Physical Access to a ComputerWe continue our series of articles on COMPUTER security. Today we offer the second part of the article “Physical Access to a Computer and Data”.

Here’s the first part of the article

This part of the article describes following questions of the computer security:

  • Limited Access to Programs
  • PROHIBITION ON USE OF USB AND DVD-drives
  • LOCK ACTION WITH Kaspersky Internet Security
  • Control Access to Files And Folders
  • ON GUARD – Bio-Scanners
  • Restricting access to the BIOS

Read the rest of this entry »


SQL InjectionSQL Injection / Command Injection in Centreon and Centreon Enterprise Server

Critical vulnerabilities has been identified in all versions of the free system monitoring Centreon, issued since 2008 (Centreon <= 2.5.2 and Centreon Enterprise Server <= 2.2 | 3.0). These vulnerabilities can be exploited by anonymous users without passing authentication. Update with security fixes until released.

Danger level: High
Availability of corrections: No
Quantity of vulnerabilities: 2 Read the rest of this entry »


php logoThe PHP developers have eliminated four vulnerabilities in their products

The update fixed a vulnerability that could lead to an integer overflow.

PHP developers have released a patches 5.6.2, 5.5.18 and 5.4.34 for your scripting language that eliminates four vulnerabilities, including CVE-2014-1668, CVE-2014-3669 and CVE-2014-3670.

All holes were discovered in September of this year. The most dangerous of the patched vulnerabilities is CVE-2014-3669.  It can cause an integer overflow when parsing specially designed serialize data using the unserialize () function. Read the rest of this entry »


Vulnerabilities in Mozilla Firefox and ThunderbirdMultiple vulnerabilities in Mozilla Firefox, Firefox ESR and Thunderbird

The remote user can bypass certain security restrictions, gain access to sensitive information and compromise a vulnerable system.

Danger level: High
Availability of corrections: Yes
Quantity of vulnerabilities: 10

CVSSv2 Rating:

(AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:W/RC:C) = Base:8.8/Temporal:7.1
(AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:W/RC:C) = Base:8.8/Temporal:7.1
(AV:N/AC:M/Au:N/C:P/I:C/A:N/E:U/RL:W/RC:C) = Base:7.8/Temporal:6.3
(AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:W/RC:C) = Base:8.8/Temporal:7.1
(AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:W/RC:C) = Base:8.8/Temporal:7.1
(AV:N/AC:M/Au:N/C:P/I:C/A:N/E:U/RL:W/RC:C) = Base:7.8/Temporal:6.3
(AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:W/RC:C) = Base:4.3/Temporal:3.5
(AV:N/AC:M/Au:N/C:C/I:C/A:N/E:U/RL:W/RC:C) = Base:8.8/Temporal:7.1
(AV:N/AC:M/Au:N/C:P/I:C/A:N/E:U/RL:W/RC:C) = Base:7.8/Temporal:6.3 Read the rest of this entry »


Drupal vulnerabilitiesThe critical vulnerability in Drupal (CVE-2014-3704)

In the release of web content management system Drupal 7.32 fixed a critical vulnerability (CVE-2014-3704), which allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. The vulnerability assigned the highest level of danger (Highly critical), what indicates the possibility of the remote attacks that can lead to gaining access to the system.

The vulnerability is caused by a bug in the implementation of the method “prepared statement” in thedatabase abstraction API and can be exploited by anonymous users. A vulnerability in this API allows an attacker to send specially crafted requests resulting in arbitrary SQL execution. Read the rest of this entry »


Wordpress VulnerabilitiesThe latest Cross-site scripting vulnerabilities in WordPress plugins

Three new Cross-site scripting vulnerabilities in WordPress plugins: MaxButtons (vulnerability CVE-2014-7181), WP Google Maps(vulnerabiliy CVE-2014-7182), and WooCommerce(vulnerability CVE-2014-6313).

1. Cross-site scripting in WordPress MaxButtons

Danger of level: Low
Availability of corrections: Yes
Quantity of vulnerabilities: 1
CVSSv2 Rating: (AV: N / AC: L / Au: N / C: N / I: P / A: N / E: U / RL: O / RC: C) = Base: 5 / Temporal: 3.7
CVE ID: CVE-2014-7181 Read the rest of this entry »

mcafeeMcAfee Launches NGFW 5.8 for Enterprises to Effectively Fight Cybercrime.

McAfee Next generation firewall empowers enterprises to more effectively fight cybercrime with expanded threat defense ecosystem.

On Oct. 15, McAfee, part of Intel Security, announced the latest release of McAfee Next Generation Firewall 5.8 with important new integrations with the McAfee Security Connected framework to provide customers with layered protection against the latest threats and evasions, along with improved workflows and operational efficiencies.

McAfee’s Security Connected threat ecosystem enables rapid sharing of extensive real-time threat information, empowering organizations to fight cybercrime with the latest global and local threat knowledge. Security Connected enables McAfee Next Generation Firewall to leverage threat information from a wide variety of third party sources, as well as other McAfee security solutions. Read the rest of this entry »


Hurricane PandaCrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda

Initially, a sample of the virus was detected on a machine running 64-bit Windows Server 2008 R2.

A highly organized hacker group Hurricane Panda, located, apparently in China and attacking companies with a large infrastructure, uses in their attacks the exploit to zero-day vulnerabilities in the products of Microsoft. The duration of the attack was more than 5 months. According to researchers at CrowdStrike, the first detected attack, was produced in the spring of this year. Read the rest of this entry »


Microsoft

Microsoft Security Bulletin

Eight security bulletins contain patches for 24 vulnerabilities, including three critical.

On the Tuesday, October 14, Microsoft has released scheduled security updates, for its products. Unlike the past couple of releases, this release is complete, correcting just three zero-day vulnerabilities.

Eight security bulletins contain patches for 24 flaws in Windows, Internet Explorer, Office and .Net framework. Three of them are critical, so administrators need to test and install the update immediately. Note that one bulletin fixes several vulnerabilities. Read the rest of this entry »


SandwormZero-day vulnerability in all versions of Windows

On Tuesday, October 14, 2014, iSIGHT Partners – in close collaboration with Microsoft – announced the discovery of a zero-day vulnerability impacting all supported versions of Microsoft Windows and Windows Server 2008 and 2012.

Researchers at iSIGHT Partners said that the team, which they’ve dubbed Sandworm, likely has been active since 2009. (The sandworm is a fictional form of desert-dwelling creature from the Dune universe created by Frank Herbert – From Wikipedia, the free encyclopedia.)

Microsoft is making a patch for this vulnerability available as part of patch updates on the 14th – CVE-2014-4114. Read the rest of this entry »