|
SecLists.Org Security Mailing List Archive
Any hacker will tell you that the latest news and exploits are not
found on any web site—not even Insecure.Org. No, the cutting edge
in security research is and will continue to be the full
disclosure mailing lists such as Bugtraq. Here we provide web
archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. Browse the individual lists below, or search them all:
Nmap Development — Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects. Subscribe here.
[NSE] Problems with authentication in ms-sql in Nmap 7.91+
Paulino Calderon (Jan 14)
Hey,
I was wondering if anyone familiar with the MS-SQL protocol knows what
might be happening here. The dev branch version crashes at the moment
when scanning Microsoft SQL Server 2005 9.00.3042; SP2:
NSE: [ms-sql-brute M:b41d0c xx.xx.xx.xx] MSSQL-SSRP: SSRP Data:
ServerName;XXXX;InstanceName;MSSQLSERVER;IsClustered;No;Version;9.00.3042.00;tcp;1433;;
NSE: [ms-sql-brute M:b41d0c xx.xx.xx.xx] MSSQL-SSRP: SSRP Substrings:...
Special MAC Addresses
Toni Ruottu (Jan 02)
Hi!
I encountered two interesting MAC address reuse cases while exploring
Commodore 64 networking. I'm wondering if these two cases are mere
exceptions. If there are lots of MAC addresses with special meanings it
might be nice if nmap shipped with a list of them and warned the user when
one of them is encountered.
RR-Net is perhaps the most used NIC for C64 networking. According to the
manufacturer documentation some models of the NIC do...
[no subject]
Le Aluminarti (Dec 16)
Re: [nmap/nmap] Replace deprecated CPEs for Microsoft IIS. #2401 (PR #2402)
Esa Jokinen via dev (Dec 10)
On Tue, 2021-12-07 at 15:07 -0800, nnposter <notifications () github com>
wrote:
(From https://github.com/nmap/nmap/pull/2402)
I was wondering the same. According to CONTRIBUTING.md, GitHub should
be used for pull requests. The changes are manually added to the
Subversion repository and synced back from there. However, the document
also states that the GitHub repository should be read only.
In my opinion the documented workflow seems a...
Q: "nmap as a service" monitoring project?
Jacek Wielemborek (Dec 09)
Hi,
I'd like to continuously port-scan given IPs and get informed once any
of the ports opens or closes. Is there any (preferably open source)
project that works this way?
Cheers,
Jacek "d33tah" Wielemborek
nc -kle 'cat largefile' doesn't transmit correctly
Tobias Girstmair (Nov 27)
Hi folks,
I'm using ncat as a simple web server, as described in
https://nmap.org/ncat/guide/ncat-tricks.html#ncat-httpserv . The file
I'm serving is relatively large (80kB), and I noticed that it gets
mangled very often: a section of over a kilobyte is missing from the
middle (at packet boundaries; e.g. after 44888 bytes using 1448 sized
packets).
This seems to only happen when using --exec or --sh-exec; not when
piping the same file...
Re: smb NSE scripts with special characters password
Carlos Gomes - FCHS (Nov 25)
Sorry, but both links are not working.
Also I did not understand what list are we talking about :D
Em qua., 24 de nov. de 2021 às 18:11, Oliver Aldridge <oliver () aldridge net>
escreveu:
Re: npcap-1.55.exe flaged as malicious
Gordon Fyodor Lyon (Nov 24)
Hi Onno. Good question. Npcap Version 1.55 is absolutely not malicious or
infected by anything, but unfortunately there are a many garbage antivirus
engines out there which flood VirusTotal with false positives like this.
The latest VirusTotal report on Npcap 1.55
<https://www.virustotal.com/gui/file/0bcc56aef29b24985d7f658cd34013b08cb53ad5bf6b6ac2a982a5f6d4d95800>
shows
that only 2 of their 66 AV engines flag any issues.
If there are any...
problem starting the driver
YouTube King (Nov 24)
Hello,
I've been trying to run "SelfishNet" but it gives a message "problem
starting the driver" then "problem installing the drivers, do you have
administrator privileges?" that after installing npcap.
Then I installed "winpcap" alone and rebooted but the program displays
nothing as if it's never stared.
Do you have any solution for this problem?
I know the program is old and not supported but...
Re: smb NSE scripts with special characters password
Oliver Aldridge (Nov 24)
Good afternoon! Our managers generated required list and I send it to you. File can be found via this link:
1)vulkanvegas1000.fanalikhtiyar.com/veritatisdebitis/cumquedolorem-3181671
2)bitcoinguidebooklive.mydemosystems.com/similiquedolor/autalias-3181671
Hello Everyone
I'm trying to do a nmap scan using some smb nse scripts, mostly with authenticated shares parsing user / password
within the script-args.
But when the share uses...
NMAP PR #2397: IoTVAS connected device discovery and risk assessment script
Behrang Fouladi (Nov 24)
Hello,
I'd like to contribute a NSE script that enables nmap to perform accurate device discovery and risk assessment of
IoT/connected devices such as IP cameras, printers and video conferencing devices. It does so by receiving the device
network service banners (snmp, http, ftp, telnet and upnp) from nmap engine and submitting it to the Firmalyzer's
IoTVAS API endpoint (link to the documentation and swagger UI : ...
npcap-1.55.exe flaged as malicious
Rommen, Onno via dev (Nov 24)
Hi guys,
VirusTotal flags npcap-1.55.exe, as available on your site, as malicious. Are you aware of that and what is your
reaction on that please?
Hope to hear from you soon.
Sincerely,
Onno Rommen, Lloyd's Register
(Working days Monday, Tuesday, Wednesday & Thursday)
Senior Lead Auditor Information Security, LRQA
T +31 (0)10 2500 505 M +31 (0)6 1746 1166 E onno.rommen () lr org<mailto:onno.rommen () lr org>
Lloyd's...
nmap 7.92 build fails on Fedora 34
ndof () gmx li (Nov 24)
Hi developers,
building nmap on Fedora 33 works, but fails on Fedora 34 with:
make[1]: Leaving directory '/builddir/build/BUILD/nmap-7.92/libnetutil'
netutil.cc: In function 'const void* icmpv6_get_data(const icmpv6_hdr*,
unsigned int*)':
netutil.cc:756:13: error: invalid use of incomplete type 'const struct
icmpv6_hdr'
756 | if (icmpv6->icmpv6_type == ICMPV6_TIMEXCEED ||
icmpv6->icmpv6_type ==...
possibly a bug or MS voodoo
Schmidt, Nathanael via dev (Nov 24)
Hello developer,
i have following Problem. I try to ping scan my local network using nmap, but it doesn't seem to find machines that are
for sure alive. It responses to Windows ping but not to nmap ping scan. I searched the problem in the internet. I don't
found a solution.
Results for ping (Transleted from German) :
Ping is executed for 172.27.97.21 with 32 bytes of data:
Reply from 172.27.97.21: Bytes=32 Time<1ms TTL=127
Reply...
Re: smb NSE scripts with special characters password
Carlos Gomes - FCHS (Nov 02)
We updated our environment to use nmap 7.92, but still have the same issue
on escaping characters
Any help / tips are welcome :D
Em dom., 31 de out. de 2021 às 12:37, Carlos Gomes - FCHS <
carlos.henrique () unesp br> escreveu:
Nmap Announce — Moderated list for the most important new releases and announcements regarding the Nmap Security Scanner and related projects. We recommend that all Nmap users subscribe.
Npcap 1.60 Release: Code Hardening, Compatibility, and Bug Fixes
Gordon Fyodor Lyon (Dec 08)
Hi Nmap (and Npcap) hackers! I hope you're enjoying the start of the
holidays. For your first stocking stuffer, we're happy to release Npcap
Version 1.60! We also released (but never actually announced) Version 1.55
in September. We put out Versions 1.12 and 1.11 of the SDK too. None of
these try to wow you with major new features. We're excited about a lot of
those in the pipeline, but we focused the last few months on...
Nmap 7.92 Defcon Release!
Gordon Fyodor Lyon (Aug 07)
Hi folks. Many of us can't attend Defcon in person this year due to global
pandemic, but we won't let that stop our traditional Defcon Nmap release!
We just posted Nmap 7.92 to https://nmap.org/download.html. It includes
dozens of performance improvements, feature enhancements, and bug fixes
that we've made over the last 10 months.
The biggest improvement (at least for Windows users) is the inclusion of
version 1.50 of Npcap (...
Npcap 1.50 Release Brings Nmap & Wireshark to Windows ARM devices
Gordon Fyodor Lyon (Jun 28)
Hi folks. The Nmap Project is pleased to release Npcap version 1.50 at
https://npcap.org. There are many improvements in this release, but the
one we're most excited about is support for the ARM architecture! This
allows apps like Nmap and Wireshark to run for the first time on a newer
generation of hardware which often includes all-day battery life and
always-on LTE/5G capabilities. Devices vary from the $349 Samsung Galaxy
Book Go...
Npcap 1.30 Released: Raw WiFi + Better Performance
Gordon Fyodor Lyon (Apr 12)
Hi folks. The Nmap Project is pleased to release Npcap Version 1.30 at
https://npcap.org. We hope Nmap and Wireshark users will be especially
happy with the raw WiFi improvements, since you tend to be particularly
savvy about low-level network inspection. It turns out that some of the
issues we thought were caused by lower level hardware drivers were actually
bugs in our driver. Oops! But at least that means we can fix them
ourselves, and we did....
Npcap 1.20 released
Gordon Fyodor Lyon (Mar 16)
Nmap/Npcap Community:
I'm happy to report the release of version 1.20 of the Npcap Windows packet
capturing/sending driver! It's the first release of 2021 and includes
better capabilities for selecting timestamp methods as well as many other
improvements and bug fixes. These include updating the underlying libpcap
library to version 1.10 and building our installer now with NSIS 3. More
details on all this are available from the...
Nmap 7.91 Bugfix Release
Gordon Fyodor Lyon (Oct 14)
Hello everyone. I'm glad Nmap 7.90 was so well received! There were so
many improvements that the official announcement (
https://seclists.org/nmap-announce/2020/1) was a bit unwieldy. So Daniel
Miller (who made most of those changes) Tweeted his top highlights at
https://twitter.com/bonsaiviking/status/1313247253197393920
While we do work hard to avoid bugs during development and to catch them
pre-release through continuous integration...
Nmap 7.90 Released! First release since August 2019.
Gordon Fyodor Lyon (Oct 03)
Hello everyone. Hot on the heels of the big Npcap 1.00 release (
https://seclists.org/nmap-announce/2020/0), we're delighted to announce a
new Nmap--version 7.90! It's the first Nmap release since Defcon 2019, even
though we've made 16 Npcap releases since then. Raw packets are so
fundamental to Nmap that we really wanted to get it right. With the
production-ready and highly performant Npcap 1.00 driver included, we can
finally...
Npcap 1.00 was just released and a new Nmap is on the way!
Gordon Fyodor Lyon (Sep 28)
Hello everyone. I hope you are all safe and well during this nasty
pandemic. I obviously haven't been wearing my marketing hat enough given
that this is my first mail to the Nmap Announcement list since last
August's Nmap 7.80 release. But we've been heads-down programming since
then and have great news to report!
The biggest news is that, after more than 7 years of development and 170
previous public releases, we're...
Full Disclosure — A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.
Win32.MarsStealer Web Panel / Unauthenticated Remote Data Deletion
malvuln (Jan 16)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/8abb41f6e7010d70c90f65fd9a740faa_C.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Win32.MarsStealer Web Panel
Vulnerability: Unauthenticated Remote Data Deletion
Description: The Mars-Stealer web interface has a "Grab Rules" component
area that lets a user specify which type of files to collect from a system
as...
Win32.MarsStealer Web Panel / Unauthenticated Remote Persistent XSS
malvuln (Jan 16)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/8abb41f6e7010d70c90f65fd9a740faa_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Win32.MarsStealer Web Panel
Vulnerability: Unauthenticated Remote Persistent XSS
Description: The Mars-Stealer web interface has a "Marker Rules" component
area. Third-party attackers who can reach the Mars-Stealer server can send
HTTP...
Win32.MarsStealer Web Panel / Unauthenticated Remote Information Disclosure
malvuln (Jan 16)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/8abb41f6e7010d70c90f65fd9a740faa.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Win32.MarsStealer Web Panel
Vulnerability: Unauthenticated Remote Information Disclosure
Description: The malware web interface stores screen captures named
"screenshot.jpg" in the panel directory, ZIP archived. Third-party
attackers who...
Ab Stealer Web Panel / Unauthenticated Remote Persistent XSS
malvuln (Jan 16)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/9e44c10307aa8194753896ecf8102167.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Ab Stealer Web Panel
Vulnerability: Unauthenticated Remote Persistent XSS
Description: The "Ab Stealer" web Panel By KingDomSc for "AbBuild
v.1.0.exe" is used to browse victim information "Get All Victims Passwords,
With...
SEC Consult SA-20220113-0 :: Cleartext Storage of Phone Password in Cisco IP Phones
SEC Consult Vulnerability Lab, Research (Jan 14)
SEC Consult Vulnerability Lab Security Advisory < 20220113-0 >
=======================================================================
title: Cleartext Storage of Phone Password
product: Cisco IP Phone Series 78x1, 88x5, 88x1, 7832,
8832, 8821 and 3905
vulnerable version: Firmware <14.1.1,
Firmware <11.0(6)SR2 (device model 8821),
Firmware...
🐞 Call for Papers for Hardwear.io USA 2022 is OPEN!
Andrea Simonca (Jan 14)
Hello,
We are happy to announce that the CFP for Hardwear.io USA 2022 is OPEN!
If you have a groundbreaking embedded research or an awesome open-source
tool you’d like to showcase before the global hardware security community,
this is your chance. Send in your ideas on various hardware subjects,
including but not limited to Chips, Processors, ICS/SCADA, Telecom,
Protocols & Cryptography.
✅ SUBMIT your research:...
APPLE-SA-2022-01-12-1 iOS 15.2.1 and iPadOS 15.2.1
Apple Product Security via Fulldisclosure (Jan 12)
APPLE-SA-2022-01-12-1 iOS 15.2.1 and iPadOS 15.2.1
iOS 15.2.1 and iPadOS 15.2.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213043.
HomeKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted HomeKit accessory name...
Reprise License Manager 14.2 - Reflected Cross-Site Scripting
Gionathan Reale via Fulldisclosure (Jan 12)
# Product: RLM 14.2
# Vendor: Reprise Software
# CVE ID: CVE-2021-45422
# Vulnerability Title: Reflected Cross-Site Scripting
# Severity: Medium
# Author(s): Giulia Melotti Garibaldi
# Date: 2022-01-11
#
#############################################################
Introduction:
An issue was discovered in Reprise License Manager 14.2, Reprise License Manager 14.2 is affected by a reflected
cross-site scripting vulnerability...
[RT-SA-2021-009] Credential Disclosure in Web Interface of Crestron Device
RedTeam Pentesting GmbH (Jan 12)
Advisory: Credential Disclosure in Web Interface of Crestron Device
When the administrative web interface of the Crestron HDMI switcher is
accessed unauthenticated, user credentials are disclosed which are valid
to authenticate to the web interface.
Details
=======
Product: Crestron HD-MD4X2-4K-E
Affected Versions: 1.0.0.2159
Fixed Versions: -
Vulnerability Type: Information Disclosure
Security Risk: high
Vendor URL:...
Backdoor.Win32.Controlit.10 / Unauthenticated Remote Command Execution
malvuln (Jan 11)
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/859aab793a42868343346163bd42f485.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Controlit.10
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 3347. Third-party attackers
who can reach an infected system can run any OS commands made available by
the malware...
Full Disclosure DMCA.COM Exploitation
WebSec B.V. (Jan 11)
Publisher: Joel Aviad Ossi
Company: Pentest <https://websec.nl>company WebSec B.V.
Vulnerabilities: Improper access Control, Stored Cross-Site Scripting and
Improper Input Validation
Description: It is possible to inject javascript code into any DMCA account
and takeover the API Token in order to read support messages (It is also
possible to inject such code into the support ticket in order to target
administrators)
Additionally it is...
CVE-2021-39623 Libstagefright (Media Framework on Android) with OOB write on the heap
Marcin Kozlowski (Jan 11)
Hi list,
Maybe you will find it interesting.
Forcedentry state of the art exploit (as I read) used by NSO made it
big. Libstagefright (Media Framework on Android) with OOB write on the
heap (with Scudo) which can possibly own your Mobile by playing an
audio file, didn't. Note: Not sure if you can do RCE with it. Leave it
to experts :P
Here is the repo with reporoducer and possibly also code in the future
to create it when needed....
Microsoft Windows Defender / Detection Bypass
hyp3rlinx (Jan 11)
[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_DETECTION_BYPASS.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec
[Vendor]
www.microsoft.com
[Product]
Windows Defender
Microsoft Defender Antivirus is a major component of your
next-generation protection in Microsoft Defender for Endpoint. This
protection brings together
machine...
Microsoft Windows .Reg File Dialog Spoof / Mitigation Bypass
hyp3rlinx (Jan 11)
[+] Credits: John Page (aka hyp3rlinx)
[+] Website: hyp3rlinx.altervista.org
[+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_REG_FILE_DIALOG_SPOOF_MITIGATION_BYPASS.txt
[+] twitter.com/hyp3rlinx
[+] ISR: ApparitionSec
[Vendor]
www.microsoft.com
A file with the .reg file extension is a Registration file used by the
Windows registry. These files can contain hives, keys, and values.
.reg files can be created from scratch...
Backdoor.Win32.SubSeven.c / Remote Stack Buffer Overflow
malvuln (Jan 07)
Discovery / credits: Malvuln - malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/bc7f4c4689f1b8ad395404d1e75c776f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.SubSeven.c
Vulnerability: Remote Stack Buffer Overflow
Description: The malware listens on TCP port 1111. Third-party attackers
who can reach an infected system can send a specially crafted packet
prefixed with "DOS". This...
Bugtraq — The premier general security mailing list. Vulnerabilities are often announced here first, so check frequently!
Re: [SECURITY] [DSA 4628-1] php7.0 security update
Timesportsall (Jan 16)
------------------------------------------------------------------------
-
Debian Security Advisory DSA-4628-1 security (at) debian (dot) org [email concealed]
https://www.debian.org/security/ Moritz Muehlenhoff
February 18, 2020 https://www.debian.org/security/faq
------------------------------------------------------------------------
-
Package : php7.0
CVE ID : CVE-2019-11045 CVE-2019-11046 CVE-2019-11047
CVE-2019-11050 CVE-2020-7059...
Re: BugTraq Shutdown
tommypickle (Jan 16)
All old school hackers from UPT remember and want to show respect. Thanks for everything.
On Second Thought...
alias (Jan 16)
Bugtraq has been a valuable institution within the Cyber Security community for
almost 30 years. Many of our own people entered the industry by subscribing to it
and learning from it. So, based on the feedback weâve received both from the
community-at-large and internally, weâve decided to keep the Bugtraq list running.
Weâll be working in the coming weeks to ensure that it can remain a valuable asset
to the community for years to...
BugTraq Shutdown
alias (Jan 15)
2020 was quite the year, one that saw many changes. As we begin 2021, we wanted
to send one last note to our friends and supporters at the SecurityFocus BugTraq
mailing list. As many of you know, assets of Symantec were acquired by Broadcom
in late 2019, and some of those assets were then acquired by Accenture in 2020
(https://newsroom.accenture.com/news/accenture-completes-acquisition-of-broadco
ms-symantec-cyber-security-...
Security Basics — A high-volume list which permits people to ask "stupid questions" without being derided as "n00bs". I recommend this list to network security newbies, but be sure to read Bugtraq and other lists as well.
CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - Call For Papers/Presenters is now open
Vic Vandal (Feb 03)
We are pleased to announce that CarolinaCon-15 will be on April 26th-28th 2019 in Charlotte NC at the Renaissance
Charlotte Suites. All who are interested in speaking on any topic in the realm of hacking, cybersecurity, technology,
science, robotics or any related field are invited to submit a proposal to present at the con. Full disclosure that
technology or physical security exploitation type submissions are most desirable for this storied...
Penetration Testing — While this list is intended for "professionals", participants frequenly disclose techniques and strategies that would be useful to anyone with a practical interest in security and network auditing.
44CON 2018 - 12th-14th September, London (UK)
Steve (Feb 28)
44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training
on the 10th and 11th of September, a free evening event on the 12th of September, and a full two-day conference on the
13th and 14th of September. The event takes place at the ILEC Conference Centre near Earls Court, London. 44CON 2018
includes catering, private bus bar and Gin O'Clock breaks. Early Bird discounted...
RootedCON Security Conference - 1-3 March, Madrid (Spain)
omarbv (Feb 11)
On the occasion of the ninth edition of RootedCON, the most important
computer security conference in the country, around 2,000 hackers will
meet to discuss new questions and researchs about the cybersecurity
world, with its risks and threats. National and international experts
have included in their agendas this mandatory appointment to discuss new
vulnerabilities, viruses, and other threats, they will also talk about
countermeasures in order...
Info Security News — Carries news items (generally from mainstream sources) that relate to security.
Ransomware: Why one city chose to the pay the ransom after falling victim
InfoSec News (Aug 12)
https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/
By Danny Palmer
ZDNet.com
August 12, 2020
A US city has explained why it gave into the demands of cyber criminals
and paid a ransom demand of $45,000 following a ransomware attack.
Lafayette, Colorado fell victim to ransomware on July 27, which encrypted
the city's computer networks and caused disruptions to phone services,
email and...
0-days, a failed patch, and a backdoor threat. Update Tuesday highlights
InfoSec News (Aug 12)
https://arstechnica.com/information-technology/2020/08/update-tuesday-fixes-2-0days-and-botched-patch-for-a-backdoor-threat/
By Dan Goodin
Ars Technica
08/12/2020
Microsoft on Tuesday patched 120 vulnerabilities, two that are notable
because they’re under active attack and a third because it fixes a
previous patch for a security flaw that allowed attackers to gain a
backdoor that persisted even after a machine was updated.
Zero-day...
OCR warns hospitals of HIPAA compliance scams
InfoSec News (Aug 12)
https://www.healthcareitnews.com/news/ocr-warns-hospitals-apparent-hipaa-compliance-scams
By Mike Miliard
Healthcare IT News
August 11, 2020
The Office for Civil Rights at the U.S. Department of Health and Human
Services has warned health systems about what appears to be something of
an old-fashioned and low-tech phishing attempt: fraudulent postcards, most
addressed to hospital privacy officers, that warn of noncompliance with a
mandatory...
The Secret SIMs Used By Criminals to Spoof Any Number
InfoSec News (Aug 12)
https://www.vice.com/en_us/article/n7w9pw/russian-sims-encrypted
By Joseph Cox
Vice.com
August 12, 2020
The unsolicited call came from France. Or at least that's what my phone
said. When I picked up, a man asked if I worked with the National Crime
Agency, the UK's version of the FBI. When I explained, no, as a journalist
I don't give information to the police, he said why he had contacted me.
"There are these special SIM...
North Korean Hacking Group Attacks Israeli Defense Industry
InfoSec News (Aug 12)
https://www.nytimes.com/2020/08/12/world/middleeast/north-korea-hackers-israel.html
By Ronen Bergman and Nicole Perlroth
nytimes.com
Aug. 12, 2020
TEL AVIV -- Israel claimed Wednesday that it had thwarted a cyberattack by
a North Korea-linked hacking group on its classified defense industry.
The Defense Ministry said the attack was deflected “in real time” and that
there was no “harm or disruption” to its computer systems.
However,...
FBI says an Iranian hacking group is attacking F5 networking devices
InfoSec News (Aug 11)
https://www.zdnet.com/article/fbi-says-an-iranian-hacking-group-is-attacking-f5-networking-devices/
By Catalin Cimpanu
Zero Day
ZDNet.com
August 10, 2020
A group of elite hackers associated with the Iranian government has been
detected attacking the US private and government sector, according to a
security alert sent by the FBI last week.
While the alert, called a Private Industry Notification, didn't identify
the hackers by name,...
Pen Test Partners: Boeing 747s receive critical software updates over 3.5" floppy disks
InfoSec News (Aug 11)
https://www.theregister.com/2020/08/10/boeing_747_floppy_drive_updates_walkthrough/
By Gareth Corfield
The Register
08/10/2020
DEF CON -- Boeing 747-400s still use floppy disks for loading critical
navigation databases, Pen Test Partners has revealed to the infosec
community after poking about one of the recently abandoned aircraft.
The eye-catching factoid emerged during a DEF CON video interview of PTP's
Alex Lomas, where the man...
US Cyber Command is using unclassified networks to fight election interference
InfoSec News (Aug 10)
https://www.c4isrnet.com/cyber/2020/08/10/us-cyber-command-is-using-unclassified-networks-to-fight-election-interference/
By Mark Pomerleau
C4ISRNET.com
08/10/2020
WASHINGTON -- U.S. Cyber Command is using unclassified networks and
publicly available communication platforms as it works to prevent foreign
interference in the next presidential election, a CYBERCOM official has
revealed.
“From a CYBERCOM standpoint, one of the big changes...
New England guardsmen test their skills in Cyber Yankee 2020
InfoSec News (Aug 03)
https://www.c4isrnet.com/cyber/2020/08/03/new-england-guardsmen-test-their-skills-in-cyber-yankee-2020/
By Mark Pomerleau
C4ISRNET.com
08/03/2020
Members of the National Guard from New England states concluded a two-week
cyber exercise that sought to test the cyber skills of guardsmen and
critical infrastructure operators.
Cyber Yankee 2020, which took place July 21-31 in New Hampshire, involved
more than 200 National Guard members and...
Travel management company CWT hands over $4.5M following ransomware attack
InfoSec News (Aug 03)
https://siliconangle.com/2020/08/02/travel-management-company-cwt-hands-4-5m-following-ransomware-attack/
By Duncan Riley
SiliconAngle.com
08/02/2020
Business travel management company CWT Global B.V. is the latest company
to pay a ransom demand following a ransomware attack.
According to report Friday by Reuters, the company paid $4.5 million to
those behind the ransomware after the attack knocked some 30,000 of the
company’s computers...
DOD, FBI, DHS release info on malware used in Chinese government-led hacking campaigns
InfoSec News (Aug 03)
https://www.cyberscoop.com/taidoor-malware-report-china-cisa-dod-fbi/
By Shannon Vavra
CYBERSCOOP
August 3, 2020
The U.S. government publicly put forth information Monday that exposed
malware used in Chinese government hacking efforts for more than a decade.
The Chinese government has been using malware, referred to as Taidoor, to
target government agencies, entities in the private sector, and think
tanks since 2008, according to a joint...
Leaky S3 buckets have gotten so common that they're being found by the thousands now, with lots of buried secrets
InfoSec News (Aug 03)
https://www.theregister.com/2020/08/03/leaky_s3_buckets/
By Shaun Nichols in San Francisco
The Register
3 Aug 2020
The massive amounts of exposed data on misconfigured AWS S3 storage
buckets is a catastrophic network breach just waiting to happen, say
experts.
The team at Truffle Security says its automated search tools were able to
stumble across some 4,000 open Amazon S3 buckets that included data
companies would not want public, things...
House Republicans introduce legislation to give states $400 million for elections
InfoSec News (Aug 03)
https://thehill.com/policy/cybersecurity/510362-house-republicans-introduce-legislation-to-give-states-400-million-for
By Maggie Miller
The Hill
08/03/2020
A group of House Republicans on Monday introduced legislation that would
appropriate $400 million to states to address election challenges stemming
from the COVID-19 pandemic.
The Emergency Assistance for Safe Elections (EASE) Act would designate
$200 million to assist with sanitizing...
Zoom private meeting passwords were easily crackable
InfoSec News (Jul 30)
https://www.itnews.com.au/news/zoom-private-meeting-passwords-were-easily-crackable-551095
By Juha Saarinen
itnews.com.au
July 31, 2020
The automatically generated passwords protecting private Zoom meetings
could be cracked with relative ease, allowing access to sensitive
conferences, a researcher has discovered.
Web site developer Tom Anthony decided on March 31 this year to see if he
could crack the password for private Zoom meetings....
Pentagon needs access to defense companies' networks to hunt cyberthreats, says commission
InfoSec News (Jul 30)
https://www.c4isrnet.com/cyber/2020/07/30/pentagon-needs-access-to-defense-companies-networks-to-hunt-cyberthreats-says-commission/
By Mark Pomerleau
C4ISRNET.com
July 30, 2020
WASHINGTON -- The Pentagon must be able to hunt cyberthreats on the
private networks of defense companies in order to strengthen national
cybersecurity, according to one of the leaders of the Cyber Solarium
Commission.
Rep. Mike Gallagher, R-Wis., who co-chairs the...
Firewall Wizards — Tips and tricks for firewall administrators
Revival?
Paul Robertson (Sep 11)
Since the last few attempts to revive the list have failed, I'm going to attempt a Facebook group revival experiment.
It'll be a bit broader in scope, but I'm hoping we can discuss technical security matters. The new group is
Security-Wizards on Facebook.
Paul
Web App Security — Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.
Faraday Beta V3.0 Released
Francisco Amato (Jul 04)
Faraday helps you to host your own vulnerability management platform
now and streamline your team in one place.
We are pleased to announce the newest version of Faraday v3.0. In this
new version we have made major architecture changes to adapt our
software to the new challenges of cyber security. We focused on
processing large data volumes and to making it easier for the user to
interact with Faraday in its environment.
To install it you can...
Daily Dave — This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.
RootedCON 2022 Call For Papers is open!
omarbv--- via Dailydave (Jan 02)
______ _ _ ____ ___ _ _
/ / _ \ ___ ___ | |_ ___ __| |/ ___/ _ \| \ | |
/ /| |_) / _ \ / _ \| __/ _ \/ _` | | | | | | \| |
/ / | _ < (_) | (_) | || __/ (_| | |__| |_| | |\ |
/_/ |_| \_\___/ \___/ \__\___|\__,_|\____\___/|_| \_|
*** /RootedCON'2022 - Main activity ***
-=] About RootedCON
RootedCON is a technology congress that will be developed in Madrid
(Spain) from 10 - 12 of march 2022....
Some cool projects - JOERN
Dave Aitel via Dailydave (Dec 09)
Lately all I've been doing is data science but I've been trying to keep up
with some of the cool work happening in the cybers as well. One project I
think is especially cool is the Joern Ghidra2CPG project.
https://twitter.com/fabsx00/status/1466302205019971586?s=20
https://joern.io/blog/joern-supports-binary/
The theory is that you can use the Ghidra decompiler, then have a code
property graph, which they store in a special purpose...
PaulDotCom — General discussion of security news, research, vulnerabilities, and the PaulDotCom Security Weekly podcast.
BHIS Sorta Top Used Tools of 2018
John - Black Hills Information Security (Dec 06)
Free Webcast
Hello all,
For our next webcast we will cover some of the core tools we use all the time at Black Hills Information Security.
However, there will be a twist. We will not talk about Nessus, Nmap, or Metasploit. Why? Because there are a ton of new
(and older) tools we use that fall outside of the standard tools you see in every security book/blog out there.
Basically, we are trying to be edgy and different.
You may want to come...
BHIS Webcast - Tues 10/2 @ 11am MDT
John Strand - Black Hills Information Security (Sep 26)
Hello All,
In this next webcast I want to cover what I am doing with the BHIS Systems team to create a C2/Implant/Malware test
bed. Testing our C2/malware solutions is important because vendors tend to lie or over-hype their capabilities. I will
cross reference some different malware specimens to the MITRE ATT&CK framework and we will cover how you can use these
techniques to test your defensive solutions at both the endpoint and the...
BHIS Webcast: The PenTest Pyramid of Pain 9/4 - 11am MDT
Sierra - Black Hills Information Security (Aug 29)
Hello!
How are you all? We had a fantastic webcast last week with John Strand and Chris Brenton and we're still working
through some unexpected hiccups to get the recording up and posted. The podcast version is on our blog, and the YouTube
version will be posted shortly on the Active Countermeasures channel and blog as well. Thanks for all of you who
ventured over to attend!
Ready for another awesome BHIS webcast? Dakota is back and...
Webcast with CJ: Tues 7/24 at 11am
Sierra - Black Hills Information Security (Jul 19)
Our upcoming webcast will be about POLICY...
Did you check out when you heard “policy”? Policy can often seem like a drudgery, but it’s also an important and
potentially overlooked part of business and procedure; it’s the framework on which security is really built!
CJ, our COO and Head of Sales has experience writing, assessing and implementing policies for many different kinds of
companies. And if you are worried it will be dry and...
Honeypots — Discussions about tracking attackers by setting up decoy honeypots or entire honeynet networks.
Honeypot malware archives
Matteo Cantoni (Feb 14)
Hello everyone,
I would like share with you for educational purposes and without any
commercial purpose, data collected by the my homemade honeypot.
Nothing new, nothing shocking, nothing sensational... but I think can
be of interest to newcomers to the world of analysis of malware,
botnets, etc... maybe for a thesis.
The files collected are divided into zip archives, in alphabetical
order, with password (which must be request via email). Some...
Microsoft Sec Notification — Beware that MS often uses these security bulletins as marketing propaganda to downplay serious vulnerabilities in their products—note how most have a prominent and often-misleading "mitigating factors" section.
Microsoft Security Update Minor Revisions
Microsoft (Dec 11)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: December 11, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision
increment:
* CVE-2018-8172
Revision Information:
=====================
- CVE-2018-8172 | Visual Studio Remote Code Execution
Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Nov 14)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: November 14, 2018
********************************************************************
Summary
=======
The following CVEs and advisory have undergone a minor revision
increment:
* CVE-2018-8454
* CVE-2018-8552
* ADV990001
Revision Information:
=====================
- CVE-2018-8454 | Windows Audio Service...
Microsoft Security Update Minor Revisions
Microsoft (Oct 24)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 24, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision increment:
* CVE-2018-8512
Revision Information:
=====================
- CVE-2018-8512 | Microsoft Edge Security Feature Bypass
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 19)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 19, 2018
********************************************************************
Summary
=======
The following CVE been added to the October 2018 Security updates:
* CVE-2018-8569
Revision Information:
=====================
- CVE-2018-8569 | Yammer Desktop Application Remote Code Execution
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 17)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 17, 2018
********************************************************************
Summary
=======
The following CVEs have undergone a major revision increment:
* CVE-2010-3190
Revision Information:
=====================
- CVE-2010-3190 | MFC Insecure Library Loading Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: October 9, 2018
********************************************************************
Summary
=======
The following CVE has undergone a minor revision increment:
* CVE-2018-8531
Revision Information:
=====================
- CVE-2018-8531 | Azure IoT Device Client SDK Memory Corruption
Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************
Summary
=======
The following CVE been added to the October 2018 Security updates:
* CVE-2018-8292
Revision Information:
=====================
- CVE-2018-8292 | .NET Core Information Disclosure Vulnerability
-...
Microsoft Security Update Releases
Microsoft (Oct 09)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 9, 2018
********************************************************************
Summary
=======
The following bulletin has undergone a major revision increment:
* MS11-025
Revision Information:
=====================
- https://docs.microsoft.com/en-us/security-updates/
SecurityBulletins/2011/ms11-025:...
Microsoft Security Update Summary for October 9, 2018
Microsoft (Oct 09)
********************************************************************
Microsoft Security Update Summary for October 9, 2018
Issued: October 9, 2018
********************************************************************
This summary lists security updates released for October 9, 2018.
Complete information for the October 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>.
Please note the...
Microsoft Security Update Releases
Microsoft (Oct 02)
********************************************************************
Title: Microsoft Security Update Releases
Issued: October 2, 2018
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment:
* CVE-2018-0952
Revision Information:
=====================
- CVE-2018-0952 | Diagnostic Hub Standard Collector Elevation of
Privilege Vulnerability
-...
Microsoft Security Advisory Notification
Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 12, 2018
********************************************************************
Security Advisories Released or Updated on September 12, 2018
===================================================================
* Microsoft Security Advisory ADV180022
- Title: Windows Denial of Service Vulnerability
-...
Microsoft Security Update Minor Revisions
Microsoft (Sep 12)
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: September 12, 2018
********************************************************************
Summary
=======
The following CVEs have undergone a minor revision increment:
* CVE-2018-8421
* CVE-2018-8468
Revision Information:
=====================
- CVE-2018-8421 | .NET Framework Remote Code Execution
Vulnerability...
Microsoft Security Update Summary for September 11, 2018
Microsoft (Sep 11)
********************************************************************
Microsoft Security Update Summary for September 11, 2018
Issued: September 11, 2018
********************************************************************
This summary lists security updates released for September 11, 2018.
Complete information for the September 2018 security update release can
Be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>....
Microsoft Security Update Releases
Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Update Releases
Issued: September 11, 2018
********************************************************************
Summary
=======
The following CVE has undergone a major revision increment:
* CVE-2018-8154
Revision Information:
=====================
- CVE-2018-8154 | Microsoft Exchange Memory Corruption
Vulnerability
-...
Microsoft Security Advisory Notification
Microsoft (Sep 11)
********************************************************************
Title: Microsoft Security Advisory Notification
Issued: September 11, 2018
********************************************************************
Security Advisories Released or Updated on September 11, 2018
===================================================================
* Microsoft Security Advisory ADV180002
- Title: Guidance to mitigate speculative execution...
Funsec — While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community
Verizon: 1.5M of Contact Records Stolen, Now on Sale
Jeffrey Walton (Mar 26)
http://www.mobipicker.com/verizon-1-5m-contact-records-stolen-now-sale/:
A business to business telecommunication giant,
Verizon Enterprise Solutions, a Basking Ridge,
New Jersey-based company, has been the latest
victim of a cyber crime that stole 1.5 million contact
records of the customers of Verizon...
I don't quite understand this double talk. Could someone explain to me:
A spokesperson from Verizon said that...
Statement on Lavabit Citation in Apple Case
Jeffrey Walton (Mar 16)
(From John Young on another list):
http://www.facebook.com/KingLadar/posts/10156714933135038
As many of you already know, the government cited the Lavabit case in
a footnote. The problem is their description insinuates a precedent
that was never created. Obviously I was somewhat disturbed by their
misrepresentation. So I decided to draft a statement. And keep in
mind, these are the same people who say "trust us." Click continue to
read...
The NSA's back door has given every US secret to our enemies
Jeffrey Walton (Feb 29)
http://www.businessinsider.com/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2
Deng Xiaoping, in 1979 - his second year as supreme leader of China -
perceived a fundamental truth that has yet to be fully grasped by most
Western leaders: Software, if properly weaponized, could be far more
destructive than any nuclear arsenal.
Under Deng’s leadership, China began one of the most ambitious and
sophisticated meta- software...
Can Spies Break Apple Crypto?
Jeffrey Walton (Feb 27)
Here's an interesting exchange between Cryptome and Michael Froomkin,
Law Professor at University of Miami, on the All Writs Act
(http://cryptome.org/2016/02/can-spies-break-apple-crypto.htm):
-----
A. Michael Froomkin:
The factual posture in the key Supreme Court precedent, New York
Telephone, involved a situation where only the subject of the order
was capable of providing the assistance at issue. This is the basis
for Apple's...
The FBI's iPhone Problem: Tactical vs. Strategic Thinking
Jeffrey Walton (Feb 23)
http://www.technewsworld.com/story/83130.html
I'm an ex-sheriff, and I've been in and out of security jobs for much
of my life, so I've got some familiarity with the issues underlying
the drama between the FBI and Apple. FBI officials -- and likely those
in every other three-letter agency and their counterparts all over the
world -- would like an easier way to do their jobs. Wouldn't we all?
If they could put cameras in...
Wanted: Cryptography Products for Worldwide Survey
Jeffrey Walton (Jan 01)
(http://www.schneier.com/crypto-gram/archives/2015/1215.html):
In 1999, Lance Hoffman, David Balenson, and others published a survey
of non-US cryptographic products. The point of the survey was to
illustrate that there was a robust international market in these
products, and that US-only export restrictions on strong encryption
did nothing to prevent its adoption and everything to disadvantage US
corporations. This was an important contribution...
CERT Advisories — The Computer Emergency Response Team has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.
Mozilla Releases Security Update for Thunderbird
US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Mozilla Releases Security Update for Thunderbird [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/17/mozilla-releases-security-update-thunderbird ] 07/17/2020
10:50 AM EDT
Original release date: July 17, 2020
Mozilla has released a security update to address multiple vulnerabilities in Thunderbird. An attacker could exploit
some of these...
Microsoft Releases Security Update for Edge
US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Microsoft Releases Security Update for Edge [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/17/microsoft-releases-security-update-edge ] 07/17/2020 10:53 AM
EDT
Original release date: July 17, 2020
Microsoft has released a security update to address a vulnerability in Edge (Chromium-based). An attacker could exploit
this vulnerability to drop...
AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation
US-CERT (Jul 17)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
AA20-198A: Malicious Cyber Actor Use of Network Tunneling and Spoofing to Obfuscate Geolocation [
https://us-cert.cisa.gov/ncas/alerts/aa20-198a ] 07/16/2020 08:09 AM EDT
Original release date: July 16, 2020
Summary
"This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) and Pre-ATT&CK
frameworks....
CISA Releases Emergency Directive on Critical Microsoft Vulnerability
US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
CISA Releases Emergency Directive on Critical Microsoft Vulnerability [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/cisa-releases-emergency-directive-critical-microsoft-vulnerability
] 07/16/2020 03:28 PM EDT
Original release date: July 16, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) has released Emergency Directive...
Apple Releases Security Updates
US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Apple Releases Security Updates [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/apple-releases-security-updates ] 07/16/2020 11:17 AM EDT
Original release date: July 16, 2020
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of
these vulnerabilities to take control of an...
Malicious Activity Targeting COVID-19 Research, Vaccine Development
US-CERT (Jul 16)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Malicious Activity Targeting COVID-19 Research, Vaccine Development [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/16/malicious-activity-targeting-covid-19-research-vaccine-development
] 07/16/2020 07:16 AM EDT
Original release date: July 16, 2020
In response to malicious activity targeting COVID-19 research and vaccine development in the United...
Cisco Releases Security Updates for Multiple Products
US-CERT (Jul 15)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Cisco Releases Security Updates for Multiple Products [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/15/cisco-releases-security-updates-multiple-products ]
07/15/2020 03:19 PM EDT
Original release date: July 15, 2020
Cisco has released security updates to address vulnerabilities affecting multiple products. An unauthenticated, remote
attacker...
Oracle Releases July 2020 Security Bulletin
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Oracle Releases July 2020 Security Bulletin [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/oracle-releases-july-2020-security-bulletin ] 07/14/2020
05:21 PM EDT
Original release date: July 14, 2020
Oracle has released its Critical Patch Update for July 2020 to address 433 vulnerabilities across multiple products. A
remote attacker could...
Google Releases Security Updates for Chrome
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/google-releases-security-updates-chrome-0 ] 07/14/2020 04:51
PM EDT
Original release date: July 14, 2020
Google has released Chrome version 84.0.4147.89 for Windows, Mac, and Linux. This version addresses vulnerabilities
that an attacker could exploit...
Google Releases Security Updates for Chrome
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Google Releases Security Updates for Chrome [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/google-releases-security-updates-chrome ] 07/14/2020 02:45 PM
EDT
Original release date: July 14, 2020
Google has released Chrome version 84.0.4147.89 for Windows, Mac, and Linux. This version addresses vulnerabilities
that an attacker could exploit to...
Microsoft Releases July 2020 Security Updates
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Microsoft Releases July 2020 Security Updates [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-releases-july-2020-security-updates ] 07/14/2020
02:13 PM EDT
Original release date: July 14, 2020
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. A remote attacker could
exploit some of these...
Microsoft Addresses 'Wormable' RCE Vulnerability in Windows DNS Server
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Microsoft Addresses 'Wormable' RCE Vulnerability in Windows DNS Server [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-addresses-wormable-rce-vulnerability-windows-dns-server
] 07/14/2020 02:14 PM EDT
Original release date: July 14, 2020
Microsoft has released a security update to address a remote code execution (RCE)...
Adobe Releases Security Updates for Multiple Products
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Adobe Releases Security Updates for Multiple Products [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/adobe-releases-security-updates-multiple-products ]
07/14/2020 01:18 PM EDT
Original release date: July 14, 2020
Adobe has released security updates to address vulnerabilities in multiple Adobe products. An attacker could exploit
some of...
Apache Releases Security Advisories for Apache Tomcat
US-CERT (Jul 14)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
Apache Releases Security Advisories for Apache Tomcat [
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/apache-releases-security-advisories-apache-tomcat ]
07/14/2020 11:33 AM EDT
Original release date: July 14, 2020
The Apache Software Foundation has released security advisories to address multiple vulnerabilities in Apache Tomcat.
An attacker...
AA20-195A: Critical Vulnerability in SAP NetWeaver AS Java
US-CERT (Jul 13)
Cybersecurity and Infrastructure Security Agency Logo
National Cyber Awareness System:
AA20-195A: Critical Vulnerability in SAP NetWeaver AS Java [ https://us-cert.cisa.gov/ncas/alerts/aa20-195a ]
07/13/2020 07:07 PM EDT
Original release date: July 13, 2020
Summary
On July 13, 2020 EST, SAP released a security update to address a critical vulnerability, CVE-2020-6287 [
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6287 ],...
Open Source Security — Discussion of security flaws, concepts, and practices in the Open Source community
WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001
Carlos Alberto Lopez Perez (Jan 21)
------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001
------------------------------------------------------------------------
Date reported : January 21, 2022
Advisory ID : WSA-2022-0001
WebKitGTK Advisory URL : https://webkitgtk.org/security/WSA-2022-0001.html
WPE WebKit Advisory URL :...
usbview polkit policy local root exploit (CVE-2022-23220)
Matthias Gerstner (Jan 21)
Hello list,
this is to inform you about a local root exploit I found in usbview [1]
release 2.1. This finding was embargoed for 7 days on the linux-distros
mailing list and the fix has been published today.
The upstream author Greg KH is currently working on an improved version
of usbview that will no longer require root privileges to run.
Following is the full report:
A polkit policy file has been added to usbview release 2.1 via commit...
Re: Prosody XMPP server advisory 2022-01-13 (Remote Unauthenticated Denial of Service) (CVE-2022-0217)
Kim Alvefur (Jan 20)
Hi,
The fix for this issue introduced a regression in the from of a memory
leak (of the unintentional reference variety, not a true leak).
A fix for can be found in this commit:
https://hg.prosody.im/trunk/rev/e5e0ab93d7f4
CVE-2021-45417 - aide (>= 0.13 <= 0.17.3): heap-based buffer overflow vulnerability in base64 functions
Hannes von Haugwitz (Jan 20)
Summary
=======
David Bouman discovered a heap-based buffer overflow vulnerability in base64
functions of AIDE, an advanced intrusion detection system. An attacker could
crash the program and possibly execute arbitrary code through large (<16k)
extended file attributes or ACL. A local user might exploit this flaw for root
privilege escalation.
Project
=======
AIDE (https://aide.github.io)
Affected versions
=================
AIDE >=...
CVE-2022-22733: Apache ShardingSphere ElasticJob-UI: Access-Token in ElasticJob UI causes password disclosure
Haoran Meng (Jan 20)
Severity: moderate
Description:
Exposure of Sensitive Information to an Unauthorized Actor
vulnerability in Apache ShardingSphere ElasticJob-UI allows an
attacker who has guest account to do privilege escalation. This issue
affects Apache ShardingSphere ElasticJob-UI Apache ShardingSphere
ElasticJob-UI 3.x version 3.0.0 and prior versions.
Race condition in the Rust standard library (CVE-2022-21658)
Pietro Albini (Jan 20)
The Rust Security Response WG was notified that the `std::fs::remove_dir_all`
standard library function is vulneable a race condition enabling symlink
following (CWE-363). An attacker could use this security issue to trick a
privileged program into deleting files and directories the attacker couldn't
otherwise access or delete.
This issue has been assigned [CVE-2022-21658][1].
## Overview
Let's suppose an attacker obtained...
CVE-2021-45230: Apache Airflow: Creating DagRuns didn't respect Dag-level permissions in the Webserver
Kaxil Naik (Jan 19)
Description:
This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for
dags that they don't have "edit" permissions for.
This is a very low severity CVE and admins can mitigate this issue by removing the global "can_create" permissions on
DagRun for Airflow versions >=2.0.0,<2.2.0 and 1.10.x versions that have set `rbac=True` in config....
Re: Linux kernel: Heap buffer overflow in fs_context.c since version 5.1
John Haxby (Jan 18)
This is CVE-2022-0185
jch
Linux kernel: Heap buffer overflow in fs_context.c since version 5.1
Will (Jan 18)
There is a heap overflow bug in legacy_parse_param in which the length of data copied can be incremented beyond the
width of the 1-page slab allocated for it. We currently have created functional LPE exploits against Ubuntu 20.04 and
container escape exploits against Google's hardened COS. The bug was introduced in 5.1-rc1
(...
Re: Prosody XMPP server advisory 2022-01-13 (Remote Unauthenticated Denial of Service) (CVE request)
Jonas Schäfer (Jan 18)
As promised, attached you'll find instructions for probing for the
vulnerability.
kind regards,
JonasTo test for a vulnerable websockets endpoint at URL
wss://xmpp.domain.example/xmpp-websocket, use the following
instructions:
1. Install `websocat` or any other tool you can use to interact with a
WebSocket (this guide uses `websocat` for simplicity):
cargo install websocat
2. Put the string
```
<!DOCTYPE open...
CVE-2022-23307: Apache Log4j 1.x: A deserialization flaw in the Chainsaw component of Log4j 1 can lead to malicious code execution.
Ralph Goers (Jan 18)
Severity: Critical
Description:
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw
was a component of Apache Log4j 1.2.x where the same issue exists.
Mitigation:
Upgrade to Apache Log4j 2 and Apache Chainsaw 2.1.0.
Credit:
@kingkk
CVE-2022-23305: SQL injection in JDBC Appender in Apache Log4j V1
Ralph Goers (Jan 18)
Severity: high
Description:
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be
inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows
attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are
logged allowing unintended SQL queries to be executed.
Note this...
CVE-2022-23302: Deserialization of untrusted data in JMSSink in Apache Log4j 1.x
Ralph Goers (Jan 18)
Severity: high
Description:
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write
access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The
attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that
result in remote code execution in a similar fashion to...
Re: Linux Kernel eBPF Improper Input Validation Vulnerability
tr3e wang (Jan 18)
Hi all,
This post is the exploit overview of CVE-2022-23222.
We successfully exploited this vulnerability to obtain full root
privileges on default installations of Ubuntu 20.04.
*Exploit overview*
1. Among all these *_OR_NULL types, we choose PTR_TO_MEM_OR_NULL
which can be created by BPF_FUNC_ringbuf_reserve. First, we
pass 0xffff........ffff to BPF_FUNC_ringbuf_reserve to get a
NULL pointer r0, and copy r0 to r1. Then add r1 by 1,...
Re: CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability
tr3e wang (Jan 18)
Hi all,
This post is the exploit overview of CVE-2021-4202.
We successfully exploited this vulnerability to obtain full root
privileges on default installations of Ubuntu 20.04.
*Exploit overview*
1. We create a lot of BPF ringbufs, and choose one of them as victim.
The BPF_FUNC_ringbuf_reserve allow us to have a pointer A to the
beginning of the victim ringbuf's data field.
2. We do a pointer subtraction to point back to the...
Secure Coding — The Secure Coding list (SC-L) is an open forum for the discussion on developing secure applications. It is moderated by the authors of Secure Coding: Principles and Practices.
Silver Bullet 123: Yanek Korff
Gary McGraw (Jul 06)
hi sc-l,
The latest installment of Silver Bullet was posted this morning. Silver Bullet episode 123 features a conversation
with Yanek Korff. Yanek worked for many years at Cigital as a system administrator back in the early days. He then
moved on to operational security work at AOL and running managed security services at Mandiant.
We talk about managing technical people in this episode. We also discuss operational security. Have a...
Educause Security Discussion — Securing networks and computers in an academic environment.
Covid Test Kit Singapore
Covid Test Kit Singapore (Oct 01)
Covid Test Kit
Order test kit for your company now! Stay Safe! Free Delivery in Singapore
Easy to use
HSA Approved
Click on the link below to open the message in a browser:
https://www.covidtestkit.info/so/b3Nmx3jmr/c?w=X7fgda-LWUeRP6mC6I6qXRUzGOxDt64oN8eoV7oJkUE.eyJ1IjoiaHR0cHM6Ly93d3cuY292aWR0ZXN0a2l0LmluZm8vc28vYjNObXgzam1yP2xhbmd1YWdlVGFnPWVuIiwibSI6Im1haWwiLCJjIjoiOGE5YzNiMGMtMjYwMC00ODQ3LTgzMGItMTVmN2U4NzA3YzVjIn0
You've received...
Don't forget to register for CAMP Week!
Jeanetta Caligari (Sep 27)
[https://lh4.googleusercontent.com/9DyXd5Am4Gi9InwJoNzoNAVoDq8t14u-C9myclQH48HCSgSlnqO-g-PGJ39rhjn25gUf24q0W_HdUGQxB7WK6c1DUmDSpwFYcc61dNNuU8cV1bhRvk_zK3rnmuu2SPWiLHQgxejk=s0]
Register Today for Virtual CAMP & Advance CAMP - OCTOBER 4-8, 2021!
Join your peers virtually October 4-8, 2021 to learn about the latest trends and happenings in identity and access
management. There's still time to register!...
EDUCAUSE Member QuickTalk: Federal Policy, Sept. 30, 3 - 4 PM, EDT
Jarret Cummings (Sep 24)
As you're hopefully winding down your week and looking ahead to your schedule for next week, I hope you will make time
on your calendar for my next Member QuickTalk on federal policy, which is scheduled for Thursday, September 30, from
3:00 - 4:00 PM, Eastern Time.
With major spending bills, the debt ceiling, and continued funding of the government all in play, we'll have plenty of
macro-level topics to talk about, especially when...
Using Canva in NIST 800-171 research environment
Bole, Jim A (Sep 24)
Some of our researchers use Canva to build infographics that contain 800-171 CUI data.
Currently they’ve purchased individual pro licensing:
https://www.canva.com/pricing/<...
October Learning Lab | Hacking the Juice Shop: An Introduction to the OWASP Top 10
Brian Kelly (Sep 23)
There are still seats available. Register today to grab your spot.
Brian
[EDUCAUSE - Learning
Labs]<https://emails.educause.edu/optiext/optiextension.dll?ID=hLKhMDRmmyL1OB19%2BySCzjaMsjz5JXEag5kbkh2GGfaxsXqxofhXcLUY3Cef5uVkJPelUl17qn4_Y1yJw5yXZNSmaXlN_>
[https://emails.educause.edu/Portal/resourcehandler/static/x.png]
[https://emails.educause.edu/Portal/resourcehandler/static/x.png]
Hacking the Juice Shop: An Introduction to the OWASP...
Re: [External] [SECURITY] Account Retention/Email retention
Gregg, Christopher S. (Sep 23)
We don't have an e-mail specific retention policy. If an e-mail constitutes a record then it is subject the retention
period of that record type.
We do use the Microsoft Litigation Hold function for situations where we need to preserve e-mail and then release the
hold when the situation is resolved. These requests are almost always triggered by requests from our Office of General
Counsel.
A few years ago I tried to go down the path of...
Account Retention/Email retention
Jeremy Livingston (Sep 23)
Friends,
I'm looking for some examples of account retention and email retention at your schools. While legal wants to hold all
emails for 7 years (statute of limitations on most crimes), that comes at a cost, and it would be great to have a basis
for comparison.
Thanks for any information you can provide, and feel free to send it directly if you don't want it shared more widely.
Jeremy M. Livingston
Chief Information Security...
[ALL-LISTS] Reminder: Action-Needed | EDUCAUSE Community Groups
she/her (Sep 22)
Hello again EDUCAUSE Community Group subscribers!
If you don’t want to lose access to your community group lists, please review the following dates and details to help
you prepare for the launch of our new platform—EDUCAUSE
Connect<https://www.educause.edu/community/educause-connect>—which will replace our current email list system for
EDUCAUSE Community Groups.
* Today, September 22: Last Chance to Create an EDUCAUSE Profile...
Job Opening: University of Nebraska - Director, Research IT Services
Matthew Long (Sep 22)
All...Information Technology Services at the University of Nebraska is currently seeking candidates for a Director,
Research IT Services to join the ITS team. Please share the posting with your networks and encourage interested
applicants to apply.
Position Summary:
This position leads Research IT Services and acts as an advocate for campus scholars and researchers in the Information
Technology Services (ITS) organization. This position will...
Non-recourse Finance.
reply (Sep 21)
<<< text/html: EXCLUDED >>>
Re: Recording from last Thursday's - Member QuickTalk | Open-source, Passwordless MFA with Duke Unlock
Jay Gallman (Sep 21)
My apologies I see the code at the bottom of the page.
Re: Recording from last Thursday's - Member QuickTalk | Open-source, Passwordless MFA with Duke Unlock
Jay Gallman (Sep 21)
Brian,
If we log in and try to watch the video it wants a passcode.
Thanks!
Jay
Recording from last Thursday's - Member QuickTalk | Open-source, Passwordless MFA with Duke Unlock
Brian Kelly (Sep 21)
The recording from last week’s Member QuickTalk | Open-source, Passwordless MFA with Duke Unlock is now available -
https://events.educause.edu/member-quicktalks/2021/open-source-passwordless-mfa-with-duke-unlock
Brian
Brian Kelly, CISSP, CISM, CEH
Director, Cybersecurity
Program<https://www.educause.edu/focus-areas-and-initiatives/policy-and-security/cybersecurity-program>
bkelly () educause edu<mailto:bkelly () educause edu>...
Re: [External] Re: [SECURITY] What security framework are you using, and why?
Shane Kroening (Sep 21)
All,
I’d like to echo the folks here that say you need to start with the why before complying to a certain framework. To
take that a step further, let me walk you through what I would advise doing to get started.
Rather than focusing on a certain security framework or mandate, such as NIST 800-53, CMMC, etc. you should first focus
on what is in your environment. This has two key aspects: technologies (operating systems, databases,...
[Action Needed Tomorrow: September 22] Your EDUCAUSE Community Groups
EDUCAUSE (Sep 21)
View in Browser
(https://membershipteam.educause.edu/optiext/optiextension.dll?ID=6yz6yDmptj2%2BRbYk1xMWax_qEKtgObASsfm7P90cb__IsjmkYfA88ek7mN9UGlFJnC9rqflckDomqQed_3Jg4bfQzC8sa)
You’re Just Two Steps Away...
By now, you’ve probably heard about our new community platform launching in just one week—EDUCAUSE Connect
(...
NANOG — The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.
Re: Operator survey: Incrementally deployable secure Internet routing
scott (Jan 21)
This all looks like a network made for surveilling the planet's citizens
more easily. Even in the FAQs!
----------------------------------------------------------------
"Do you use countries as ISDs? Doesn't that create opportunities for
government intervention and censorship?
We're currently looking into the best way to partition the Internet into
ISDs, so using countries as ISDs is only one possible option. Countries...
Operator survey: Incrementally deployable secure Internet routing
Yixin Sun (Jan 21)
Dear Nanog,
We appreciate that your time is very precious, but we wanted to ask you for
your help in answering a brief survey about a new secure routing system we
have developed in a research collaboration between ETH, Princeton
University, and University of Virginia. We'd like to thank those of you who
have already helped us fill out the survey and provided insightful
feedback. Your input is critical for helping inform our further work on...
Re: Telia is now Arelion
Mike Hammett (Jan 21)
I do want to point out that it isn't a mindless name change like Xfinity, Spectrum, or Lumen. It's because the company
actually split off from Telia proper and thus, needed a new name.
-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
Midwest-IX
http://www.midwest-ix.com
----- Original Message -----
From: "Justin Krejci" <JKrejci () usinternet com>
To: nanog () nanog org
Sent:...
Fastly CDN and Tiktok byteDance CDN
Paschal Masha (Jan 21)
Hello,
Any contacts from Fastly CDN and byteDance, kindly contact me offlist. About CDN for ISPs, thanks.
Regards
Paschal Masha | Engineering
Skype ID: paschal.masha
Re: What do you think about this airline vs 5G brouhaha?
Mel Beckman (Jan 21)
Geoff,
My understanding is that the FAA and 5G industry has just this week agreed on buffer zones around 50 of the impacted 80
US airports:
https://www.8newsnow.com/news/local-news/las-vegas-airport-included-in-5g-buffer-zone/
The 30 airports that are not buffered I think don’t have 5G deployed yet. For example, Denver international. The buffer
zone is described as “the last 20 seconds of flight time”, which considering 230MPH (the...
Re: What do you think about this airline vs 5G brouhaha?
Jay Hennigan (Jan 21)
I'm not qualified to answer. Avionics needs to go through a testing
program called TSO.
https://www.faa.gov/aircraft/air_cert/production_approvals/tsoa/
The FAA certainly could require that the radar meet the specs. There are
several off-the-shelf waveguide filters that are -60dB at 20 MHZ
out-of-band readily available within that frequency range but a quick
search doesn't show anything off-the-shelf with the radar band as the...
Re: What do you think about this airline vs 5G brouhaha?
Mel Beckman (Jan 21)
Here’s another video by 767 pilot Juan Brown from his chanel BlancoLirio:
https://youtu.be/aHIFs4EkA0k
He addresses many of the points being claimed by the FCC and 5G industry, in particular the reason you can’t compare US
5G with overseas 5G.
-mel via cell
FAA puts all kinds of restrictions on what equipment is required to perform certain maneuvers. You need a localizer,
glideslope, etc. for instrument landings. Radars are made...
Re: What do you think about this airline vs 5G brouhaha?
Michael Thomas (Jan 21)
For commercial airlines is it just old equipment or all equipment that
has this error? That is, is there actually an off the shelf radio that
would solve the problem?
Mike
Re: What do you think about this airline vs 5G brouhaha?
Jay Hennigan (Jan 21)
Indeed, it sounds like that is the case, and that's a horrible
assumption. When the spectrum was originally being allocated, if the
devices need 1200 MHz of interference-free bandwidth to function they
should have requested 1200 MHz of spectrum.
FCC indeed does take into account practical performance of equipment in
licensing. Early TV sets weren't very selective, so you wouldn't see
adjacent VHF channels licensed in the same...
Weekly Global IPv4 Routing Table Report
Routing Table Analysis Role Account (Jan 21)
This is an automated weekly mailing describing the state of the Global
IPv4 Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, SANOG, PacNOG, SAFNOG
TZNOG, MENOG, BJNOG, SDNOG, CMNOG, LACNOG and the RIPE Routing WG.
Daily listings are sent to bgp-stats () lists apnic net.
For historical data, please see https://thyme.apnic.net.
If you have any comments please contact Philip Smith <pfsinoz...
Re: Coverage of the .to internet outage
Joel M Snyder (Jan 21)
Got an Intelsat press release which may be of interest to folks
following the situation in Tonga. I wish I could include just a URL,
but they sent it to be as text so I am including the full thing:
-------
FOR IMMEDIATE RELEASE: January 21, 2022
Intelsat and Partners Bring Emergency Connectivity to Tonga
McLean, Va. – Intelsat, operator of the world’s largest integrated
satellite and terrestrial network, in cooperation with Telstra and...
Re: [External] Re: What do you think about this airline vs 5G brouhaha?
Mark Tinka (Jan 21)
In my mind, that is still rather negligent and irresponsible, especially
because in the -MAX, this was more critical considering the level of
input from the computer to activate MCAS outside of the pilot's control,
or even knowledge.
Unlikely to be such a big deal in earlier B737 models, where MCAS is not
used.
There has been AoA sensor failure in non-MAX B737 aircraft. The
difference is you don't have MCAS there trying to do its...
Re: Coverage of the .to internet outage
John Levine (Jan 20)
It appears that Aaron C. de Bruyn via NANOG <aaron () heyaaron com> said:
I think you vastly overestimate how much money there is in domain registrations
if your name is not Verisign or Godaddy.
Well, sure, the DNS has mirrors all over the place:
$ host -t ns to.
to name server frankfurt.tonic.to.
to name server singapore.tonic.to.
to name server colo.tonic.to.
to name server tonic.to.
to name server sydney.tonic.to.
to name server...
Re: Coverage of the .to internet outage
scott (Jan 20)
From: "Jay R. Ashworth" <jra () baylink com>
This piece:
https://www.npr.org/2022/01/18/1073863310/an-undersea-cable-fault-could-cut-tonga-from-the-rest-of-the-world-for-weeks
drills down to this piece with slightly more detail:
https://www.reuters.com/markets/funds/undersea-cable-fault-could-cut-off-tonga-rest-world-weeks-2022-01-18/
I'm told their national carrier is trying to bring in a ground station as
well, though...
Re: What do you think about this airline vs 5G brouhaha?
Brandon Martin (Jan 20)
I think we're saying the same thing, but with a different focus.
Yeah, front-end overload will always be a problem if the overload is
caused by an unwanted signal or if the overload is so severe that it
causes distortion going into the next stage even if it's just from a
desired signal.
But even a moderately powerful signal that's outside your band of
interest by as much as the entire width of the interested band...
Interesting People — David Farber moderates this list for discussion involving internet governance, infrastructure, and any other topics he finds fascinating
Alquileres, FRENTE al MAR en Punta del Este
Azure (Jan 21)
😃Alquiler Temporario, FRENTE al MAR en Punta del Este 🌊
Por Dia, Semana, Quincena y Mes
Ultimas Unidades para Enero
consultas al whatsapp haciendo click aqui
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustpripsroi">click...
Buscamos para Clientes Propiedades de Dueños Directos
La Capitana (Jan 12)
🔎*BUSCO para CLIENTES*👁️ de Dueños Directos con mucha ganas de vender
Terreno para construir entre 1000/1500 m2, en buena ubicación y pagar la mayor cantidad con metros ya construidos en
Villa Pueyrredon y algo en Devoto.
Lote bien ubicado para canjear por 2 locales alquilados, uno en Av. Cabildo otro en Av. Santa Fe mas saldo CASH a
negociar
Lote para canjear por dos locales alquilados...
Altos de Nuñez con Amenities
La Capitana (Jan 11)
Mas Proyectos haciendo click aqui
La Capitana Real Estate de Marisa G. Snatman,
Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA,
3 De Febrero 820 2°D (CABA 1426), Ruta Nacional N 8 KM.52 (Pilar)
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="...
Cambio de Cheques y Ahora Tambien e-cheqs, Cheques Electronicos
Cambio de Cheques (Jan 11)
Consultas al Whatsapp aqui
Ahora tambien e-chqs
hace click aquí para reenviar este email a un amigo
*Enviamos tu Campaña a Nuestras Bases*
podes ver nuestros Trabajos y BASES haciendo click aqui
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustprtusroi">click...
Highland Park Country Club
La Capitana (Jan 10)
La Capitana Real Estate de Marisa G. Snatman
Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA
3 De Febrero 820 2°D (CABA 1426), Ruta Nacional N 8 KM.52 (Pilar)
Haga click aquí para reenviar este email a otra persona
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustpretsroi">click...
Alquileres, FRENTE al MAR en Punta del Este
Azure (Jan 07)
😃Alquiler Temporario, FRENTE al MAR en Punta del Este 🌊
Por Dia, Semana, Quincena y Mes
consultas al whatsapp haciendo click aqui
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustprwqsroi">click aquí</a>
Palermo Hollywood, 1, 2, 3 y 4 ambientes
La Capitana (Jan 07)
Palermo Hollywood
La Capitana Real Estate de Marisa G. Snatman
Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA
3 De Febrero 820 2°D (CABA 1426), Ruta Nacional N 8 KM.52 (Pilar)
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustpeptsroi">click aquí</a>
Almagro, a Estrenar, 1, 2 y 3 ambientes
La Capitana Real Estate (Jan 06)
La Capitana Real Estate de Marisa G. Snatman
Martillera y Corredora Publica, matriculas n° 5633 CSI /3921 CUCICBA
3 De Febrero 820 2°D (CABA 1426), Ruta Nacional N 8 KM.52 (Pilar)
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="...
Alquileres Verano 2022, FRENTE al MAR en Punta del Este
Azure (Jan 05)
😃Alquileres Temporada 2022, FRENTE al MAR en Punta del Este 🌊
Por Dia, Semana, Quincena y Mes
consultas al whatsapp haciendo click aqui
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="https://ml13.send4you.info/unsuscribe.php?id=wwrueuswepptsuouisriq">click aquí</a>
ALQUILER VERANO, Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna
La Capitana (Jan 05)
🏡 Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna🌳
➕ informacion en este link:
https://www.lacapitana.com.ar/p/4144463-Casa-en-Alquiler-temporario-en-San-Gabriel-San-Gabriel-Barrio-Nautico
👍Enero u$s 3.500, 2da quincena de Enero u$s 2.000, Febrero u$s3.200, Marzo u$s 2.500
http://barriosangabriel.com/
Celular / Whatsapp: 11-5621-7423
La Capitana Real Estate de Marisa G. Snatman,...
Alquileres, FRENTE al MAR en Punta del Este
Azure (Jan 04)
😃Alquileres Temporada 2022, FRENTE al MAR en Punta del Este 🌊
Por Dia, Semana, Quincena y Mes
consultas al whatsapp haciendo click aqui
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustpeuesroi">click aquí</a>
ALQUILER VERANO, Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna
La Capitana (Jan 03)
🏡 Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna🌳
➕ informacion en este link:
https://www.lacapitana.com.ar/p/4144463-Casa-en-Alquiler-temporario-en-San-Gabriel-San-Gabriel-Barrio-Nautico
👍Enero u$s 3.500, 2da quincena de Enero u$s 2.000, Febrero u$s3.200, Marzo u$s 2.500
http://barriosangabriel.com/
Celular / Whatsapp: 11-5621-7423
La Capitana Real Estate de Marisa G. Snatman,...
ALQUILER VERANO, Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna
La Capitana Real Estate (Dec 31)
🏡 Nuevita, recién ingresada Barrio San Gabriel, vista a la Laguna🌳
➕ informacion en este link:
https://www.lacapitana.com.ar/p/4144463-Casa-en-Alquiler-temporario-en-San-Gabriel-San-Gabriel-Barrio-Nautico
👍Enero u$s 3.500, 2da quincena de Enero u$s 2.000, Febrero u$s3.200, Marzo u$s 2.500
http://barriosangabriel.com/
Celular / Whatsapp: 11-5621-7423
La Capitana Real Estate de Marisa G. Snatman,...
ULTIMAS UNIDADES para FIN de AÑO, Alquileres, FRENTE al MAR en Punta del Este
Azure (Dec 30)
😃Alquileres Temporada 2021/22, FRENTE al MAR en Punta del Este 🌊
consultas al whatsapp haciendo click aqui
hace click aquí para reenviar este email a un amigo
Para remover su dirección de esta lista haga <a
href="https://ml15.gpserver4.com/unsuscribe.php?id=wuwwiiswrryustperusroi">click aquí</a>
Beneficios Exclusivos clientes de CLARO
Marcelo Perez (Dec 29)
@font-face{
font-family:"Times New Roman";
}
@font-face{
font-family:"宋体";
}
@font-face{
font-family:"Calibri";
}
@font-face{
font-family:"Calibri";
}
@font-face{
font-family:"Wingdings";
}
@font-face{
font-family:"Calibri";
}
@font-face{
font-family:"Arial";
}
p.MsoNormal{
mso-style-name:Normal;
mso-style-parent:"";...
The RISKS Forum — Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.
Risks Digest 33.02
RISKS List Owner (Jan 15)
RISKS-LIST: Risks-Forum Digest Saturday 15 January 2021 Volume 33 : Issue 02
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.02>
The current issue can also be found at
<...
Risks Digest 33.01
RISKS List Owner (Jan 08)
RISKS-LIST: Risks-Forum Digest Saturday 8 December 2021 Volume 33 : Issue 01
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/33.01>
The current issue can also be found at
<...
Risks Digest 32.96
RISKS List Owner (Dec 29)
RISKS-LIST: Risks-Forum Digest Wednesday 28 December 2021 Volume 32 : Issue 96
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.96>
The current issue can also be found at
<...
Risks Digest 32.95
RISKS List Owner (Dec 14)
RISKS-LIST: Risks-Forum Digest Tuesday 14 December 2021 Volume 32 : Issue 95
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.95>
The current issue can also be found at
<...
Risks Digest 32.94
RISKS List Owner (Dec 01)
RISKS-LIST: Risks-Forum Digest Wednesday 1 December 2021 Volume 32 : Issue 94
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.94>
The current issue can also be found at
<...
Risks Digest 32.93
RISKS List Owner (Nov 22)
RISKS-LIST: Risks-Forum Digest Monday 22 November 2021 Volume 32 : Issue 93
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.93>
The current issue can also be found at
<...
Risks Digest 32.92
RISKS List Owner (Nov 06)
RISKS-LIST: Risks-Forum Digest Saturday 6 November 2021 Volume 32 : Issue 92
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.92>
The current issue can also be found at
<...
Risks Digest 32.91
RISKS List Owner (Oct 30)
RISKS-LIST: Risks-Forum Digest Saturday 30 October 2021 Volume 32 : Issue 91
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.91>
The current issue can also be found at
<...
Risks Digest 32.90
RISKS List Owner (Oct 17)
RISKS-LIST: Risks-Forum Digest Sunday 17 October 2021 Volume 32 : Issue 90
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.90>
The current issue can also be found at
<...
Risks Digest 32.89
RISKS List Owner (Oct 03)
RISKS-LIST: Risks-Forum Digest Sunday 3 October 2021 Volume 32 : Issue 89
ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator
***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/32.89>
The current issue can also be found at
<...
BreachExchange — BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.
Nigerian Police Arrest 11 Individuals in BEC Crackdown
Terrell Byrd (Jan 20)
https://www.darkreading.com/attacks-breaches/nigerian-police-arrest-11-individuals-in-bec-crackdown
Police in Nigeria, with the help of Interpol, have arrested 11 individuals
in the country for their alleged involvement in business email compromise
(BEC) scams associated with more than 50,000 targets worldwide.
Six of those arrested were identified as members of SilverTerrier, a known
BEC gang that is thought to have harmed thousands of...
Senate passes bills aimed at ransomware, data breaches
Terrell Byrd (Jan 20)
https://apnews.com/article/technology-congress-pennsylvania-432de39affb45babd018744e023b4dfa
HARRISBURG, Pa. (AP) — Pennsylvania’s state Senate passed a package of
legislation on Wednesday aimed at preventing data security breaches and
requiring victims and law enforcement officials to be notified when they do
happen.
The bills’ passage comes barely two weeks after the state’s unemployment
compensation system acknowledged that hackers...
Gloucester Council cyber attack linked to Russian hackers
Terrell Byrd (Jan 20)
https://www.bbc.com/news/uk-england-gloucestershire-60045060
A cyber attack which has knocked out parts of a council website has been
linked to the work of Russian hackers.
Gloucester City Council became aware that its IT systems had been affected
on 20 December last year.
Since then, the council's online revenue and benefits, planning and
customer services have been affected.
The council has been working with the National Crime Agency...
'Lock it down and piss people off': How quick thinking stopped a ransomware attack from crippling a Florida hospital
Terrell Byrd (Jan 20)
https://www.cnn.com/2022/01/16/politics/florida-hospital-ransomware/index.html
It was approaching midnight on Sunday and the head of IT at a Florida
hospital had a problem.
The emergency room of Jackson Hospital, a 100-bed facility on Florida's
panhandle, called to report that it couldn't connect to the charting system
that doctors use to look up patients' medical histories. Jamie Hussey,
Jackson Hospital's IT director, soon...
Email Account Compromise – What Is It And How Can Your Business Protect Itself From It?
Terrell Byrd (Jan 20)
https://www.natlawreview.com/article/email-account-compromise-what-it-and-how-can-your-business-protect-itself-it
Scamming, phishing, pharming, vishing — people in the business world are
well aware that hackers and other fraudsters have developed a myriad of
schemes designed to obtain sensitive personal information and money. Every
year, these schemes cause businesses to suffer significant financial
losses. The FBI estimates that in 2020...
Former Homeland Security Acting Inspector General Pleads Guilty To Data Theft
Terrell Byrd (Jan 18)
https://www.nextgov.com/cio-briefing/2022/01/former-homeland-security-acting-inspector-general-pleads-guilty-data-theft/360794/
Former Acting Inspector General for the Department of Homeland Security
Charles Edwards pleaded guilty on Friday to two federal charges related to
stealing software and sensitive data from the government.
Confirmed by the Department of Justice, Edwards stole confidential
proprietary software from the U.S. government...
SRT email service down due to ransomware attack
Terrell Byrd (Jan 18)
https://www.kxnet.com/news/local-news/srt-email-service-down-due-to-ransomware-attack/
Email service to SRT customers has been down since January 12 due to a
ransomware attack, the company said Friday.
Mail2World, SRT’s third-party email provider, says customer data has not
been compromised.
“The ransomware attack is on Mail2World’s server that controls distribution
of email, not on SRT directly,” said SRT CEO and General Manager...
Vesta Property Group Notifies Individuals of Data Security Incident
Terrell Byrd (Jan 18)
https://finance.yahoo.com/news/vesta-property-group-notifies-individuals-210000035.html
Vesta Property Services, Inc. ("Vesta"), an organization that provides
association management services to developers of planned unit communities,
condominium associations, homeowners associations and property owners
associations announced today that it is notifying certain individuals whose
information may have been involved in recent data security...
What Russia’s Arrest of REvil Hackers Means for Ransomware
Terrell Byrd (Jan 18)
https://www.wsj.com/articles/what-the-russian-crackdown-on-revil-means-for-ransomware-11642188675
Russian authorities announced Friday that they raided one of the most
prominent ransomware gangs, known as REvil, arrested 14 of its members and
halted the group’s operations at the request of the U.S. government.
“These are very important steps, in that they represent the Kremlin taking
action against criminals operating from within its...
Ransomware puts New Mexico prison in lockdown: Cameras, doors go offline
Terrell Byrd (Jan 14)
https://www.theregister.com/2022/01/12/ransomware_new_mexico_prison/
Bernalillo County, New Mexico, has been unable to comply with the
settlement terms of a 27-year-old lawsuit over prison conditions because of
a ransomware attack last week that saw prisoners back under manual control.
County officials on January 6, 2022, filed a notice [PDF] with the New
Mexico District Court overseeing the settlement invoking an emergency
provision in the...
Bunnings customers exposed in data breach
Terrell Byrd (Jan 14)
https://thenewdaily.com.au/finance/consumer/2022/01/13/bunnings-customers-data-breach/
The personal information of some Bunnings Warehouse customers has been
compromised after a significant data breach at a third-party provider.
Bunnings Australia has been caught up in a major cyber security attack
after its US-based booking platform, FlexBooker, revealed the data of an
estimated 3.7 million users, including Australian shoppers, was exposed to...
Attack on Health Dept. Computers Was “Ransomware,” Hogan and Cyber Czar Acknowledge
Terrell Byrd (Jan 14)
https://www.marylandmatters.org/2022/01/12/attack-on-health-dept-computers-was-ransomware-hogan-and-cyber-czar-acknowledge/
Gov. Lawrence J. Hogan Jr. and top Maryland Department of Health officials
acknowledged for the first time Wednesday that the perpetrators of the
attack on the agency’s computer system sought a ransom payment from the
state.
The state has not paid those responsible for the attack, Hogan (R) said.
“Unlike Texas and I...
Arizona lawmaker proposes ban on taxpayer-funded ransomware payouts
Terrell Byrd (Jan 14)
https://www.washingtonexaminer.com/politics/arizona-lawmaker-proposes-ban-on-taxpayer-funded-ransomware-payouts
Any public entity in Arizona that’s held ransom for its digital assets
could not pay the ransom to get those assets back, under a new proposal.
State Rep. Shawnna LM Bolick, R-Phoenix, filed two bills Tuesday that would
ban state or local entities from paying off a ransomware attack.
A ransomware attack is typically described as a...
Ukraine Reports Massive Cyber Attack on Government Websites
Terrell Byrd (Jan 14)
https://www.securityweek.com/ukraine-reports-massive-cyber-attack-government-websites
Kyiv on Friday reported a massive cyber attack on key government websites
as tensions between Russia and the West over Ukraine escalate following
several rounds of unsuccessful talks.
The education ministry said on Facebook that its website was down due to a
"global (cyber) attack" that had taken place overnight.
Other websites that were down...
Fertility Clinic Hacking Incident Affected Nearly 80, 000
Terrell Byrd (Jan 11)
https://www.govinfosecurity.com/fertility-clinic-hacking-incident-affected-nearly-80000-a-18269
A Chicago-based fertility center has reported that a hacking incident
detected in February 2021 has affected the protected health information of
nearly 80,000 individuals. The breach is among the latest security
incidents involving fertility healthcare providers and the compromise of
their patients' sensitive data.
Fertility Centers of Illinois...
Metasploit — Development discussion for Metasploit, the premier open source remote exploitation tool
nullcon se7en CFP is open
nullcon (Aug 25)
Dear Friends,
Welcome to nullcon se7en!
$git commit -a <sin>
<sin> := wrath | pride | lust | envy | greed | gluttony | sloth
nullcon is an annual security conference held in Goa, India. The focus
of the conference is to showcase the next generation of offensive and
defensive security technology. We happily open doors to researchers
and hackers around the world working on the next big thing in security
and request...
Ruxcon 2015 Final Call For Presentations
cfp (Jul 05)
Ruxcon 2015 Final Call For Presentations
Melbourne, Australia, October 24-25
CQ Function Centre
http://www.ruxcon.org.au
The Ruxcon team is pleased to announce the first round of Call For Presentations for Ruxcon 2015.
This year the conference will take place over the weekend of the 24th and 25th of October at the CQ Function Centre,
Melbourne, Australia.
The deadline for submissions is the 15th of September, 2015.
.[x]. About Ruxcon .[x]....
Wireshark — Discussion of the free and open source Wireshark network sniffer. No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 21)
I used apt-rdepends to check. Maybe I checked a different release. I
stand corrected in any case. There is one package that depends on
libwireshark in Debian. I was not aware libvirt-wireshark existed in
Debian.
However as I have repeatedly tried to explain plugins are a misdirection
to the discussion. It is very curious that libvirt-wireshark depends on
libwireshark14 *only*, since as a dissector plugin it cannot work with
only...
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 21)
I don't know who recommends that or where it is recommended. I would
consider myself a Debian user with average knowledge. Makes me wonder
why the Debian package system is so limited that it can't handle this
simple use case without imposing hidden requirements on the user.
Since this passed through the cracks, I don't think it does. It's just
boring menial wasteful brainless work compiling lists of symbols for a...
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 21)
This is about package code that lives in the Wireshark repository, that
Wireshark devs have to work on, and relates directly to the issue at
hand, so I beg to differ. I think it is very relevant and in the proper
place.
The symbols added are fine, nobody is contesting them, and they were
necessary fix bugs in the 3.6 branch. The issue is a symbol that was
replaced by a different one in the backport. That removal that is what
constitutes an...
Re: Future of Wireshark's shared library ABI stability
Bálint Réczey (Jan 21)
João Valverde <j () v6e pt> ezt írta (időpont: 2022. jan. 21., P, 11:17):
Before installing the upstream packages it is recommended to remove
all installed packages generated from Debian's official wireshark
source package because incompatibilities can't be prevented otherwise.
When testing new builds I do that and just install all built .deb-s.
Debian many years ago used to _not_ recommend upstreams to to keep
packaging...
Re: Future of Wireshark's shared library ABI stability
Bálint Réczey (Jan 21)
Hi Roland,
Roland Knall <rknall () gmail com> ezt írta (időpont: 2022. jan. 21., P, 11:48):
I fully agree with and support the current practice of allowing ABI
breakages between major releases and those are well handled by bumping
the major SO version. My bug report was about breaking the ABI between
3.6.0 and 3.6.1 and somehow this escalated.
Cheers,
Balint
Re: Future of Wireshark's shared library ABI stability
Roland Knall (Jan 21)
May I suggest that we focus on the discussion at hand here. The discussion
about the package itself seems to be better suited for the issue list
specific for that package, as is the purpose for that list.
The issue here is, that with change
https://gitlab.com/wireshark/wireshark/-/merge_requests/5318 version
changes where backported in 3.6, which are only meant to be in 3.7 and
beyond (hence the reference in libwireshark0.symbols). Regardless of...
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 21)
I don't mind the email. We do disagree on many things and what I said on
the Gitlab issue is exactly what I meant. My lack of patience with you
is entirely justified.
I strongly believe the upstream Debian package to be a detriment to the
project, and not in the interest of users either. I will share my
experience as a user. I had to build the Wireshark Debian package to
fix something or other. I looked up online the incantation to...
Re: Future of Wireshark's shared library ABI stability
Bálint Réczey (Jan 21)
João Valverde <j () v6e pt> ezt írta (időpont: 2022. jan. 21., P, 1:29):
In gitlab issue I already mention libvirt as a packaged thus I had the
impression that this one was covered:
https://gitlab.com/wireshark/wireshark/-/issues/17822#note_815677078
It is factually incorrect to state that nothing depends on our
libraries in Debian:
root@73c5830ef791:/# apt-cache rdepends libwireshark14
libwireshark14
Reverse Depends:
......
Re: Future of Wireshark's shared library ABI stability
Bálint Réczey (Jan 21)
Hi João,
João Valverde <j () v6e pt> ezt írta (időpont: 2022. jan. 21., P, 1:14):
OK, great to hear that from you. I got the impression from the gitlab
comments that you had a different view.
I'm happy with the the project's commitment to ABI stability and agree
with Gerald's proposal of trying to revive the abi-complicance-checker
test to help him in the final release checks. I may find time to
restore the changes...
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 20)
I still don't understand what ABI change you are talking about, and I'm
quite curious.
In this case downstream is complaining about a single function that was
removed, that is extremely unlikely that anyone was using anyway.
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 20)
How is that relevant?
The answer to the question that was asked is: exactly zero Debian
packages have a dependency on your libwsutil/libwireshark/libwiretap
packages.
If you want to see what a properly packaged non-trivial application for
Debian looks like check out Geany[1] for example. It also uses shared
libraries internally and has a plugin system.
I have no idea what you are trying to say here. The libraries were not
intended to be...
Re: Future of Wireshark's shared library ABI stability
João Valverde (Jan 20)
I agree the current practice is reasonable and beneficial, and it is
currently documented in README.Developer[1], chapter 7.3, to the best of
my understanding and ability.
Do you have changes you'd like to propose? I'll gladly go over those.
What I won't do, however, is maintain your package for you.
[1]https://gitlab.com/wireshark/wireshark/-/blob/master/doc/README.developer#L862
Re: Future of Wireshark's shared library ABI stability
Roland Knall (Jan 20)
To be quite honest, I asked the developers myself. In this case they are a
group of students who implemented that utility and did not know better.
Personally I would much rather have new developments added to the main
repository than be implemented as standalone. And as Guy rightfully
guessed, the main reason for them doing it this way was to basically
provide a different UI for the dissection engine with a little bit
different output info. Hope...
Re: Future of Wireshark's shared library ABI stability
Guy Harris (Jan 20)
So why, *other than "because it uses Wireshark libraries intended to provide directly useful services such as reading
capture files or dissecting packets and that use libwsutil"*, would some program outside of Wireshark use wsutil?
Re: Future of Wireshark's shared library ABI stability
Bálint Réczey (Jan 20)
Hi Guy,
Guy Harris <gharris () sonic net> ezt írta (időpont: 2022. jan. 20., Cs, 21:52):
It seems libvirt's plugin needs wmem_alloc(), for example:
https://gitlab.com/wireshark/wireshark/-/issues/17889
IMO it is easier mentally to have a single library ABI policy because
we ship only public libraries. Having a more relaxed private shared
library policy would make it easier to make mistakes.
Also if libwsutil (with wmem_alloc)...
Snort — Everyone's favorite open source IDS, Snort. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.
Snort Subscriber Rules Update 2022-01-20
Research (Jan 20)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the file-other and
protocol-scada rule sets to provide coverage for emerging threats from
these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Re: Snort 3.1.20: segfault when 16-core cpu, 2 interfaces and inspector appid (with stream/ssl/http)
Steven Baigal (sbaigal) via Snort-devel (Jan 20)
You are right, perf_monitor.base = false, will disable reporting base stats.
By the way, you can change the process affinity with process.thread configuration, and see if it can make any
differences.
Example can be found from here:
https://github.com/snort3/snort3_demo/blob/master/perf/3.0/common.lua
From: Meridoff <oagvozd () gmail com>
Date: Thursday, January 20, 2022 at 5:36 AM
To: Steven Baigal (sbaigal) <sbaigal () cisco com>...
Re: Snort 3.1.20: segfault when 16-core cpu, 2 interfaces and inspector appid (with stream/ssl/http)
Meridoff via Snort-devel (Jan 20)
Sure, will do that.
But perfmon is disabled,and do nothing, because perfmon.base=false.
It doesn't collect statistics with such setup, isn't it?
ср, 19 янв. 2022 г., 19:50 Steven Baigal (sbaigal) <sbaigal () cisco com>:
Re: Snort 3.1.20: segfault when 16-core cpu, 2 interfaces and inspector appid (with stream/ssl/http)
Steven Baigal (sbaigal) via Snort-devel (Jan 19)
Thanks for reporting the issue, could you share the backtrace from the crash?
Also, I noticed you have enabled perf_monitor, please specify which peg count from what module to limit output size,
otherwise snort will try to collect all stats from all modules, when appid is enabled, the peg counts for each
collection will exceed 3k+ for every thread. Try to comment out perf_monitor from your configuration to see if it will
help.
Steven B....
Snort 3.1.20: segfault when 16-core cpu, 2 interfaces and inspector appid (with stream/ssl/http)
Meridoff via Snort-devel (Jan 19)
Hello, I have snort 3.1.20 running on 16-core CPU with 2 interfaces.
Also good traffic goes through snort, and appid detect applications from it
(as shown below in Statistics)
And snort randomly does segfalts, also segfault and even GP occurred when
snort disabled.
If I configure number of threads to 8 or 4 or 2 - then all *OK*, no
segfaults and snort runs OK.
I think it is only when a lot of CPUs used. And number of ifaces
significantly less...
Snort Subscriber Rules Update 2022-01-18
Research (Jan 18)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the file-other,
file-pdf, malware-cnc and server-webapp rule sets to provide coverage
for emerging threats from these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Re: [SUSPECTED SPAM] Returned Errors for CISA Snort Rules
Russ Combs (rucombs) via Snort-sigs (Jan 18)
That looks like an abuse of classtype, but to add new classtypes for Snort 2 you need to update
etc/classification.config.
________________________________
From: Snort-sigs <snort-sigs-bounces () lists snort org> on behalf of chris <chris () shadowserver org>
Sent: Thursday, January 6, 2022 7:20 PM
To: snort-sigs () lists snort org <snort-sigs () lists snort org>
Subject: [SUSPECTED SPAM] [Snort-sigs] Returned Errors for CISA...
Re: Snort3: segfault after "Inspector found in the trash is still use"
Oleksii Shumeiko -X (oshumeik - SOFTSERVE INC at Cisco) via Snort-devel (Jan 18)
Hi
As a workaround, you can remove the following config option from your configuration file:
snort = { ["-z"] = 0 }
and specify it as a command-line option.
Regards,
Alexey
Hello, Meridoff!
Can you still provide core dump and binary (not stripped will be the best)?
In order to share it, you can upload them to the GoogleDisk (or any other cloud storage) and send a link.
As I can see, previously was proposed to use snort with...
SNORT and dropping spoofed packets
Ameen Al-Azzawi via Snort-sigs (Jan 18)
Hi everyone,
I have attached a pic of my topology (hopefully it goes through this
mailing list).
The topology represents a DS-Lite technology basic structure.
IPIP6 tunnel has been built between B4 & AFTR machines.
I have an attacking scenario and want to mitigate it.
I am sending (through my attacker machine) a crafted packet of IPv4 in
IPv6 packet while spoofing the IP address of the B4 router
(2001:db8:0:1::2).
The target is AFTR ens34...
Re: Snort3: segfault after "Inspector found in the trash is still use"
Yehor Velykozhon via Snort-devel (Jan 18)
Hello, Meridoff!
Can you still provide core dump and binary (not stripped will be the best)?
In order to share it, you can upload them to the GoogleDisk (or any other cloud storage) and send a link.
As I can see, previously was proposed to use snort with sanitizers, has it given you any additional information?
Also, what OS you use? Information about the version and process architecture can help as well.
Thanks, Yehor.
From: Snort-devel...
Snort Subscriber Rules Update 2022-01-13
Research (Jan 13)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
Talos has added and modified multiple rules in the malware-cnc,
server-mysql and server-webapp rule sets to provide coverage for
emerging threats from these technologies.
For a complete list of new and modified rules please see:
https://www.snort.org/advisories
Snort Subscriber Rules Update 2022-01-11
Research (Jan 11)
Talos Snort Subscriber Rules Update
Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.
Details:
Microsoft Vulnerability CVE-2022-21881:
A coding deficiency exists in Microsoft Windows Kernel that may lead to
elevation of privilege.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 58866 through 58867.
Microsoft Vulnerability...
Re: Returned Errors for CISA Snort Rules
John W. Blue via Snort-sigs (Jan 11)
Insights? That is SOP for CISA right there.
"We recommend that you should do this *but* if it does not work it is up to you to figure out how we screwed up."
You should see the amazing dysfunction of CISA trying to explain how to fill out/answer a data call for any recently
released BOD. It happens.every.single.time.
John
-----Original Message-----
From: Snort-sigs [mailto:snort-sigs-bounces () lists snort org] On Behalf Of chris...
Returned Errors for CISA Snort Rules
chris (Jan 10)
Hello,
I've been trying to implement Snort rules provided by the CISA but I'm
receiving errors when the classtype field contains the value "http-uri"
or "http-header" (examples provided below). These are not default Snort
classtypes. Can someone provide some insight on how to either define
these classtypes OR provide a good alternative classtype?
Thanks in advance for any insight you can provide!
Best,
Chris...
Snort Subscriber Rules Update 2022-01-06
Research (Jan 06)
Talos Snort Subscriber Rules Update
Synopsis:
This release adds and modifies rules in several categories.
Details:
References to CVE 2021-44832 have been added to all existing log4j
rules for ease of reference for users. Coverage was not updated as
there was no need.
Talos has added and modified multiple rules in the file-multimedia,
indicator-compromise, malware-cnc, malware-other, policy-other,
protocol-other and server-webapp rule sets to...
We also maintain archives for these lists (some are currently inactive):
Read some old-school private security digests such as Zardoz at SecurityDigest.Org
We're always looking for great network security related lists to archive. To suggest one, mail Fyodor.
|