Laura

Vulnerable: Ubuntu Ubuntu Linux 16.10
Ubuntu Ubuntu Linux 16.04 LTS
Ubuntu Ubuntu Linux 14.04 LTS
Ubuntu Ubuntu Linux 12.04 LTS i386
Ubuntu Ubuntu Linux 12.04 LTS amd64
MoinMoin MoinMoin 1.9.6
MoinMoin MoinMoin 1.9.5
MoinMoin MoinMoin 1.9.4
MoinMoin MoinMoin 1.9.3
MoinMoin MoinMoin 1.9.2
MoinMoin MoinMoin 1.9.1
MoinMoin MoinMoin 1.9
MoinMoin MoinMoin 1.9.8
Debian Linux 6.0 sparc
Debian Linux 6.0 s/390
Debian Linux 6.0 powerpc
Debian Linux 6.0 mips
Debian Linux 6.0 ia-64
Debian Linux 6.0 ia-32
Debian Linux 6.0 arm
Debian Linux 6.0 amd64


SecurityFocus Vulnerabilities

</head><body id="readabilityBody"> </p> <p>%PDF-1.6 %äãÏÒ 1 0 obj [/PDF/ImageB/ImageC/ImageI/Text] endobj 4 0 obj <</Length 5 0 R /Filter/FlateDecode >> stream xœ endstream endobj 5 0 obj 8 endobj 6 0 obj <</Subtype/Image /Width 150 /Height 150 /BitsPerComponent 8 /ColorSpace/DeviceRGB /Filter/FlateDecode /Length 7 0 R >> stream xœígx]ŵ÷!!›póá^¾¼onè á’¼¸@hƒ &6„zÁÀIè6ظɲ-˲%Y]Vï½Z½ËjVï½Ë²lÉr’ûþgÖÞsf—st$ ‰÷³=Gçì}ÊþíµÖÍ̞ùßÿ=¿ßÎoç·óÛùíüv~;¿ßÎosޞjk﬩­/.-ËÍ/ŒOLŽKHŽOŠ‰KŒŽM€EÅÄGFÇEDņGÆÀÂ"¢³sóaûË*êšpøää‘sý;þ…¶écÇúúªkëò ŠSÓ3SÒ2RR÷%§¦'¥¤'&§%$ ¥Æ'¦Ø14<*$ ,’,($ †7))-ëìꞜœ<׿òŸm;yêÔÀà`]}#\,3+7#3g_FvzFVÚ¾,Sˆx”’Ãㄤ”ø4ŽJƒÃ‚BaØ­¨¤´£³ëÌ™3çúׇ·S§N WVUçææä îeåäefç ˆY9YÙyx>'¯ûäååçåãùþ2tÎ:…œ@ASÑ? æ·7(;'ï<Ê9m_~ùåÁƒãÈP…%ŒHAˆˆpâ’â’²Òýå°XiYqÉþ¢âÒ¢Råû ê<~Ë<484BÑ×?–•Û××®OÏ·z;}útOoyE•ŽHAa10••WÂ+*À°þ…YXˆ"‡Â7‘4]÷†È}üÂ#£Tל>ï’Ú ì !tD`eåUªkkjêªkêð ê@Í7 QÄXDW¢·ïހÀ|¹cÇfÎõ™;÷ÛéÓgÚ;:C&@5µu MP/0T ç"R. ½|üaˆêǎ;×gñÜlÐ=½} "pà/56575·66µ€à· "B+4R¤qo@peÕ\ŠçúŒ~£ÛÈÈh}}#p"õ -­íÜÚš[Zç€âyáŸèéåóðòñðdæã»72:6" ¥DtjzÆÙ@¤b)R@ôôöójmm;×çõ›ØŽÍ̀b$ pÔp …@ kkïhmë°bfVNDd´¯_Àf‡­«×¬]õ—÷ædŸ­]¿~ÃfW7$ 50š+DªAWD/ß„Ääééés}Ž¿® eÂððáA–è›;;»;»z cPsÙ1'7?4,b‡³Ë~2Wd¶íãO>Å•àíãrÞ~ˆpFè$ Gq§OEeÕ¹>Ù¿Í?ÞÖÖÑÐØL8ðà»z»º{f…˜_Päãë¿æÓu6¼òÖÊ'þôâ²Wž¾ý™mö­úÏvûò«¯úú…CØ ã¯mˆyù.»\§§Ôpædkñ•,¹ò‚¯ºàÁ«/xèê–’]sÁÃ’á_z;`7ìŒCp aå@q1€&|Ùø¹[·CÙΈˆJÝ=¼‹JJq ŸkóÜNž< 4¡ÀhxddxdthxÄÄä”´›¶Áýæ©E?yðj„ì!"uí¿¿ö‚e?g¶üç.ÿÅ…»Ž›úïò_`eO‚qøC*P•&>׉åºÏ7BºÌ 184冀ˆˆzêÔésMcn®:hN!‡‚ µ±°¨dÓf ;d+8ÅO–¨à«ÔàS„Œ`=z³?üòÂÇ`×3{ÜŠÑ«Ø ;ÓQ€é/T *M|G g_üâãFŽÁa¶!Rù/ b¤’sÅÞ ø¦¦¦ETăѱƒÇ·±¾¡i»ÓN,¹þñ».yà*Åãdp‚Ú~©Àzâ¿™=yÃ…OÁ~uáa¿fö´dô^ÂØ ;ÓQ„•€M%÷J| ¸¤Nü8lÙp¶!"¢ ˆÐ9€ø폨ø†GQ±·¯ÿÐÄaØø¡ Sˆ cdÇÒ9ÅIœêhDíIÎtžý¿Ÿåö܍°ïÁž7‰í‰Cžápñ&TÐ|ä: Jî’—</p> <p>hbàÛ‘ÉÎC‡xTì<:<9 ›8<em>< ß)1Saw­Âî:pÌ}TjŒ‡uË^æöÊÿ0•Ûk·êž§hș⭚ÏÞ¨¢T½RqIž(UüɃס–Ñ8ãn÷ï4D|Ÿ#GŽ"¯A±"ßôô1dCSˆí]H"²Î¼lé L«È~GiŽ±»%/îq8Ãßþ7½À½ì%Áú춬 »Ùë£çiìü'+}é–‹š„’åy€\I”ÄW]ô3TrPÝ°Ñྋ™t™ž;„ÁËffŽ;6c ±¤´ì£×ˆ_ˆÄÂ&i•¥×hüîIbÇC¥î•[,Ôˆè¼ûíVÂîøÁ›6 ;`7ìü†Àʁ š„’%°:Ž"®rƒ ºì•§ÅÏY½fíÞÀ¨˜øY!"'BÞ 2é25…° ×DÈ­|3…˜¾/CÎz¬0®GZå×éØ1§C¨D{Y€ãNôºŠŒ¸¼uÇÅoÝyñŸ™]ò6Ù]cÏÓ>؇¨L9Ð×µ(™Wr—4áxÝ…¤sTg¼þñ»…3"¢Bº|W âÓOœ<É_? "Á?~ü„ºé É bJÖ[r•%lB<°|§cG¡Rõ8œJ ,Ö;ÜÞ…ÝÍl•£WßU÷û®‹9S…&ÞÖ‚òVö¡ŠKj9âKB²Š ú û!—=ü+¹Àm—=ƒCOœ8y® âsÏœ9ƒŠ‚ƒÃàj¦ƒÅ¯C¬DNR,Ë¥°ù4Ïwzv</em></p> <p><em><¸¿ª¢¯¿ dÒˆK\Eå scÍãÌø6:̘Ê6vp“v¦Ã‡GG¡+z{Ÿpû{¥–ãJ®]Wˆ *9ãSŠ¼a5#~2û¢ŸÉU¿ËnwkEÛ)T Nà7Ÿrúôé¶6Ö㈤(ñP&!ÊÁSÅw•Š‰OœÏßȲÞË·8„{Jø¬²£ '\Ž£;8ÓÑDÄǬö=áþ!eLŽ¯ËΨfFüüJ‹ñþËïy~¹=ÂFôbÄÆ'"1ñ)==}ˆs-­pÁnülüp#ÄŒŒ,}ðTðqÝB‰O-¼RxíÖŠÚjÆÎßȈÀGìdp4ãcãÌ*vH5ö/½dŠ²§§¿qÏG,]Êßæ5ˆT¹3òˆjø„¢6œúúšBý‰ûËʿ÷ªÆ¦–¦æV@c'P±¬¼Â€ïJ->%ñ)¢gcÅíHõ  àé âÌoqÜ&ÊvV÷‘òÔãSKªV²"8«ë vÚyhVj¶iâÍò¦§¦5ûúžÄîSjáŒoßÅ"*j‘M ruºøJÔ‰¢Øwزîg4B¥š¾ŽXʺݏ«­k¨«oD¤œm#ÄаÑhÆZ]¨l_FÊSÉŠ÷½ªâ“zïÜ‚føT¹b…‘"·Ã‡›ë¯œŸÐÕ××_XXˆ ö•´"û“žÿÛ÷iœQŽ¨zˆBØP‰ÁŠýËþ•H+î{¼L!î ¡!‹ªÐKáÚÍÍ-5µõ€ J ¡2ÄŠÊ*ñ=Y›çý—+eû£¼p ´4«««KKKQ ˆñ¾ Ä÷­AdÂF)1Pìã‡?¦ªžE†»‡·)D1Œ?/¿p¡$ ç±²ªºê@ ¢ìêîÑA¬®©ñ󲥿’ÒW/HîÏ)e;Sà$ ]´øpN@p|ÂõLØ8…ÑáÙÌBSEYVV¶ÿþŽŽS‚ˆ-RÒ¢" ¥Nä-6BÕP,}àŠë¿[ÄR1PJ†ˆX*n¨™šš:7$ „t©¨<ˆM͝]ÝÔš-CtÚ±S–`ñóÁ«ôéïß V8@ÈQîøpN::;mà3u=…mjG¸ÙD‰ü[^^ˆMMMÖ ˆ[¬AdêT­_¾E‘¦"!bé¶íÎòl¢¸+ª¸¤ôì݈äN7÷`ÔoÍ–!æäækô§!~*ê‰~Åm¬~ëÖŠŇsÒÙÙi ܼ­½S±ÅÚë:{kjj©¬¨Äææf bÿ€Q §¼Ä`u"µØ0Us‹šo`Jà%–ʺg„ˆXJ÷'ú¥ª°iY ¢Ž­Ù2ÄÏÖ®·4¿þ¤òÇÏï='ÒßmL³!ý1Æر¢UU¢m‚:OÔQm±áª†%Dc,½ÿrÑÚæà¸]7ï A„IJòŠ³qC8 ®>k 6·°¶PÄ”Ôt1ÎS¦?Y¿ƒ6~jÒŸ„ïC†ïÇŸ<ÐÙÙ%)OCð”#§.l9:yT¶©#dSS_šdf9¤¥¹åÀj‚8+Á¯ŒÂæ=QìKªÆKÕâºôák/XråO¼NHxœ"|“n÷FÝqòäü;ñ¿øâÀ*)-DȨPjЖ!Zq@¡?¥ø)ÒÔáŸãûˆá»t5'¨-¬á“sÜ¬àŽªfJ“Ž­©©…J#ˆ8cöBP!¾/ Ê Q©-º”j¸¤ÝO[·g DqÏ>NõWóª Ù˜'àzÅ%û±¶*¦U1#3[€úS-´éð-úñÇ÷ߥkƒ ¦Ée6K-óY,½‰±‘%Í’«.Y|µÈ†tW”"jCš=#m_æ©S§æá†ø†ÃÃ#…E¥EÅ¥ˆ¢¨©KB†¸mûÈÌ-l|éOmü$ õ"ð]úéx´Q|ŠÆ1=>«ì,°¦¦MGG!«¢œkkëfffæ1Î÷ߌ±”t)~>IJÙpç.Wã\p JS  '>|x®-¥Ô[[ßPPXˆ4S"Ô© RÔ: "`HJñSJ—®¾Å—~¶¤‹Ôâ›°Ÿ`'HM6£šòŒåÀÀ@CCƒžØÓÓ348„¯sôèQÄ"{ J ‘ÅRE—šº!²áb– Emh:¡Ÿ˜Çæ@u 2Úœ‚øôôta1M©TRS[‚:ˆ~þ–PvÀ'ŒÈéOKü>‹^úÙƒŒ Yüäø&'fç73›)(q`gª‰</em></p> <p></body></div> <div><html xmlns="http://www.w3.org/1999/xhtml"><head><title/></head><body id="readabilityBody"> </p> <p>%PDF-1.6 %äãÏÒ 1 0 obj [/PDF/ImageB/ImageC/ImageI/Text] endobj 4 0 obj <</Length 5 0 R /Filter/FlateDecode >> stream xœ endstream endobj 5 0 obj 8 endobj 6 0 obj <</Subtype/Image /Width 150 /Height 150 /BitsPerComponent 8 /ColorSpace/DeviceRGB /Filter/FlateDecode /Length 7 0 R >> stream xœígx]ŵ÷!!›póá^¾¼onè á’¼¸@hƒ &6„zÁÀIè6ظɲ-˲%Y]Vï½Z½ËjVï½Ë²lÉr’ûþgÖÞsf—st$ ‰÷³=Gçì}ÊþíµÖÍ̞ùßÿ=¿ßÎoç·óÛùíüv~;¿ßÎosޞjk﬩­/.-ËÍ/ŒOLŽKHŽOŠ‰KŒŽM€EÅÄGFÇEDņGÆÀÂ"¢³sóaûË*êšpøää‘sý;þ…¶écÇúúªkëò ŠSÓ3SÒ2RR÷%§¦'¥¤'&§%$ ¥Æ'¦Ø14<*$ ,’,($ †7))-ëìꞜœ<׿òŸm;yêÔÀà`]}#\,3+7#3g_FvzFVÚ¾,Sˆx”’Ãㄤ”ø4ŽJƒÃ‚BaØ­¨¤´£³ëÌ™3çúׇ·S§N WVUçææä îeåäefç ˆY9YÙyx>'¯ûäååçåãùþ2tÎ:…œ@ASÑ? æ·7(;'ï<Ê9m_~ùåÁƒãÈP…%ŒHAˆˆpâ’â’²Òýå°XiYqÉþ¢âÒ¢Råû ê<~Ë<484BÑ×?–•Û××®OÏ·z;}útOoyE•ŽHAa10••WÂ+*À°þ…YXˆ"‡Â7‘4]÷†È}üÂ#£Tל>ï’Ú ì !tD`eåUªkkjêªkêð ê@Í7 QÄXDW¢·ïހÀ|¹cÇfÎõ™;÷ÛéÓgÚ;:C&@5µu MP/0T ç"R. ½|üaˆêǎ;×gñÜlÐ=½} "pà/56575·66µ€à· "B+4R¤qo@peÕ\ŠçúŒ~£ÛÈÈh}}#p"õ -­íÜÚš[Zç€âyáŸèéåóðòñðdæã»72:6" ¥DtjzÆÙ@¤b)R@ôôöójmm;×çõ›ØŽÍ̀b$ pÔp …@ kkïhmë°bfVNDd´¯_Àf‡­«×¬]õ—÷ædŸ­]¿~ÃfW7$ 50š+DªAWD/ß„Ääééés}Ž¿® eÂððáA–è›;;»;»z cPsÙ1'7?4,b‡³Ë~2Wd¶íãO>Å•àíãrÞ~ˆpFè$ Gq§OEeÕ¹>Ù¿Í?ÞÖÖÑÐØL8ðà»z»º{f…˜_Päãë¿æÓu6¼òÖÊ'þôâ²Wž¾ý™mö­úÏvûò«¯úú…CØ ã¯mˆyù.»\§§Ôpædkñ•,¹ò‚¯ºàÁ«/xèê–’]sÁÃ’á_z;`7ìŒCp aå@q1€&|Ùø¹[·CÙΈˆJÝ=¼‹JJq ŸkóÜNž< 4¡ÀhxddxdthxÄÄä”´›¶Áýæ©E?yðj„ì!"uí¿¿ö‚e?g¶üç.ÿÅ…»Ž›úïò_`eO‚qøC*P•&>׉åºÏ7BºÌ 184冀ˆˆzêÔésMcn®:hN!‡‚ µ±°¨dÓf ;d+8ÅO–¨à«ÔàS„Œ`=z³?üòÂÇ`×3{ÜŠÑ«Ø ;ÓQ€é/T *M|G g_üâãFŽÁa¶!Rù/ b¤’sÅÞ ø¦¦¦ETăѱƒÇ·±¾¡i»ÓN,¹þñ».yà*Åãdp‚Ú~©Àzâ¿™=yÃ…OÁ~uáa¿fö´dô^ÂØ ;ÓQ„•€M%÷J| ¸¤Nü8lÙp¶!"¢ ˆÐ9€ø폨ø†GQ±·¯ÿÐÄaØø¡ Sˆ cdÇÒ9ÅIœêhDíIÎtžý¿Ÿåö܍°ïÁž7‰í‰Cžápñ&TÐ|ä: Jî’—</p> <p>hbàÛ‘ÉÎC‡xTì<:<9 ›8<em>< ß)1Saw­Âî:pÌ}TjŒ‡uË^æöÊÿ0•Ûk·êž§hș⭚ÏÞ¨¢T½RqIž(UüɃס–Ñ8ãn÷ï4D|Ÿ#GŽ"¯A±"ßôô1dCSˆí]H"²Î¼lé L«È~GiŽ±»%/îq8Ãßþ7½À½ì%Áú춬 »Ùë£çiìü'+}é–‹š„’åy€\I”ÄW]ô3TrPÝ°Ñྋ™t™ž;„ÁËffŽ;6c ±¤´ì£×ˆ_ˆÄÂ&i•¥×hüîIbÇC¥î•[,Ôˆè¼ûíVÂîøÁ›6 ;`7ìü†Àʁ š„’%°:Ž"®rƒ ºì•§ÅÏY½fíÞÀ¨˜øY!"'BÞ 2é25…° ×DÈ­|3…˜¾/CÎz¬0®GZå×éØ1§C¨D{Y€ãNôºŠŒ¸¼uÇÅoÝyñŸ™]ò6Ù]cÏÓ>؇¨L9Ð×µ(™Wr—4áxÝ…¤sTg¼þñ»…3"¢Bº|W âÓOœ<É_? "Á?~ü„ºé É bJÖ[r•%lB<°|§cG¡Rõ8œJ ,Ö;ÜÞ…ÝÍl•£WßU÷û®‹9S…&ÞÖ‚òVö¡ŠKj9âKB²Š ú û!—=ü+¹Àm—=ƒCOœ8y® âsÏœ9ƒŠ‚ƒÃàj¦ƒÅ¯C¬DNR,Ë¥°ù4Ïwzv</em></p> <p><em><¸¿ª¢¯¿ dÒˆK\Eå scÍãÌø6:̘Ê6vp“v¦Ã‡GG¡+z{Ÿpû{¥–ãJ®]Wˆ *9ãSŠ¼a5#~2û¢ŸÉU¿ËnwkEÛ)T Nà7Ÿrúôé¶6Ö㈤(ñP&!ÊÁSÅw•Š‰OœÏßȲÞË·8„{Jø¬²£ '\Ž£;8ÓÑDÄǬö=áþ!eLŽ¯ËΨfFüüJ‹ñþËïy~¹=ÂFôbÄÆ'"1ñ)==}ˆs-­pÁnülüp#ÄŒŒ,}ðTðqÝB‰O-¼RxíÖŠÚjÆÎßȈÀGìdp4ãcãÌ*vH5ö/½dŠ²§§¿qÏG,]Êßæ5ˆT¹3òˆjø„¢6œúúšBý‰ûËʿ÷ªÆ¦–¦æV@c'P±¬¼Â€ïJ->%ñ)¢gcÅíHõ  àé âÌoqÜ&ÊvV÷‘òÔãSKªV²"8«ë vÚyhVj¶iâÍò¦§¦5ûúžÄîSjáŒoßÅ"*j‘M ruºøJÔ‰¢Øwزîg4B¥š¾ŽXʺݏ«­k¨«oD¤œm#ÄаÑhÆZ]¨l_FÊSÉŠ÷½ªâ“zïÜ‚føT¹b…‘"·Ã‡›ë¯œŸÐÕ××_XXˆ ö•´"û“žÿÛ÷iœQŽ¨zˆBØP‰ÁŠýËþ•H+î{¼L!î ¡!‹ªÐKáÚÍÍ-5µõ€ J ¡2ÄŠÊ*ñ=Y›çý—+eû£¼p ´4«««KKKQ ˆñ¾ Ä÷­AdÂF)1Pìã‡?¦ªžE†»‡·)D1Œ?/¿p¡$ ç±²ªºê@ ¢ìêîÑA¬®©ñ󲥿’ÒW/HîÏ)e;Sà$ ]´øpN@p|ÂõLØ8…ÑáÙÌBSEYVV¶ÿþŽŽS‚ˆ-RÒ¢" ¥Nä-6BÕP,}àŠë¿[ÄR1PJ†ˆX*n¨™šš:7$ „t©¨<ˆM͝]ÝÔš-CtÚ±S–`ñóÁ«ôéïß V8@ÈQîøpN::;mà3u=…mjG¸ÙD‰ü[^^ˆMMMÖ ˆ[¬AdêT­_¾E‘¦"!bé¶íÎòl¢¸+ª¸¤ôì݈äN7÷`ÔoÍ–!æäækô§!~*ê‰~Åm¬~ëÖŠŇsÒÙÙi ܼ­½S±ÅÚë:{kjj©¬¨Äææf bÿ€Q §¼Ä`u"µØ0Us‹šo`Jà%–ʺg„ˆXJ÷'ú¥ª°iY ¢Ž­Ù2ÄÏÖ®·4¿þ¤òÇÏï='ÒßmL³!ý1Æر¢UU¢m‚:OÔQm±áª†%Dc,½ÿrÑÚæà¸]7ï A„IJòŠ³qC8 ®>k 6·°¶PÄ”Ôt1ÎS¦?Y¿ƒ6~jÒŸ„ïC†ïÇŸ<ÐÙÙ%)OCð”#§.l9:yT¶©#dSS_šdf9¤¥¹åÀj‚8+Á¯ŒÂæ=QìKªÆKÕâºôák/XråO¼NHxœ"|“n÷FÝqòäü;ñ¿øâÀ*)-DȨPjЖ!Zq@¡?¥ø)ÒÔáŸãûˆá»t5'¨-¬á“sÜ¬àŽªfJ“Ž­©©…J#ˆ8cöBP!¾/ Ê Q©-º”j¸¤ÝO[·g DqÏ>NõWóª Ù˜'àzÅ%û±¶*¦U1#3[€úS-´éð-úñÇ÷ߥkƒ ¦Ée6K-óY,½‰±‘%Í’«.Y|µÈ†tW”"jCš=#m_æ©S§æá†ø†ÃÃ#…E¥EÅ¥ˆ¢¨©KB†¸mûÈÌ-l|éOmü$ õ"ð]úéx´Q|ŠÆ1=>«ì,°¦¦MGG!«¢œkkëfffæ1Î÷ߌ±”t)~>IJÙpç.Wã\p JS  '>|x®-¥Ô[[ßPPXˆ4S"Ô© RÔ: "`HJñSJ—®¾Å—~¶¤‹Ôâ›°Ÿ`'HM6£šòŒåÀÀ@CCƒžØÓÓ348„¯sôèQÄ"{ J ‘ÅRE—šº!²áb– Emh:¡Ÿ˜Çæ@u 2Úœ‚øôôta1M©TRS[‚:ˆ~þ–PvÀ'ŒÈéOKü>‹^úÙƒŒ Yüäø&'fç73›)(q`gª‰</em></p> <p></body></html></div> <p><img src="http://pixel.quantserve.com/pixel/p-89EKCgBk8MZdE.gif" border="0" height="1" width="1" /><br /> <a rel="nofollow" href="https://www.sans.org/reading-room/whitepapers/auditing/checklist-audit-docker-containers-37437">SANS Information Security Reading Room</a></p> <!-- /article-content --> </div> <div class="cleared"></div> <div class="romeo-postfootericons romeo-metadata-icons"><span class="romeo-postcategoryicon"><span class="categories">Posted in</span> <a href="http://www.ineedachick.com/category/uncategorized/" rel="category tag">Uncategorized</a></span> | <span class="romeo-posttagicon"><span class="tags">Tagged</span> <a href="http://www.ineedachick.com/tag/audit/" rel="tag">Audit</a>, <a href="http://www.ineedachick.com/tag/checklist/" rel="tag">Checklist</a>, <a href="http://www.ineedachick.com/tag/containers/" rel="tag">Containers</a>, <a href="http://www.ineedachick.com/tag/docker/" rel="tag">Docker</a></span> | <span class="romeo-postcommentsicon"><a href="http://www.ineedachick.com/a-checklist-for-audit-of-docker-containers/#respond" rel="nofollow">Leave a comment</a></span></div> </div> <div class="cleared"></div> </div> </div> <div class="romeo-box romeo-post post-2872 post type-post status-publish format-standard hentry category-uncategorized tag-addresses tag-email tag-identifiers tag-leaked tag-names tag-numbers tag-phone tag-portal tag-uber tag-unique" id="post-2872"> <div class="romeo-box-body romeo-post-body"> <div class="romeo-post-inner romeo-article"> <div class="romeo-postmetadataheader"><h2 class="romeo-postheader"><a href="http://www.ineedachick.com/uber-portal-leaked-names-phone-numbers-email-addresses-unique-identifiers/" rel="bookmark" title="Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers">Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers</a></h2><div class="romeo-postheadericons romeo-metadata-icons"><span class="romeo-postdateicon"><span class="date">Published</span> <span class="entry-date" title="9:38 pm">November 24, 2016</span></span> | <span class="romeo-postauthoricon"><span class="author">By</span> <span class="author vcard"><a class="url fn n" href="http://www.ineedachick.com/author/laura/" title="View all posts by Laura">Laura</a></span></span></div></div> <div class="romeo-postcontent"> <!-- article-content --> <div> <h4 class="entry-title">Dyn Confirms DDoS Attack Affecting Twitter, Github, Many Others</h4> <p><span class="date">October 21, 2016 , 10:01 am</span></p> <h4 class="entry-title">IoT Botnets Are The New Normal of DDoS Attacks</h4> <p><span class="date">October 5, 2016 , 8:51 am</span></p> <h4 class="entry-title">Leftover Factory Debugger Doubles as Android Backdoor</h4> <p><span class="date">October 14, 2016 , 9:00 am</span></p> <h4 class="entry-title">Backdoor Found in Firmware of Some Android Devices</h4> <p><span class="date">November 21, 2016 , 3:20 pm</span></p> <h4 class="entry-title">Threatpost News Wrap, November 18, 2016</h4> <p><span class="date">November 18, 2016 , 9:15 am</span></p> <h4 class="entry-title">iPhone Call History Synced to iCloud Without User Consent, Knowledge</h4> <p><span class="date">November 17, 2016 , 1:51 pm</span></p> <h4 class="entry-title">Microsoft Patches Zero Day Disclosed by Google</h4> <p><span class="date">November 8, 2016 , 2:57 pm</span></p> <h4 class="entry-title">Microsoft Says Russian APT Group Behind Zero-Day Attacks</h4> <p><span class="date">November 1, 2016 , 5:50 pm</span></p> <h4 class="entry-title">Google to Make Certificate Transparency Mandatory By 2017</h4> <p><span class="date">October 29, 2016 , 6:00 am</span></p> <h4 class="entry-title">Microsoft Extends Malicious Macro Protection to Office 2013</h4> <p><span class="date">October 27, 2016 , 4:27 pm</span></p> <h4 class="entry-title">Dyn DDoS Work of Script Kiddies, Not Politically Motivated Hackers</h4> <p><span class="date">October 25, 2016 , 3:00 pm</span></p> <h4 class="entry-title">Mirai-Fueled IoT Botnet Behind DDoS Attacks on DNS Providers</h4> <p><span class="date">October 22, 2016 , 6:00 am</span></p> <h4 class="entry-title">FruityArmor APT Group Used Recently Patched Windows Zero Day</h4> <p><span class="date">October 20, 2016 , 7:00 am</span></p> <h4 class="entry-title">Experts ‘Outraged’ by Warrant Demanding Fingerprints to Unlock Smartphones</h4> <p><span class="date">October 18, 2016 , 4:58 pm</span></p> <h4 class="entry-title">Researchers Break MarsJoke Ransomware Encryption</h4> <p><span class="date">October 3, 2016 , 5:00 am</span></p> <h4 class="entry-title">OpenSSL Fixes Critical Bug Introduced by Latest Update</h4> <p><span class="date">September 26, 2016 , 10:45 am</span></p> <h4 class="entry-title">500 Million Yahoo Accounts Stolen By State-Sponsored Hackers</h4> <p><span class="date">September 22, 2016 , 3:47 pm</span></p> <h4 class="entry-title">Yahoo Reportedly to Confirm Breach of Hundreds of Millions of Credentials</h4> <p><span class="date">September 22, 2016 , 12:31 pm</span></p> <h4 class="entry-title">Experts Want Transparency From Government’s Vulnerabilities Equities Process</h4> <p><span class="date">September 20, 2016 , 2:41 pm</span></p> <h4 class="entry-title">Bruce Schneier on Probing Attacks Testing Core Internet Infrastructure</h4> <p><span class="date">September 15, 2016 , 11:15 am</span></p> <h4 class="entry-title">Generic OS X Malware Detection Method Explained</h4> <p><span class="date">September 13, 2016 , 9:14 am</span></p> <h4 class="entry-title">Patched Android Libutils Vulnerability Harkens Back to Stagefright</h4> <p><span class="date">September 9, 2016 , 2:06 pm</span></p> <h4 class="entry-title">Chrome to Label Some HTTP Sites ‘Not Secure’ in 2017</h4> <p><span class="date">September 8, 2016 , 3:43 pm</span></p> <h4 class="entry-title">Threatpost News Wrap, September 2, 2016</h4> <p><span class="date">September 2, 2016 , 9:00 am</span></p> <h4 class="entry-title">Insecure Redis Instances at Core of Attacks Against Linux Servers</h4> <p><span class="date">September 1, 2016 , 1:08 pm</span></p> <h4 class="entry-title">Dropbox Forces Password Reset for Older Users</h4> <p><span class="date">August 29, 2016 , 9:58 am</span></p> <h4 class="entry-title">Cisco Begins Patching Equation Group ASA Zero Day</h4> <p><span class="date">August 24, 2016 , 5:53 pm</span></p> <h4 class="entry-title">New Collision Attacks Against 3DES, Blowfish Allow for Cookie Decryption</h4> <p><span class="date">August 24, 2016 , 8:00 am</span></p> <h4 class="entry-title">Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers</h4> <p><span class="date">August 17, 2016 , 4:06 pm</span></p> <h4 class="entry-title">Pokémon GO Spam, Ransomware, On the Rise</h4> <p><span class="date">August 17, 2016 , 12:58 pm</span></p> <h4 class="entry-title">ProjectSauron APT On Par With Equation, Flame, Duqu</h4> <p><span class="date">August 8, 2016 , 1:40 pm</span></p> <h4 class="entry-title">Miller, Valasek Deliver Final Car Hacking Talk</h4> <p><span class="date">August 4, 2016 , 3:26 pm</span></p> <h4 class="entry-title">Researchers Go Inside a Business Email Compromise Scam</h4> <p><span class="date">August 4, 2016 , 10:00 am</span></p> <h4 class="entry-title">Export-Grade Crypto Patching Improves</h4> <p><span class="date">August 3, 2016 , 10:00 am</span></p> <h4 class="entry-title">Kaspersky Lab Launches Bug Bounty Program</h4> <p><span class="date">August 2, 2016 , 9:00 am</span></p> <h4 class="entry-title">Threatpost News Wrap, July 29, 2016</h4> <p><span class="date">July 29, 2016 , 10:45 am</span></p> <h4 class="entry-title">KeySniffer Vulnerability Opens Wireless Keyboards to Snooping</h4> <p><span class="date">July 26, 2016 , 9:30 am</span></p> <h4 class="entry-title">Upcoming Tor Design Battles Hidden Services Snooping</h4> <p><span class="date">July 25, 2016 , 3:51 pm</span></p> <h4 class="entry-title">EFF Files Lawsuit Challenging DMCA’s Restrictions on Security Researchers</h4> <p><span class="date">July 21, 2016 , 1:18 pm</span></p> <h4 class="entry-title">Oracle Patches Record 276 Vulnerabilities with July Critical Patch Update</h4> <p><span class="date">July 20, 2016 , 9:21 am</span></p> <h4 class="entry-title">Threatpost News Wrap, July 15, 2016</h4> <p><span class="date">July 15, 2016 , 11:00 am</span></p> <h4 class="entry-title">Academics Build Early-Warning Ransomware Detection System</h4> <p><span class="date">July 14, 2016 , 1:05 pm</span></p> <h4 class="entry-title">xDedic Hacked Server Market Resurfaces on Tor Domain</h4> <p><span class="date">July 12, 2016 , 11:40 am</span></p> <h4 class="entry-title">Conficker Used in New Wave of Hospital IoT Device Attacks</h4> <p><span class="date">June 30, 2016 , 11:48 am</span></p> <h4 class="entry-title">655,000 Healthcare Records Being Sold on Dark Web</h4> <p><span class="date">June 28, 2016 , 10:00 am</span></p> <h4 class="entry-title">Windows Zero Day Selling for $ 90,000</h4> <p><span class="date">May 31, 2016 , 5:44 pm</span></p> <h4 class="entry-title">Millions of Stolen MySpace, Tumblr Credentials Being Sold Online</h4> <p><span class="date">May 31, 2016 , 1:37 pm</span></p> <h4 class="entry-title">OTR Protocol Patched Against Remote Code Execution Flaw</h4> <p><span class="date">March 10, 2016 , 10:23 am</span></p> <h4 class="entry-title">Serious Dirty Cow Linux Vulnerability Under Attack</h4> <p><span class="date">October 21, 2016 , 11:21 am</span></p> <h4 class="entry-title">Facebook Debuts Open Source Detection Tool for Windows</h4> <p><span class="date">September 27, 2016 , 12:24 pm</span></p> <h4 class="entry-title">Popular Android App Leaks Microsoft Exchange User Credentials</h4> <p><span class="date">October 14, 2016 , 8:00 am</span></p> <h4 class="entry-title">Cisco Warns of Critical Flaws in Nexus Switches</h4> <p><span class="date">October 7, 2016 , 10:55 am</span></p> <h4 class="entry-title">Free Tool Protects Mac Users from Webcam Surveillance</h4> <p><span class="date">October 7, 2016 , 7:00 am</span></p> </p></div> <p><img src="http://pixel.quantserve.com/pixel/p-89EKCgBk8MZdE.gif" border="0" height="1" width="1" /><br /> <a rel="nofollow" href="http://threatpost.com/uber-portal-leaked-names-phone-numbers-email-addresses-unique-identifiers/122128/">Threatpost | The first stop for security news</a></p> <!-- /article-content --> </div> <div class="cleared"></div> <div class="romeo-postfootericons romeo-metadata-icons"><span class="romeo-postcategoryicon"><span class="categories">Posted in</span> <a href="http://www.ineedachick.com/category/uncategorized/" rel="category tag">Uncategorized</a></span> | <span class="romeo-posttagicon"><span class="tags">Tagged</span> <a href="http://www.ineedachick.com/tag/addresses/" rel="tag">Addresses</a>, <a href="http://www.ineedachick.com/tag/email/" rel="tag">Email</a>, <a href="http://www.ineedachick.com/tag/identifiers/" rel="tag">Identifiers</a>, <a href="http://www.ineedachick.com/tag/leaked/" rel="tag">leaked</a>, <a href="http://www.ineedachick.com/tag/names/" rel="tag">Names</a>, <a href="http://www.ineedachick.com/tag/numbers/" rel="tag">Numbers</a>, <a href="http://www.ineedachick.com/tag/phone/" rel="tag">phone</a>, <a href="http://www.ineedachick.com/tag/portal/" rel="tag">Portal</a>, <a href="http://www.ineedachick.com/tag/uber/" rel="tag">Uber</a>, <a href="http://www.ineedachick.com/tag/unique/" rel="tag">Unique</a></span> | <span class="romeo-postcommentsicon"><a href="http://www.ineedachick.com/uber-portal-leaked-names-phone-numbers-email-addresses-unique-identifiers/#respond" rel="nofollow">Leave a comment</a></span></div> </div> <div class="cleared"></div> </div> </div> <div class="romeo-box romeo-post post-2747 post type-post status-publish format-standard hentry category-uncategorized tag-disclosure tag-information tag-moodle tag-msa160026 tag-vuln tag-vulnerability" id="post-2747"> <div class="romeo-box-body romeo-post-body"> <div class="romeo-post-inner romeo-article"> <div class="romeo-postmetadataheader"><h2 class="romeo-postheader"><a href="http://www.ineedachick.com/vuln-moodle-msa-16-0026-information-disclosure-vulnerability/" rel="bookmark" title="Vuln: Moodle MSA-16-0026 Information Disclosure Vulnerability">Vuln: Moodle MSA-16-0026 Information Disclosure Vulnerability</a></h2><div class="romeo-postheadericons romeo-metadata-icons"><span class="romeo-postdateicon"><span class="date">Published</span> <span class="entry-date" title="8:41 am">November 22, 2016</span></span> | <span class="romeo-postauthoricon"><span class="author">By</span> <span class="author vcard"><a class="url fn n" href="http://www.ineedachick.com/author/laura/" title="View all posts by Laura">Laura</a></span></span></div></div> <div class="romeo-postcontent"> <!-- article-content --> <div id=""> <td><span class="label">Vulnerable:</span></td> <td>Moodle Moodle 3.1.2<br />Moodle Moodle 3.1.1<br />Moodle Moodle 3.0.6<br />Moodle Moodle 3.0.5<br />Moodle Moodle 3.0.4<br />Moodle Moodle 3.0.3<br />Moodle Moodle 3.0.2<br />Moodle Moodle 3.0.1<br />Moodle Moodle 2.9.8<br />Moodle Moodle 2.9.7<br />Moodle Moodle 2.9.6<br />Moodle Moodle 2.9.5<br />Moodle Moodle 2.9.4<br />Moodle Moodle 2.9.3<br />Moodle Moodle 2.9.1<br />Moodle Moodle 3.1<br />Moodle Moodle 3.0<br />Moodle Moodle 2.9.2<br />Moodle Moodle 2.9</td> </p></div> <p><img src="http://pixel.quantserve.com/pixel/p-89EKCgBk8MZdE.gif" border="0" height="1" width="1" /><br /> <a rel="nofollow" href="http://www.securityfocus.com/bid/94456">SecurityFocus Vulnerabilities</a></p> <!-- /article-content --> </div> <div class="cleared"></div> <div class="romeo-postfootericons romeo-metadata-icons"><span class="romeo-postcategoryicon"><span class="categories">Posted in</span> <a href="http://www.ineedachick.com/category/uncategorized/" rel="category tag">Uncategorized</a></span> | <span class="romeo-posttagicon"><span class="tags">Tagged</span> <a href="http://www.ineedachick.com/tag/disclosure/" rel="tag">Disclosure</a>, <a href="http://www.ineedachick.com/tag/information/" rel="tag">Information</a>, <a href="http://www.ineedachick.com/tag/moodle/" rel="tag">Moodle</a>, <a href="http://www.ineedachick.com/tag/msa160026/" rel="tag">MSA160026</a>, <a href="http://www.ineedachick.com/tag/vuln/" rel="tag">Vuln</a>, <a href="http://www.ineedachick.com/tag/vulnerability/" rel="tag">Vulnerability</a></span> | <span class="romeo-postcommentsicon"><a href="http://www.ineedachick.com/vuln-moodle-msa-16-0026-information-disclosure-vulnerability/#respond" rel="nofollow">Leave a comment</a></span></div> </div> <div class="cleared"></div> </div> </div> <div class="romeo-box romeo-post post-2652 post type-post status-publish format-standard hentry category-uncategorized tag-firefox tag-usn31241 tag-vulnerabilities" id="post-2652"> <div class="romeo-box-body romeo-post-body"> <div class="romeo-post-inner romeo-article"> <div class="romeo-postmetadataheader"><h2 class="romeo-postheader"><a href="http://www.ineedachick.com/usn-3124-1-firefox-vulnerabilities/" rel="bookmark" title="USN-3124-1: Firefox vulnerabilities">USN-3124-1: Firefox vulnerabilities</a></h2><div class="romeo-postheadericons romeo-metadata-icons"><span class="romeo-postdateicon"><span class="date">Published</span> <span class="entry-date" title="7:42 pm">November 19, 2016</span></span> | <span class="romeo-postauthoricon"><span class="author">By</span> <span class="author vcard"><a class="url fn n" href="http://www.ineedachick.com/author/laura/" title="View all posts by Laura">Laura</a></span></span></div></div> <div class="romeo-postcontent"> <!-- article-content --> <div><html xmlns="http://www.w3.org/1999/xhtml" class="no-js" lang="en" dir="ltr"><head><meta charset="UTF-8"/><meta name="description" content=""/><meta name="keywords" content=""/><meta name="author" content="Canonical"/><meta name="viewport" content="width=device-width, initial-scale=1"/><title>USN-3124-1: Firefox vulnerabilities | Ubuntu

Jump to site nav

  • Jump to content
  • Cloud
    • Overview
    • Ubuntu OpenStack
    • Public cloud
    • Cloud tools
    • Cloud management
    • Ecosystem
    • Cloud labs
  • Server
    • Overview
    • Server management
    • Hyperscale
  • Desktop
    • Overview
    • Features
    • For business
    • For developers
    • Take the tour
    • Desktop management
    • Ubuntu Kylin
  • Phone
    • Overview
    • Features
    • Scopes
    • App ecosystem
    • Operators and OEMs
    • Carrier Advisory Group
    • Ubuntu for Android
  • Tablet
    • Design
    • Operators and OEMs
    • App ecosystem
  • TV
    • Overview
    • Experience
    • Industry
    • Contributors
    • Features and specs
    • Commercial info
  • Management
    • Overview
    • Landscape features
    • Working with Landscape
    • Return on investment
    • Compliance
    • Ubuntu Advantage
  • Download
    • Overview
    • Cloud
    • Server
    • Desktop
    • Ubuntu Kylin
    • Alternative downloads


Ubuntu Security Notices

Three UK, a telecom and ISP operating in the United Kingdom, has suffered a data breach. According to Three’s status report on the investigation, the attackers were able to access the company’s customer upgrade system by using login credentials of an employee, and their goal was to steal high-end smartphones.

three data breach

“Over the last four weeks Three has seen an increasing level of attempted handset fraud. This has been visible through higher levels of burglaries of retail stores and attempts to unlawfully intercept upgrade devices,” the company explained.

“We’ve been working closely with the Police and relevant authorities. To date, we have confirmed approximately 400 high value handsets have been stolen through burglaries and 8 devices have been illegally obtained through the upgrade activity.”

There is no mention of how many customers were affected, how long the perpetrators had access to the data (customer names, addresses, phone numbers, and dates of birth), nor whether they have exfiltrated any of it.

The company reassured users that customers’ payment card or bank account information was not accessed nor compromised, and that they will be contacting affected customers as soon as possible.

According to The Telegraph, the National Crime Agency is investigating the breach and they have already arrested three people in connection to it. Two men are suspected of computer misuse offences, while the third one of attempting to pervert the course of justice.

“It appears the vulnerability came from a legitimate employee log-in, which provided the gang with easy access to critical information. On top of this, it bought them valuable time before anyone at Three noticed the unusual behaviour. These are both factors why an insider threat can prove far more dangerous than brute-forcing your way into a network. Any log-in or access details need to be strictly monitored by companies to prevent these kinds of attacks happening,” Jason Allaway, VP of UK & Ireland at RES, commented for Help Net Security.

“I believe this points to an issue with the on- and off-boarding processes at Three. Such issues should be addressed by refining and automating such processes to ensure they are protected against risk. New joiners should be granted the correct access, and leavers should be stripped of access entirely. If companies secure the lifecycle, new joiners and those exiting the company will not expose an access point leaving open the door to an opportunistic cybercriminal.”

Hopefully, the attackers didn’t exfiltrate customers’ information and didn’t sell it on to other fraudsters. But, just in case, customers should be alert to phishing emails and calls from fraudsters claiming to be Three or other ‘associated’ companies.

“The compromised data included dates of birth, information which is often used as a security question. Such information is actually easily obtainable, so all consumers, not just Three’s customers, shouldn’t presume callers are legitimate for knowing it,” says Nigel Hawthorn, chief European spokesperson at Skyhigh Networks.

John Madelin, CEO at cybersecurity experts RelianceACSN, says that the most worrying thing about the Three breach is that it has been discovered by third parties.

“In this case they were only alerted to it once customers themselves started to complain about scam callers. The reality is we don’t know how long the hackers were in Three’s network, but the average time to discover an intrusion is 205 days. Three should have spotted this sooner, and it’s a case of understanding the threat vectors as this appears to be an insider threat. In the wake of the TalkTalk hack Three really should have done better,” he added.


Help Net Security

Semiconductor and telecommunications giant Qualcomm Technologies, Inc. (QTI) announced on Thursday the launch of a bug bounty program with rewards of up to $ 15,000 for each vulnerability found in its products.

Hundreds of millions of Android devices have been exposed to attacks in the past months due to vulnerabilities in Qualcomm components, including the recently disclosed security bugs known as QuadRooter.

The company is hoping that researchers can find these types of flaws faster than the bad guys so it has launched a new HackerOne-powered bug bounty program that promises both money and recognition.

The program covers several Snapdragon chipset families used in smartphones and tablets from Google, LG, Motorola, Sony, Asus, HTC, Samsung, Microsoft, BlackBerry and others.

Qualcomm is particularly interested in vulnerabilities affecting the Linux kernel code in “Android for MSM” (version 3.14 or newer), the bootloader, cellular modems, WLAN and Bluetooth firmware, programs running with root or system privileges, and the Qualcomm Secure Execution Environment (QSEE) on Trustzone.

The highest reward, up to $ 15,000, can be earned for critical vulnerabilities in cellular modems. Critical flaws in QSEE and the bootloader can earn hackers $ 9,000, while application processor software weaknesses are rewarded with up to $ 8,000.

High-severity vulnerabilities are worth up to $ 5,000 if they affect cellular modems, the trusted execution environment or the bootloader, and up to $ 4,000 if they impact application processor software. The maximum reward for medium- and low-severity flaws is $ 2,000 and $ 1,000, respectively.

Qualcomm pointed out that critical vulnerabilities include remote code execution, permanent remote denial-of-service (DoS) attacks, and bypassing or disabling important security systems. Local privilege escalation, confidential device or user information disclosure, and temporary remote DoS attacks are rated high severity.

Depending on the nature of the security holes, experts who submit eligible reports will also be mentioned in the QTI Product Security Hall of Fame or the CodeAuroraForum Hall of Fame.

The company said it will not reward local DoS issues or vulnerabilities caused by device manufacturer misconfigurations or OEM modifications.

The program is invitation-only, but more than 40 researchers who disclosed vulnerabilities in the past have already been asked to participate. Qualcomm plans on gradually inviting other security experts.

Related: Identity Management Firm Okta Launches Bug Bounty Program

Related: Researchers Bypass ASLR via Hardware Vulnerability

Related: Researchers Leverage RKP Module to Bypass Samsung KNOX

view counter

Previous Columns by Eduard Kovacs:

Tags:


SecurityWeek RSS Feed

Computer science researchers at the University of Washington are developing a technology to securely send data through the human body rather than wires or the air.

Passwords sent over insecure networks are liable to sniffing. This well-understood problem is most easily mitigated against using VPN technology but now security academics have taken a left-field approach to the same problem which also guards against the risk of vulnerabilities in custom radio protocols for wearables and implantables.

The technology would work in conjunction with fingerprint sensors in the latest generation of smartphones.

One use cited is opening a door fitted with an electronic smart lock. A user would touch the doorknob and the fingerprint sensor on their smartphone at the same time, with their credentials been transmitted through their body rather than over the air.

The technology is not restricted by body type or posture, as a research paper by the researchers (abstract below) explains:

We show for the first time that commodity devices can be used to generate wireless data transmissions that are confined to the human body. Specifically, we show that commodity input devices such as fingerprint sensors and touchpads can be used to transmit information to only wireless receivers that are in contact with the body.

We characterize the propagation of the resulting transmissions across the whole body and run experiments with ten subjects to demonstrate that our approach generalizes across different body types and postures. We also evaluate our communication system in the presence of interference from other wearable devices such as smartwatches and nearby metallic surfaces. Finally, by modulating the operations of these input devices, we demonstrate bit rates of up to 50 bits per second over the human body.

The approach works because fingerprint sensors “produce characteristic electromagnetic signals at frequencies below 10 MHz” that propagate well through the human body.

The researchers ran tests using iPhone 5s and iPhone 6s fingerprint sensors, the Verifi P5100 USB fingerprint scanner, and both Lenovo T440s and Adafruit touch pads. Interference from wearable or metallic objects a users might have about them (such as watches) wasn’t a problem. The data transmission rate achieved of just 25 bits per second, or “less than a quarter the speed of a 1950s modem”, as security blogger Bill Camarda notes, might well be a limitation though.

“It’s a long way from a university research lab to your body, but if this proves out, multiple applications are possible,” Camarda adds in a post on the Sophos Naked Security blog.

“Instead of manually typing in a secret serial number or password for wirelessly pairing medical devices such as glucose or blood pressure monitors with smartphones, a smartphone could directly transmit arbitrary secret keys through the human body.

Of course, having your body as the transmission medium brings a whole new set of security concerns about man-in-the-middle attacks,” he concludes. ®

Sponsored: Fast data protection ROI?


The Register - Security

Vulnerabilities, Backdoor Found in D-Link DWR-932B LTE Router

Security researchers have discovered numerous unpatched security vulnerabilities in the D-Link DWR-932B LTE router / access point, including backdoor accounts and default Wi-Fi Protected Setup (WPS) PIN.

The device is being sold in various countries and appears to be customers’ security nightmare because of the numerous security weaknesses. The vulnerabilities were discovered by Pierre Kim, who decided to reveal only the most significant of them, and who says that the issues affect even the latest firmware version released by the vendor.

Earlier this year, Kim disclosed numerous unpatched vulnerabilities affecting the LTE QDH routers made by Quanta, including backdoors, hardcoded PIN, flaws in the web interface, remote code execution issue, and other bugs. The flaws that impact D-Link’s router are similar to those found in Quanta’s device, it seems.

The researcher discovered two backdoor accounts on the device and says that they can be used to bypass the HTTP authentication used to manage the router. There is an “admin” account with password “admin,” as well as a “root” account, with password “1234.” By default, telnetd and SSHd are running on D-Link DWR-932B, yet the latter isn’t documented, the researcher also explains.

Next, there is a backdoor inside the /bin/appmgr program, which allows an attacker to send a specific string in UDP to the router to start an authentication-less telnet server (if a telnetd daemon is not already running). The issue is that the router listens to 0.0.0.0:39889 (UDP) for commands and that it allows access without authentication as root if “HELODBG” is received as command.

D-Link DWR-932B also comes with 28296607 as the default WPS PIN, and has it hardcoded in the /bin/appmgr program. The HostAP configuration contains the PIN as well, and so do the HTTP APIs. What’s more, although the router allows the user to generate a temp PIN for the WPS system, the PIN is weak and uses an algorithm leveraging srand(time(0)) as seed. An attacker knowing the current date as time(0) can generate valid WPS PIN suites and brute-force them, the researcher explains.

Kim also reveals that the file /etc/inadyn-mt.conf contains a user and a hardcoded password, and that the HTTP daemon /bin/qmiweb contains multiple vulnerabilities as well. The router also executes strange, purposeless shell commands as root.

Furthermore, the router supports remote FOTA (Firmware Over The Air) and contains the credentials to contact the server hardcoded in the /sbin/fotad binary, as base64-strings. The researcher discovered that, although the FOTA daemon tries to retrieve the firmware over HTTPS, the SSL certificate has been invalid for one year and a half.

The researcher also reveals that the security level of the UPNP program (miniupnp) in the router is lowered, which allows an attacker located in the LAN area to add Port forwarding from the Internet to other clients located in the LAN. “There is no restriction about the UPnP permission rules in the configuration file, contrary to common usage in UPnP where it is advised to only allow redirection of port above 1024,” Kim notes.

Because of this lack of permission rules, an attacker can forward everything from the WAN into the LAN, the researcher says. This means that they can set rules to allow traffic from the Internet to local Exchange servers, mail servers, FTP servers, HTTP servers, database servers, and the like.

An attacker can overwrite the router’s firmware with a custom firmware if they wanted to, “but with all these vulnerabilities present in the default firmware, I don't think it is worth making the effort,” Kim says. He also notes that, because the device has a sizable memory (168 MB), a decent CPU, and good free space (235 MB), along with complete toolkits installed by default, users should consider trashing it, “because it's trivial for an attacker to use this router as an attack vector.”

D-Link was informed on these issues in June, but the company failed to resolve them until now. Because 90 days have passed since the vulnerabilities were disclosed to the vendor, Kim decided to publish an advisory to reveal these bugs.

This is not the first time D-Link products have made it to the headline due to security vulnerabilities. The company patched a critical flaw in several DIR model routers in August, after a popular D-Link Wi-Fi camera was found in June to be affected by a serious flaw that was subsequently discovered in over 120 D-Link products.

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Tags:


SecurityWeek RSS Feed