When Mozilla released Firefox 32 last week, the company removed several root certificates from the trust store for the browser. The move wasn’t because the certificates were fraudulent or the CAs that issued them were compromised, but because the certificates use 1024-bit keys. This is the first step in a process that Mozilla officials say […]
All posts by 007admin
Google ‘Sunsetting’ Weak SHA-1 Crypto Algorithm
Google has initiated a process to revoke trust from any certificates that rely on the outdated SHA-1crytpographic hash algorithm.
Kyle & Stan Malvertising Hits Amazon, YouTube
The “Kyle and Stan” method is an example of a particular type of exploit known as âmalvertisingâ, because it inserts malware into online advertising, so as to infect visitors of legitimate, high-traffic websites. Because online advertisements are served up by a relatively small number of ad-publishing networks that reach many popular websites simultaneously, malvertising is a very efficient means of malware distribution.
This particular exploit is called âKyle and Stanâ because the malware code contains references to specific sub-domains with the URLs “kyle.mxp2038.comâ and “stan.mxp2099.com.”
Although most malvertising exploits do not harm individual users directly, they will often make unscrupulous revenue by generating fake advertising clicks, or by redirecting users to other scam websites, or installing spyware or back-doors that are later used to hijack the usersâ computers for misuse, for example as botnets. In the case of the Kyle and Stan exploits, users are redirected to websites that offer a legitimate media-player app that, when downloaded, comes bundled with a malicious browser hijacker that installs itself automatically.
Unfortunately, this new threat makes detection extra difficult by creating a unique profile for each and every installation.
In the bigger picture, the Kyle and Stan malvertising exploit may represent a new style of malware distribution that is OS-agnostic and highly efficient. We may soon see an industry call for ad publishers to more carefully scan the ads that are distributed through their networks. Our experts will monitor the progress of Kyle and Stan and will inform you as we learn more.
The post Kyle & Stan Malvertising Hits Amazon, YouTube appeared first on Avira Blog.
FreeBSD-SA-14:18.openssl
2871997 – Update to Improve Credentials Protection and Management – Version: 3.0
Revision Note: V3.0 (September 9, 2014): Rereleased advisory to announce the release of update 2982378 to provide additional protection for usersâ credentials when logging into a Windows 7 or Windows Server 2008 R2 system. See Updates Related to this Advisory for details.
Summary: Microsoft is announcing the availability of updates for supported editions of Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1 that improve credential protection and domain authentication controls to reduce credential theft.
MS14-SEP – Microsoft Security Bulletin Summary for September 2014 – Version: 1.0
Revision Note: V1.0 (September 9, 2014): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for September 2014.
2905247 – Insecure ASP.NET Site Configuration Could Allow Elevation of Privilege – Version: 2.0
Revision Note: V2.0 (September 9, 2014): Advisory rereleased to announce the offering of the security update via Microsoft Update, in addition to the Download-Center-only option that was provided when this advisory was originally released.
Summary: Microsoft is announcing the availability of an update for Microsoft ASP.NET to address a vulnerability in ASP.NET view state that exists when Machine Authentication Code (MAC) validation is disabled through configuration settings. The vulnerability could allow elevation of privilege and affects all supported versions of Microsoft .NET Framework except .NET Framework 3.0 Service Pack 2 and Microsoft .NET Framework 3.5 Service Pack 1.
MS14-054 – Important: Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege (2988948) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerability and take complete control over an affected system. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.
MS14-052 – Critical: Cumulative Security Update for Internet Explorer (2977629) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (September 9, 2014): Bulletin published.
Summary: This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
ManageEngine Desktop Central StatusUpdate Arbitrary File Upload
This Metasploit module exploits an arbitrary file upload vulnerability in ManageEngine DesktopCentral v7 to v9 build 90054 (including the MSP versions). A malicious user can upload a JSP file into the web root without authentication, leading to arbitrary code execution as SYSTEM. Some early builds of version 7 are not exploitable as they do not ship with a bundled Java compiler.