Ubuntu Security Notice 3022-1 – It was discovered that LibreOffice incorrectly handled RTF document files. If a user were tricked into opening a specially crafted RTF document, a remote attacker could cause LibreOffice to crash, and possibly execute arbitrary code.
Monthly Archives: June 2016
Debian Security Advisory 3610-1
Debian Linux Security Advisory 3610-1 – Brandon Perry discovered that xerces-c, a validating XML parser library for C++, fails to successfully parse a DTD that is deeply nested, causing a stack overflow. A remote unauthenticated attacker can take advantage of this flaw to cause a denial of service against applications using the xerces-c library.
Debian Security Advisory 3611-1
Debian Linux Security Advisory 3611-1 – The TERASOLUNA Framework Development Team discovered a denial of service vulnerability in Apache Commons FileUpload, a package to make it easy to add robust, high-performance, file upload capability to servlets and web applications. A remote attacker can take advantage of this flaw by sending file upload requests that cause the HTTP server using the Apache Commons Fileupload library to become unresponsive, preventing the server from servicing other requests.
Conficker Used in New Wave of Hospital IoT Device Attacks
Conficker returns from obsolescence to help hijack medical devices and steal patient records.
Oculus CEO's Twitter Gets Hacked
Facebook Wins Legal Battle To Track Non-Users In Belgium
Hackers Note That Most Breaches Just Need Normal Admin Tools
Global Terror Database World-Check Leaked
Cisco Releases Security Updates
Original release date: June 30, 2016
Cisco has released security updates to address vulnerabilities in several products. Exploitation of some of these vulnerabilities could allow an unauthenticated remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review the following Cisco Security Advisories and apply the necessary updates:
- Cisco Prime Infrastructure and EPNM Authentication Bypass API Vulnerability
- Cisco Prime Collaboration Provisioning LDAP Authentication Bypass Vulnerability
- Cisco Firepower System Software Static Credential Vulnerability
This product is provided subject to this Notification and this Privacy & Use policy.
How to secure your social media accounts
Social media platforms are increasingly being targeted, as Facebook CEO Mark Zuckerberg found out earlier this month. Here, we look at how to keep your accounts secure.
The post How to secure your social media accounts appeared first on We Live Security.
![]()