificates and keys are generated, they’re inserted using the first 32 bits of MD5(serialNumber||issuer) as the key. If a match is found for a key, they just pull the previously generated certificate and key out of the binary tree and start using it to relay data to the user-agent. You don’t have to be a cryptographer to understand a 32bit key is not enough to prevent brute-forcing a collision in seconds. In fact, producing a collision with any other certificate is trivial.
PHPMailer / Zend-mail / SwiftMailer Remote Code Execution
This proof of concept exploit aims to execute a reverse shell on the target in the context of the web server user via a vulnerable PHP email library.
Samsung OTP TrustZone Buffer Overflow
As a part of the KNOX extensions available on Samsung devices, Samsung provides a TrustZone trustlet which allows the generation of OTP tokens. The OTP TrustZone trustlet suffers from a stack buffer overflow.