|
SecLists.Org Security Mailing List Archive
Any hacker will tell you that the latest news and exploits are not
found on any web site—not even Insecure.Org. No, the cutting edge
in security research is and will continue to be the full
disclosure mailing lists such as Bugtraq. Here we provide web
archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. Browse the individual lists below, or search them all:
Nmap Development — Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects. Subscribe here.
802.11 Management Frames in npcap
David Burkett (Oct 21)
I'm trying to send 802.11 management frames like associate and authenticate
using npcap in Windows 7/10. My packets all end up getting changed to data
frames instead.
Is this something npcap supports? If not, is anyone aware of a library that
does support sending management frames from Windows?
Thanks,
David Burkett
How to find out if SMTP mailserver supports STARTTLS or (only) SSL/TLS ?
Ben Stover via dev (Oct 20)
Assume a (remote) smtp mailserver smtp.foobar.com listens either on port 465 or port 587.
How can I find out (with nmap/netcat) if this smtp mailserver supports STARTTLS protocol or (only) SSL/TLS?
Or both ?
Thank you
Ben
Re: Challenge identifying mainframe port
David Fifield (Oct 20)
It's running the tn3270 probe, but it looks like there are no match
lines for this specific response. The first three bytes here are
"\xff\xfd\x2e". The match lines in nmap-service-probes (r37060) start
with "\xff\xfd\x18".
Under the NULL probe there are also "\xff\xfd\x1d" and "\xff\xfd\x28",
but no "\xff\xfd\x2e".
Challenge identifying mainframe port
Phil (Oct 20)
Hi Dev,
I’m testing a mainframe and this looks like it should be triggering the tn3270 service detection but doesn’t work. I
worked previously (sorry I can’t get more specific than ‘previously’). Any suggestions on what I could change to make
this work?
Re: How to connect to smtp mail server with ncat or nmap?
Mak Kolybabi via dev (Oct 20)
To connect to 587 (SMTP Submission):
ncat smtp.gmail.com 587
To connect to 465 (SMTP over SSL/TLS):
ncat --ssl smtp.gmail.com 465
How to connect to smtp mail server with ncat or nmap?
Ben Stover via dev (Oct 20)
How can I start a conversation from cmdline with a remote smtp mailserver lets say
mail.foobar.com at port 587
What is better for this task ncat or nmap?
Ben
Re: dev Digest, Vol 150, Issue 18
Md. Tariq Aziz (Oct 17)
static build on Linux
Levente Laszlo (Oct 16)
Hi,
I would like to make a static build of Nmap (actually I just need a static
Ncat binary).
I am on Ubuntu 16.04 but I can build on CentOS/Arch/etc as well.
I have not found a lot of documentations on the web or in the list
archive...
https://blog.zsec.uk/staticnmap/
This is a post from May 2016 with version 7.11
When I tried the same (with ncat of course), with v7.60 I got an error too:...
Re: Talk on NSE's use of coroutines at Lua Workshop 2017
Fyodor (Oct 16)
On Wed, Oct 4, 2017 at 5:06 PM, Patrick Donnelly <batrick () batbytes com>
wrote:
Nice! I hope the talk goes well (looks like it starts in 30 minutes) and
I'm looking forward to the video!
Cheers,
Fyodor
Re: Crash Report
Daniel Miller (Oct 10)
Ron,
Thanks for the bug report. Can you verify whether that file exists? It's
possible there is a problem with your Nmap installation.
Dan
Re: Crash Report
Daniel Miller (Oct 10)
Pia,
Thanks for reporting this. The error is caused by a corrupted .pyc file
somewhere in your Python installation. Deleting the file will solve the
error, and importing the problem library as root will recompile it. Since
we don't know which library is the problem, you could run this shell script
as root, which will try each of them:
#!/bin/sh
rm /usr/lib/python2.7/difflib.pyc
python -c 'import difflib'
rm...
Crash Report
Ronald Belill (Oct 09)
Version: 6.47
Traceback (most recent call last):
File "zenmapGUI\ScriptInterface.pyo", line 328, in
script_list_timer_callback
File "zenmapGUI\ScriptInterface.pyo", line 337, in initial_script_list_cb
File "zenmapGUI\ScriptInterface.pyo", line 369, in
handle_initial_script_list_output
File "zenmapCore\ScriptMetadata.pyo", line 495, in get_script_entries
File...
Crash Report
Pia S. Sumalinog (Oct 09)
Version: 7.60
Traceback (most recent call last):
File "/usr/bin/zenmap", line 195, in <module>
zenmapGUI.App.run()
File "/usr/lib/python2.7/dist-packages/zenmapGUI/App.py", line 358, in run
window = new_window()
File "/usr/lib/python2.7/dist-packages/zenmapGUI/App.py", line 194, in new_window
from zenmapGUI.MainWindow import ScanWindow
File...
[MS17-010]
DUMAS Xavier (Oct 09)
Re: nsock READ timeout
Gerald Roy (Oct 09)
Nmap Announce — Moderated list for the most important new releases and announcements regarding the Nmap Security Scanner and related projects. We recommend that all Nmap users subscribe.
Nmap GSoC 2017 Success Reports
Fyodor (Oct 10)
Hello Nmap Community,
Nmap celebrated its 20th birthday last month and we also just completed our
13th Google Summer of Code. We focused on a fairly small team of four
students this year (http://seclists.org/nmap-announce/2017/2), and I'm
happy to report that every one passed! And they all have code integrated
into Nmap 7.60 already, with even more to follow for the next release.
Also this year, for the first time, every student wrote a...
Nmap 7.60 released! SSH support, SMB2/SMB3 improvements, 14 more scripts, new Npcap, GSoC work, and more
Fyodor (Aug 01)
Hello everyone. I'm back from Defcon and excited to announce the new Nmap
7.60 release! It has only been a month and a half since 7.50, but we still
packed a lot into this one. Mostly because we have such an awesome GSoC
team of 8 students and mentors working on so many cool projects. The
program hasn't even ended yet, but much of their work has already been
integrated into this release.
One of the things I'm most excited...
Nmap 7.50 Released! 14 new NSE scripts, 300+ fingerprints, new Npcap, and more
Fyodor (Jun 13)
Dear Nmap Community:
The Nmap project is delighted to announce the release of Nmap 7.50! It is
our first big release since last December and has hundreds of improvements
that we hope you will enjoy.
One of the things we have been worked the hardest on recently is our Npcap
packet capturing driver and library for Windows (https://nmap.org/npcap/).
It is a replacement for WinPcap, which served us well for many years, but
is no longer maintained....
Introducing the 2017 Nmap/Google Summer of Code Team!
Fyodor (May 18)
Nmap community:
Thanks for all of your applications and referrals of talented students to
the Summer of Code program. Google has agreed to sponsor four students to
spend this summer enhancing the Nmap Security Scanner and I'm proud to
introduce our 2017 team! We normally mentor coders working all over the
Nmap/Zenmap/Ncat/Nping spectrum, but this year we're doubling down on the
Nmap Scripting Engine component. All four of our...
Nmap Project Seeking Talented Programmers for GSoC 2017
Fyodor (Mar 27)
Hi folks. I'm delighted to report that Nmap has been accepted by Google to
participate in this year's Summer of Code internship program. This
innovative and extraordinarily generous program provides $5,500 stipends to
college and graduate students anywhere in the world who spend the summer
improving Nmap from home! They gain valuable experience, get paid,
strengthen their résumés, and write code for millions of users. We're one...
Nmap GSoC 2016 Success Report
Fyodor (Feb 07)
Happy belated new year from the Nmap Project! I'd like to take this
opportunity to send you the belated results from our 2016 Summer of Code
team. I was going to send them right after the program finished, but some
of the students were still finishing some great things so I decided to
wait. As you may recall from the team intro mail (
http://seclists.org/nmap-announce/2016/2), we had 5 students last year and
I'm happy to report that...
Nmap 7.40 Holiday Release: a dozen new NSE scripts, hundreds of new fingerprints, new Npcap, faster brute forcing, and more...
Fyodor (Dec 20)
Happy holidays from the Nmap Project! In case your Christmas break plans
involve a lot of port scanning, we're delighted to announce our holiday
Nmap 7.40 release! This version stuffs your stockings with dozens of new
features, including:
- 12 new NSE scripts
- Hundreds of updated OS and version detection detection signatures
- Faster brute force authentication cracking and other NSE library
improvements
- A much-improved...
Nmap 7.31 stability-focused point release
Fyodor (Oct 21)
Hi folks. I'm happy to report that the big Nmap 7.30 release last month
was a great success. We didn't even see as many bugs as expected for such
a large release, but we have collected and fixed the ones which did arise
in the last few weeks into a new 7.31 point release. It includes the
latest updates to our new Npcap driver, a fix for Nping on Windows, and
more.
Nmap 7.31 source code and binary packages for Linux, Windows, and Mac...
Nmap 7.30 Released with new NSE scripts, new Npcap, new Fingerprints, etc.
Fyodor (Sep 29)
Hi folks! You may have noticed that we've only been releasing Nmap betas
for the last 6 months because we've had so much new code and so many
features to integrate thanks to hard work from both our regular team and
the 5 Google Summer of Code summer interns. But we spent the last month
focused on stability and I'm pleased to announce Nmap 7.30--our first
stable release since 7.12 back in March.
Even though it's a stable...
Nmap 7.25BETA2 Birthday Release
Fyodor (Sep 01)
Hi folks! I'm happy to report that today is Nmap's 19th birthday and
instead of cake, we're celebrating open source style with a new release!
Nmap 7.25BETA1 includes dozens of performance improvements, bug fixes, and
new features. The full list is below, and includes a major LUA upgrade for
NSE scripts, a new overlapped I/O engine for better Windows performance, a
much-improved version of our new Npcap packet capturing driver,...
Nmap 7.25BETA1 Released with our new Npcap driver, 6 new NSE scripts, and more!
Fyodor (Jul 19)
Hi folks! As you may know, we've been working for the last 3 years on an
improved Windows packet capturing library named Npcap. It's based on the
original WinPcap (which hasn't been maintained in years), but we rewrote
the driver to use modern APIs (NDIS 6) for better performance. It also
improves security and enables new features. For example, Npcap allows Nmap
to do raw scans (including SYN scans and OS detection) of localhost...
Introducing the 2016 Nmap/Google Summer of Code Team!
Fyodor (May 09)
Hello everyone. Google has agreed to sponsor five amazing students to
spend this summer enhancing the Nmap Security Scanner and I'm proud to
introduce our 2015 team:
*Abhishek Singh* will be working as a Feature Creeper and Bug Hunter,
making improvements throughout the Nmap codebase. The project hasn't even
started yet and he's already found and fixed several NSE script bugs and
has other code changes in the works. Abhishek is...
Nmap 7.10 released: 12 new scripts, hundreds of OS/version fingerprints, bug fixes, and more!
Fyodor (Mar 17)
Hi Folks! Before I tell you about today's new Nmap release, I wanted to
share some Summer of Code news:
Google posted a fantastic story by one of our Summer of Code alumni about
how the program helped take him from rural China to a full-ride scholarship
at the University of Virginia graduate school! His mentor David and I had
the chance to meet him in San Francisco:...
Nmap Project Seeking Talented Programmers for Google Summer of Code 2016
Fyodor (Feb 29)
Hi folks. I'm delighted to report that Nmap has been accepted by Google to
participate in this year's Summer of Code internship program. This
innovative and extraordinarily generous program provides $5,500 stipends to
college and graduate students anywhere in the world who spend the summer
improving Nmap from home! They gain valuable experience, get paid,
strengthen their résumés, and write code for millions of users. We're one...
Full Disclosure — A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.
Multiple vulnerabilities in BMC Remedy
Simon Rawet (Oct 20)
Document Title
==============
Multiple vulnerabilities in BMC Remedy
Reported By
===========
Simon Rawet from Outpost24
Kristian Varnai from Outpost24
Vendor description
==================
"Remedy Service Management Suite is an enterprise service management
platform built natively for mobile with an intuitive, people-centric
user experience that makes your whole organization more productive."
Source:...
SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution
Maor Shwartz (Oct 20)
SSD Advisory – Endian Firewall Stored From XSS to Remote Command Execution
Full report: https://blogs.securiteam.com/index.php/archives/3471
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability Summary
The following advisory describes a stored cross site scripting that can be
used to trigger remote code execution in Endian Firewall version 5.0.3.
Endian Firewall is a “turnkey Linux security distribution, which is an
independent,...
SSD Advisory – HPE Baseline Smart Gig SFP 24 Switch Pre-authentication Stored XSS
Maor Shwartz (Oct 20)
SSD Advisory – HPE Baseline Smart Gig SFP 24 Switch Pre-authentication
Stored XSS
Full report: https://blogs.securiteam.com/index.php/archives/3389
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability Summary
The following advisory describes an unauthenticated stored XSS in the HPE
Baseline Smart Gig SFP 24 / 3Com Baseline Switch 2924 SFP Plus Switch.
The vulnerability affect versions:
Software Version: 01.00.10
Boot version:...
[RCE] TP-Link Remote Code Execution CVE-2017-13772
Kurtis Brown (Oct 20)
** Advisory Information
Title: TP-Link Remote Code Execution
Blog URL: https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/
Vendor: TP-Link
Date Published: 19/10/2017
CVE: CVE-2017-13772
** Vulnerability Summary
Numerous remote code execution paths were discovered in TP-Link's
WR940N home WiFi router. Valid credentials are required for this
attack path. It is possible for an authenticated attacker to obtain a
remote...
[RCESEC-2017-001][CVE-2017-14955] Check_mk v1.2.8p25 save_users() Race Condition leading to Sensitive Information Disclosure
Julien Ahrens (Oct 20)
RCE Security Advisory
https://www.rcesecurity.com
1. ADVISORY INFORMATION
=======================
Product: Check_mk
Vendor URL: https://mathias-kettner.de/check_mk.html
Type: Race Condition [CWE-362]
Date found: 2017-09-21
Date published: 2017-10-18
CVSSv3 Score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVE: CVE-2017-14955
2. CREDITS
==========
This vulnerability was discovered and researched by...
CVE-2017-12579 Local root privesc in Hashicorp vagrant-vmware-fusion 4.0.24
Mark Wadham (Oct 20)
I have previously disclosed a couple of bugs in Hashicorp's
vagrant-vmware-fusion plugin for vagrant.
Unfortunately the 4.0.23 release which was supposed to fix the previous
bug I
reported didn't address the issue, so Hashicorp quickly put out another
release
- 4.0.24 - after that (but didn't update the public changelog on
github).
Unfortunately 4.0.24 is still vulnerable, largely due to a fundamental
design
flaw in the way...
SEC Consult SA-20171018-1 :: Multiple vulnerabilities in Linksys E-series products
SEC Consult Vulnerability Lab (Oct 18)
SEC Consult Vulnerability Lab Security Advisory < 20171018-1 >
=======================================================================
title: Multiple vulnerabilities
product: Linksys E series, see "Vulnerable / tested versions"
vulnerable version: see "Vulnerable / tested versions"
fixed version: no public fix, see solution/timeline
CVE number: -
impact: high...
SEC Consult SA-20171018-0 :: Multiple vulnerabilities in Afian AB FileRun
SEC Consult Vulnerability Lab (Oct 18)
SEC Consult Vulnerability Lab Security Advisory < 20171018-0 >
=======================================================================
title: Multiple vulnerabilities
product: Afian AB FileRun
vulnerable version: 2017.03.18
fixed version: 2017.09.18
impact: critical
homepage: https://www.filerun.com | https://afian.se
found: 2017-08-28
by: Roman Ferdigg...
SSD Advisory – Linux Kernel AF_PACKET Use-After-Free
Maor Shwartz (Oct 17)
SSD Advisory – Linux Kernel AF_PACKET Use-After-Free
Full report: https://blogs.securiteam.com/index.php/archives/3484
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerabilities summary
The following advisory describes a use-after-free vulnerability found in
Linux Kernel’s implementation of AF_PACKET that can lead to privilege
escalation.
AF_PACKET sockets “allow users to send or receive packets on the device
driver level. This for...
SSD Advisory – Ikraus Anti Virus Remote Code Execution
Maor Shwartz (Oct 17)
SSD Advisory – Ikraus Anti Virus Remote Code Execution
Full report: https://blogs.securiteam.com/index.php/archives/3485
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability summary
The following advisory describes an remote code execution found in Ikraus
Anti Virus version 2.16.7.
KARUS anti.virus “secures your personal data and PC from all kinds of
malware. Additionally, the Anti-SPAM module protects you from SPAM and
malware...
SSD Advisory – Webmin Multiple Vulnerabilities
Maor Shwartz (Oct 17)
SSD Advisory – Webmin Multiple Vulnerabilities
Full report: https://blogs.securiteam.com/index.php/archives/3430
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability summary
The following advisory describes three (3) vulnerabilities found in Webmin
version 1.850
Webmin “is a web-based interface for system administration for Unix. Using
any modern web browser, you can setup user accounts, Apache, DNS, file
sharing and much more....
SSD Advisory – Microsoft Office SMB Information Disclosure
Maor Shwartz (Oct 17)
SSD Advisory – Microsoft Office SMB Information Disclosure
Full report: *https://blogs.securiteam.com/index.php/archives/3463
<https://blogs.securiteam.com/index.php/archives/3463>*
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
*Vulnerability Summary*
The following advisory describes an information disclosure found in
Microsoft Office versions 2010, 2013, and 2016.
Microsoft Office is: “Whether you’re working or playing, Microsoft...
SSD Advisory – FiberHome Directory Traversal
Maor Shwartz (Oct 17)
SSD Advisory – FiberHome Directory Traversal
Full report: https://blogs.securiteam.com/index.php/archives/3472
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD
Vulnerability Summary
The following advisory describes a directory traversal vulnerability found
in FiberHome routers.
FiberHome Technologies Group “was established in 1974. After continuous and
intensive development for over 40 years, its business has been extended to
R&D,...
[CVE-2017-14322] Interspire Email Marketer - Remote Admin Authentication Bypass
Hakan Küsne (Oct 17)
Please disclose, thanks.
SEC Consult SA-20171017-0 :: Cross site scripting in Webtrekk Pixel tracking component
SEC Consult Vulnerability Lab (Oct 17)
SEC Consult Vulnerability Lab Security Advisory < 20171017-0 >
=======================================================================
title: Cross site scripting
product: Webtrekk Pixel tracking
vulnerable version: v3.24 to v3.40, v4.00 to v4.40, v5.00 to v5.04
fixed version: v3.41, v4.41, v5.05
impact: Medium
homepage: https://www.webtrekk.com/
found: 2017-08-29...
Bugtraq — The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
[SECURITY] [DSA 4003-1] libvirt security update
Salvatore Bonaccorso (Oct 19)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4003-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
October 19, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : libvirt
CVE ID : CVE-2017-1000256
Debian Bug :...
[SECURITY] [DSA 4002-1] mysql-5.5 security update
Salvatore Bonaccorso (Oct 19)
-------------------------------------------------------------------------
Debian Security Advisory DSA-4002-1 security () debian org
https://www.debian.org/security/ Salvatore Bonaccorso
October 19, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : mysql-5.5
CVE ID : CVE-2017-10268 CVE-2017-10378...
FreeBSD Security Advisory FreeBSD-SA-17:07.wpa [REVISED]
FreeBSD Security Advisories (Oct 18)
=============================================================================
FreeBSD-SA-17:07.wpa Security Advisory
The FreeBSD Project
Topic: WPA2 protocol vulnerability
Category: contrib
Module: wpa
Announced: 2017-10-16
Credits: Mathy Vanhoef
Affects: All supported versions of FreeBSD.
Corrected:...
[slackware-security] xorg-server (SSA:2017-291-03)
Slackware Security Team (Oct 18)
[slackware-security] xorg-server (SSA:2017-291-03)
New xorg-server packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/xorg-server-1.18.3-i586-5_slack14.2.txz: Rebuilt.
This update fixes integer overflows and other possible security issues.
For more information, see:...
[slackware-security] wpa_supplicant (SSA:2017-291-02)
Slackware Security Team (Oct 18)
[slackware-security] wpa_supplicant (SSA:2017-291-02)
New wpa_supplicant packages are available for Slackware 14.0, 14.1, 14.2,
and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded.
This update includes patches to mitigate the WPA2 protocol issues known
as "KRACK" (Key Reinstallation AttaCK),...
[slackware-security] libXres (SSA:2017-291-01)
Slackware Security Team (Oct 18)
[slackware-security] libXres (SSA:2017-291-01)
New libXres packages are available for Slackware 14.1, 14.2, and -current to
fix a security issue.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/libXres-1.2.0-i586-1_slack14.2.txz: Upgraded.
Integer overflows may allow X servers to trigger allocation of insufficient
memory and a buffer overflow via vectors related to the (1)...
WebKitGTK+ Security Advisory WSA-2017-0008
Carlos Alberto Lopez Perez (Oct 18)
------------------------------------------------------------------------
WebKitGTK+ Security Advisory WSA-2017-0008
------------------------------------------------------------------------
Date reported : October 18, 2017
Advisory ID : WSA-2017-0008
Advisory URL : https://webkitgtk.org/security/WSA-2017-0008.html
CVE identifiers : CVE-2017-7081, CVE-2017-7087, CVE-2017-7089,...
SEC Consult SA-20171018-1 :: Multiple vulnerabilities in Linksys E-series products
SEC Consult Vulnerability Lab (Oct 18)
SEC Consult Vulnerability Lab Security Advisory < 20171018-1 >
=======================================================================
title: Multiple vulnerabilities
product: Linksys E series, see "Vulnerable / tested versions"
vulnerable version: see "Vulnerable / tested versions"
fixed version: no public fix, see solution/timeline
CVE number: -
impact: high...
[security bulletin] HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform Module v2.0 Option, Unauthorized Access to Data
security-alert (Oct 18)
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03789en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03789en_us
Version: 2
HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform Module
v2.0 Option, Unauthorized Access to Data
NOTICE: The information in this Security Bulletin should be acted upon as
soon as...
[SECURITY] [DSA 3999-1] wpa security update
Yves-Alexis Perez (Oct 16)
-------------------------------------------------------------------------
Debian Security Advisory DSA-3999-1 security () debian org
https://www.debian.org/security/ Yves-Alexis Perez
October 16, 2017 https://www.debian.org/security/faq
-------------------------------------------------------------------------
Package : wpa
CVE ID : CVE-2017-13077 CVE-2017-13078...
SEC Consult SA-20171016-0 :: Multiple vulnerabilities in Micro Focus VisiBroker C++
SEC Consult Vulnerability Lab (Oct 16)
SEC Consult Vulnerability Lab Security Advisory < 20171016-0 >
=======================================================================
title: Multiple vulnerabilities
product: Micro Focus VisiBroker C++
vulnerable version: 8.5 SP2
fixed version: 8.5 SP4 HF3
CVE number: CVE-2017-9281, CVE-2017-9282, CVE-2017-9283
impact: High
homepage:...
[security bulletin] MFSBGN03786 rev.1 - HPE Connected Backup, Local Escalation of Privilege
swpmb . cyber-psrt (Oct 15)
Note: the current version of the following document is available here:
https://softwaresupport.hpe.com/km/KM02987868
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM02987868
Version: 1
MFSBGN03786 rev.1 - HPE Connected Backup, Local Escalation of Privilege
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2017-10-13
Last Updated: 2017-10-13
Potential Security Impact: Local:...
Advisory X41-2017-010: Command Execution in Shadowsocks-libev
X41 D-Sec GmbH Advisories (Oct 15)
X41 D-Sec GmbH Security Advisory: X41-2017-010
Command Execution in Shadowsocks-libev
======================================
Overview
--------
Severity Rating: High
Confirmed Affected Versions: 3.1.0
Confirmed Patched Versions: N/A
Vendor: Shadowsocks
Vendor URL: https://github.com/shadowsocks/shadowsocks-libev
Vector: Local
Credit: X41 D-Sec GmbH, Niklas Abel
Status: Public
CVE: not yet assigned
Advisory-URL:...
Advisory X41-2017-008: Multiple Vulnerabilities in Shadowsocks
X41 D-Sec GmbH Advisories (Oct 15)
X41 D-Sec GmbH Security Advisory: X41-2017-008
Multiple Vulnerabilities in Shadowsocks
=======================================
Overview
--------
Confirmed Affected Versions: Latest commit 2ab8c6b on Sep 6
Confirmed Patched Versions: N/A
Vendor: Shadowsocks
Vendor URL: https://github.com/shadowsocks/shadowsocks/tree/master
Vector: Network
Credit: X41 D-Sec GmbH, Niklas Abel
Status: Public
Advisory-URL:...
[RCESEC-2017-002][CVE-2017-14956] AlienVault USM v5.4.2 "/ossim/report/wizard_email.php" Cross-Site Request Forgery leading to Sensitive Information Disclosure
Julien Ahrens (Oct 15)
RCE Security Advisory
https://www.rcesecurity.com
1. ADVISORY INFORMATION
=======================
Product: AlienVault USM
Vendor URL: https://www.alienvault.com
Type: Cross-Site Request Forgery [CWE-253]
Date found: 2017-09-22
Date published: 2017-10-13
CVSSv3 Score: 6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
CVE: CVE-2017-14956
2. CREDITS
==========
This vulnerability was discovered and researched...
Penetration Testing — While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.
SpiderFoot 2.11 released
Steve Micallef (Aug 14)
Hi all,
For the folks here interested in OSINT, recon and threat intel, I'm
pleased to announce SpiderFoot 2.11 is now out.
SpiderFoot now has over 100 modules to collect data utilising APIs from
SHODAN, BuiltWith, RIPE, AlienVault OTX, Robtex, HaveIBeenPwned? as well
as typical recon techniques like DNS brute-forcing, port scanning, web
spidering and more. It's open source, written in Python, documented and
usable with both a...
Faraday v2.6: Collaborative Penetration Test and Vulnerability Management Platform
Francisco Amato (Jul 24)
Faraday is the Integrated Multiuser Risk Environment you were looking
for! It maps and leverages all the knowledge you generate in real
time, letting you track and understand your audits. Our dashboard for
CISOs and managers uncovers the impact and risk being assessed by the
audit in real-time without the need for a single email. Developed with
a specialized set of functionalities that helps users improve their
own work, the main purpose is to...
File Upload in Integration Gateway (PSIGW)
ERPScan inc (Jul 20)
1. ADVISORY INFORMATION
Title: File Upload in Integration Gateway (PSIGW)
Advisory ID: [ERPSCAN-17-039]
Advisory URL: https://erpscan.com/advisories/erpscan-17-039-file-upload-integration-gateway-psigw-peoplesoft/
Risk: High
Date published: 18.07.2017
Vendor contacted: Oracle
2. VULNERABILITY INFORMATION
Class: File Upload
Impact: Remote command execution on the server
Remotely Exploitable: Yes
Locally Exploitable: Yes
CVE Name: CVE-2017-10061...
Multiple XSS (POST request) Vulnerabilities in TestServlet (PeopleSoft)
ERPScan inc (Jul 20)
1. ADVISORY INFORMATION
Title: Multiple XSS (POST request) Vulnerabilities in TestServlet (PeopleSoft)
Advisory ID: [ERPSCAN-17-037]
Advisory URL: https://erpscan.com/advisories/erpscan-17-037-multiple-xss-vulnerabilities-testservlet-peoplesoft/
Risk: Medium
Date published: 18.07.2017
Vendor contacted: Oracle
2. VULNERABILITY INFORMATION
Class: XSS [CWE-79]
Impact: Modify displayed content from a Web site, steal authentication
information of a...
Directory Traversal vulnerability in Integration Gateway (PSIGW)
ERPScan inc (Jul 20)
1. ADVISORY INFORMATION
Title: Directory Traversal vulnerability in Integration Gateway (PSIGW)
Advisory ID: [ERPSCAN-17-038]
Advisory URL: https://erpscan.com/advisories/erpscan-17-038-directory-traversal-vulnerability-integration-gateway-psigw/
Risk: High
Date published: 18.07.2017
Vendor contacted: Oracle
2. VULNERABILITY INFORMATION
Class: Directory Traversal
Impact: Read, delete, rewrite file from the system
Remotely Exploitable: Yes
CVE...
[HITB-Announce] HITB GSEC 2017 CommSec CFP Closes July 31st
Hafez Kamal (Jul 15)
REMINDER: CFP Submission dateline is on the 31st of July 2017 23:59 SGT
Alongside HITBGSEC 2017 Singapore, we are calling on the community of hackers, makers, builders and breakers to send us
their 30 minute talk abstracts for consideration to be included in a separate 2-day single-track of talks (24th and
25th August). Access to these track of talks is completely FREE TO ATTEND and we are encouraging everyone to come! If
you're in...
ekoparty: Call for Papers 2017! Open!
Francisco Amato (Jul 12)
ekoparty security conference
Training September 25-26, 2017
Conference September 27-29, 2017
Buenos Aires
Submit at: http://cfp.ekoparty.org
We are really proud to announce the thirteenth edition of the Ekoparty
Security Conference.
Once again, in this unique event, security specialist from all over
Latin America and the World will have the chance to get acquainted
with the most important researches of the year.
Ekoparty has become the most...
Firewall Wizards — Tips and tricks for firewall administrators
Revival?
Paul Robertson (Sep 11)
Since the last few attempts to revive the list have failed, I'm going to attempt a Facebook group revival experiment.
It'll be a bit broader in scope, but I'm hoping we can discuss technical security matters. The new group is
Security-Wizards on Facebook.
Paul
Web App Security — Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.
Faraday v2.6: Collaborative Penetration Test and Vulnerability Management Platform
Francisco Amato (Jul 24)
Faraday is the Integrated Multiuser Risk Environment you were looking
for! It maps and leverages all the knowledge you generate in real
time, letting you track and understand your audits. Our dashboard for
CISOs and managers uncovers the impact and risk being assessed by the
audit in real-time without the need for a single email. Developed with
a specialized set of functionalities that helps users improve their
own work, the main purpose is to...
Faraday v2.5: Collaborative Penetration Test and Vulnerability Management Platform
Francisco Amato (May 29)
Faraday is the Integrated Multiuser Risk Environment you were looking
for! It maps and leverages all the knowledge you generate in real
time, letting you track and understand your audits. Our dashboard for
CISOs and managers uncovers the impact and risk being assessed by the
audit in real-time without the need for a single email. Developed with
a specialized set of functionalities that helps users improve their
own work, the main purpose is to...
Ruxcon 2017 Call For Presentations
cfp (Apr 20)
Ruxcon 2017 Call For Presentations
Melbourne, Australia, October 21-22
CQ Function Centre
http://www.ruxcon.org.au
The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2017.
This year the conference will take place over the weekend of the 21st and 22nd of October at the CQ Function Centre,
Melbourne, Australia.
The deadline for submissions is the 30th of June, 2017.
.[x]. About Ruxcon .[x].
Ruxcon is...
Daily Dave — This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.
Keynotes
dave aitel (Oct 16)
So I'm about to do V6 of my T2 keynote - usually it takes about 10 full
runs until a keynote is good. This is why we are very very careful about
asking people to do keynotes. They typical first run of a keynote gets
feedback like "This is terrible. Just terrible. Awful". (Except Halvar's).
In any case, I've sent out versions of it to lots of different people
for feedback and I've noticed a few things. Probably the...
Re: Eulogy
Ryan Duff (Oct 10)
Yeah he was. The tragedy is how few will know everything he's done for his
country. But that's how it is.
He'll definitely be remembered by anyone who had the pleasure of working
with him.
-Ryan
Re: Eulogy
Matt Georgy (Oct 06)
He was a great guy and a real patriot. He will be missed.
Eulogy
dave aitel (Oct 06)
It's 11am. I'm pretty drunk right now. Lee would have liked to have
known that his passing was noticed.
For those of you who knew him.
-dave
Re: Equitablefax
the grugq (Oct 03)
Hey
I wasn’t either since it doesn’t impact me, but I had to research it for this week’s news segment on Risky.Biz ==>
https://risky.biz/RB471/
During the research it became clear that the public narrative and the facts were diverging quite a bit. In particular
this “failure to patch” story line. Yes, they were slow to patch. However, their upstream provider didn’t even make the
patch available until weeks after the compromise...
Re: Equitablefax
spacerog () spacerogue net (Oct 03)
Thank you for this timeline because honestly I haven't been paying that
close attention.
Based on this it looks like Equifax did actually patch, just not fast
enough, and by the time they got around to it the bad guys where already
inside. Based on this list the delta from patch release to install was
<91 days. Am I reading this correctly?
If so then the absolute shit ton of criticism heaped on Equifax for not
patching is IMO...
Re: Equitablefax
Arrigo Triulzi (Oct 03)
Just in passing: "Equifax is ISO/IEC 27001:2013 certified by a reputable independent third party.”[0]. Asset management
is a core part of ISO27001:2013.
Cheers,
Arrigo
[0] https://www.equifax.com/assets/WFS/the_work_number_best_practices_in_data_security.pdf (1st page)
Twitter
dave aitel (Sep 29)
Right now everyone is going on and on about how Russians spent 256K on
ads on Twitter to influence the election. Much less understood is how
great Twitter ads are for targeting phishing attacks! I wrote this whole
article while back here
<https://tindertipsforgirls.blogspot.com/2016/03/paying-for-okcupid-is-stupid.html>
on it. People are genuinely good at phishing now. The "Fake RedTube
subscription <...
Re: Equitablefax
the grugq (Sep 29)
I’m not going to address any of the points in the excellent post by Katie but rather put some facts together in a
timeline so people can see the Equihax event better. The “if only bug bounty” claptrap is, as Katie points out (much
more politely), complete bullshit.
Timeline of events:
2017-03-06: Apache announces struts bug
2017-03-07: PoC exploit released to public
2017-03-10: Equihax compromised via struts exploit. Genius hackers use...
Re: Why people aren't stealing ADFS secrets?
James Pleger (Sep 28)
I'm not holding out much hope on the OneLogin side, the breach they had earlier this year sounded really bad. Maybe
that event woke up the other identity providers though.
http://www.zdnet.com/article/onelogin-security-chief-new-details-data-breach/
Re: Equitablefax
Katie M (Sep 28)
I actually tried helping coordinate one of the new bugs that someone found
and wanted to report to Equifax. Unfortunately, before they had time to
even look up from their current conflagration, eyebrows still singed, a
reporter published it.
At this instant, even one bug report, while completely helpful in the
micro-sense, is process-wise another tax on the resources they have working
on the big breach. It still has to go into the queue of their...
Re: Why people aren't stealing ADFS secrets?
Kyle Creyts (Sep 27)
Or other SAML IDP private keys. ADFS is good, but stealing them from IDP
vendors might be much more efficient, and open many more doors. One hopes
that Google, OneLogin, Okta, and friends all do the needful to compartment
and protect these private keys.
On Wed, Sep 27, 2017 at 1:00 PM Konrads Smelkovs <konrads.smelkovs () gmail com>
wrote:
Re: Equitablefax
Katie M (Sep 27)
Having a bug bounty program wouldn't have helped Equifax. Only Equifax
could have helped Equifax. The root cause of the problem wasn't that they
didn't know about the bug, it was that they face the same patch
prioritization risk vs resource balance that all orgs gamble with. They
lost that gamble, which is what every breach represents: a lost bet on the
tradeoffs. Simply knowing about a bug, via a bug bounty or otherwise, is
just...
Why people aren't stealing ADFS secrets?
Konrads Smelkovs (Sep 27)
I was thinking about long term persistence and clearly, it would make a lot
of sense to steal the private key of the ADFS certificate that is used to
authenticate SAML claims. Anyone seen it done?
Re: Equitablefax
Kristian Erik Hermansen (Sep 27)
But clearly Equifax didn't know ALL public facing attack surfaces
controlled by Equifax which were affected by that vulnerability. A bug
bounty likely would have surfaced those missing attack surfaces. Internal
folks always make assumptions about their own network, which is biased and
almost never reality.
- Based on the company's investigation, Equifax believes the
unauthorized accesses to certain files containing personal...
PaulDotCom — General discussion of security news, research, vulnerabilities, and the PaulDotCom Security Weekly podcast.
Re: [Security Weekly] cheap hosting
Robin Wood (Sep 23)
Resurrecting an old thread but they now have an affiliate program and I can
issue my own codes so:
20% off all servers AqUVYbUXag
50% off all big dog (whatever that is) 7E9YRUzEZy
After a month with them, their tech support is OK but not great, the server
has stayed up and not had any problems.
Robin
Re: [Security Weekly] projecting in a bight space
Jeremy Pommerening (Aug 28)
I would look for a projector with at least 6000 ANSI Lumens or better. A darker screen (grey) may also help.
Jeremy Pommerening
________________________________
From: Robin Wood <robin () digi ninja>
To: Security Weekly Mailing List <pauldotcom () mail securityweekly com>
Sent: Sunday, August 3, 2014 3:42 AM
Subject: [Security Weekly] projecting in a bight space
I've been looking at the venue for next year's...
[Security Weekly] Two Firefox security bugs related to HTTPS
ffbugishere (Aug 17)
Hello world!
We need votes for security bugs!
Adding "Security Exception" for self-signed HTTPS sites cannot be done
permanently
https://bugzilla.mozilla.org/show_bug.cgi?id=1050100
Firefox 31 doesn't supports the industry recommended best HTTPS
ciphers
https://bugzilla.mozilla.org/show_bug.cgi?id=1051210
Other browsers should have the same bugs fixed..
p.s.: We are not related to this group, but we think they worth a
penny...
Re: [Security Weekly] Java and Flash decompilers
Will Metcalf (Aug 05)
JPEXS is very nice for flash IMHO.
http://www.free-decompiler.com/flash/
Regards,
Will
Re: [Security Weekly] Java and Flash decompilers
Bradley McMahon (Aug 05)
I've used flare before to pull apart a flash site for a client.
http://www.nowrap.de/flare.html
-Brad
Re: [Security Weekly] SecurityCenter alternative
Steven McGrath (Aug 04)
SC certainly isn’t cheap (as a former SC customer that moved over to Tenable I can attest to that) however I can point
out that the data aggregation, trending, and custom reporting were huge wins in my book. I guess its a time/money
trade-off. How much time do you want to spend either cobbling together a tool or manually aggregating the data when
there is another tool already out there that can do it out of the box.
I can speak in more...
Re: [Security Weekly] Java and Flash decompilers
S. White (Aug 04)
A few I've used in the past:
JAD - http://varaneckas.com/jad/ , http://en.wikipedia.org/wiki/JAD_(JAva_Decompiler)
HP SWFscan
Adobe SWF investigator http://labs.adobe.com/technologies/swfinvestigator/
________________________________
From: Robin Wood <robin () digi ninja>
To: Security Weekly Mailing List <pauldotcom () mail securityweekly com>
Sent: Monday, August 4, 2014 5:54 AM
Subject: [Security Weekly] Java and...
[Security Weekly] DoFler @ BSidesLV
Steven McGrath (Aug 04)
This will be the 3rd year that DoFler (the Dashboard of Fail) will be at BSidesLV. This year I wrote a new spiffy
interface for maximum trolling. Let’s be honest now, everyone loves to surf for various forms of horrible on the
internet at cons :D. Also added this year is a little vulnerability analysis (using Tenable’s PVS). Every year I try
to improve it a bit based on everyone’s input, and am always welcome to more feedback.
DB...
Re: [Security Weekly] cheap hosting
Robin Wood (Aug 04)
Already sorted but thanks for the info.
Re: [Security Weekly] Java and Flash decompilers
Nathan Sweaney (Aug 04)
Here are a few others I've used with varying success in the past:
SWFInvestigator - http://labs.adobe.com/technologies/swfinvestigator/
SWFScan - from Rafal Los at HP, though the link has been deleted. (Careful,
I've seen trojaned copies online.)
Re: [Security Weekly] SecurityCenter alternative
Paul Asadoorian (Aug 04)
Thanks all for the informative discussion!
I know, I'm jumping in late, some closing thoughts on the subject:
- SecurityCenter has the unique advantage of consolidating plugin
updates, meaning you could have hundred of Nessus scanners deployed in
your organization, and the scanners get the plugin feed from your
SecurityCenter system. The removes the requirement of Internet access
(From the scanners), and greatly eases the administration...
Re: [Security Weekly] SecurityCenter alternative
k41zen (Aug 04)
Thanks for all of your help.
We are in discussions with our Tenable contact about solutions for this issue. They’ve helped me out by enabling me to
move forward to at least deploy this into a Pre-Production environment but the costs of SC are a massive stumbling
block; hence my question about something else. Appreciate we have a big Nessus fan base here of which I am a member
too, but just wondered what could be wrapped around it.
I’ll...
Re: [Security Weekly] SecurityCenter alternative
Adrien de Beaupre (Aug 04)
Hi,
I have also written a series of script to collect data from tools such as
nmap and nessus to import into MySQL called OSSAMS:
http://www.ossams.com/wp-content/uploads/2011/10/ossams-parser-SecTor-2011.zip
That leaves report writing as a series of SQL queries.
I also have a series of scripts to kick off scans, as well as a command
like XML-RPC nessus client in python if anyone is interested.
Cheers,
Adrien
Re: [Security Weekly] cheap hosting
sec list (Aug 04)
Hey Robin,
If you're still looking, might want to try out getclouder.com - they
spin up Linux containers in 5 seconds and use distributed storage, which
is pretty awesome. It's still in beta, so they offer 3 months free
service, but it has been pretty stable so far from my experience.
[Security Weekly] Java and Flash decompilers
Robin Wood (Aug 04)
Hi
I'm trying to put together a list of tools for decompiling Flash and Java
apps. From asking on another list I already have:
Java
JD-GUI
Java Decompiler http://jd.benow.ca/jd-gui/downloads/jd-gui-0.3.6.windows.zip.
Java snoop https://code.google.com/p/javasnoop/
Flash
Trillix
Flashbang https://github.com/cure53/Flashbang
Has anyone here got any others they can suggest?
Ideally I'm looking for free stuff but cheap commercial...
Honeypots — Discussions about tracking attackers by setting up decoy honeypots or entire honeynet networks.
Honeypot malware archives
Matteo Cantoni (Feb 14)
Hello everyone,
I would like share with you for educational purposes and without any
commercial purpose, data collected by the my homemade honeypot.
Nothing new, nothing shocking, nothing sensational... but I think can
be of interest to newcomers to the world of analysis of malware,
botnets, etc... maybe for a thesis.
The files collected are divided into zip archives, in alphabetical
order, with password (which must be request via email). Some...
Microsoft Sec Notification — Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products—note how most have a prominent and often-misleading "mitigating factors" section.
Microsoft Security Update Minor Revisions
Microsoft (Oct 20)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 20, 2017
********************************************************************
Summary
=======
The following advisory and security bulletin have undergone a
minor revision increment.
* ADV170012
* MS14-085
Revision Information:
=====================
ADV170012
- Title: ADV170012 | Vulnerability in TPM could...
Microsoft Security Update Minor Revisions
Microsoft (Oct 19)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 18, 2017
********************************************************************
Summary
=======
The following advisory and CVE have been revised in the October 2017
Security Updates.
* ADV170012
* CVE-2017-13080
Revision Information:
=====================
ADV170012
- Title: ADV170012 | Vulnerability in TPM...
Microsoft Security Update Minor Revisions
Microsoft (Oct 17)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 17, 2017
********************************************************************
Summary
=======
The following advisory has been revised in the October 2017 Security
Updates.
* ADV170012
Revision Information:
=====================
ADV170012
- Title: ADV170012 | Vulnerability in TPM could allow Security...
Microsoft Security Update Releases
Microsoft (Oct 17)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 17, 2017
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment.
* ADV170018
CVE Revision Information:
=====================
CVE-2017-13080
- Title: ADV170018 | October 2017 Flash Update
-...
Microsoft Security Update Minor Revisions
Microsoft (Oct 16)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 16, 2017
********************************************************************
Summary
=======
The following CVEs have been revised in the October 2017 Security
Updates.
* CVE-2017-11775
* CVE-2017-11777
* CVE-2017-11815
* CVE-2017-11820
Revision Information:
=====================
CVE-2017-11775
- Title:...
Microsoft Security Update Releases
Microsoft (Oct 16)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 16, 2017
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment.
* CVE-2017-13080
CVE Revision Information:
=====================
CVE-2017-13080
- Title: CVE-2017-13080 | Windows Wireless WPA Group Key
Reinstallation...
Microsoft Security Update Minor Revisions
Microsoft (Oct 11)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 11, 2017
********************************************************************
Summary
=======
The following advisory has been revised in the October 2017 Security
Updates.
* ADV170012
Revision Information:
=====================
ADV170012
- Title: ADV170012 | Vulnerability in TPM could allow Security...
Microsoft Security Bulletin Releases
Microsoft (Oct 10)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 10, 2017
********************************************************************
Summary
=======
The following CVE has been revised in the October 2017 Security
Updates.
* CVE-2017-11774
Revision Information:
=====================
CVE-2017-11774
- Title: CVE-2017-11774 | Microsoft Outlook Security Feature...
Microsoft Security Bulletin Releases
Microsoft (Oct 10)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 10, 2017
********************************************************************
Summary
=======
The following CVE has been revised in the October 2017 Security
Updates.
* CVE-2017-11774
Revision Information:
=====================
CVE-2017-11774
- Title: CVE-2017-11774 | Microsoft Outlook Security Feature...
This summary lists security updates released for October 2017.
Microsoft (Oct 10)
********************************************************************
Microsoft Security Update Summary for October 2017
Issued: October 10, 2017
********************************************************************
This summary lists security updates released for October 2017.
Complete information for the October 2017 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>.
Critical Security...
The following CVE has undergone a major revision increment.
Microsoft (Oct 04)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 4, 2017
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment.
* CVE-2017-8695
CVE Revision Information:
=====================
CVE-2017-8695
- Title: CVE-2017-8695 | Graphics Component Information Disclosure
Vulnerability...
The following CVEs have been revised in the September 2017 Security Updates.
Microsoft (Oct 03)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 3, 2017
********************************************************************
Summary
=======
The following CVEs have been revised in the September 2017 Security
Updates.
* CVE-2017-8759
Revision Information:
=====================
CVE-2017-8759
- Title: CVE-2017-8759 | .NET Framework Remote Code Execution...
The following CVE has undergone a major revision increment.
Microsoft (Sep 26)
********************************************************************
Title: Microsoft Security Update Releases
Issued: September 26, 2017
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment.
* CVE-2017-8628
CVE Revision Information:
=====================
CVE-2017-8628
- Title: CVE-2017-8628 | Microsoft Bluetooth Driver Spoofing
Vulnerability
-...
The following CVE has been revised in the June 2017 Security Updates.
Microsoft (Sep 20)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: September 20, 2017
********************************************************************
Summary
=======
The following CVE has been revised in the June 2017 Security
Updates.
* CVE-2017-8529
Revision Information:
=====================
CVE-2017-8529
- Title: CVE-2017-8529 | Microsoft Browser Information Disclosure...
The following Defense in Depth Update has undergone a major revision increment.
Microsoft (Sep 19)
********************************************************************
Title: Microsoft Security Update Releases
Issued: September 19, 2017
********************************************************************
Summary
=======
The following Defense in Depth Update has undergone a major
revision increment.
* ADV170015
Revision Information:
=====================
ADV170015
- Title: ADV170015 | Microsoft Office Defense in Depth Update
-...
Funsec — While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community
Verizon: 1.5M of Contact Records Stolen, Now on Sale
Jeffrey Walton (Mar 26)
http://www.mobipicker.com/verizon-1-5m-contact-records-stolen-now-sale/:
A business to business telecommunication giant,
Verizon Enterprise Solutions, a Basking Ridge,
New Jersey-based company, has been the latest
victim of a cyber crime that stole 1.5 million contact
records of the customers of Verizon...
I don't quite understand this double talk. Could someone explain to me:
A spokesperson from Verizon said that...
Statement on Lavabit Citation in Apple Case
Jeffrey Walton (Mar 16)
(From John Young on another list):
http://www.facebook.com/KingLadar/posts/10156714933135038
As many of you already know, the government cited the Lavabit case in
a footnote. The problem is their description insinuates a precedent
that was never created. Obviously I was somewhat disturbed by their
misrepresentation. So I decided to draft a statement. And keep in
mind, these are the same people who say "trust us." Click continue to
read...
The NSA's back door has given every US secret to our enemies
Jeffrey Walton (Feb 29)
http://www.businessinsider.com/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2
Deng Xiaoping, in 1979 - his second year as supreme leader of China -
perceived a fundamental truth that has yet to be fully grasped by most
Western leaders: Software, if properly weaponized, could be far more
destructive than any nuclear arsenal.
Under Deng’s leadership, China began one of the most ambitious and
sophisticated meta- software...
Can Spies Break Apple Crypto?
Jeffrey Walton (Feb 27)
Here's an interesting exchange between Cryptome and Michael Froomkin,
Law Professor at University of Miami, on the All Writs Act
(http://cryptome.org/2016/02/can-spies-break-apple-crypto.htm):
-----
A. Michael Froomkin:
The factual posture in the key Supreme Court precedent, New York
Telephone, involved a situation where only the subject of the order
was capable of providing the assistance at issue. This is the basis
for Apple's...
The FBI's iPhone Problem: Tactical vs. Strategic Thinking
Jeffrey Walton (Feb 23)
http://www.technewsworld.com/story/83130.html
I'm an ex-sheriff, and I've been in and out of security jobs for much
of my life, so I've got some familiarity with the issues underlying
the drama between the FBI and Apple. FBI officials -- and likely those
in every other three-letter agency and their counterparts all over the
world -- would like an easier way to do their jobs. Wouldn't we all?
If they could put cameras in...
Wanted: Cryptography Products for Worldwide Survey
Jeffrey Walton (Jan 01)
(http://www.schneier.com/crypto-gram/archives/2015/1215.html):
In 1999, Lance Hoffman, David Balenson, and others published a survey
of non-US cryptographic products. The point of the survey was to
illustrate that there was a robust international market in these
products, and that US-only export restrictions on strong encryption
did nothing to prevent its adoption and everything to disadvantage US
corporations. This was an important contribution...
CERT Advisories — The Computer Emergency Response Team has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.
TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors
US-CERT (Oct 21)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors [
https://www.us-cert.gov/ncas/alerts/TA17-293A ] 10/20/2017 06:50 PM EDT
Original release date: October 20, 2017 | Last revised: October 21, 2017
Systems Affected
* Domain Controllers
* File Servers
* Email Servers
Overview
This joint Technical...
TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors
US-CERT (Oct 20)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors [
https://www.us-cert.gov/ncas/alerts/TA17-293A ] 10/20/2017 06:50 PM EDT
Original release date: October 20, 2017
Systems Affected
* Domain Controllers
* File Servers
* Email Servers
Overview
This joint Technical Alert (TA) is the result of analytic...
Cisco Releases Security Updates
US-CERT (Oct 18)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Cisco Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2017/10/18/Cisco-Releases-Security-Updates ] 10/18/2017 04:07 PM EDT
Original release date: October 18, 2017
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit one
of these vulnerabilities to take control of an affected...
Google Releases Security Updates for Chrome
US-CERT (Oct 18)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://www.us-cert.gov/ncas/current-activity/2017/10/18/Google-Releases-Security-Updates-Chrome ] 10/18/2017 10:08 AM
EDT
Original release date: October 18, 2017
Google has released Chrome version 62.0.3202.62 for Windows, Mac, and Linux to address multiple vulnerabilities.
Exploitation of some of these...
Oracle Releases Security Bulletin
US-CERT (Oct 17)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Oracle Releases Security Bulletin [
https://www.us-cert.gov/ncas/current-activity/2017/10/17/Oracle-Releases-Security-Bulletin ] 10/17/2017 08:40 PM EDT
Original release date: October 17, 2017
Oracle has released its Critical Patch Update for October 2017 to address 252 vulnerabilities across multiple products.
A remote attacker could exploit some of these...
IC3 Issues Alert on DDoS Attacks
US-CERT (Oct 17)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
IC3 Issues Alert on DDoS Attacks [
https://www.us-cert.gov/ncas/current-activity/2017/10/17/IC3-Issues-Alert-DDoS-Attacks ] 10/17/2017 08:39 PM EDT
Original release date: October 17, 2017
The Internet Crime Complaint Center (IC3) has issued an alert on distributed denial-of-service (DDoS)-for-hire services
advertised on criminal forums and marketplaces. Using DDoS...
IC3 Issues Alert on IoT Devices
US-CERT (Oct 17)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
IC3 Issues Alert on IoT Devices [ https://www.us-cert.gov/ncas/current-activity/2017/10/17/IC3-Issues-Alert-IoT-Devices
] 10/17/2017 06:56 PM EDT
Original release date: October 17, 2017
In conjunction with National Cyber Security Awareness Month, the Internet Crime Complaint Center (IC3) has issued an
alert to individuals and businesses about the security risks...
Today’s Predictions for Tomorrow’s Internet
US-CERT (Oct 17)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Todays Predictions for Tomorrows Internet [
https://www.us-cert.gov/ncas/current-activity/2017/10/17/Today%E2%80%99s-Predictions-Tomorrow%E2%80%99s-Internet ]
10/17/2017 07:24 AM EDT
Original release date: October 17, 2017
October is National Cybersecurity Awareness Month, an annual campaign to raise awareness about cybersecurity. Smart
cities, connected devices,...
Adobe Releases Security Updates
US-CERT (Oct 16)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Adobe Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2017/10/16/Adobe-Releases-Security-Updates ] 10/16/2017 03:33 PM EDT
Original release date: October 16, 2017
Adobe has released security updates to address a vulnerability in Adobe Flash Player. A remote attacker could exploit
this vulnerability to take control of an affected system....
CERT/CC Reports WPA2 Vulnerabilities
US-CERT (Oct 16)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
CERT/CC Reports WPA2 Vulnerabilities [
https://www.us-cert.gov/ncas/current-activity/2017/10/16/CERTCC-Reports-WPA2-Vulnerabilities ] 10/16/2017 09:20 AM EDT
Original release date: October 16, 2017
CERT Coordination Center (CERT/CC) has released information on Wi-Fi Protected Access II (WPA2) protocol
vulnerabilities. Exploitation of these vulnerabilities could...
Mozilla Releases Security Update
US-CERT (Oct 11)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Mozilla Releases Security Update [
https://www.us-cert.gov/ncas/current-activity/2017/10/11/Mozilla-Releases-Security-Update ] 10/11/2017 10:25 AM EDT
Original release date: October 11, 2017
Mozilla has released a security update to address multiple vulnerabilities in Thunderbird. Exploitation of some of
these vulnerabilities may allow a remote attacker to take...
Microsoft Releases October 2017 Security Updates
US-CERT (Oct 10)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Microsoft Releases October 2017 Security Updates [
https://www.us-cert.gov/ncas/current-activity/2017/10/10/Microsoft-Releases-October-2017-Security-Updates ] 10/10/2017
03:37 PM EDT
Original release date: October 10, 2017
Microsoft has released updates to address vulnerabilities in Microsoft software. A remote attacker could exploit some
of these vulnerabilities...
Cybersecurity in the Workplace is Everyone’s Business
US-CERT (Oct 10)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Cybersecurity in the Workplace is Everyones Business [
https://www.us-cert.gov/ncas/current-activity/2017/10/10/Cybersecurity-Workplace-Everyone%E2%80%99s-Business ]
10/10/2017 01:38 PM EDT
Original release date: October 10, 2017
October is National Cybersecurity Awareness Month, an annual campaign to raise awareness about cybersecurity. Creating
a culture of...
Apple Releases Security Update for macOS High Sierra
US-CERT (Oct 05)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Apple Releases Security Update for macOS High Sierra [
https://www.us-cert.gov/ncas/current-activity/2017/10/05/Apple-Releases-Security-Update-macOS-High-Sierra ] 10/05/2017
05:00 PM EDT
Original release date: October 05, 2017
Apple has released a supplemental security update to address vulnerabilities in macOS High Sierra 10.13. An attacker
could exploit these...
Cisco Releases Security Updates
US-CERT (Oct 04)
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:
Cisco Releases Security Updates [
https://www.us-cert.gov/ncas/current-activity/2017/10/04/Cisco-Releases-Security-Updates ] 10/04/2017 03:30 PM EDT
Original release date: October 04, 2017
Cisco has released updates to address vulnerabilities affecting multiple products. A remote attacker could exploit some
of these vulnerabilities to cause a denial-of-service...
Open Source Security — Discussion of security flaws, concepts, and practices in the Open Source community
LAME 3.100 released with security fixes
Henri Salo (Oct 21)
Hello,
LAME 3.100 has been released including fixes to security vulnerabilities.
Coy-paste from history:
Rogério Brito
- Don't include the debian directory as one that is needed during builds. Patch
taken from Debian's packaging of lame.
- Resurrect Owen Taylor's code dated from 97-11-3 to properly deal with GTK1.
This was transplanted back from aclocal.m4 with a patch provided by Andres
Mejia. This change makes it easy to...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Robert Watson (Oct 21)
Thank You for tolerating my questions. I've read the wikis and pages
you've suggested, and am attempting to format this reply as required.
Please advise if anything is still wrong.
I didn't see how revealing configuration details was anything more
than "security by obscurity" but that's not a discussion for this
forum. Mea Culpa.
Believe it or not, this is first occasion using the "Plain text"
feature in...
CVE-2017-15670, CVE-2017-15671 glibc: Buffer overflow and memory leak in glob with GLOB_TILDE
Eddie Chapman (Oct 21)
Just a heads up for anyone around over the weekend ...
== CVE-2017-15670 ==
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670
"The GNU C Library (aka glibc or libc6) before 2.27 contains an
off-by-one error leading to a heap-based buffer overflow in the glob
function in glob.c, related to the processing of home directories using
the ~ operator followed by a long string."...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Simon McVittie (Oct 21)
In that particular case, it would do an attacker no good. (Unless the
web server that will be serving the mirrored content is running as root,
but don't do that.)
However, there are plenty of files on a system that are readable by the
web server, but should not be readable by random people on the Internet.
If the same web server has password-protected directories (for example
using Apache .htaccess/.htpasswd) then the files with their...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Solar Designer (Oct 21)
Robert,
As a moderator, I let your questions through so far, as well as all
replies. I think it is in fact beneficial to question things and make
sure people are on the same page as to what constitutes (or does not
constitute) a security issue, and what exactly the issues are. That
said, please remember that your messages reach thousands of people and
take up a tiny bit of each person's time - which adds up to way more
time than you...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Bastian Blank (Oct 21)
Hi Seth
Almost none of the so called script languages are interpreted. They
include a compiler, usually compile the input to some form of byte-code
and executed it within a VM. But that's just definition.
Raising awareness was one reason why I asked for a CVE id instead of
just fixing it. rsync, even if the protocol is really bad, is widly
used to mirror all sorts of software. It is also a generic tool, so the
defaults are there to...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Robert Watson (Oct 21)
Thank You for taking the time to explain the scripting issue.
Okay, so a script adds a symlink to /etc/shadow or something else
confidential. Unless they're root, what good does it do them? They can't
read it.
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Seth Arnold (Oct 20)
I'm not sure what 'script' vs 'not-script' has to do with anything.
'Script' really just means "interpreted programming language" and says
nothing about the threat model in use.
This ftpsync script and similar scripts are the primary tool for mirroring
Debian, Ubuntu, and other derived Linux distributions, to the mirror
networks that support many millions of computers.
Probably other programs use...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Ben Tasker (Oct 20)
Re: [CVE-2017-15186]: ffmpeg: Double free when ffmpeg parsing an craft AVI file to MKV file using ffvhuff decoder
Ludovic Courtès (Oct 20)
Hi,
连一汉 <lianyihan () 360 cn> skribis:
[...]
Looks like this is not the URL you intended to share, is it?
Ludo’.
[CVE-2017-15186]: ffmpeg: Double free when ffmpeg parsing an craft AVI file to MKV file using ffvhuff decoder
连一汉 (Oct 20)
Affected package: ffmpeg
Affected versions: <= 3.3.4
FFmpeg trigger double-free when it parsing an craft AVI file to MKV file using ffvhuff decoder.
From the back trace, we can see that ffmpeg frees a filter array firstly:
#0 av_free (ptr=0x32bb920) at libavutil/mem.c:209
#1 0x000000000162a759 in initFilter (outFilter=0x32ae7f8, filterPos=0x32ae818, outFilterSize=0x32ae82c, xInc=65536,
srcW=45, dstW=45, filterAlign=1,
one=4096,...
Re: CVE-2017-8805: Unsafe symlinks not filtered in Debian mirror script ftpsync
Robert Watson (Oct 20)
Scripts depend on the underlying functionality of the various utilities
like rsync that they call. I'm having trouble understanding how a script
could ever be deserving of a CVE. Maybe I'm wrong. I wish to be educated.
We are overwhelmed with more vulnerabilities than can be fixed quickly
already.
Are "just to be safer" type things really a wise use of our resources?
Does a proliferation of a large number of low-caliber...
Announce: Apache James 3.0.1 security release
Tellier Benoit (Oct 19)
I, in the name of Apache James PMCs, am glad to announce you the release
version 3.0.1 of Apache James server.
It fixes vulnerability described in CVE-2017-12628. The JMX server, also
used by the command line client is exposed to a java de-serialization
issue, and thus can be used to execute arbitrary commands. As James
exposes JMX socket by default only on local-host, this vulnerability can
only be used for privilege escalation.
Release 3.0.1...
Re: CVE request: musl libc 1.1.16 and earlier dns buffer overflow
Rich Felker (Oct 19)
CVE-2017-15650 has been assigned for this issue.
Rich
CVE request: musl libc 1.1.16 and earlier dns buffer overflow
Rich Felker (Oct 19)
Felix Wilhelm has discovered a flaw in the dns response parsing for
musl libc 1.1.16 that leads to overflow of a stack-based buffer.
Earlier versions are also affected.
When an application makes a request via getaddrinfo for both IPv4 and
IPv6 results (AF_UNSPEC), an attacker who controls or can spoof the
nameservers configured in resolv.conf can reply to both the A and AAAA
queries with A results. Since A records are smaller than AAAA records,...
Secure Coding — The Secure Coding list (SC-L) is an open forum for the discussion on developing secure applications. It is moderated by the authors of Secure Coding: Principles and Practices.
Silver Bullet 123: Yanek Korff
Gary McGraw (Jul 06)
hi sc-l,
The latest installment of Silver Bullet was posted this morning. Silver Bullet episode 123 features a conversation
with Yanek Korff. Yanek worked for many years at Cigital as a system administrator back in the early days. He then
moved on to operational security work at AOL and running managed security services at Mandiant.
We talk about managing technical people in this episode. We also discuss operational security. Have a...
Educause Security Discussion — Securing networks and computers in an academic environment.
Re: File Integrity Monitoring - PCI
Benjamin Stein (Oct 20)
We use Tripwire in our unit and work to focus the reporting to something manageable in 4-6 hours week (for a 100ish
servers and devices).
In general this means that we configure it to detect a broad range of changes on Windows and Linux servers and also
have it checking some device configs. The default rule sets from Tripwire of what particular files or folders and what
particular settings (hashes, permissions, content, streams...) to...
Re: File Integrity Monitoring - PCI
Kevin Wilcox (Oct 20)
Justin - I think my question is really, "what are you trying to accomplish?"
For example, you could say, "I just want to know if files change and
check the box".
- okay, that's cool, it's an honest response. If you're on a budget,
OSSEC is fantastic. Upside: you'll know when files change. Downside:
you won't know who did it. Arguable either way: there is no
distinction between you changing a file as...
Last Call for Security 2018 Proposals (due Tuesday, Oct. 24)
Valerie Vogel (Oct 20)
Don't be left adrift! Submit a proposal for the 2018 Security Professionals
Conference<https://events.educause.edu/security-professionals-conference/2018> by next Tuesday, October 24!
This is a fantastic opportunity to connect with peers, share your experiences, and explore innovative strategies to
improve information security and privacy practices in higher ed! We are seeking proposals for half-day or full-day
seminars, as well as...
Re: File Integrity Monitoring - PCI
Jim Williams Jr (Oct 20)
We are using the product from Manage Engine, "Eventlog Analyzer". It does file integrity monitoring, but also fulfills
many other PCI requirements. The offer a demo period if you would like to try it out.
James Williams, MPS
Pennsylvania College of Technology
Manager of IT Security | CISO | Information Technology Services
Jim.Williams () pct edu | 570-329-4997
-----Original Message-----
From: The EDUCAUSE Security Constituent Group...
Re: Security Awareness Training Tool(s)
Hendra Hendrawan (Oct 20)
+1
From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of
Francisco Chavez
Sent: Thursday, October 19, 2017 11:53 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Security Awareness Training Tool(s)
Scott,
We just rolled out our security Awareness Training for faculty and staff this month. We are using SANS
Securing The Human training modules and delivering...
Re: posters or graphics promoting 2FA / Duo for students (or faculty)?
Ben Marsden (Oct 20)
Blake, GT has some excellent online resources, thanks for the link. The
"Using two-factor" video on the front page is really well done! (And I'm
envious of your -- and other institutions' -- UI programming into Duo's
backend, wish we had the resources for that...)
Thanks!
-- Ben
Re: posters or graphics promoting 2FA / Duo for students (or faculty)?
Penn, Blake C (Oct 20)
2fa.gatech.edu
We designed a hand with the “peace” sign - two fingers raised to represent two factor - amazingly clever, no? The
students do seem to like the t-shirts with that logo.
Regards,
Blake Penn
Information Security Policy and Compliance Manager
Cyber Security
Georgia Institute of Technology
(404) 385-5480
From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Ben
Marsden...
Re: Security Awareness Training Tool(s)
Harris, Brent (Oct 20)
We’ve recently rolled StH out to all employees as mandatory training. We assigned the most relevant modules. The
management on the backend is a little clunky but all feedback from users regarding the training has been positive.
Brent Harris
University of Mary Hardin-Baylor
We have been looking into security awareness training and have looked at a couple of vendors. We are now looking into
the SANS Securing The Human. I'd appreciate any...
Re: posters or graphics promoting 2FA / Duo for students (or faculty)?
Telfer, Will (Oct 19)
Initially the graphic said ‘Do You? I Do’ (with the Duo logo inside the O in the second Do) - this is what was on the
shirts, but after the initial rollout it changed to ‘We Duo’ like you see now.
Thank You,
Will Telfer, M.S.
Information Security Analyst
Information Technology Services
[sig]
From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Ben
Marsden
Sent: Thursday,...
Re: posters or graphics promoting 2FA / Duo for students (or faculty)?
Ben Marsden (Oct 19)
Hi Will, thanks! Actually, while using my weak google-fu to see what I
could find prior to posting, I did find your "We do Duo, Enroll Now"
graphic, which I promptly printed and already have push-pinned to my office
door! :-)
Fwiw, so far the best incentive we've come up with was adding $5 extra of
printing to their student account if they signed up by the end of
September. That seemed to work *really* well.
-- Ben
On...
Re: posters or graphics promoting 2FA / Duo for students (or faculty)?
Telfer, Will (Oct 19)
We rolled out Duo to one service last year & just this month rolled it out to about 50 more…our marketing folks went
with the theme seen on our 2-factor website: www.baylor.edu/its/weduo<http://www.baylor.edu/its/weduo>. We even gave
away t-shirts in the school colors with that logo on it. I’m not sure if this is the eye-catching look, but it did
sync up with Duo’s look fairly well, since we incorporated the logo into our...
posters or graphics promoting 2FA / Duo for students (or faculty)?
Ben Marsden (Oct 19)
Hi, We're doing a "slow roll" of Duo this year.
We're continuing to work on ways to promote adoption of Duo for 2FA for
students. I'd like to post posters or table tent graphics to keep getting
eyes on it so that it enters their awareness fringes and hopefully
generates greater buy-in during more active and targeted efforts.
Do you have an eye-catching promotional poster or graphic you'd be
willing to...
Re: Security Awareness Training Tool(s)
Kevin Cumberland (Oct 19)
Michael,
I did not have that issue as it relates to support. They were great in
responding to any questions or issues that I did have and they were very
quick and eager to help. I'm not really sure why your experience was
different than mine but at any rate, it's a great product
Thanks
Kevin,
I had started the implementation of this product at my last institution
and while I can’t say I completed it prior to switching jobs I can...
Save the date - VA Tech SANS Onsite 3/5/2018-3/10/2018
randy (Oct 19)
Just a note to save the date for the 2018 VA Tech SANS Onsite class that
will be offered in March, 2018. Details are:
1. WHAT: SEC 573 Automating Information Security with Python
2. WHEN: 3/5-10/2018
3. COST: $2390/person class only, $3190/person class+GIAC
4. GIAC Certification: GPYC
5. WHERE: VA Tech, Blacksburg, VA, simulcast option available
6. WWW SITE: being updated
If you have any questions, let me know. Thanks.
-Randy Marchany
VA Tech...
Save the date - VA Tech SANS Onsite 3/5/2018-3/10/2018
randy (Oct 19)
Just a note to save the date for the 2018 VA Tech SANS Onsite class that
will be offered in March, 2018. Details are:
1. WHAT: SEC 573 Automating Information Security with Python
2. WHEN: 3/5-10/2018
3. COST: $2390/person class only, $3190/person class+GIAC
4. GIAC Certification: GPYC
5. WHERE: VA Tech, Blacksburg, VA, simulcast option available
6. WWW SITE: being updated
If you have any questions, let me know. Thanks.
-Randy Marchany
VA Tech...
NANOG — The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.
Re: Allstream/Zayo in the house?
Jason Lixfeld (Oct 21)
Thanks for all the private responses. Contact made, and the issue has been resolved. Thank you all.
Allstream/Zayo in the house?
Jason Lixfeld (Oct 21)
Having an issue where you’re caching announcements for my AS via a peering session that was turned down hours ago
causing * * *, and my Saturday to suck :)
Emails out to NOC/Peering contacts on peeringdb haven’t had a response yet. Hoping someone here can poke and/or prod.
Thanks in advance.
Re: Calgary <-> Toronto 100% Canadian Fibre Resiliency on failover
Tom Beecher (Oct 20)
"But if provider 1 has its 1 fibre on the CN line and provider 2 has its
1 fibre along CP line (or road), then you can get diversity by getting
bandwidth from both."
That's not diversity. That's just a matter of time before the same backhoe
catches them both. :)
RE: Puerto Rico: Lack of electricity threatens telephone and internet services
Jacques Latour (Oct 20)
Here's a fact, the next ICANN meeting in March is still a go in San Juan PR. Hopefully bringing 2000 people will have
a positive impact on the local economy.
Weekly Routing Table Report
Routing Analysis Role Account (Oct 20)
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
MENOG, BJNOG, SDNOG, CMNOG, LACNOG, IRNOG and the RIPE Routing WG.
Daily listings are sent to bgp-stats () lists apnic net
For historical data, please see http://thyme.rand.apnic.net.
If you have any comments please contact Philip Smith <pfsinoz...
Re: Google DNS intermittent ServFail for Disney subdomain
Michael Loftis (Oct 20)
None of the NS records/delegations are in agreement. com delegations
don't agree with authoritative in disney.com, and disney.com's
delegations don't agree with studio.disney.com's NSen.
Re: Private Link between TOR and CHI
Ryan Gard (Oct 20)
Just an update -- We've sourced a solution and have moved forward with it.
Thanks for all the replies with vendors -- It definitely helped with the
sourcing process to find vendors that service both locales :)
Chinese websites loading slower recently?
Simon Lockhart (Oct 20)
All,
I know that access to Chinese websites from outside China is notorious for
being slow or broken, but we seem to have had a major increase in support
calls from our users over the last couple of weeks, complaining of slow or
no access to major Chinese websites, such as www.baidu.com, www.youku.com and
world.taobao.com.
We can't find anything on our network that would be affecting this, and at
various times can (and cannot!) reproduce...
Contact / RPF issue with GoDaddy at Equinix Chicago
Cassell, Brandon (Oct 20)
Would anyone happen to have a name or number of an engineer at GoDaddy who could help me with an issue we’re seeing
with them at equinix in Chicago? It looks like it might be related to some kind of RPF checking they’re doing on their
side that’s causing traffic for some of our /16’s to get dumped.
Thanks,
Brandon Cassell
Tier 2 NOC Technician
OARnet<https://oar.net/>
A member of the Ohio Technology Consortium<...
Re: Google DNS intermittent ServFail for Disney subdomain
Christopher Morrow (Oct 20)
Re: Google DNS intermittent ServFail for Disney subdomain
Filip Hruska (Oct 20)
Re: Google DNS intermittent ServFail for Disney subdomain
Stephane Bortzmeyer (Oct 20)
On Fri, Oct 20, 2017 at 03:29:15PM +0200,
Filip Hruska <fhr () fhrnet eu> wrote
a message of 49 lines which said:
The good ones do <https://omnia.turris.cz/en/>
Re: Google DNS intermittent ServFail for Disney subdomain
Filip Hruska (Oct 20)
Would be great if makers of home routers would implement full recursive
DNS resolvers
instead of just forwards in their gear.
Re: Google DNS intermittent ServFail for Disney subdomain
Mike Hammett (Oct 20)
I know it doesn't help your problem, but friends don't let friends use public DNS resolvers (Google, L3, Open DNS,
etc.). ;-)
-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
Midwest-IX
http://www.midwest-ix.com
----- Original Message -----
From: "David Sotnick" <sotnickd-nanog () ddv com>
To: "NANOG" <nanog () nanog org>
Sent: Thursday, October 19, 2017 10:41:46 PM...
Re: Google DNS intermittent ServFail for Disney subdomain
valdis . kletnieks (Oct 20)
On Fri, 20 Oct 2017 08:01:00 +0200, Bjørn Mork said:
Worthy .sig fodder indeed. :)
Interesting People — David Farber moderates this list for discussion involving internet governance, infrastructure, and any other topics he finds fascinating
Fwd: Re There's no future for taxis': New York yellow cab drivers drowning in debt
Dave Farber (Oct 20)
A large number on the medallions in New York City are owned by two corporations who asked Nyc to pay them for their
loses!!!!
DJF
Begin forwarded message:
> From: "John R. Levine" <johnl () iecc com>
> Date: October 20, 2017 at 7:06:18 PM EDT
> To: "Bob Hinden" <bob.hinden () gmail com>
> Cc: "Dave Farber" <farber () gmail com>
> Subject: Re: [IP] Re There's no future for...
Jeff Sessions Just Confessed His Negligence on Russia – Foreign Policy
Dave Farber (Oct 20)
http://foreignpolicy.com/2017/10/20/jeff-sessions-just-confessed-his-negligence-on-russia/
-------------------------------------------
Archives: https://www.listbox.com/member/archive/247/=now
RSS Feed: https://www.listbox.com/member/archive/rss/247/18849915-ae8fa580
Modify Your Subscription: https://www.listbox.com/member/?member_id=18849915&id_secret=18849915-aa268125
Unsubscribe Now:...
Re There's no future for taxis': New York yellow cab drivers drowning in debt
Dave Farber (Oct 20)
Begin forwarded message:
> From: Bob Hinden <bob.hinden () gmail com>
> Date: October 20, 2017 at 4:42:03 PM EDT
> To: "John R. Levine" <johnl () iecc com>
> Cc: Bob Hinden <bob.hinden () gmail com>, Dave Farber <farber () gmail com>
> Subject: Re: [IP] Re There's no future for taxis': New York yellow cab drivers drowning in debt
>
> John,
>
> I use Gett a lot when I am in...
5 Ultimas Unidades Disponibles
no responder (Oct 20)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)
https://app.embluemail.com/Online/VO.aspx?6c4h-R-ek5br76dbKwIKEi-R-9i:,i,9-R-0
Re There's no future for taxis': New York yellow cab drivers drowning in debt
Dave Farber (Oct 20)
Begin forwarded message:
> From: "John Levine" <johnl () iecc com>
> Date: October 20, 2017 at 3:02:05 PM EDT
> To: dave () farber net
> Subject: Re: [IP] There's no future for taxis': New York yellow cab drivers drowning in debt
>
> In article <24E0A272-6F4F-4DC6-90E8-F4A64462CD88 () gmail com> you write:
>>> 'There's no future for taxis': New York yellow cab drivers...
ULTIMO DIA u$s 20.000 de DESCUENTO, ULTIMA UNIDAD
no responder (Oct 20)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)
https://app.embluemail.com/Online/VO.aspx?6c4h-R-ek5br96cbKwIKEi-R-9i:,i,9-R-0
There's no future for taxis': New York yellow cab drivers drowning in debt
Dave Farber (Oct 20)
Begin forwarded message:
> From: Dewayne Hendricks <dewayne () warpspeed com>
> Date: October 20, 2017 at 10:55:55 AM EDT
> To: Multiple recipients of Dewayne-Net <dewayne-net () warpspeed com>
> Subject: [Dewayne-Net] 'There's no future for taxis': New York yellow cab drivers drowning in debt
> Reply-To: dewayne-net () warpspeed com
>
> 'There's no future for taxis': New York...
How the FCC helped pave the way for Sinclair to take over American broadcasting
Dave Farber (Oct 20)
Begin forwarded message:
> From: Dewayne Hendricks <dewayne () warpspeed com>
> Date: October 20, 2017 at 9:50:46 AM EDT
> To: Multiple recipients of Dewayne-Net <dewayne-net () warpspeed com>
> Subject: [Dewayne-Net] How the FCC helped pave the way for Sinclair to take over American broadcasting
> Reply-To: dewayne-net () warpspeed com
>
> How the FCC helped pave the way for Sinclair to take over American...
84 CUOTAS, así podes abonar tu Depto, desde u$s 760,72 x MES☺☺
noresponder (Oct 20)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)
https://app.embluemail.com/Online/VO.aspx?6c4h-R-ek5br78cbKwIKEi-R-9i:,i,9-R-0
The death of the startup: is big tech squeezing out the competition? | Technology | The Guardian
Dave Farber (Oct 20)
Begin forwarded message:
> From: Allan Davidson <alland () heckerty com>
> Date: October 20, 2017 at 8:19:53 AM EDT
> To: Dave Farber <dave () farber net>
> Subject: The death of the startup: is big tech squeezing out the competition? | Technology | The Guardian
>
> Hi Dave
>
> Thought this might interest readers of your list:
>
>
>>
>>...
Re:Oil Painting/Customizing Portrait/Amy/Supply
Amy (Oct 19)
Dear lists-ip-jhof () seclists org:
Glad to write to you. This is Amy from the largest oil painting trading market in Shenzhen, China.We supply all kinds
of handmade oil painting (Classical Oil Painting, Portrait Painting, Abstract Paintings, Landscape Paintings,
Customizing Portrait and so on.) with high quality and competitive price. Hope to cooperate with you.Please visit our
website http://www.find-emails.com/ and Get a Quotation.Feel free...
DOJ Drops Its Demand For Data On 6,000 Facebook Users
Dave Farber (Oct 19)
Begin forwarded message:
> From: Richard Forno <rforno () infowarrior org>
> Date: October 19, 2017 at 5:02:05 PM EDT
> To: Infowarrior List <infowarrior () attrition org>
> Cc: Dave Farber <dave () farber net>
> Subject: DOJ Drops Its Demand For Data On 6,000 Facebook Users
>
> Government Drops Its Demand For Data On 6,000 Facebook Users
>
> from the sunlight-disinfectant dept
>
> It's...
UK Gov't Considering Redefining Social Media Services As Publishers To Make It Easier To Control Them
Dave Farber (Oct 19)
Begin forwarded message:
> From: Richard Forno <rforno () infowarrior org>
> Date: October 19, 2017 at 11:49:38 AM EDT
> To: Infowarrior List <infowarrior () attrition org>
> Cc: Dave Farber <dave () farber net>
> Subject: UK Gov't Considering Redefining Social Media Services As Publishers To Make It Easier To Control Them
>
>
>
> UK Gov't Considering Redefining Social Media Services As...
Network Neutrality and Beyond: The Long Road Ahead
Dave Farber (Oct 19)
Begin forwarded message:
> From: Dewayne Hendricks <dewayne () warpspeed com>
> Date: October 19, 2017 at 9:31:05 AM EDT
> To: Multiple recipients of Dewayne-Net <dewayne-net () warpspeed com>
> Subject: [Dewayne-Net] Network Neutrality and Beyond: The Long Road Ahead
> Reply-To: dewayne-net () warpspeed com
>
> Network Neutrality and Beyond: The Long Road Ahead
> By Michael Copps
> Oct 18 2017
> <...
COMO CONSEGUIR NUEVOS CLIENTES ???
no responder (Oct 19)
Su Cliente de Mail NO soporta mensajes en formato HTML.
Para ver correctamente el contenido del correo COPIE y PEGUE la siguiente URL
en su Navegador Web (Chrome / Internet Explorer / FireFox / Safari)
https://app.embluemail.com/Online/VO.aspx?6c4h-R-ek5bq75dbKwIKEi-R-9i:,i,9-R-0
The RISKS Forum — Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.
Risks Digest 30.48
RISKS List Owner (Oct 19)
RISKS-LIST: Risks-Forum Digest Thursday 19 October 2017 Volume 30 : Issue 48
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.48>
The current issue can also...
Risks Digest 30.47
RISKS List Owner (Sep 29)
RISKS-LIST: Risks-Forum Digest Friday 29 September 2017 Volume 30 : Issue 47
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.47>
The current issue can also...
Risks Digest 30.46
RISKS List Owner (Sep 11)
RISKS-LIST: Risks-Forum Digest Monday 11 September 2017 Volume 30 : Issue 46
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.46>
The current issue can also...
Risks Digest 30.44
RISKS List Owner (Aug 31)
RISKS-LIST: Risks-Forum Digest Thursday 31 August 2017 Volume 30 : Issue 44
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.44>
The current issue can also be...
Risks Digest 30.43
RISKS List Owner (Aug 14)
RISKS-LIST: Risks-Forum Digest Monday 14 August 2017 Volume 30 : Issue 43
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.43>
The current issue can also be...
Risks Digest 30.42
RISKS List Owner (Aug 07)
RISKS-LIST: Risks-Forum Digest Monday 7 August 2017 Volume 30 : Issue 42
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.42>
The current issue can also be...
Risks Digest 30.41
RISKS List Owner (Aug 01)
RISKS-LIST: Risks-Forum Digest Tuesday 1 August 2017 Volume 30 : Issue 41
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.41>
The current issue can also be...
Risks Digest 30.40
RISKS List Owner (Jul 28)
RISKS-LIST: Risks-Forum Digest Friday 28 July 2017 Volume 30 : Issue 40
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.40>
The current issue can also be...
Risks Digest 30.39
RISKS List Owner (Jul 22)
RISKS-LIST: Risks-Forum Digest Saturday 22 July 2017 Volume 30 : Issue 39
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.39>
The current issue can also be...
Risks Digest 30.38
RISKS List Owner (Jul 17)
RISKS-LIST: Risks-Forum Digest Monday 17 July 2017 Volume 30 : Issue 38
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.38>
The current issue can also be...
Risks Digest 30.37
RISKS List Owner (Jul 14)
RISKS-LIST: Risks-Forum Digest Friday 14 July 2017 Volume 30 : Issue 37
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.37>
The current issue can also be...
Risks Digest 30.36
RISKS List Owner (Jul 07)
RISKS-LIST: Risks-Forum Digest Friday 7 July 2017 Volume 30 : Issue 36
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, moderator, chmn ACM Committee on Computers and Public Policy
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/30.36>
The current issue can also be...
BreachExchange — BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.
Lack of preparation tops the list of cybersecurity threats, senators say
Audrey McNeil (Oct 20)
http://valleycentral.com/news/nation-world/senators-say-lack-of-preparation-tops-the-list-of-cybersecurity-threats
In the array of cybersecurity threats, from data theft to disinformation,
election hacking and attacks on critical infrastructure, lawmakers warned
that the most serious threat may be the government's lack of preparation.
Officials responsible for the nation's cybersecurity appeared before the
Senate Armed Services...
Cybersecurity Myths Debunked
Audrey McNeil (Oct 20)
https://www.natlawreview.com/article/cybersecurity-myths-debunked
Security incidents, loss of customer data, exposure of confidential
corporate assets, demands of ransom, and similar stories are becoming daily
headlines with the impacts being felt across a wide variety of industries.
We hear it every day. One need not go looking in the history books for
examples of significant and costly breaches of sensitive data maintained by
companies and...
An Overview of the Security Ecosystem in Programming
Audrey McNeil (Oct 20)
https://www.javacodegeeks.com/2017/10/overview-security-
ecosystem-programming.html
As is the case in recent years, security breaches are becoming ever more
accepted. Just take the recent Equifax breach as an epic example. No matter
where we look, it seems like someone is always falling victim to some form
of malicious attack or another.
While the recent breach is fresh in our minds, I wanted to take a moment to
get an overview of the security...
Aetna Slapped With Another Lawsuit Alleging Invasion of Privacy Against HIV Patients
Audrey McNeil (Oct 20)
http://www.ctlawtribune.com/id=1202800794899/Aetna-
Slapped-With-Another-Lawsuit-Allegedly-Invasion-of-Privacy-
Against-HIV-Patients?slreturn=20170919161600
Aetna is facing its second prospective class action for allegedly breaching
the privacy of HIV patients.
The health insurance giant, which appeared in federal court in Pennsylvania
in August, was sued again Thursday in U.S. District Court in Hartford by
three individuals representing the...
Why a risk assessment should be in your future
Audrey McNeil (Oct 20)
https://www.csoonline.com/article/3234354/data-breach/
why-a-risk-assessment-should-be-in-your-future.html
Companies that put cyber risk assessments on the backburner will quickly
find themselves enmeshed in controversy if their controls are found to be
inadequate, or fail to satisfy regulatory requirements.
Recent legislation, such as HIPAA, Sarbanes-Oxley and Gramm-Leach-Bliley,
not only contain references as to how organizations should...
Big Data Security Presents Big Challenges
Audrey McNeil (Oct 20)
http://it.toolbox.com/blogs/understanding-crm/big-data-
security-presents-big-challenges-78776
Big data means big responsibilities, and anyone worried about protecting
and preserving big data needs to accept those responsibilities. Those
running business enterprises, in particular, must remain in compliance with
all steps necessary to keep data from being destroyed or compromised.
Imagine if all the sales and earnings figures for the past year...
Agency report: Most businesses couldn't withstand cyberattack
Destry Winant (Oct 19)
https://www.theet.com/news/free/agency-report-most-businesses-couldn-t-withstand-cyberattack/article_d1e81455-f3f3-5c94-b5a5-93efbe683dce.html
Half of small businesses report they could remain profitable for only
one month if they lost essential data, according to a new report
released by the Better Business Bureau in conjunction with National
Cybersecurity Awareness Month.
“Profitability is the ultimate test of risk,” said Bill Fanelli,...
Top real estate company admits to being unwitting source of country’s largest personal data breach
Destry Winant (Oct 19)
https://www.timeslive.co.za/news/south-africa/2017-10-18-top-real-estate-company-admits-to-being-unwitting-source-of-countrys-largest-personal-data-breach/
One of South Africa’s top real estate companies has admitted to being
the unwitting source of the largest known personal data breach to date
in the country.
TimesLIVE has also ascertained that the dump of personal information —
estimated at 31.6 million records — includes the estimated...
Realistic Cybersecurity for Small- and Mid-Sized Enterprises
Inga Goddijn (Oct 18)
http://www.brinknews.com/realistic-cybersecurity-for-small-and-mid-sized-enterprises/
In June of this year, a data analytics firm working for the Republican
National Committee left databases of 198 million U.S. citizen voter files
exposed to the Internet without security, making the RNC susceptible to
theft by cyber criminals for 10 to 14 days. Following the incident, the RNC
suspended its relationship with the third-party firm.
Reading the...
Why Certification Matters for Cloud Service Providers
Inga Goddijn (Oct 18)
https://cloudtweaks.com/2017/10/certification-cloud-service-providers/
Certification for Cloud Service Providers
As of 2017, the concept of “*cloud*” has become more of a norm for
companies and organizations worldwide. Most now use cloud service providers
(CSPs) for some part of their business, and cloud has grown from simply
being an IT concern to a C-level concern. Debate continues over the
varieties of cloud available, such as...
How We Can Turn National Cybersecurity Awareness Month Into Cybersecurity Action
Inga Goddijn (Oct 18)
https://dzone.com/articles/how-we-can-turn-national-cybersecurity-awareness-m
Want to take a peek at the World’s Worst Data Breaches? Here
<http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/>
you go.
Now that we’ve got that out of the way, let’s start this blog post over
again. Our goal isn’t to frighten you or deepen the numbness you might
already be feeling from the drip, drip, drip of bad...
THE RIGHT STUFF: BUILDING AN EFFECTIVE CYBERSECURITY INCIDENT RESPONSE TEAM
Inga Goddijn (Oct 18)
http://www.insidecounsel.com/2017/10/17/the-right-stuff-building-an-effective-cybersecurit?slreturn=1508263317
I. A Multi-disciplinary Team-based Approach to Incident Response
A well thought-out and practical incident response plan is a key component
of any comprehensive information security program. But, organizations often
make the mistake of categorizing the incident response plan as an “IT
issue” or a “legal issue.” A...
Data breach at Arden Hills-based Catholic financial services provider affects nearly 130K accounts
Inga Goddijn (Oct 18)
http://www.twincities.com/2017/10/16/catholic-united-financial-data-breach-may-have-affected-nearly-130k-accounts/
A data breach at an Arden Hills-based financial services company serving
Catholic Church members in the upper Midwest has affected nearly 130,000
current and former members.
The unidentified hacker accessed the first and last names, mailing
addresses, dates of birth, email addresses, insurance policy information,
and Social...
Microsoft responded quietly after detecting secret database hack in 2013
Richard Forno (Oct 17)
#Cyber Risk
October 17, 2017 / 5:06 AM / in 6 hours
Microsoft responded quietly after detecting secret database hack in 2013
Joseph Menn
http://www.reuters.com/article/us-microsoft-cyber-insight/microsoft-responded-quietly-after-detecting-secret-database-hack-in-2013-idUSKBN1CM0D0
(Reuters) - Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly
sophisticated hacking group more than four...
FTC Provides Guidance on Reasonable Data Security Practices (Part I of III)
Inga Goddijn (Oct 17)
http://www.jdsupra.com/legalnews/ftc-provides-guidance-on-reasonable-18941/
Over the past 15 years, the Federal Trade Commission (FTC) has brought
more than 60 cases against companies for unfair or deceptive data security
practices that put consumers’ personal data at unreasonable risk. Although
the FTC has stated that the touchstone of its approach to data security is
reasonableness, the FTC has faced considerable criticism from the...
Metasploit — Development discussion for Metasploit, the premier open source remote exploitation tool
nullcon se7en CFP is open
nullcon (Aug 25)
Dear Friends,
Welcome to nullcon se7en!
$git commit -a <sin>
<sin> := wrath | pride | lust | envy | greed | gluttony | sloth
nullcon is an annual security conference held in Goa, India. The focus
of the conference is to showcase the next generation of offensive and
defensive security technology. We happily open doors to researchers
and hackers around the world working on the next big thing in security
and request...
Ruxcon 2015 Final Call For Presentations
cfp (Jul 05)
Ruxcon 2015 Final Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre
http://www.ruxcon.org.au
The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.
This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre,
Melbourne, Australia.
The deadline for submissions is the 15th of September, 2015.
.[x]. About Ruxcon .[x]....
Wireshark — Discussion of the free and open source Wireshark network sniffer. No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.
Re: Looking for example s1ap pcaps
Pascal Quantin (Oct 19)
Hi Brien,
2017-10-19 9:46 GMT+02:00 Brien Colwell <xcolwell () gmail com>:
You can find a few samples here: http://www.ng4t.com/wireshark.html
Best regards,
Pascal.
Looking for example s1ap pcaps
Brien Colwell (Oct 19)
Hi,
I'm looking for example LTE S1AP pcaps to study. I'm trying to
understand the protocol more deeply and looking for more data to learn with.
Best,
Brien
Re: Parameter passing when using a dissector table to call a sub-dissector
Anders Broman (Oct 19)
-----Original Message-----
From: Wireshark-dev [mailto:wireshark-dev-bounces () wireshark org] On Behalf Of Richard Sharpe
Sent: den 18 oktober 2017 19:15
To: Developer support list for Wireshark <wireshark-dev () wireshark org>
Subject: [Wireshark-dev] Parameter passing when using a dissector table to call a sub-dissector
Hi folks,
During the review of a new protocol dissector it was suggested that I add a dissector table for the TLVs...
Re: Tips regarding measuring function execution times
Paul Offord (Oct 19)
Thanks Graham,
I wasn’t aware of that. The hot path concept is the same as I get from PerfView but I may need to get even more
granular, i.e. code blocks rather than functions, hence the interest in timers. I also thought that timing would give
me a cross check. I plan to look into Guy’s suggestion regarding CPU time – as he says, I only need relative values.
I’ll try to find some time this weekend.
Best regards…Paul
From:...
Parameter passing when using a dissector table to call a sub-dissector
Richard Sharpe (Oct 18)
Hi folks,
During the review of a new protocol dissector it was suggested that I
add a dissector table for the TLVs that are in the protocol so that
other dissectors can use them.
This raises an issue, however. The filter expressions for such
dissected results will always be those of the dissector was written
for, however, if you are using another dissectors sub-dissectors you
would like to be able to override their search strings.
For example,...
TLS_EDCHE_RSA_WITH_AES_128_GCM_SHA256
Sadik Sikder (Oct 18)
hello all
can anyone tell me that this cipher suite
-TLS_EDCHE_RSA_WITH_AES_128_GCM_SHA256 in order to decrypt how many byte
block requires or key block requires?
*Kind Regards,*
Samsuddin Sikder
Masters Student
M.Sc. in Communication Systems Engineering
Cologne University of Applied Sciences (FH-Köln),Germany
Re: Favoring Npcap over WinPcap at runtime?
Graham Bloice (Oct 18)
And thinking a little bit more my view is that if we don't add a
preference\command flag, WinPcap is still our preferred solution as it's
bundled in the installer, hence we should prefer that. If users want
Wireshark to use Npcap, they will have to uninstall WinPcap.
Re: Favoring Npcap over WinPcap at runtime?
Graham Bloice (Oct 18)
Presumably dumpcap could also have a command flag to select which to use.
Thinking about my own workflow, when capturing "oddities" occur, and Npcap
is installed, a remedial option is to uninstall it. Having a switch in
Wireshark would make life easier.
Re: Favoring Npcap over WinPcap at runtime?
Pascal Quantin (Oct 18)
2017-10-18 11:54 GMT+02:00 Graham Bloice <graham.bloice () trihedral com>:
Unfortunately a Wireshark preference is not doable, as wpcap.dll is also
loaded by dumpcap that does not use our preferences module. A registry key
might do the trick. Presumably tshark should also have a command flag
allowing you to configure it.
I guess the underlying question is: what kind of power users would have
both Npcap and WinPcap installed? Either...
Re: Favoring Npcap over WinPcap at runtime?
Graham Bloice (Oct 18)
On 18 October 2017 at 09:45, Pascal Quantin <pascal.quantin () gmail com>
wrote:
I'm generally in agreement with all the above, but I'm torn on hard-coding
a preference for one capture library over another. If a system has both,
who are we to say which one will be used to the exclusion of the other.
I guess I'm implying we should expose a preference to allow the user to
choose which is definitely more work but does give...
Favoring Npcap over WinPcap at runtime?
Pascal Quantin (Oct 18)
Hi list,
when we introduced Npcap support back in 2015/2016, we decided that WinPcap
driver should have higher precedence due to its known stability (and
despite issues with newer Windows versions). By that time, you could get a
BSoD with Npcap.
Time has elapsed since, and Npcap is now bundled with Nmap. The number of
commits in Npcap repository (https://github.com/nmap/npcap/) have also
decreased, which hopefully means that the product is...
Re: bad UDP reassembly
Graham Bloice (Oct 17)
The Wireshark Bugzilla is the place for that, where you can attach the
capture to the item you raise: https://bugs.wireshark.org
bad UDP reassembly
Deny IP Any Any (Oct 17)
I have a capture, which I believe shows a device fragmenting UDP packets
and not setting the 'More Fragment's flags correctly. Wireshark reassembles
the packets, but the 'length' column is not correct for this packet.
I would expect Wireshark to show an error or indicate that there is
something wrong with the packets, but it doesn't. Can I send this small
capture to someone else to confirm?
using wireshark 2.4.1 on...
Re: build problems with the latest pull
Guy Harris (Oct 17)
Yes - you're using the configure script. The configure script expects pkg-config to be able to find Qt, but, as the
Qt-for-macOS package doesn't install any .pc files, that doesn't work on macOS.
Use CMake, instead. (It might also increase the chances that running the Wireshark that results from the build will
actually post its menu bar; I've had reasonable luck with that recently with autotools builds, but there have...
Re: build problems with the latest pull
Eliot Lear (Oct 17)
OSX. Clearly I'm doing something wrong. And I was wrong twice, it
doesn't build with 5.5 either. Am I missing a path variable somewhere?
I definitely have PKG_CONFIG_PATH set correctly, as well as my PATH...
Snort — Everyone's favorite open source IDS, Snort. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.
Re: correct pflog comment in src/decode.h
Joel Esler (jesler) via Snort-devel (Oct 21)
Please follow the link at the bottom of every email to the list to unsubscribe.
Visibility tests
Armindo Rodrigues via Snort-users (Oct 20)
Hi all,
Does anyone have recommendations on visibility testing? We recently tuned
and tweaked the IDS setting a number of policies, groups, and rules and I
want to make sure we didn’t design any blind spots.
I was thinking of making a couple custom rules and set them off on various
parts of the network but figured I’d ask if anyone has done this before and
see if there were any pointers.
Re: correct pflog comment in src/decode.h
Lawrence Belyeu via Snort-devel (Oct 20)
Please take me off this list. No longer need it.
correct pflog comment in src/decode.h
Markus Lude (Oct 20)
Hello,
please correct the comment in src/decode.h
Regards
Markus
--- src/decode.h.orig
+++ src/decode.h
@@ -835,9 +835,9 @@ typedef struct _SLLHdr {
* Pflog1_Hdr: CVS = 1.3, DLT_OLD_PFLOG = 17, Length = 28
* Pflog2_Hdr: CVS = 1.8, DLT_PFLOG = 117, Length = 48
* Pflog3_Hdr: CVS = 1.12, DLT_PFLOG = 117, Length = 64
- * Pflog3_Hdr: CVS = 1.172, DLT_PFLOG = 117, Length = 100
+ * Pflog4_Hdr: CVS = 1.16, DLT_PFLOG =...
snort 2.9.11 warnings with clang/llvm on OpenBSD 6.2
Markus Lude (Oct 20)
Hello,
while building snort 2.9.11 with clang/llvm 4.0.0 I get a lot of
warnings.
build was done on OpenBSD 6.2 on i386
timeval vs. bpf_timeval problem is OpenBSD-related.
Regards
Markus
warning messages (build log available on request):
/usr/ports/pobj/snort-2.9.11/snort-2.9.11/src/sfutil/acsmx.c:825:11: warning: explicitly assigning value of variable of
type 'ACSM_STRUCT *' to itself [-Wself-assign]
p = p;
~ ^ ~...
Re: Crash using the latest build from Git
Russ via Snort-users (Oct 19)
Hey João,
The backtrace definitely indicates a problem. Can we get a pcap to help
debug? In the meantime, what happens if you build without debug?
Hopefully that gets you going until we have a fix.
Thanks
Russ
RULE DETECT FULL SYN SCAN
nguyen cao via Snort-users (Oct 19)
when I run : nmap -sS IP ( IP target ). Rule snort not given alert.
So, can anybody tell me rule detect this type SYN SCAN ? Tks
SNORT SMS ALERT
nguyen cao via Snort-users (Oct 19)
Can someone tell me how to send sms alert of snort? As detailed as
possible. thank you
Re: Crash using the latest build from Git
Russ via Snort-users (Oct 19)
Ouch. We're on it. Thanks.
Crash using the latest build from Git
João Soares via Snort-users (Oct 19)
Hello everyone,
I've just updated my Snort++ build to the latest one directly from git,
and I'm getting a crash.
Here goes the version details and the backtrace:
,,_ -*> Snort++ <*-
o" )~ Version 3.0.0 (Build 239) from 2.9.8-383
'''' By Martin Roesch & The Snort Team
http://snort.org/contact#team
Copyright (C) 2014-2017 Cisco...
Snort Subscriber Rules Update 2017-10-19
Research (Oct 19)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the browser-ie,
indicator-compromise, indicator-obfuscation, malware-cnc, os-windows,
policy-other and server-webapp rule sets to provide coverage for
emerging threats from these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Re: QinQ and 802.1ah headers
jan hugo prins (Oct 19)
That is really cool.
Could you tell me when I will be able to test it for you ;-) ?
Jan Hugo Prins
Re: QinQ and 802.1ah headers
Russ via Snort-users (Oct 19)
I've got a new pbb codec for Snort++. It will be out soon.
Re: QinQ and 802.1ah headers
Al Lewis (allewi) via Snort-users (Oct 19)
Its a little easier in Snort++ than in Snort2.
There are instructions in each version for extending snorts capabilities (within their downloads).
Albert Lewis
ENGINEER.SOFTWARE ENGINEERING
SOURCEfire, Inc. now part of Cisco
Email: allewi () cisco com<mailto:allewi () cisco com>
From: Jan Hugo Prins <jhp () jhprins org<mailto:jhp () jhprins org>>
Date: Thursday, October 19, 2017 at 7:11 AM
To: allewi <allewi () cisco...
Re: QinQ and 802.1ah headers
Jan Hugo Prins (Oct 19)
How much work would it be to support this header? As far as I'm concerned it would be enough to strip the header and
work with the underneath packet.
Jan Hugo
We also maintain archives for these lists (some are currently inactive):
Read some old-school private security digests such as Zardoz at SecurityDigest.Org
We're always looking for great network security related lists to archive. To suggest one, mail Fyodor.
|