Tag Archive for: linux

TCP Flaw in Linux Servers Allows Web Traffic Hijacking – Softpedia News


Softpedia News

TCP Flaw in Linux Servers Allows Web Traffic Hijacking
Softpedia News
CVE-2016-5696 is the ID of a serious security flaw that affects the TCP implementation in the Linux kernel, which, if exploited, allows an attacker to hijack unencrypted Web traffic, or crash encrypted communications such as HTTPS sessions or Tor …
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous – University of California, RiversideUniversity of California, Riverside
Study Highlights Serious Security Threat to Many Internet UsersUCR Today
RFC 5961 – Improving TCP's Robustness to Blind In-Window Attacks – IETF ToolsIETF Tools
Wikipedia –Wikipedia
all 39 news articles »

HTTPS hijacking – read more

Mac, Linux malware discovered targeting biomedical research

The malware, which Apple calls Fruitfly, is designed to take screen captures, access the Mac’s webcam, and simulate mouse clicks and key presses, allowing for remote control by a hacker, Malwarebytes said in a blog post on Wednesday. The security firm …
mac hacker – read more

Google patches Dirty Cow Linux vulnerability in Android security bulletin – Inquirer


Inquirer

Google patches Dirty Cow Linux vulnerability in Android security bulletin
Inquirer
GOOD NEWS SECURITY FANS, Google has tackled that Dirty Cow problem that had us all sniggering at the back. The fix comes as part of an Android security bulletin, naturally, and comes with a number of fixes for some core security problems. You are, of …
Malware, Hacking Is A Serious Game, But Security Experts Warn Against PanicInternational Business Times
December Android Security Update Includes Dirty Cow FixGo Android Apps (blog)

all 3 news articles »

“android security” – read more

Elegant 0-day unicorn underscores “serious concerns” about Linux security

Enlarge / A screenshot showing an exploit that takes full control of a fully updated version of Fedora. (credit: Chris Evans)

Recently released exploit code makes people running fully patched versions of Fedora and other Linux distributions vulnerable to drive-by attacks that can install keyloggers, backdoors, and other types of malware, a security researcher says.

One of the exploits—which targets a memory corruption vulnerability in the GStreamer framework that by default ships with many mainstream Linux distributions—is also noteworthy for its elegance. To wit: it uses a rarely seen approach to defeat address space layout randomization and data execution prevention, which are two of the security protections built in to Linux to make software exploits harder to carry out. ASLR randomizes the locations in computer memory where software loads specific chunks of code. As a result, code that exploits existing flaws often results in a simple computer crash rather than a catastrophic system compromise. Meanwhile, DEP, which is often referred to as NX or No-Execute, blocks the execution of code that such exploits load into memory. (Ars Technology Editor Peter Bright has much more about ASLR and DEP here.)

Unlike most ASLR and DEP bypasses, the one folded into the GStreamer exploit doesn’t rely on code to manipulate the memory layout or other environmental variables. Instead, it painstakingly arranges the bytes of code in a way that completely disables the protections. And by eliminating the need for JavaScript or other memory-massaging code to execute on a targeted computer, it’s possible to carry out attacks that otherwise wouldn’t be possible. Chris Evans, the security researcher who developed the exploit, describes the challenge as “a real beast.”

Read 6 remaining paragraphs | Comments

Technology Lab – Ars Technica