Feed aggregator

Drupal Fixes Highly Critical SQL Injection Flaw

Threatpost for B2B - Wed, 10/15/2014 - 12:34
Drupal has patched a critical SQL injection vulnerability in version 7.x of the content management system that can allow arbitrary code execution.

Microsoft Extends SHA-2, TLS Support for Windows

Threatpost for B2B - Wed, 10/15/2014 - 10:40
Microsoft announced that it has extended support for SHA-2 and TLS in supported versions of Windows.

Browser Vendors Move to Disable SSLv3 in Wake of POODLE Attack

Threatpost for B2B - Wed, 10/15/2014 - 09:35
With details of the new POODLE attack on SSLv3 now public, browser vendors are in the process of planning how they're going to address the issue in their products in a way that doesn't break the Internet for millions of users but still provides protection.

Java Reflection API Woes Resurface in Latest Oracle Patches

Threatpost for B2B - Wed, 10/15/2014 - 08:55
Oracle's Critical Patch update addresses 154 vulnerabilities, many of which are remotely exploitable. Security Explorations of Poland, meanwhile, published details on a number of Java flaws in the Java Reflection API.

New POODLE SSL 3.0 Attack Exploits Protocol Fallback Issue

Threatpost for B2B - Tue, 10/14/2014 - 19:13
A new attack on the SSLv3 protocol, disclosed Tuesday, takes advantage of an issue with the protocol that enables a network attacker to recover the plaintext communications of a victim.

Microsoft Security Updates October 2014

Secure List feed for B2B - Tue, 10/14/2014 - 17:23

Update (2014.10.15) - administrative notes for preparation... Friends on Twitter let me know their update cycle took close to 20 minutes on Windows 7. Yesterday, others on 8.1 told me their update download was around a gig, for some it was ~200 mb. Also, this cycle likely requires everyone a reboot to complete.


This morning was possibly one of the most information rich in the history of Microsoft's patch Tuesdays. Last month, we pointed out the Aurora Panda/DeputyDog actor was losing an IE 0day being patched, and that seemed unusual. This month, several vulnerabilities abused with 0day exploits by known APT actors are being patched and the actors are being publicly noted. So today Microsoft pushes out eight security bulletins MS14-056 through MS14-063, including three rated critical.

The most interesting of today's vulnerabilities are two that are enabled by Windows functionality, but are useful for spearphishing targets with Office-type data file attachments - an Excel file, PowerPoint Show, Word document, and so on. The first of the two remind us of the Duqu attacksMS14-058 patches yet another kernel level font handling flaw CVE-2014-4148, the same kind of issue seen in the Duqu spearphish exploits. This one is rated critical by Microsoft. No one particular actor has been associated with this attack or exploit just yet.

The Windows OLE vulnerability patched with MS14-060 is surprisingly rated "Important" by Microsoft. The APT known as the "Sandworm team" deployed CVE-2014-4114 in incidents against targets alongside other known exploits. The group was known for deploying new variants of the BlackEnergy bot in cyber-espionage campaigns, hitting geopolitical and military targets. In one incident, the team sent spearphish as a PowerPoint slide deck containing the 0day OLE exploit to Ukrainian government and US academic organizations. When opened, the slides dropped newer variants of BlackEnergy to the victim systems. These newer variants of BlackEnergy maintain functionality dedicated to cyber espionage tasks.The most interesting characteristics of these BlackEnergy trojans are the custom plugins or modules, but that's for a different blog post. Our GReAT researchers Maria Garnaeva and Sergey Lozhkin spoke about interesting BlackEnergy functionality at the May 2014 PHDays conference.

Another group known as Hurricane Panda attempted to exploit CVE-2014-4113 in targeted environments. This escalation of privilege issue can present a real problem in situations where an attacker has gotten in to a network and is attempting to burrow in further. This bug also exists in Windows kernel code, and is patched by the same MS14-058 bulletin mentioned above.

The Internet Explorer update addresses fourteen vulnerabilities, rated critical for IE6 through IE11. They do not affect Server Core installations.

More can be read about October 2014 Microsoft Security Bulletins here.

Fixes for IE, Flash Player in October Patch Tuesday Release

Threatpost for B2B - Tue, 10/14/2014 - 14:02
Microsoft posted eight bulletins for Patch Tuesday, three of which are considered critical including a cumulative Internet Explorer update, while Adobe has fixes for Flash Player and ColdFusion.

Kmart Latest Retail Chain to Disclose Payment Card Breach

Threatpost for B2B - Tue, 10/14/2014 - 13:04
Discount department store Kmart acknowledged on Friday that it fell victim to a “payment security incident” for most of September and some of October.

BlackBerry 10 Devices Open to Bug That Allows Malicious App Installation

Threatpost for B2B - Tue, 10/14/2014 - 12:57
BlackBerry has patched a vulnerability in its BlackBerry 10 devices that could allow an attacker to intercept users’ traffic to and from the BlackBerry World app store and potentially install malware on a targeted device. The vulnerability is a weakness in the integrity checking system that BlackBerry uses to verify the apps that users download. […]

Dropbox Denies Hack, Says ‘Your Stuff is Safe’

Threatpost for B2B - Tue, 10/14/2014 - 09:28
Dropbox officials on Monday said that a large cache of usernames and passwords posted online and alleged to have come from the company’s users are not related to Dropbox customer accounts. A spate of media reports reported yesterday that attackers had stolen several million sets of credentials from Dropbox and posted them online. The claim of […]

Sandworm APT Team Found Using Windows Zero Day Vulnerability

Threatpost for B2B - Tue, 10/14/2014 - 05:11
A cyberespionage team, possibly based in Russia, has been using a Windows zero day vulnerability to target a variety of organizations in several countries, including the United States, Poland, Ukraine and western Europe.
Syndicate content