Harry Smith

Great if you want to hear someone chew or breathe. Pic: The Lives of Others

Experimental malware has highlighted the possibility that hackers might be able to turn headphones into microphones in order to snoop on computer users.

Research by computer scientists at Ben-Gurion University, Israel, has revealed that both headphones and loudspeakers present a potential bugging risk. The boffins put together proof-of-concept malware, dubbed SPEAKE(a)R, in order to validate the risk.

"Malware can use a computer as an eavesdropping device, even when a microphone is not present, muted, taped or turned off," the researchers warn. In a paper, SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit (PDF), the researchers survey the scope of the risk and access potential countermeasures. Possible hardware-based defences include using only active one-way speakers or deploying either white noise emitters or an audio jammer.

Youtube Video

A speaker converts an electric signal into a sound wave. A microphone converts sound to an electrical signal. "The difference between these two pieces of equipment is that they have been optimised for the direction of conversion," according to Paul Farrington, manager of EMEA solution architects at application security firm Veracode. "However, there is little to prevent the conversion happening in the reverse direction."

This feature of consumer tech coupled with the possibility of hacking an audio port's role in the PC from output to input creates a bugging risk.

"The RealTek codec chip vulnerability is apparently allowing malware running on the device to take advantage of the physical properties of the connected equipment to use the ports to accept input when they should be restricted to output only," Farrington continued.

RealTek or operating system developers might be able to deliver a software patch to mitigate this chip vulnerability and help secure IO ports, according to Farrington. ®

Sponsored: The state of mobile security maturity


The Register - Security

The TrickBot Trojan, which emerged in the wild only this summer, continues to widen its attack scope, spreading farther in its target geographies and developing new redirection attacks. The most recent additions to TrickBot’s redirection targets are three Canadian banks.

According to IBM X-Force researchers following the TrickBot Trojan’s ongoing technical advances, the malware operators frequently release new configurations. The gang continues to focus on the U.K. and Australia, but it’s now setting its sights on Canada with enhanced capabilities to attack banks in the country.

TrickBot research

Figure 1: TrickBot’s current bank targets — per locale, per URL count (November 2016, IBM Security)

Redirection Attacks, Mafia Style

TrickBot is the fourth known gang-operated banking Trojan to bring redirection attacks to Canada. Redirection attacks first targeted Canadian banks in 2015, when the Dyre malware launched its nefarious web browser manipulation techniques. At the time, Dyre targeted business accounts of a handful of banks in Canada. After Dyre’s disappearance, the Dridex Trojan started using redirections against businesses in Canada. Next, GozNym created redirection attacks designed to target business banking in Canada, and now TrickBot is entering that same turf.

This matters because the only malware operators with the extra resources to build and carry out redirection attacks are the top-known organized cybercrime gangs in the fraud arena today. The fact that all these heavy hitters invest in attacks specific to Canadian banks suggests that they’ll see more attacks, more potential fraud and a level of operational sophistication comparable to organized crime.

These mob-style cybercrime gangs are higher up on the food chain of online fraud than other malware operators, and they are nothing short of devastating to individuals and businesses. To make stolen funds disappear, gangs keep elaborate crews on their payroll, maintaining a large number of foot soldiers to funnel stolen money from one account to another and either act as money mules to cash the funds out.

Recent events in the news, such as the arrest of two Dridex gang members who were caught in October with access to more than 220 compromised U.K. bank accounts and £2.5 million, bring the concept to life. In a larger case made public in November, authorities arrested 14 ex-Dyre and ex-Dridex members who laundered over $ 13 million in the past two years. In both cases, only the low-level crooks linked with these gangs’ activity were apprehended.

Canada’s Cybercrime Landscape

Given the rising threat from the most sophisticated malware gangs, it’s surprising that the Canadian government has yet to establish a federal reporting agency for financial cybercrime. This makes it rather difficult to tally specific complaints and losses. Overall, statistics from previous years are alarming: Canadian police observed a 40 percent increase in cybercrime incidents around the country between 2011 and 2013. That number has likely risen in the three years since.

Canadian businesses are also struggling with other types of cyberattacks. According to the Ponemon Institute’s “2016 Cost of a Data Breach Study: Canada,” Canada suffered the highest detection and escalation costs. The cost of a breach rose 12.5 percent for Canadian companies, and the average total cost of a breach was $ 6.03 million in 2016.

Canada weathers attacks from similar cybercrime groups as those observed on the global map. Commercial malware factions top the chart, followed by the organized crime groups that operate malware such as GootKit, Dridex, URLZone, GozNym and others.

Financial Malware Families 2016

Figure 2: Most active malware in Canada by attack volume (November 2016, IBM Security)

TrickBot Takes On Canada

At this time, TrickBot’s activity in Canada is only beginning, but the malware is advancing rapidly and aggressively, according to X-Force researchers. TrickBot’s operators appear to be connected to well-known spamming and infection services, use redirection attacks and seem to have some ties to the Dyre crew. For this reason, we expect to see this malware’s activity increase during the holiday season and into 2017.

For TrickBot indicators of compromise (IOCs), check out — and share — via X-Force Exchange. Banks looking for technology solutions to mitigate threats like TrickBot and other sophisticated malware are invited to learn more about the IBM Trusteer anti-fraud suite. As always, users should reference these security tips to mitigate threats like the TrickBot Trojan and reduce risk.

Read the white paper: How to outsmart Fraudsters with Cognitive Fraud Detection


Security Intelligence

%PDF-1.6 %äãÏÒ 1 0 obj [/PDF/ImageB/ImageC/ImageI/Text] endobj 4 0 obj <</Length 5 0 R /Filter/FlateDecode >> stream xœ endstream endobj 5 0 obj 8 endobj 6 0 obj <</Subtype/Image /Width 150 /Height 150 /BitsPerComponent 8 /ColorSpace/DeviceRGB /Filter/FlateDecode /Length 7 0 R >> stream xœígx]ŵ÷!!›póá^¾¼onè á’¼¸@hƒ &6„zÁÀIè6ظɲ-˲%Y]Vï½Z½ËjVï½Ë²lÉr’ûþgÖÞsf—st$ ‰÷³=Gçì}ÊþíµÖÍ̞ùßÿ=¿ßÎoç·óÛùíüv~;¿ßÎosޞjk﬩­/.-ËÍ/ŒOLŽKHŽOŠ‰KŒŽM€EÅÄGFÇEDņGÆÀÂ"¢³sóaûË*êšpøää‘sý;þ…¶écÇúúªkëò ŠSÓ3SÒ2RR÷%§¦'¥¤'&§%$ ¥Æ'¦Ø14<*$ ,’,($ †7))-ëìꞜœ<׿òŸm;yêÔÀà`]}#\,3+7#3g_FvzFVÚ¾,Sˆx”’Ãㄤ”ø4ŽJƒÃ‚BaØ­¨¤´£³ëÌ™3çúׇ·S§N WVUçææä îeåäefç ˆY9YÙyx>'¯ûäååçåãùþ2tÎ:…œ@ASÑ? æ·7(;'ï<Ê9m_~ùåÁƒãÈP…%ŒHAˆˆpâ’â’²Òýå°XiYqÉþ¢âÒ¢Råû ê<~Ë<484BÑ×?–•Û××®OÏ·z;}útOoyE•ŽHAa10••WÂ+*À°þ…YXˆ"‡Â7‘4]÷†È}üÂ#£Tל>ï’Ú ì !tD`eåUªkkjêªkêð ê@Í7 QÄXDW¢·ïހÀ|¹cÇfÎõ™;÷ÛéÓgÚ;:C&@5µu MP/0T ç"R. ½|üaˆêǎ;×gñÜlÐ=½} "pà/56575·66µ€à· "B+4R¤[email protected]Õ\ŠçúŒ~£ÛÈÈh}}#p"õ -­íÜÚš[Zç€âyáŸèéåóðòñðdæã»72:6" ¥DtjzÆÙ@¤b)[email protected]ôôöójmm;×çõ›ØŽÍ̀b$ pÔp …@ kkïhmë°bfVNDd´¯_Àf‡­«×¬]õ—÷ædŸ­]¿~ÃfW7$ 50š+DªAWD/ß„Ääééés}Ž¿® eÂððáA–è›;;»;»z cPsÙ1'7?4,b‡³Ë~2Wd¶íãO>Å•àíãrÞ~ˆpFè$ Gq§OEeÕ¹>Ù¿Í?ÞÖÖÑÐØL8ðà»z»º{f…˜_Päãë¿æÓu6¼òÖÊ'þôâ²Wž¾ý™mö­úÏvûò«¯úú…CØ ã¯mˆyù.»\§§Ôpædkñ•,¹ò‚¯ºàÁ«/xèê–’]sÁÃ’á_z;`7ìŒCp aå@q1€&|Ùø¹[·CÙΈˆJÝ=¼‹JJq ŸkóÜNž< 4¡ÀhxddxdthxÄÄä”´›¶Áýæ©E?yðj„ì!"uí¿¿ö‚e?g¶üç.ÿÅ…»Ž›úïò_`eO‚qøC*P•&>׉åºÏ7BºÌ 184冀ˆˆzêÔésMcn®:hN!‡‚ µ±°¨dÓf ;d+8ÅO–¨à«ÔàS„Œ`=z³?üòÂÇ`×3{ÜŠÑ«Ø ;ÓQ€é/T *M|G g_üâãFŽÁa¶!Rù/ b¤’sÅÞ ø¦¦¦ETăѱƒÇ·±¾¡i»ÓN,¹þñ».yà*Åãdp‚Ú~©Àzâ¿™=yÃ…OÁ~uáa¿fö´dô^ÂØ ;ÓQ„•€M%÷J| ¸¤Nü8lÙp¶!"¢ ˆÐ9€ø폨ø†GQ±·¯ÿÐÄaØø¡ Sˆ cdÇÒ9ÅIœêhDíIÎtžý¿Ÿåö܍°ïÁž7‰í‰Cžápñ&TÐ|ä: Jî’—

hbàÛ‘ÉÎC‡xTì<:<9 ›8< ß)1Saw­Âî:pÌ}TjŒ‡uË^æöÊÿ0•Ûk·êž§hș⭚ÏÞ¨¢T½RqIž(UüɃס–Ñ8ãn÷ï4D|Ÿ#GŽ"¯A±"ßôô1dCSˆí]H"²Î¼lé L«È~GiŽ±»%/îq8Ãßþ7½À½ì%Áú춬 »Ùë£çiìü'+}é–‹š„’åy€\I”ÄW]ô3TrPÝ°Ñྋ™t™ž;„ÁËffŽ;6c ±¤´ì£×ˆ_ˆÄÂ&i•¥×hüîIbÇC¥î•[,Ôˆè¼ûíVÂîøÁ›6 ;`7ìü†Àʁ š„’%°:Ž"®rƒ ºì•§ÅÏY½fíÞÀ¨˜øY!"'BÞ 2é25…° ×DÈ­|3…˜¾/CÎz¬0®GZå×éØ1§C¨D{Y€ãNôºŠŒ¸¼uÇÅoÝyñŸ™]ò6Ù]cÏÓ>؇¨L9Ð×µ(™Wr—4áxÝ…¤sTg¼þñ»…3"¢Bº|W âÓOœ<É_? "Á?~ü„ºé É bJÖ[r•%lB<°|§cG¡Rõ8œJ ,Ö;ÜÞ…ÝÍl•£WßU÷û®‹9S…&ÞÖ‚òVö¡ŠKj9âKB²Š ú û!—=ü+¹Àm—=ƒCOœ8y® âsÏœ9ƒŠ‚ƒÃàj¦ƒÅ¯C¬DNR,Ë¥°ù4Ïwzv

<¸¿ª¢¯¿ dÒˆK\Eå scÍãÌø6:̘Ê6vp“v¦Ã‡GG¡+z{Ÿpû{¥–ãJ®]Wˆ *9ãSŠ¼a5#~2û¢ŸÉU¿ËnwkEÛ)T Nà7Ÿrúôé¶6Ö㈤(ñP&!ÊÁSÅw•Š‰OœÏßȲÞË·8„{Jø¬²£ '\Ž£;8ÓÑDÄǬö=áþ!eLŽ¯ËΨfFüüJ‹ñþËïy~¹=ÂFôbÄÆ'"1ñ)==}ˆs-­pÁnülüp#ÄŒŒ,}ðTðqÝB‰O-¼RxíÖŠÚjÆÎßȈÀGìdp4ãcãÌ*vH5ö/½dŠ²§§¿qÏG,]Êßæ5ˆT¹3òˆjø„¢6œúúšBý‰ûËʿ÷ªÆ¦–¦æ[email protected]'P±¬¼Â€ïJ->%ñ)¢gcÅíHõ  àé âÌoqÜ&ÊvV÷‘òÔãSKªV²"8«ë vÚyhVj¶iâÍò¦§¦5ûúžÄîSjáŒoßÅ"*j‘M ruºøJÔ‰¢Øwزîg4B¥š¾ŽXʺݏ«­k¨«oD¤œm#ÄаÑhÆZ]¨l_FÊSÉŠ÷½ªâ“zïÜ‚føT¹b…‘"·Ã‡›ë¯œŸÐÕ××_XXˆ ö•´"û“žÿÛ÷iœQŽ¨zˆBØP‰ÁŠýËþ•H+î{¼L!î ¡!‹ªÐKáÚÍÍ-5µõ€ J ¡2ÄŠÊ*ñ=Y›çý—+eû£¼p ´4«««KKKQ ˆñ¾ Ä÷­AdÂF)1Pìã‡?¦ªžE†»‡·)D1Œ?/¿p¡$ ç±²ªºê@ ¢ìêîÑA¬®©ñ󲥿’ÒW/HîÏ)e;Sà$ ]´ø[email protected]|ÂõLØ8…ÑáÙÌBSEYVV¶ÿþŽŽS‚ˆ-RÒ¢" ¥Nä-6BÕP,}àŠë¿[ÄR1PJ†ˆX*n¨™šš:7$ „t©¨<ˆM͝]ÝÔš-CtÚ±S–`ñóÁ«ôéïß [email protected]ÈQîøpN::;mà3u=…mjG¸ÙD‰ü[^^ˆMMMÖ ˆ[¬AdêT­_¾E‘¦"!bé¶íÎòl¢¸+ª¸¤ôì݈äN7÷`ÔoÍ–!æäækô§!~*ê‰~Åm¬~ëÖŠŇsÒÙÙi ܼ­½S±ÅÚë:{kjj©¬¨Äææf bÿ€Q §¼Ä`u"µØ0Us‹šo`Jà%–ʺg„ˆXJ÷'ú¥ª°iY ¢Ž­Ù2ÄÏÖ®·4¿þ¤òÇÏï='ÒßmL³!ý1Æر¢UU¢m‚:OÔQm±áª†%Dc,½ÿrÑÚæà¸]7ï A„IJòŠ³qC8 ®>k 6·°¶PÄ”Ôt1ÎS¦?Y¿ƒ6~jÒŸ„ïC†ïÇŸ<ÐÙÙ%)OCð”#§.l9:yT¶©#dSS_šdf9¤¥¹åÀj‚8+Á¯ŒÂæ=QìKªÆKÕâºôák/XråO¼NHxœ"|“n÷FÝqòäü;ñ¿øâÀ*)-DȨPjЖ[email protected]¡?¥ø)ÒÔáŸãûˆá»t5'¨-¬á“sÜ¬àŽªfJ“Ž­©©…J#ˆ8cöBP!¾/ Ê Q©-º”j¸¤ÝO[·g DqÏ>NõWóª Ù˜'àzÅ%û±¶*¦U1#3[€úS-´éð-úñÇ÷ߥkƒ ¦Ée6K-óY,½‰±‘%Í’«.Y|µÈ†tW”"jCš=#m_æ©S§æá†ø†ÃÃ#…E¥EÅ¥ˆ¢¨©KB†¸mûÈÌ-l|éOmü$ õ"ð]úéx´Q|ŠÆ1=>«ì,°¦¦MGG!«¢œkkëfffæ1Î÷ߌ±”t)~>IJÙpç.Wã\p JS  '>|x®-¥Ô[[ßPPXˆ4S"Ô© RÔ: "`HJñSJ—®¾Å—~¶¤‹Ôâ›°Ÿ`'HM6£šòŒåÀÀ@CCƒžØÓÓ348„¯sôèQÄ"{ J ‘ÅRE—šº!²áb– Emh:¡Ÿ˜Çæ@u 2Úœ‚øôôta1M©TRS[‚:ˆ~þ–PvÀ'ŒÈéOKü>‹^úÙƒŒ Yüäø&'fç73›)(q`gª‰

%PDF-1.6 %äãÏÒ 1 0 obj [/PDF/ImageB/ImageC/ImageI/Text] endobj 4 0 obj <</Length 5 0 R /Filter/FlateDecode >> stream xœ endstream endobj 5 0 obj 8 endobj 6 0 obj <</Subtype/Image /Width 150 /Height 150 /BitsPerComponent 8 /ColorSpace/DeviceRGB /Filter/FlateDecode /Length 7 0 R >> stream xœígx]ŵ÷!!›póá^¾¼onè á’¼¸@hƒ &6„zÁÀIè6ظɲ-˲%Y]Vï½Z½ËjVï½Ë²lÉr’ûþgÖÞsf—st$ ‰÷³=Gçì}ÊþíµÖÍ̞ùßÿ=¿ßÎoç·óÛùíüv~;¿ßÎosޞjk﬩­/.-ËÍ/ŒOLŽKHŽOŠ‰KŒŽM€EÅÄGFÇEDņGÆÀÂ"¢³sóaûË*êšpøää‘sý;þ…¶écÇúúªkëò ŠSÓ3SÒ2RR÷%§¦'¥¤'&§%$ ¥Æ'¦Ø14<*$ ,’,($ †7))-ëìꞜœ<׿òŸm;yêÔÀà`]}#\,3+7#3g_FvzFVÚ¾,Sˆx”’Ãㄤ”ø4ŽJƒÃ‚BaØ­¨¤´£³ëÌ™3çúׇ·S§N WVUçææä îeåäefç ˆY9YÙyx>'¯ûäååçåãùþ2tÎ:…œ@ASÑ? æ·7(;'ï<Ê9m_~ùåÁƒãÈP…%ŒHAˆˆpâ’â’²Òýå°XiYqÉþ¢âÒ¢Råû ê<~Ë<484BÑ×?–•Û××®OÏ·z;}útOoyE•ŽHAa10••WÂ+*À°þ…YXˆ"‡Â7‘4]÷†È}üÂ#£Tל>ï’Ú ì !tD`eåUªkkjêªkêð ê@Í7 QÄXDW¢·ïހÀ|¹cÇfÎõ™;÷ÛéÓgÚ;:C&@5µu MP/0T ç"R. ½|üaˆêǎ;×gñÜlÐ=½} "pà/56575·66µ€à· "B+4R¤[email protected]Õ\ŠçúŒ~£ÛÈÈh}}#p"õ -­íÜÚš[Zç€âyáŸèéåóðòñðdæã»72:6" ¥DtjzÆÙ@¤b)[email protected]ôôöójmm;×çõ›ØŽÍ̀b$ pÔp …@ kkïhmë°bfVNDd´¯_Àf‡­«×¬]õ—÷ædŸ­]¿~ÃfW7$ 50š+DªAWD/ß„Ääééés}Ž¿® eÂððáA–è›;;»;»z cPsÙ1'7?4,b‡³Ë~2Wd¶íãO>Å•àíãrÞ~ˆpFè$ Gq§OEeÕ¹>Ù¿Í?ÞÖÖÑÐØL8ðà»z»º{f…˜_Päãë¿æÓu6¼òÖÊ'þôâ²Wž¾ý™mö­úÏvûò«¯úú…CØ ã¯mˆyù.»\§§Ôpædkñ•,¹ò‚¯ºàÁ«/xèê–’]sÁÃ’á_z;`7ìŒCp aå@q1€&|Ùø¹[·CÙΈˆJÝ=¼‹JJq ŸkóÜNž< 4¡ÀhxddxdthxÄÄä”´›¶Áýæ©E?yðj„ì!"uí¿¿ö‚e?g¶üç.ÿÅ…»Ž›úïò_`eO‚qøC*P•&>׉åºÏ7BºÌ 184冀ˆˆzêÔésMcn®:hN!‡‚ µ±°¨dÓf ;d+8ÅO–¨à«ÔàS„Œ`=z³?üòÂÇ`×3{ÜŠÑ«Ø ;ÓQ€é/T *M|G g_üâãFŽÁa¶!Rù/ b¤’sÅÞ ø¦¦¦ETăѱƒÇ·±¾¡i»ÓN,¹þñ».yà*Åãdp‚Ú~©Àzâ¿™=yÃ…OÁ~uáa¿fö´dô^ÂØ ;ÓQ„•€M%÷J| ¸¤Nü8lÙp¶!"¢ ˆÐ9€ø폨ø†GQ±·¯ÿÐÄaØø¡ Sˆ cdÇÒ9ÅIœêhDíIÎtžý¿Ÿåö܍°ïÁž7‰í‰Cžápñ&TÐ|ä: Jî’—

hbàÛ‘ÉÎC‡xTì<:<9 ›8< ß)1Saw­Âî:pÌ}TjŒ‡uË^æöÊÿ0•Ûk·êž§hș⭚ÏÞ¨¢T½RqIž(UüɃס–Ñ8ãn÷ï4D|Ÿ#GŽ"¯A±"ßôô1dCSˆí]H"²Î¼lé L«È~GiŽ±»%/îq8Ãßþ7½À½ì%Áú춬 »Ùë£çiìü'+}é–‹š„’åy€\I”ÄW]ô3TrPÝ°Ñྋ™t™ž;„ÁËffŽ;6c ±¤´ì£×ˆ_ˆÄÂ&i•¥×hüîIbÇC¥î•[,Ôˆè¼ûíVÂîøÁ›6 ;`7ìü†Àʁ š„’%°:Ž"®rƒ ºì•§ÅÏY½fíÞÀ¨˜øY!"'BÞ 2é25…° ×DÈ­|3…˜¾/CÎz¬0®GZå×éØ1§C¨D{Y€ãNôºŠŒ¸¼uÇÅoÝyñŸ™]ò6Ù]cÏÓ>؇¨L9Ð×µ(™Wr—4áxÝ…¤sTg¼þñ»…3"¢Bº|W âÓOœ<É_? "Á?~ü„ºé É bJÖ[r•%lB<°|§cG¡Rõ8œJ ,Ö;ÜÞ…ÝÍl•£WßU÷û®‹9S…&ÞÖ‚òVö¡ŠKj9âKB²Š ú û!—=ü+¹Àm—=ƒCOœ8y® âsÏœ9ƒŠ‚ƒÃàj¦ƒÅ¯C¬DNR,Ë¥°ù4Ïwzv

<¸¿ª¢¯¿ dÒˆK\Eå scÍãÌø6:̘Ê6vp“v¦Ã‡GG¡+z{Ÿpû{¥–ãJ®]Wˆ *9ãSŠ¼a5#~2û¢ŸÉU¿ËnwkEÛ)T Nà7Ÿrúôé¶6Ö㈤(ñP&!ÊÁSÅw•Š‰OœÏßȲÞË·8„{Jø¬²£ '\Ž£;8ÓÑDÄǬö=áþ!eLŽ¯ËΨfFüüJ‹ñþËïy~¹=ÂFôbÄÆ'"1ñ)==}ˆs-­pÁnülüp#ÄŒŒ,}ðTðqÝB‰O-¼RxíÖŠÚjÆÎßȈÀGìdp4ãcãÌ*vH5ö/½dŠ²§§¿qÏG,]Êßæ5ˆT¹3òˆjø„¢6œúúšBý‰ûËʿ÷ªÆ¦–¦æ[email protected]'P±¬¼Â€ïJ->%ñ)¢gcÅíHõ  àé âÌoqÜ&ÊvV÷‘òÔãSKªV²"8«ë vÚyhVj¶iâÍò¦§¦5ûúžÄîSjáŒoßÅ"*j‘M ruºøJÔ‰¢Øwزîg4B¥š¾ŽXʺݏ«­k¨«oD¤œm#ÄаÑhÆZ]¨l_FÊSÉŠ÷½ªâ“zïÜ‚føT¹b…‘"·Ã‡›ë¯œŸÐÕ××_XXˆ ö•´"û“žÿÛ÷iœQŽ¨zˆBØP‰ÁŠýËþ•H+î{¼L!î ¡!‹ªÐKáÚÍÍ-5µõ€ J ¡2ÄŠÊ*ñ=Y›çý—+eû£¼p ´4«««KKKQ ˆñ¾ Ä÷­AdÂF)1Pìã‡?¦ªžE†»‡·)D1Œ?/¿p¡$ ç±²ªºê@ ¢ìêîÑA¬®©ñ󲥿’ÒW/HîÏ)e;Sà$ ]´ø[email protected]|ÂõLØ8…ÑáÙÌBSEYVV¶ÿþŽŽS‚ˆ-RÒ¢" ¥Nä-6BÕP,}àŠë¿[ÄR1PJ†ˆX*n¨™šš:7$ „t©¨<ˆM͝]ÝÔš-CtÚ±S–`ñóÁ«ôéïß [email protected]ÈQîøpN::;mà3u=…mjG¸ÙD‰ü[^^ˆMMMÖ ˆ[¬AdêT­_¾E‘¦"!bé¶íÎòl¢¸+ª¸¤ôì݈äN7÷`ÔoÍ–!æäækô§!~*ê‰~Åm¬~ëÖŠŇsÒÙÙi ܼ­½S±ÅÚë:{kjj©¬¨Äææf bÿ€Q §¼Ä`u"µØ0Us‹šo`Jà%–ʺg„ˆXJ÷'ú¥ª°iY ¢Ž­Ù2ÄÏÖ®·4¿þ¤òÇÏï='ÒßmL³!ý1Æر¢UU¢m‚:OÔQm±áª†%Dc,½ÿrÑÚæà¸]7ï A„IJòŠ³qC8 ®>k 6·°¶PÄ”Ôt1ÎS¦?Y¿ƒ6~jÒŸ„ïC†ïÇŸ<ÐÙÙ%)OCð”#§.l9:yT¶©#dSS_šdf9¤¥¹åÀj‚8+Á¯ŒÂæ=QìKªÆKÕâºôák/XråO¼NHxœ"|“n÷FÝqòäü;ñ¿øâÀ*)-DȨPjЖ[email protected]¡?¥ø)ÒÔáŸãûˆá»t5'¨-¬á“sÜ¬àŽªfJ“Ž­©©…J#ˆ8cöBP!¾/ Ê Q©-º”j¸¤ÝO[·g DqÏ>NõWóª Ù˜'àzÅ%û±¶*¦U1#3[€úS-´éð-úñÇ÷ߥkƒ ¦Ée6K-óY,½‰±‘%Í’«.Y|µÈ†tW”"jCš=#m_æ©S§æá†ø†ÃÃ#…E¥EÅ¥ˆ¢¨©KB†¸mûÈÌ-l|éOmü$ õ"ð]úéx´Q|ŠÆ1=>«ì,°¦¦MGG!«¢œkkëfffæ1Î÷ߌ±”t)~>IJÙpç.Wã\p JS  '>|x®-¥Ô[[ßPPXˆ4S"Ô© RÔ: "`HJñSJ—®¾Å—~¶¤‹Ôâ›°Ÿ`'HM6£šòŒåÀÀ@CCƒžØÓÓ348„¯sôèQÄ"{ J ‘ÅRE—šº!²áb– Emh:¡Ÿ˜Çæ@u 2Úœ‚øôôta1M©TRS[‚:ˆ~þ–PvÀ'ŒÈéOKü>‹^úÙƒŒ Yüäø&'fç73›)(q`gª‰


SANS Information Security Reading Room

  • info
  • discussion
  • exploit
  • solution
  • references
IBM Connections CVE-2016-2953 Man in the Middle Information Disclosure Vulnerability

Bugtraq ID: 94415
Class: Design Error
CVE: CVE-2016-2953
Remote: Yes
Local: No
Published: Nov 17 2016 12:00AM
Updated: Nov 20 2016 12:12AM
Credit: IBM
Vulnerable: IBM Connections 5.0
IBM Connections 4.5.0.0
IBM Connections 4.0
Not Vulnerable: IBM Connections 5.0 CR4
IBM Connections 4.5 CR5
IBM Connections 4.0 CR4


SecurityFocus Vulnerabilities

[[badge.metadataBadgeRenderer.label]] [[badge.metadataBadgeRenderer.tooltip]]

[[getSimpleString_(item)]]

[[getSimpleString(data.indexText)]]

[[getCastDeviceName_(isCasting_)]]

[[ariaLabel]]

[[item.tabRenderer.title]]

[[getSimpleString(data.text)]]

[[computeLabel_(selected)]]

[[item.title]]

[[getSimpleString(data.text)]] [[computeTooltip_(data.untoggledTooltip, data.toggledTooltip, data.isToggled)]]

[[getSimpleString(data.title)]]

[[getSimpleString(data.subscriberCountText)]] [[getSimpleString(data.videoCountText)]]

[[getSimpleString(data.title)]]

[[errorMessage]]

[[getSimpleString(voteCount)]]

[[data.tooltip]]

[[getSimpleString(data.question)]]

[[data.iconText]]

[[getSimpleString(data.title)]]

[[reason]]

[[getSimpleString(content)]]

Ad

-

[[menuStrings_.LANGUAGE_LABEL]] [[clientSettings_.language]]

[[menuStrings_.COUNTRY_LABEL]] [[clientSettings_.country]]

[[menuStrings_.RESTRICTED_MODE_LABEL]] [[computeRestrictedModeText_(clientSettings_.restrictedMode)]]

[[menuStrings_.SETTINGS_LABEL]] [[menuStrings_.HELP_LABEL]] [[menuStrings_.FEEDBACK_LABEL]] [[menuStrings_.CLASSIC_YOUTUBE_LABEL]]

[[menuStrings_.RESTRICTED_MODE_TEXT_LINE_1]]

[[menuStrings_.RESTRICTED_MODE_TEXT_LINE_2]]

[[computeRestrictedModeText_(clientSettings_.restrictedMode)]]

[[menuStrings_.SHARE_LABEL]]


DEF CON Announcements!

J003-Content-Microsoft-Patch-Tuesday-Oct2016_SQThis Tuesday’s update addresses 49 vulnerabilities within 10 security bulletins, of which five are rated as critical, and four of them are zero-day flaws.

After the start of the announced changes on the way patches are delivered on Patch Tuesday, which we covered in our yesterday’s blog post, Microsoft has released the security bulletins for October 2016. Among affected products are Edge, Internet Explorer, Office, Windows, Skype for Business, and of course Adobe Flash Player, and most of the critical updates are for Remote Code Execution issues.

MS16-118 (KB 3192887) This is a cumulative security update for Internet Explorer fixing issues which could allow remote code execution if a user views a specially crafted webpage using IE9, 10 or 11, gaining the attacker the same user rights as the current user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

The update addresses the vulnerabilities by correcting how Internet Explorer handles objects in memory and namespace boundaries.

MS16-119 (KB 3192890) This is a similar cumulative security update like the previous one, this time for Edge browser, resolving remote code execution issues on Windows 10-based computers using Edge as a primary browser.

The patch modifies how Microsoft Edge and certain functions, like the Chakra JavaScript scripting engine, handle objects in memory, and restricts what information is returned to Microsoft Edge. It also changes the way Microsoft Browsers store credentials in memory and handle namespace boundaries, and corrects how Microsoft Edge Content Security Policy validates documents.

MS16-120 (KB 3192884) Yet another critical fix for remote code execution, but this time for the Microsoft Graphics Component, and it resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync.

This update is rated critical for all supported Windows versions, Office 2007 and 2010, Lync/Skype for Business 2010, 2013 and 2016, .NET Framework and Silverlight, and it addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts.

Since it affects Windows operating systems since Vista SP2 and Server 2008 SP2 until Windows 10, including Windows RT 8.1, and covers seven vulnerabilities verified by CVE, this patch should not be taken lightly. Also, this is the only zero-day vulnerability on this batch which there were already registered exploits.

MS16-122 (KB 3195360) This vulnerability could allow remote code execution if Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploits the vulnerability could run arbitrary code in the context of the current user. Of course, if the user is logged on with administrative user rights, an attacker could take control of the affected system.

This security update is rated Critical for Windows Vista, 7, 8.1, RT 8.1, and Windows 10, and it fixes the vulnerability by correcting how Microsoft Video Control handles objects in memory.

MS16-127 (KB 3194343) And, as usual, this Patch Tuesday brought another update for Adobe Flash Player. It updates the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge, on all supported editions of Windows 8.1, RT 8.1, 10, and on Windows Server 2012 and 2012 R2.

The patch covers a set of 13 CVE vulnerabilities, described in Adobe Security Bulletin APSB16-32, and there are several known workarounds and mitigation actions for these issues. Apart from blocking Adobe Flash Player completely, of course.

MS16-121 (KB 3194063) This update resolves an Office RTF remote code execution vulnerability which exists in Microsoft Office, when the Office software fails to properly handle RTF files. It affects Office 2007, 2010, 2013 (including the RT version), 2016, Office for Mac 2011 and 2016, and some other Office apps and services, such as SharePoint Server 2010 and 2013.

An attacker who would successfully exploit this memory corruption vulnerability could run arbitrary code as the current user, and the update fixes the issue by changing the way Microsoft Office apps handle RTF content.

MS16-123 (KB 3192892) This security update resolves several vulnerabilities in various editions of Microsoft Windows, from Vista to 10 and Servers 2008 and 2012, where the more severe ones could allow elevation of privilege of an attacker.

Microsoft has not identified any mitigating factors or workarounds for these five CVE vulnerabilities, and this security update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory.

MS16-124 (KB 3193227) Like the previous one, this update fixes a vulnerability that allows attackers to perform unauthorized privilege elevation and gain access to registry information, and corrects it by changing the way how the kernel API restricts access to this information.

It applies to variants of Microsoft operating systems from Windows Vista SP2 to Windows 10, and addresses four known CVE vulnerabilities, all marked as important.

MS16-125 (KB 3193229) This security update is rated Important for all supported editions of Windows 10, and resolves a vulnerability which could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.

The security update addresses this vulnerability by correcting how the Windows Diagnostics Hub Standard Collector Service sanitizes input, to help preclude unintended elevated system privileges.

MS16-126 (KB 3196067) The last update in today’s batch is marked as Moderate, and addresses an information disclosure vulnerability, when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploits this vulnerability could test for the presence of files on disk, but for an attack to be successful an attacker must persuade a user to open a malicious website.

The security update affects Windows Vista, 7, Server 2008 and 2008 R2, and is rated moderate on client and low on server operating systems. Also, note that you must install two updates to be protected from this vulnerability: this one, and the update in MS16-118.

You will find more details about all the updates listed above in the Security Bulletin Summary for October 2016.

You may also like:

  • Microsoft Patch Tuesday has changed and now all patches are…
  • Third Party Patch Roundup – September 2016
  • Microsoft Patch Tuesday – September 2016


GFI Blog

Blockchain and Cryptography: The New Gold Standard

Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global financial systems based prices on the amount of gold held in coins, which could then be exchanged between people who had no common language, who didn’t necessarily trust each other and whose currency was of no use to the other.

By 1880, many of the leading industrial countries used the gold standard, converting currencies into meaningful equivalents by virtue of their weight in gold. This enabled unprecedented trade volume and international commerce growth.

The comparison between the science of cryptography and the commodity gold may sound dubious at first, but cryptography plays the historical role of gold today by enabling international trade, products and services. Put simply, our interconnected economies now rely on a technological common denominator that can be trusted to secure and enable trade beyond physical borders now that our assets, money and transactions are digital.

Cryptography: A Common Foundation

Cryptography secures the global information infrastructure by encrypting data flows and protecting data from third-party interception. Nowadays, cryptography secures data in transit and at rest, protects personal information and communications, and ensures the integrity of every online purchase. Cryptography has four key attributes:

  1. Confidentiality: The protection of information and prevention of unauthorized access;
  2. Privacy: Protecting the personal information of individuals;
  3. Non-repudiation: The inability to deny an action took place; and
  4. Integrity: Assurance that information cannot be manipulated.

Though its origins date back centuries, modern cryptography came into effect in the 1970s using public keys, asymmetric keys and digital signatures — techniques still in use today.

Financial services introduced public key infrastructures (PKI) in the 1990s, and the National Institute of Standards and Technology (NIST) standardized the cryptographic hash algorithm SHA-1, the operating standard used globally for the past 20 years.

The Future of Banking

Many banks are now pivoting their business models toward technology solutions as they seek to provide digital services for their clients and reduce costs due to regulatory compliance obligations. Similarly, banks are investing heavily in new ways to deliver products and services to clients to compete with technology companies’ alternative payment methods.

This refocus has spurred the term fintech, or financial technology, to describe the growing market segment. A reliance on technology creates a greater need for cryptography to secure and move digital assets. Many banks are now creating their own cryptographic service units to respond to the growing demand.

Blockchain Changes the Banking Game

A perfect example of these competitive forces is the current focus on blockchain. Blockchain has become synonymous with alternative business models. It has driven businesses to reimagine how their networks operate when using a shared distributed ledger of information to reduce costs and complexity and increase efficiency and transparency. These permissioned blockchain concepts — where participants in the network are known and vetted — are considered some of the most innovative technologies currently in development.

At its core, however, blockchain leverages a vast amount of public key cryptography to enable confidentiality, privacy and security of data and user identities. Banks envision organizing vast securities trading platforms, supply chains and back office functions into blockchain systems, essentially changing the rules of how information flows are managed.

A Murky Future

Changes in cryptography will likely redefine banking infrastructures globally in the next decade. According to the NIST, SHA-1 is being phased out. Banks are now preparing to migrate to the new SHA-2 standard, a costly and complicated process for many institutions. This migration, however, is only one step in the evolving cryptography landscape for banks.

Whether you like it or not, quantum computing (QC) is coming. All enterprises, including banks, will need to rebuild their current cryptographic systems to defend against the power of QC. Essentially, QC can decode all current cryptography regimes, requiring quantum-resistant cryptography to keep data safe. This evolving field will be at the forefront of massive infrastructure changes in the coming years.

Learn More

Visit IBM at booth No. 1033 during Money 20/20, happening from Oct. 23 to 26 in Las Vegas, to hear more about blockchain in the financial industry.


Security Intelligence

USN-3093-1: ClamAV vulnerabilities | Ubuntu

Jump to site nav

  • Jump to content
  • Cloud
    • Overview
    • Ubuntu OpenStack
    • Public cloud
    • Cloud tools
    • Cloud management
    • Ecosystem
    • Cloud labs
  • Server
    • Overview
    • Server management
    • Hyperscale
  • Desktop
    • Overview
    • Features
    • For business
    • For developers
    • Take the tour
    • Desktop management
    • Ubuntu Kylin
  • Phone
    • Overview
    • Features
    • Scopes
    • App ecosystem
    • Operators and OEMs
    • Carrier Advisory Group
    • Ubuntu for Android
  • Tablet
    • Design
    • Operators and OEMs
    • App ecosystem
  • TV
    • Overview
    • Experience
    • Industry
    • Contributors
    • Features and specs
    • Commercial info
  • Management
    • Overview
    • Landscape features
    • Working with Landscape
    • Return on investment
    • Compliance
    • Ubuntu Advantage
  • Download
    • Overview
    • Cloud
    • Server
    • Desktop
    • Ubuntu Kylin
    • Alternative downloads


Ubuntu Security Notices

Bugtraq ID: 89752 Class: Unknown CVE: CVE-2016-2108 Remote: Yes Local: No Published: May 03 2016 12:00AM Updated: Sep 28 2016 12:02AM Credit: Huzaifa Sidhpurwala (Red Hat), Hanno B&amp;amp;amp;amp;amp;amp;amp;ouml;ck, and David Benjamin (Google). Vulnerable: SuSE openSUSE Evergreen 11.4
Slackware Slackware Linux 14.1
Slackware Linux x86_64 -current
Slackware Linux 14.1 x86_64
Slackware Linux 14.0 x86_64
Slackware Linux 14.0
Slackware Linux -current
S.u.S.E. openSUSE 13.2
S.u.S.E. openSUSE 13.1
Redhat Enterprise Linux Workstation 7
Redhat Enterprise Linux Server EUS 7.2
Redhat Enterprise Linux Server AUS 7.2
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux HPC Node EUS 7.2
Redhat Enterprise Linux HPC Node 7
Redhat Enterprise Linux Desktop Workstation 5 client
Redhat Enterprise Linux Desktop 7
Redhat Enterprise Linux Desktop 5 client
Redhat Enterprise Linux 5 Server
Oracle Exalogic Infrastructure 2.0
Oracle Exalogic Infrastructure 1.0
OpenSSL Project OpenSSL 1.0.2
OpenSSL Project OpenSSL 1.0.2b
OpenSSL Project OpenSSL 1.0.2a
OpenSSL Project OpenSSL 1.0.1n
OpenSSL Project OpenSSL 1.0.1m
OpenSSL Project OpenSSL 1.0.1l
OpenSSL Project OpenSSL 1.0.1k
OpenSSL Project OpenSSL 1.0.1j
OpenSSL Project OpenSSL 1.0.1i
OpenSSL Project OpenSSL 1.0.1h
OpenSSL Project OpenSSL 1.0.1g
OpenSSL Project OpenSSL 1.0.1f
OpenSSL Project OpenSSL 1.0.1e
OpenSSL Project OpenSSL 1.0.1d
OpenSSL Project OpenSSL 1.0.1c
OpenSSL Project OpenSSL 1.0.1b
OpenSSL Project OpenSSL 1.0.1a
OpenSSL Project OpenSSL 1.0.1
IBM Workload Deployer 3.1 7
IBM Workload Deployer 3.1 6
IBM Workload Deployer 3.1 2
IBM Workload Deployer 3.1 1
IBM Workload Deployer 3.1
IBM Worklight Enterprise Edition 6.1.0.2
IBM Worklight Enterprise Edition 6.1.0.1
IBM Worklight Enterprise Edition 6.1.0.0
IBM WebSphere Cast Iron Cloud Integration 7.5
IBM WebSphere Cast Iron Cloud Integration 6.4 1
IBM WebSphere Cast Iron Cloud Integration 6.4 0
IBM WebSphere Cast Iron Cloud Integration 6.3 2
IBM WebSphere Cast Iron Cloud Integration 6.3 1
IBM WebSphere Cast Iron Cloud Integration 6.1 9
IBM WebSphere Cast Iron Cloud Integration 6.1 6
IBM WebSphere Cast Iron Cloud Integration 6.1 3
IBM WebSphere Cast Iron Cloud Integration 6.1 15
IBM WebSphere Cast Iron Cloud Integration 6.1 12
IBM WebSphere Cast Iron Cloud Integration 7.0.0.0
IBM Websphere Application Server 8.5.5.9 - Liberty Pr
IBM Websphere Application Server 8.5.5.8 - Liberty Pr
IBM Websphere Application Server 8.5.5.7 - Liberty Pr
IBM Websphere Application Server 8.5.5.6 - Liberty Pr
IBM Websphere Application Server 8.5.5.5 - Liberty Pr
IBM Websphere Application Server 8.5.5.4 - Liberty Pr
IBM Websphere Application Server 8.5.5.3 - ~~Liberty
IBM Websphere Application Server 8.5.5.2 - Liberty Pr
IBM Websphere Application Server 8.5.5.1 - Liberty Pr
IBM Websphere Application Server 8.5.5.0 - Liberty Pr
IBM Virtual Fabric 10GB Switch Module 7.8.10.0
IBM Vios 2.2
IBM Tivoli Network Manager IP Edition 3.9 Fix Pack 4
IBM Tivoli Common Reporting 3.1.3
IBM Tivoli Common Reporting 3.1.2
IBM Tivoli Common Reporting 3.1.2.1
IBM Tivoli Common Reporting 3.1.0.2
IBM Tivoli Common Reporting 3.1.0.1
IBM Tivoli Common Reporting 3.1
IBM Systems Director 6.3.2 0
IBM Systems Director 5.2
IBM Systems Director 6.3.7.0
IBM Systems Director 6.3.6.0
IBM Systems Director 6.3.5.0
IBM Systems Director 6.3.3.1
IBM Systems Director 6.3.3.0
IBM Systems Director 6.3.2.2
IBM Systems Director 6.3.2.1
IBM Systems Director 6.3.1.1
IBM Systems Director 6.3.1.0
IBM Systems Director 6.3.0.0
IBM Systems Director 6.3
IBM Systems Director 6.2.1.2
IBM Systems Director 6.2.1.0
IBM Systems Director 6.2.0.0
IBM Systems Director 6.1.0.0
IBM Sterling Connect:Direct for UNIX 4.1
IBM Sterling Connect:Direct for UNIX 4.0
IBM Sterling Connect:Direct for Microsoft Windows 4.6.0
IBM Sterling Connect:Direct for Microsoft Windows 4.5.01
IBM Sterling Connect:Direct for Microsoft Windows 4.5.00
IBM Sterling Connect:Direct for HP NonStop 3.6
IBM Sterling Connect:Direct for HP NonStop 3.5.1
IBM Sterling Connect:Direct for HP NonStop 3.5
IBM Security Proventia Network Active Bypass 1.0.2919
IBM Security Proventia Network Active Bypass 1.0.1876
IBM Security Proventia Network Active Bypass 3.9-34
IBM Security Proventia Network Active Bypass 3.4-23
IBM Security Proventia Network Active Bypass 3.30.4-12
IBM Security Proventia Network Active Bypass 3.30.2-9
IBM Security Proventia Network Active Bypass 3.30.0-13
IBM Security Proventia Network Active Bypass 3.30-12
IBM Security Proventia Network Active Bypass 3.29-9
IBM Security Proventia Network Active Bypass 3.25-57
IBM Security Proventia Network Active Bypass 3.18-49
IBM Security Proventia Network Active Bypass 3.13-41
IBM Security Proventia Network Active Bypass 2.18-43
IBM Security Proventia Network Active Bypass 2.18-42
IBM Security Proventia Network Active Bypass 2.16-37
IBM Security Proventia Network Active Bypass 2.15-36
IBM Security Proventia Network Active Bypass 2.13-34
IBM Security Proventia Network Active Bypass 2.11-28
IBM Security Proventia Network Active Bypass 0343c3c
IBM Security Network Protection 5.3.2
IBM Security Network Protection 5.3.1
IBM Security Network Controller 1.0.3387
IBM Security Network Controller 1.0.3381
IBM Security Network Controller 1.0.3379
IBM Security Network Controller 1.0.3376
IBM Security Network Controller 1.0.3361
IBM Security Network Controller 1.0.1768
IBM Security Network Controller 1.0.1209
IBM Security Network Controller 1.0.913
IBM Security Network Controller 1.0.3394M
IBM Security Network Controller 1.0.3394
IBM Security Network Controller 1.0.3387M
IBM Security Network Controller 1.0.3381M
IBM Security Network Controller 1.0.3379M
IBM Security Network Controller 1.0.3376M
IBM Security Network Controller 1.0.3361M
IBM Security Network Controller 1.0.3352M
IBM Security Network Controller 1.0.3350M
IBM Security Network Controller 1.0
IBM Security Identity Manager Virtual Appliance 7.0.1.1
IBM Security Identity Manager Virtual Appliance 7.0.1.0
IBM Security Identity Manager Virtual Appliance 7.0.0.3
IBM Security Identity Manager Virtual Appliance 7.0.0.2
IBM Security Identity Manager Virtual Appliance 7.0.0.1
IBM Security Identity Manager Virtual Appliance 7.0.0.0
IBM Security Identity Governance and Intelligence 5.2.1
IBM Security Guardium 10.0
IBM Security Access Manager for Web 8.0.1
IBM Security Access Manager for Web 8.0 3
IBM Security Access Manager for Web 8.0 2
IBM Security Access Manager for Web 9.0.0.1
IBM Security Access Manager for Web 9.0
IBM Security Access Manager for Web 8.0.1.3
IBM Security Access Manager for Web 8.0.1.2
IBM Security Access Manager for Web 8.0.1.1
IBM Security Access Manager for Web 8.0.1.0
IBM Security Access Manager for Web 8.0.0.5
IBM Security Access Manager for Web 8.0.0.4
IBM Security Access Manager for Web 8.0.0.2
IBM Security Access Manager for Web 8.0.0.0
IBM Security Access Manager for Web 7.0
IBM Security Access Manager for Mobile 8.0.1
IBM Security Access Manager for Mobile 9.0
IBM Security Access Manager for Mobile 8.0.1.4
IBM Security Access Manager for Mobile 8.0.1.3
IBM Security Access Manager for Mobile 8.0.1.2
IBM Security Access Manager for Mobile 8.0.1.1
IBM Security Access Manager for Mobile 8.0.0.5
IBM Security Access Manager for Mobile 8.0.0.4
IBM Security Access Manager for Mobile 8.0.0.3
IBM Security Access Manager for Mobile 8.0.0.2
IBM Security Access Manager for Mobile 8.0.0.1
IBM Security Access Manager for Mobile 8.0.0.0
IBM Real-time Compression Appliance 4.1.2
IBM Rational Reporting for Development Intelligence 2.0.6
IBM Rational Reporting for Development Intelligence 2.0.5
IBM Rational Reporting for Development Intelligence 2.0.4
IBM Rational Reporting for Development Intelligence 2.0.3
IBM Rational Reporting for Development Intelligence 2.0.1
IBM Rational Reporting for Development Intelligence 5.0.2
IBM Rational Reporting for Development Intelligence 5.0.1
IBM Rational Reporting for Development Intelligence 5.0
IBM Rational Reporting for Development Intelligence 2.0
IBM Rational Insight 1.1.1 3
IBM Rational Insight 1.1.1 2
IBM Rational Insight 1.1.1 1
IBM Rational Insight 1.1.1
IBM Rational Insight 1.1.1.7
IBM Rational Insight 1.1.1.6
IBM Rational Insight 1.1.1.5
IBM Rational Insight 1.1.1.4
IBM Rational Insight 1.1
IBM RackSwitch G8332 7.7.23.0
IBM RackSwitch G8316 7.9.17.0
IBM RackSwitch G8264T 7.9.17.0
IBM RackSwitch G8264CS 7.8.14.0
IBM RackSwitch G8264 7.9.17.0
IBM RackSwitch G8264 7.11.7.0
IBM RackSwitch G8124/G8124-E 7.9.17.0
IBM RackSwitch G8124/G8124-E 7.11.7.0
IBM RackSwitch G8052 7.9.17.0
IBM RackSwitch G8052 7.11.7.0
IBM QRadar 7.2
IBM QRadar 7.1
IBM PureApplication System 2.2.0.0
IBM PureApplication System 2.1.2.2
IBM PureApplication System 2.1.2.1
IBM PureApplication System 2.1.2.0
IBM PureApplication System 2.1.1.0
IBM PureApplication System 2.1.0.2
IBM PureApplication System 2.1.0.1
IBM PureApplication System 2.1.0.0
IBM PureApplication System 2.0.0.1
IBM PureApplication System 2.0
IBM Proventia Network Enterprise Scanner 2.3
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 3.4
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 3.3
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 3.2
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 3.1
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 2.5
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 2.4
IBM ProtecTIER Gateway for System Z (PID 5639-FPA) 1.2
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 3.4
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 3.3
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 3.2
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 3.1
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 2.5
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 2.4
IBM ProtecTIER Entry Edition (PID 5639-PTC) - TS7610 / TS7620 1.2
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 3.4
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 3.3
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 3.2
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 3.1
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 2.5
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 2.4
IBM ProtecTIER Enterprise Edition (PID 5639-PTA) - TS7650G 1.2
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 3.4
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 3.3
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 3.2
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 3.1
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 2.5
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 2.4
IBM ProtecTIER Appliance Edition (PID 5639-PTB) - TS7650AP1 1.2
IBM PowerKVM 3.1
IBM PowerKVM 2.1
IBM Power HMC 8.5.0.0
IBM Power HMC 8.4.0.0
IBM Power HMC 8.3.0.0
IBM Power HMC 8.2.0.0
IBM Power HMC 8.1.0.0
IBM Power HMC 7.9.0.0
IBM Power HMC 7.3.0.0
IBM MQ Appliance M2001
IBM MQ Appliance M2000
IBM MobileFirst Platform Foundation 7.1.0.0
IBM MobileFirst Platform Foundation 7.0.0.0
IBM MobileFirst Platform Foundation 6.3.0.0
IBM Mobile Foundation Consumer Edition 6.2.0.1
IBM Mobile Foundation Consumer Edition 6.2.0.0
IBM Messagesight 1.2
IBM Messagesight 1.1
IBM Jazz Reporting Service 6.0
IBM Jazz Reporting Service 5.0.2
IBM Jazz Reporting Service 5.0.1
IBM Jazz Reporting Service 5.0
IBM Image Construction and Composition Tool 2.3.2.0
IBM Image Construction and Composition Tool 2.3.1.0
IBM i 7.3
IBM i 7.2
IBM i 7.1
IBM Flex System Fabric SI4093 System Interconnect Module 7.8.14.0
IBM Flex System Fabric EN4093R 10Gb Scalable Switch 7.8.14.0
IBM Flex System Fabric CN4093 10Gb Converged Scalable Switch 7.8.14.0
IBM Flex System EN2092 1Gb Ethernet Scalable Switch 7.8.14.0
IBM DataPower Gateways 7.5.1.0
IBM DataPower Gateways 7.5.0.1
IBM DataPower Gateways 7.2.0.6
IBM DataPower Gateways 7.1.0.10
IBM DataPower Gateways 7.0.0.13
IBM Counter Fraud Management for Safer Payments 5.3.0
IBM Cognos Business Intelligence Server 10.2.2
IBM Cognos Business Intelligence Server 10.2.1 1
IBM Cognos Business Intelligence Server 10.2.1
IBM Cognos Business Intelligence Server 10.1.1
IBM Cognos Business Intelligence Server 10.2
IBM Cognos Business Intelligence 10.2.1 FixPack 2
IBM Cognos Business Intelligence 10.2.1
IBM Cognos Business Intelligence 10.1.1
IBM Cloud Manager with Openstack 4.3
IBM Cloud Manager with Openstack 4.2
IBM Cloud Manager with Openstack 4.1
IBM Cloud Manager with Openstack 4.3.0.6 Interim Fix1
IBM Cloud Manager with Openstack 4.3.0.6
IBM Cloud Manager with Openstack 4.3.0.4 interim Fix
IBM Cloud Manager with Openstack 4.3.0.4
IBM Cloud Manager with Openstack 4.3.0.3
IBM Cloud Manager with Openstack 4.3.0.2
IBM Cloud Manager with Openstack 4.3.0.1
IBM Cloud Manager with Openstack 4.2.0.3 Interix Fix
IBM Cloud Manager with Openstack 4.2.0.3 Interix Fix
IBM Cloud Manager with Openstack 4.2.0.3 Interim Fix
IBM Cloud Manager with Openstack 4.2.0.3
IBM Cloud Manager with Openstack 4.2.0.2
IBM Cloud Manager with Openstack 4.2.0.1
IBM Cloud Manager with Openstack 4.1.0.5 Interim Fix
IBM Cloud Manager with Openstack 4.1.0.5 Interim Fix
IBM Cloud Manager with Openstack 4.1.0.5
IBM Cloud Manager with Openstack 4.1.0.4.2
IBM Cloud Manager with Openstack 4.1.0.4
IBM Cloud Manager with Openstack 4.1.0.3
IBM Cloud Manager with Openstack 4.1.0.2
IBM Cloud Manager with Openstack 4.1.0.1
IBM Algo Audit and Compliance 2.1
IBM Aix 7.2
IBM AIX 7.1
IBM AIX 6.1
IBM AIX 5.3
IBM ABYP-4TS-P-M 0
IBM ABYP-4TS-P 0
IBM ABYP-4TL-P-M 0
IBM ABYP-4TL-P 0
IBM ABYP-4T-0S-0L-P-M 0
IBM ABYP-4T-0S-0L-P 0
IBM ABYP-2T-2S-0L-P-M 0
IBM ABYP-2T-2S-0L-P 0
IBM ABYP-2T-1S-1L-P-M 0
IBM ABYP-2T-1S-1L-P 0
IBM ABYP-2T-0S-2L-P-M 0
IBM ABYP-2T-0S-2L-P 0
IBM ABYP-10G-4SR-1-P-M 0
IBM ABYP-10G-4SR-1-P 0
IBM ABYP-10G-4LR-1-P-M 0
IBM ABYP-10G-4LR-1-P 0
IBM ABYP-10G-2SR-2LR-1-P-M 0
IBM ABYP-10G-2SR-2LR-1-P 0
IBM ABYP-0T-4S-0L-P-M 0
IBM ABYP-0T-4S-0L-P 0
IBM ABYP-0T-2S-2L-P-M 0
IBM ABYP-0T-2S-2L-P 0
IBM ABYP-0T-0S-4L-P-M 0
IBM ABYP-0T-0S-4L-P 0
IBM 1/10GB Uplink Ethernet Switch Module 7.4.14.0
HP IceWall SSO Dfw 10.0
HP IceWall SSO Agent Option 10
HP Helion OpenStack 2.1.4
HP Helion OpenStack 2.1.2
HP Helion OpenStack 2.1
HP Helion OpenStack 2.0
Google Android 5.1.1
Google Android 5.0.2
Google Android 4.4.4
Extremenetworks Summit WM3000 Series 0
Extremenetworks Purview 6.3
Extremenetworks NetSight Appliance 6.3
Extremenetworks NAC Appliance 6.3
Extremenetworks IdentiFi Wireless 10.11
Extremenetworks IdentiFi V7R0
Extremenetworks IdentiFi 10.01
Extremenetworks ExtremeXOS 21.1.1
Extremenetworks ExtremeXOS 21.1
Extremenetworks ExtremeXOS 16.2
Extremenetworks ExtremeXOS 16.1.3
Extremenetworks ExtremeXOS 16.1.2
Extremenetworks ExtremeXOS 15.7.4
Extremenetworks ExtremeXOS 15.7.3
Extremenetworks ExtremeXOS 15.7.2
Extremenetworks ExtremeXOS 15.7
Extremenetworks ExtremeXOS 15.6.5
Extremenetworks ExtremeXOS 15.6.4
Extremenetworks ExtremeXOS 15.5.5
Extremenetworks ExtremeXOS 15.3.5
Extremenetworks ExtremeXOS 16.1
Extremenetworks ExtremeXOS 15.4.1.0
Extremenetworks ExtremeXOS 15.3
Extremenetworks EOS 7.91.1
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64
Citrix XenServer 6.0.2 Common Criteria
Citrix XenServer 6.0.2
Citrix XenServer 6.5 Service Pack 1
Citrix XenServer 6.5
Citrix XenServer 6.2 Service Pack 1
Citrix XenServer 6.2
Citrix XenServer 6.1
Citrix XenServer 6.0
Cisco Wide Area Application Services (WAAS) 0
Cisco WebEx Recording Playback Client 0
Cisco WebEx Node for MCS 0
Cisco WebEx Messenger Service 7.9.9 EP1
Cisco WebEx Messenger Service 0
Cisco WebEx Meetings Server - SSL Gateway 0
Cisco WebEx Meetings Server 2.6
Cisco WebEx Meetings Server 2.5MR2
Cisco WebEx Meetings Server 2.5.99.2
Cisco WebEx Meetings Server 2.5.1.5
Cisco WebEx Meetings Server 2.5.0.997
Cisco WebEx Meetings Server 2.5 MR1
Cisco WebEx Meetings Server 2.5
Cisco WebEx Meetings Server 2.0
Cisco WebEx Meetings Server 1.5.1.6
Cisco WebEx Meetings Server 1.5.1.131
Cisco WebEx Meetings Server 1.5(.1.6)
Cisco WebEx Meetings Server 1.5(.1.131)
Cisco WebEx Meetings Server 1.5
Cisco WebEx Meetings Server 1.1
Cisco WebEx Meetings Server 1.0
Cisco WebEx Meetings Server 0
Cisco WebEx Meetings for WP8 0
Cisco WebEx Meetings for BlackBerry 0
Cisco WebEx Meetings for Android 0
Cisco WebEx Meetings Client - On Premises 0
Cisco WebEx Meetings Client - Hosted 0
Cisco WebEx Meeting Center 0
Cisco Web Security Appliance (WSA) 0
Cisco Visual Quality Experience Tools Server 0
Cisco Visual Quality Experience Server 0
Cisco Virtualization Experience Media Engine 0
Cisco Virtual Security Gateway for Microsoft Hyper-V 0
Cisco Videoscape Control Suite 0
Cisco Video Surveillance PTZ IP Cameras 0
Cisco Video Surveillance Media Server 7.7
Cisco Video Surveillance Media Server 0
Cisco Video Surveillance 7000 Series IP Cameras 0
Cisco Video Surveillance 6000 Series IP Cameras 0
Cisco Video Surveillance 4300E/4500E High-Definition IP Cameras 0
Cisco Video Surveillance 3000 Series IP Cameras 0
Cisco Video Distribution Suite for Internet Streaming (VDS-IS/CDS-IS) 0
Cisco Universal Small Cell 7000 Series 3.4.2.0
Cisco Unity Connection (UC) 0
Cisco Unified Workforce Optimization 0
Cisco Unified Wireless IP Phone 0
Cisco Unified SIP Proxy 0
Cisco Unified IP Phone 7900 Series 0
Cisco Unified IP Conference Phone 8831 for Third-Party Call Control 0
Cisco Unified Intelligent Contact Management Enterprise 0
Cisco Unified Contact Center Express 0
Cisco Unified Contact Center Enterprise 0
Cisco Unified Computing System -
Cisco Unified Communications Manager Session Management Edition (SME) 0
Cisco Unified Communications Manager (UCM) 0
Cisco Unified Communications Manager 11.0 (0.98000.225)
Cisco Unified Communications Manager 10.5(3.10000.9)
Cisco Unified Communications Manager 10.5(2)su3
Cisco Unified Communications Manager 10.5(0.98000.88)
Cisco Unified Communications Manager 10.5 (2.13900.9)
Cisco Unified Communications Manager 10.5 (2.10000.5)
Cisco Unified Communications Manager 10.5 (1.98991.13)
Cisco Unified Communications Manager 10.3(1)
Cisco Unified Communications Manager 10.0(1)
Cisco Unified Communications Manager 10.0 (1.10000.12)
Cisco Unified Communications Manager 10.0
Cisco Unified Communications Manager 10.0
Cisco Unified Communications for Microsoft Lync 0
Cisco Unified Attendant Console Standard 0
Cisco Unified Attendant Console Premium Edition 0
Cisco Unified Attendant Console Enterprise Edition 0
Cisco Unified Attendant Console Department Edition 0
Cisco Unified Attendant Console Business Edition 0
Cisco Unified Attendant Console Advanced 0
Cisco Unified 9971 IP Phone 0
Cisco Unified 9951 IP Phone 0
Cisco Unified 8961 IP Phone 0
Cisco Unified 8945 IP Phone 0
Cisco Unified 8831 Series IP Conference Phone 0
Cisco Unified 8831 IP Phone 0
Cisco Unified 7800 Series IP Phones 0
Cisco Unified 6945 IP Phones 0
Cisco Unified 6901 IP Phones 0
Cisco TelePresence Video Communication Server (VCS) 0
Cisco Telepresence Video Communication Server 0
Cisco TelePresence SX Series 0
Cisco TelePresence Server on Virtual Machine 4.1
Cisco TelePresence Server on Virtual Machine 0
Cisco TelePresence Server on Multiparty Media 320 4.1
Cisco TelePresence Server on Multiparty Media 320 0
Cisco TelePresence Server on Multiparty Media 310 4.1
Cisco TelePresence Server on Multiparty Media 310 0
Cisco TelePresence Server 8710 0
Cisco TelePresence Server 7010 0
Cisco TelePresence Serial Gateway Series 0
Cisco TelePresence Profile Series 0
Cisco TelePresence MX Series 0
Cisco TelePresence MCU 8510 0
Cisco TelePresence MCU 8420 0
Cisco TelePresence MCU 5300 0
Cisco TelePresence MCU 4500 0
Cisco TelePresence MCU 4200 0
Cisco TelePresence ISDN Link 0
Cisco TelePresence ISDN GW MSE 8321 0
Cisco TelePresence ISDN GW 3241 0
Cisco TelePresence Integrator C Series 0
Cisco TelePresence EX Series 0
Cisco TelePresence Content Server (TCS) 0
Cisco TelePresence Conductor 0
Cisco Tandberg Codian MSE 8320 model 0
Cisco Tandberg Codian ISDN GW 3240 0
Cisco Tandberg Codian ISDN GW 3220 0
Cisco Tandberg Codian ISDN GW 3210 0
Cisco Standalone rack server CIMC 0
Cisco SPA525G 0
Cisco SPA51X Series IP Phones 0
Cisco SPA50X Series IP Phones 0
Cisco SPA30X Series IP Phones 0
Cisco SPA232D Multi-Line DECT ATA 0
Cisco SPA122 ATA with Router 0
Cisco SPA112 2-Port Phone Adapter 0
Cisco SocialMiner 0
Cisco Show and Share (SnS) 0
Cisco Show and Share 5.2(3)
Cisco Show and Share 5.2(2.1)
Cisco Show and Share 5.2(2)
Cisco Show and Share 5.2(1)
Cisco Show and Share 5(2)
Cisco Services Analytic Platform 0
Cisco Registered Envelope Service (CRES) 0
Cisco Registered Envelope Service 0
Cisco Proactive Network Operations Center 0
Cisco Prime Security Manager 9.3.4.2-4
Cisco Prime Performance Manager 0
Cisco Prime Optical for SPs 0
Cisco Prime Network Services Controller 0
Cisco Prime Network Registrar (CPNR) 0
Cisco Prime Network 0
Cisco Prime License Manager 0
Cisco Prime LAN Management Solution (LMS - Solaris) 0
Cisco Prime IP Express 0
Cisco Prime Infrastructure Standalone Plug and Play Gateway 0
Cisco Prime Data Center Network Manager (DCNM) 0
Cisco Prime Collaboration Provisioning 0
Cisco Prime Collaboration Deployment 0
Cisco Prime Collaboration Assurance 0
Cisco Prime Access Registrar 0
Cisco Policy Suite (CPS) 0
Cisco Physical Access Control Gateway 0
Cisco Partner Supporting Service (PSS) 1.0
Cisco Packet Tracer 5.3
Cisco Packet Tracer 5.2
Cisco Packet Tracer 5.2
Cisco OnePK All-in-One VM 0
Cisco Nexus 3X00 Series Switches 0
Cisco Nexus 1000V Series Switches 0
Cisco Nexus 1000V InterCloud 0
Cisco Network Performance Analytics (NPA) 0
Cisco Network Performance Analytics 0
Cisco Network Health Framework 0
Cisco Network Analysis Module 0
Cisco Network Admission Control (NAC) 0
Cisco NetFlow Generation Appliance (NGA) 0
Cisco NAC Server 0
Cisco NAC Guest Server 0
Cisco Multicast Manager 0
Cisco MMP server 0
Cisco MeetingPlace 0
Cisco MeetingPlace
Cisco MediaSense 9.1(1)
Cisco MediaSense 9.1 (1)
Cisco MediaSense 9.1
Cisco MediaSense 9.0(1A)
Cisco MediaSense 9.0 (1a)
Cisco MediaSense 8.5(4)
Cisco MediaSense 8.5(3)
Cisco MediaSense 8.5 (4)
Cisco MediaSense 8.5 (3)
Cisco MediaSense 10.5 (1)
Cisco MediaSense 10.0 (1)
Cisco Media Services Interface 0
Cisco Media Experience Engines (MXE) 0
Cisco MDS 9000 Series Multilayer Switches 0
Cisco MATE Live 0
Cisco MATE Design 0
Cisco MATE collector 0
Cisco Management Appliance (MAP) 0
Cisco Local Collector Appliance (LCA) 2.2.8
Cisco Local Collector Appliance 2.2.10
Cisco Lancope Stealthwatch UDP Director 0
Cisco Lancope Stealthwatch SMC 0
Cisco Lancope Stealthwatch FlowSensor 0
Cisco Lancope Stealthwatch FlowCollector sFlow 0
Cisco Lancope Stealthwatch FlowCollector NetFlow 0
Cisco Jabber Software Development Kit 0
Cisco Jabber Guest 10.0(2)
Cisco Jabber Guest 0
Cisco Jabber for Windows 0
Cisco Jabber for Mac 0
Cisco Jabber for Android 0
Cisco IronPort Encryption Appliance (IEA) 0
Cisco IronPort Email Security Appliance 0
Cisco IPS 0
Cisco InTracer 0
Cisco Intelligent Automation for Cloud 0
Cisco IM and Presence Service (CUPS) 0
Cisco Identity Services Engine (ISE) 0
Cisco Hosted Collaboration Mediation Fulfillment 10.6(3)
Cisco Hosted Collaboration Mediation Fulfillment 0
Cisco FireSIGHT System Software 0
Cisco Expressway series 0
Cisco Enterprise Content Delivery System (ECDS) 0
Cisco Emergency Responder 9.2
Cisco Emergency Responder 8.7
Cisco Emergency Responder 8.6
Cisco Emergency Responder 8.5
Cisco Emergency Responder 10.5(3.10000.9)
Cisco Emergency Responder 10.5(1a)
Cisco Emergency Responder 10.5(1.10000.5)
Cisco Emergency Responder 10.5(1)
Cisco Email Security Appliance (ESA) 0
Cisco Edge 340 Digital Media Player 0
Cisco Edge 300 Digital Media Player 0
Cisco DX Series IP Phones 0
Cisco Digital Media Players (DMP) 4400 Series 5.4(1)RB(2P4)
Cisco Digital Media Players (DMP) 4400 Series 5.3(6)RB(2P3)
Cisco Digital Media Players (DMP) 4400 Series 0
Cisco Digital Media Players (DMP) 4300 Series 5.4(1)RB(2P4)
Cisco Digital Media Players (DMP) 4300 Series 5.3(6)RB(2P3)
Cisco Digital Media Players (DMP) 4300 Series 0
Cisco Digital Media Manager (DMM) 5.2.3
Cisco Digital Media Manager (DMM) 5.2.2
Cisco Digital Media Manager (DMM) 5.2.1
Cisco Digital Media Manager (DMM) 5.3
Cisco Digital Media Manager (DMM) 5.2.2.1
Cisco Digital Media Manager (DMM) 5.2.1.1
Cisco Digital Media Manager (DMM) 5.2
Cisco Digital Media Manager (DMM) 5.1
Cisco Digital Media Manager (DMM) 5.0
Cisco DCM Series 9900-Digital Content Manager 0
Cisco Content Security Management Appliance (SMA) 0
Cisco Content Security Appliance Updater Servers 0
Cisco Connected Grid Routers (CGR) 0
Cisco Connected Grid Router-CGOS 0
Cisco Connected Analytics For Collaboration 0
Cisco Cloupia Unified Infrastructure Controller 0
Cisco Cloud Object Store (COS) 0
Cisco Clean Access Manager 0
Cisco Cisco Unified IP Phone 7900 Series 9.4(2)
Cisco Cisco IronPort Encryption Appliance (IEA) 0
Cisco ATA 187 Analog Telephone Adaptor 0
Cisco ASR 5000 Series 0
Cisco ASA Next-Generation Firewall Services 0
Cisco ASA CX and Prime Security Manager 0
Cisco Application Policy Infrastructure Controller (APIC) 0
Cisco Application and Content Networking System (ACNS) 0
Cisco AnyRes Live (CAL) 0
Cisco AnyConnect Secure Mobility Client for iOS 0
Cisco Agent for OpenFlow 0
Cisco Agent Desktop for Cisco Unified Contact Center Express 0
Cisco Adaptive Security Appliance (ASA) 0
Cisco ACE 30 Application Control Engine Module 0
Cisco 8800 Series IP Phones - VPN Feature 0
Cisco 190 ATA Series Analog Terminal Adaptor 0
Apple Mac Os X 10.11.3
Apple Mac Os X 10.11.2
Apple Mac Os X 10.11.1
Apple Mac Os X 10.11.5
Apple Mac Os X 10.11.4
Apple Mac Os X 10.11 Not Vulnerable: OpenSSL Project OpenSSL 1.0.2c
OpenSSL Project OpenSSL 1.0.1o
IBM Workload Deployer 3.1.0.7 IF12
IBM Sterling Connect:Direct for HP NonStop 3.6.0.1 iFix 030
IBM Security Access Manager for Web 9.0.1.0
IBM Security Access Manager for Web 8.0.1.4
IBM QRadar SIEM/QRIF/QRM/QVM 7.2.7 Patch 1
IBM QRadar SIEM 7.1 MR2 Patch 13
IBM PureApplication System 2.2.1
IBM PureApplication System 2.1.2.3
IBM Image Construction and Composition Tool 2.3.2.0 Build 28
IBM Image Construction and Composition Tool 2.3.1.0 Build 50
IBM DataPower Gateways 7.5.1.1
IBM DataPower Gateways 7.5.0.2
IBM DataPower Gateways 7.2.0.8
IBM DataPower Gateways 7.1.0.11
IBM DataPower Gateways 7.0.0.14
IBM Cognos Business Intelligence 10.2.1 Interim Fix 17
IBM Cognos Business Intelligence 10.1.1 Interim Fix 19
IBM Cloud Manager with Openstack 4.3.0.6 Interim Fix1
IBM Cloud Manager with Openstack 4.2.0.3 interim fix
IBM Cloud Manager with Openstack 4.1.0.5 interim fix
IBM Algo Audit and Compliance 2.1.0.3 IF 2
HP Helion OpenStack 2.1.5
Extremenetworks Purview 7.0
Extremenetworks NetSight Appliance 7.0
Extremenetworks NAC Appliance 7.0
Extremenetworks IdentiFi Wireless 10.11.1
Extremenetworks IdentiFi 9.21.12
Extremenetworks ExtremeXOS 21.1.2
Extremenetworks ExtremeXOS 16.2.1
Extremenetworks ExtremeXOS 22.1
Extremenetworks EOS 8.61.1
Cisco Wide Area Application Services (WAAS) 6.2.3
Cisco Wide Area Application Services (WAAS) 5.5.7
Cisco WebEx Node for MCS 3.12.9.8
Cisco WebEx Messenger Service 7.20
Cisco WebEx Meetings Server - SSL Gateway 2.7
Cisco WebEx Meetings Server 2.7
Cisco WebEx Meetings for WP8 2.6.1
Cisco WebEx Meetings for WP8 3.0
Cisco WebEx Meetings for Android 9.1
Cisco WebEx Meetings Client - On Premises 2.7
Cisco WebEx Meetings Client - Hosted T31R1SP6
Cisco WebEx Meeting Center 3.9.1
Cisco WebEx Meeting Center 3.9.0.5
Cisco Virtualization Experience Media Engine 11.5.1
Cisco Virtualization Experience Media Engine 11.7(0)
Cisco Virtual Security Gateway for Microsoft Hyper-V VSG2(1.4)
Cisco Virtual Security Gateway for Microsoft Hyper-V 5.2(1)
Cisco Virtual Security Gateway VSG2(1.4)
Cisco Virtual Security Gateway 5.2(1)
Cisco Video Surveillance PTZ IP Cameras 2.8
Cisco Video Surveillance Media Server 7.9
Cisco Video Surveillance 7000 Series IP Cameras 2.8
Cisco Video Surveillance 6000 Series IP Cameras 2.8
Cisco Video Surveillance 4300E/4500E High-Definition IP Cameras 3.2.8
Cisco Video Surveillance 4000 Series High-Definition IP Cameras 2.4.7
Cisco Video Surveillance 3000 Series IP Cameras 2.8
Cisco Video Distribution Suite for Internet Streaming (VDS-IS/CDS-IS) 4.3.2
Cisco Universal Small Cell 7000 Series 3.5.12.21
Cisco Universal Small Cell 5000 Series 3.5.12.21
Cisco Unity Connection (UC) 11.5
Cisco Unified Workforce Optimization Quality Management 11.0 SR3 ES5
Cisco Unified Workforce Optimization 11.0 SR3 ES5
Cisco Unified Wireless IP Phone 1.5.1
Cisco Unified SIP Proxy 10.0
Cisco Unified Intelligent Contact Management Enterprise 11.51
Cisco Unified Intelligence Center (CUIC) 11.5.1
Cisco Unified Contact Center Express 11.5.1
Cisco Unified Contact Center Enterprise 11.51
Cisco Unified Communications Manager Session Management Edition (SME) 11.5
Cisco Unified Communications Manager (UCM) 11.5
Cisco Unified Communications for Microsoft Lync 11.6
Cisco Unified Communications for Microsoft Lync 10.6.7
Cisco Unified 9971 IP Phone 9.4.2SR3
Cisco Unified 9951 IP Phone 9.4.2SR3
Cisco Unified 8961 IP Phone 9.4.2SR3
Cisco Unified 8945 IP Phone 9.4.2SR3
Cisco Unified 7800 Series IP Phones 11.5.2
Cisco Unified 6901 IP Phones 9.3(1)SR3
Cisco UCS Central 1.5(1a)
Cisco TelePresence Video Communication Server (VCS) 8.8
Cisco TelePresence SX Series 8.1.2
Cisco TelePresence SX Series 7.3.7
Cisco TelePresence Server on Virtual Machine 4.4
Cisco TelePresence Server on Virtual Machine 4.2 MR2
Cisco TelePresence Server on Multiparty Media 320 4.4
Cisco TelePresence Server on Multiparty Media 320 4.2 MR2
Cisco TelePresence Server on Multiparty Media 310 4.4
Cisco TelePresence Server on Multiparty Media 310 4.2 MR2
Cisco TelePresence Server 8710 4.4
Cisco TelePresence Server 8710 4.2 MR2
Cisco Telepresence Server 7010 4.4
Cisco Telepresence Server 7010 4.2 MR2
Cisco TelePresence Profile Series 8.1.2
Cisco TelePresence Profile Series 7.3.7
Cisco TelePresence MX Series 8.1.2
Cisco TelePresence MX Series 7.3.7
Cisco TelePresence ISDN Link 1.1.6
Cisco TelePresence Integrator C Series 8.1.2
Cisco TelePresence Integrator C Series 7.3.7
Cisco TelePresence EX Series 8.1.2
Cisco TelePresence EX Series 7.3.7
Cisco TelePresence Content Server (TCS) 7.2
Cisco TelePresence Conductor 4.3
Cisco SPA525G 7.6.5
Cisco SPA51X Series IP Phones 7.6.5
Cisco SPA50X Series IP Phones 7.6.5
Cisco SPA30X Series IP Phones 7.6.5
Cisco SPA232D Multi-Line DECT ATA 1.4.5
Cisco SPA122 ATA with Router 1.4.5
Cisco SPA112 2-Port Phone Adapter 1.4.5
Cisco Security Manager 4.12
Cisco Registered Envelope Service (CRES) 5.0
Cisco Prime Security Manager 9.5.4.3
Cisco Prime Optical for SPs 10.6
Cisco Prime License Manager 11.5
Cisco Prime Collaboration Provisioning 11.2
Cisco Prime Collaboration Deployment 11.5
Cisco Prime Collaboration Assurance 11.5 SP1
Cisco Prime Access Registrar 7.1
Cisco Prime Access Registrar 7.2
Cisco Prime Access Registrar 7.0.1.7
Cisco Policy Suite (CPS) 10.0
Cisco Paging Server (Informacast) 11.5.1
Cisco Paging Server 11.5.1
Cisco Packet Tracer 7.0
Cisco ONS 15454 Series Multiservice Provisioning Platforms 10.6.1
Cisco Nexus 9000 (ACI/Fabric Switch) 12.0
Cisco Nexus 7000 Series Switches 6.2.17
Cisco Nexus 7000 Series Switches 8.3
Cisco Nexus 7000 Series Switches 7.3.1NX
Cisco Nexus 7000 Series Switches 7.3.1DX
Cisco Nexus 6000 Series Switches 6.2.17
Cisco Nexus 6000 Series Switches 8.3
Cisco Nexus 6000 Series Switches 7.3.1NX
Cisco Nexus 6000 Series Switches 7.3.1DX
Cisco Nexus 5000 Series Switches 7.3.1
Cisco Nexus 5000 Series Switches 6.2.17
Cisco Nexus 5000 Series Switches 8.3
Cisco Nexus 5000 Series Switches 7.3.1NX
Cisco Nexus 5000 Series Switches 7.3.1DX
Cisco Nexus 4000 Series Blade Switches 0.9.8zf
Cisco Nexus 1000V Series Switches (ESX) 5.2(1)SV3(2.1)
Cisco Nexus 1000V Series Switches 5.2(1)SV3(2.1)
Cisco Network Analysis Module 6.3.1
Cisco Mobility Services Engine (MSE) 8.0
Cisco MMP server 3.9.1
Cisco MMP server 3.9.0.5
Cisco MMP server 3.10
Cisco MeetingPlace 2.7
Cisco MediaSense 11.5.1
Cisco Media Experience Engines (MXE) 3.5.1
Cisco Media Experience Engines (MXE) 3.5
Cisco Media Experience Engines (MXE) 3.2
Cisco MDS 9000 Series Multilayer Switches 6.2.17
Cisco MDS 9000 Series Multilayer Switches 8.3
Cisco MDS 9000 Series Multilayer Switches 7.3.1NX
Cisco MDS 9000 Series Multilayer Switches 7.3.1DX
Cisco Local Collector Appliance (LCA) 2.2.12
Cisco Lancope Stealthwatch UDP Director 6.8.2
Cisco Lancope Stealthwatch UDP Director 6.8.1
Cisco Lancope Stealthwatch UDP Director 6.8
Cisco Lancope Stealthwatch UDP Director 6.7.3
Cisco Lancope Stealthwatch SMC 6.8.2
Cisco Lancope Stealthwatch SMC 6.8.1
Cisco Lancope Stealthwatch SMC 6.8
Cisco Lancope Stealthwatch SMC 6.7.3
Cisco Lancope Stealthwatch FlowSensor 6.8.2
Cisco Lancope Stealthwatch FlowSensor 6.8.1
Cisco Lancope Stealthwatch FlowSensor 6.8
Cisco Lancope Stealthwatch FlowSensor 6.7.3
Cisco Lancope Stealthwatch FlowCollector sFlow 6.8.2
Cisco Lancope Stealthwatch FlowCollector sFlow 6.8.1
Cisco Lancope Stealthwatch FlowCollector sFlow 6.8
Cisco Lancope Stealthwatch FlowCollector sFlow 6.7.3
Cisco Lancope Stealthwatch FlowCollector NetFlow 6.8.2
Cisco Lancope Stealthwatch FlowCollector NetFlow 6.8.1
Cisco Lancope Stealthwatch FlowCollector NetFlow 6.8
Cisco Lancope Stealthwatch FlowCollector NetFlow 6.7.3
Cisco Jabber Software Development Kit 11.7
Cisco Jabber Guest 11.0
Cisco Jabber for Mac 11.7
Cisco Jabber for Apple iOS 11.7
Cisco Jabber for Apple iOS 11.6.2
Cisco Jabber for Android 11.6 MR
Cisco IronPort Email Security Appliance 10.5
Cisco IP Interoperability and Collaboration System (IPICS) 5.0
Cisco IOS Software and Cisco IOS XE Software 16.3.1
Cisco Intelligent Automation for Cloud 0.9.8
Cisco IM and Presence Service (CUPS) 11.5
Cisco Identity Services Engine (ISE) 2.2.1
Cisco Hosted Collaboration Mediation Fulfillment 11.5:20
Cisco Hosted Collaboration Mediation Fulfillment 11.5
Cisco Expressway series 8.8
Cisco Enterprise Content Delivery System (ECDS) 2.6.8
Cisco Emergency Responder 11.5
Cisco Email Security Appliance (ESA) 10.5
Cisco Edge 340 Digital Media Player 1.2.0.20
Cisco Edge 300 Digital Media Player 1.6RB4_5
Cisco Digital Media Players (DMP) 4400 Series 5.4(1)RB(2P11)
Cisco Digital Media Players (DMP) 4300 Series 5.4(1)RB(2P11)
Cisco Digital Media Manager 5.4.1
Cisco Digital Media Manager 5.4
Cisco Digital Media Manager 5.3.6
Cisco Digital Media Manager 5.3
Cisco DCM Series 9900-Digital Content Manager 19.0
Cisco Connected Grid Router - CGOS 15.6.2.15T
Cisco Connected Grid Router 15.6.2.15T
Cisco Connected Analytics For Collaboration 1.0.1q
Cisco Computer Telephony Integration Object Server (CTIOS) 11.51
Cisco Common Services Platform Collector 1.9.1
Cisco Cloud Object Store (COS) 3.8
Cisco ATA 187 Analog Telephone Adaptor 9.2.5
Cisco ASA CX and Cisco Prime Security Manager 9.5.4.3
Cisco Application Policy Infrastructure Controller (APIC) 2.0(0.400)
Cisco Application and Content Networking System (ACNS) 5.5.41
Cisco AnyRes Live (CAL) 9.4.5
Cisco AnyConnect Secure Mobility Client for Windows 4.3
Cisco AnyConnect Secure Mobility Client for Windows 4.2
Cisco AnyConnect Secure Mobility Client for Windows 4.0
Cisco AnyConnect Secure Mobility Client for OS X 4.3
Cisco AnyConnect Secure Mobility Client for OS X 4.2
Cisco AnyConnect Secure Mobility Client for OS X 4.0
Cisco AnyConnect Secure Mobility Client for Linux 4.3
Cisco AnyConnect Secure Mobility Client for Linux 4.2
Cisco AnyConnect Secure Mobility Client for Linux 4.0
Cisco AnyConnect Secure Mobility Client for iOS 4.3
Cisco AnyConnect Secure Mobility Client for iOS 4.2
Cisco AnyConnect Secure Mobility Client for iOS 4.0
Cisco AnyConnect Secure Mobility Client for Android 4.3
Cisco AnyConnect Secure Mobility Client for Android 4.2
Cisco AnyConnect Secure Mobility Client for Android 4.0
Cisco AnyConnect Secure Mobility Client 4.3
Cisco AnyConnect Secure Mobility Client 4.2
Cisco Agent for OpenFlow 2.1.5
Cisco Agent for OpenFlow 2.0.7
Cisco 8800 Series IP Phones - VPN Feature 11.5.2
Cisco 190 ATA Series Analog Terminal Adaptor 1.3
Apple Mac Os X 10.11.6
Apple Mac Os X Security Update 2016


SecurityFocus Vulnerabilities

Microsoft recently announced that it would begin banning weak passwords for a variety of its services and also...

introduced a feature called Smart Password Lockout to prevent attackers from guessing passwords. How is Microsoft banning these weak passwords, and how does the Smart Password Lockout work? Will these things benefit enterprises or just complicate matters?

Stealing passwords is big business in the world of cybercrime. One Russian hacker known as the Collector has recently been offering more than 250 million stolen usernames and passwords for Mail.ru, Yahoo Mail, Gmail, Hotmail and other accounts. Another hacker nicknamed Peace is advertising for sale a database of 167 million emails and hashed passwords belonging to LinkedIn users. As many people use the same username and password for multiple sites, their credentials can potentially provide easy access to social media accounts, online banking services and enterprise networks and resources. According to Microsoft's  Security Intelligence Report Volume 20, it detects more than 10 million credential attacks every day across its various identity systems.

When these big password lists come on to the market they are analyzed both by cybercriminals and security teams, such as Microsoft's Azure Active Directory Identity Protection team -- everyone is looking to see which passwords are the most common. Microsoft is using this information to dynamically update its banned list of common and similar weak passwords. Now, before a user's proposed password is accepted for her Microsoft Account or in Azure AD, it's compared against this list to ensure it's not present. If it is on the list, the user is prompted to choose a password that's harder for other people to guess. By preventing users from choosing common and easy to guess weak passwords, it will reduce the chances of their passwords being cracked by a rainbow table or dictionary-based, brute force attack.

On top of this feature, Microsoft is also introducing Smart Password Lockout to reduce the disruption caused by hackers trying to guess an account password online and triggering an account lockdown. When Microsoft's security system detects someone trying to guess a password online, it will only lock out that specific login session. This means when the genuine user tries to log in, the account is not locked, and as long as she enters the correct username and password, she can access her account. This will save huge amounts of time and frustration given the millions of attacks that occur each day. The only time a genuine user will be locked out is if someone is judged to be trying to guess her password while using the user's own machine or network.

Although many policies and online services try to enforce strong passwords by requiring users to choose a password with a minimum length and complexity, Microsoft has found that this forces people to standardize their passwords in order to remember them, making it easier for hackers to crack them. Preventing users from choosing common weak passwords will certainly improve the effectiveness of many password policies by ensuring passwords are more unique, and therefore harder to guess. Although these security features will certainly help improve password security, some users may struggle to remember harder passwords.

As bad passwords are a major weakness in endpoint security, enterprises should be moving to multifactor authentication (MFA), particularly when users need to access sensitive resources or information. MFA makes it a lot harder for a hacker to use stolen credentials to gain access to endpoint devices and the rest of the network. The presence of high quality cameras, microphones and fingerprint readers in many of today's devices means it's never been easier to implement. The FIDO specification supports a wide range of authentication technologies, including biometrics, USB security tokens and smart cards that can be deployed without extensive programming. Hopefully these technologies will help end the role of the password as the primary authentication factor.

Ask the Expert: Want to ask Michael Cobb a question about application security? Submit your questions now via email. (All questions are anonymous.)

Next Steps

Pick from the top multifactor authentication products

Find out how to protect your organization from bad passwords

Learn how to avoid data breaches with better passwords

This was first published in September 2016


SearchSecurity: Security Wire Daily News