The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.
The post Carbon Paper: Peering into Turla’s second stage backdoor appeared first on WeLiveSecurity
![]()
The Turla espionage group has been targeting various institutions for many years. Recently, ESET found several new versions of Carbon.
The post Carbon Paper: Peering into Turla’s second stage backdoor appeared first on WeLiveSecurity
![]()
Open source developers who use the popular code-sharing site GitHub were put on alert after the discovery of a phishing email campaign that attempts to infect their computers with an advanced malware trojan.
Dubbed Dimnie, the reconnaissance and espionage trojan has the ability to harvest credentials, download sensitive files, take screenshots, log keystrokes on 32-bit and 64-bit
![]()
ESA-2017-028: EMC Isilon OneFS Path Traversal Vulnerability
ESA-2017-013: RSA Archer® GRC Security Operations Management Sensitive Information Disclosure Vulnerability
[security bulletin] HPESBUX03725 rev.1 – HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
[security bulletin] HPESBHF03723 rev.1 – HPE Aruba ClearPass Policy Manager, using Apache Struts, Remote Code Execution
Red Hat Enterprise Linux: Updated kernel packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.5 Advanced Update Support.
29th March, 2017
A security issue affects these releases of Ubuntu and its
derivatives:
Several security issues were fixed in Oxide.
Multiple vulnerabilities were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to obtain sensitive information, spoof
application UI by causing the security status API or webview URL to
indicate the wrong values, bypass security restrictions, cause a denial
of service via application crash, or execute arbitrary code.
(CVE-2017-5029, CVE-2017-5030, CVE-2017-5031, CVE-2017-5033,
CVE-2017-5035, CVE-2017-5037, CVE-2017-5040, CVE-2017-5041, CVE-2017-5044,
CVE-2017-5045, CVE-2017-5046)
The problem can be corrected by updating your system to the following
package version:
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
29th March, 2017
A security issue affects these releases of Ubuntu and its
derivatives:
The system could be made to crash or run programs as an administrator.
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
The problem can be corrected by updating your system to the following
package version:
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
29th March, 2017
A security issue affects these releases of Ubuntu and its
derivatives:
The system could be made to crash or run programs as an administrator.
It was discovered that the xfrm framework for transforming packets in the
Linux kernel did not properly validate data received from user space. A
local attacker could use this to cause a denial of service (system crash)
or execute arbitrary code with administrative privileges.
The problem can be corrected by updating your system to the following
package version:
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.