securityaffairs.com

henfredemars, to linux in Root access vulnerability in glibc library impacts many Linux distros

For your convenience:

The researchers pointed out that the vulnerability cannot be exploited remotely. An attacker can trigger the issue by providing crafted inputs to applications that employ these [syslog] logging functions [in apps that allow the user to feed crafted data to those functions].

This is a privilege escalation.

atzanteol,

This may be difficult to exploit in practice - I don’t think most user applications use syslog.

Tja,

Unless you have user access to a system with gcc on it.

Markaos,

You still need some privileged process to exploit. Glibc code doesn’t get any higher privileges than the rest of the process. From kernel’s point of view, it’s just a part of the program like any other code.

So if triggering the bug in your own process was enough for privilege escalation, it would also be a critical security vulnerability in the kernel - it can’t allow you to execute a magic sequence of instructions in your process and become a root, that completely destroys any semblance of process / user isolation.

db2,

The hero we need."; DROP TABLE “users”;

acockworkorange,

If it isn’t little Bobby Tables again.

Sucuk, to android in Two spyware sending data of more than 1.5M users to China were found in Google Play Store
Sucuk avatar

use MiXplorer or ZArchiver, they are good.
MiXplorer (and it's addons): Google Drive / Beta (mixplorer.com/beta) (or, if you want to support the developer; Google Play Store (includes addons))
ZArchiver: Google Play Store

edit: corrected the layout.

1brokeguy, to android in Two spyware sending data of more than 1.5M users to China were found in Google Play Store

To save everyone’s time:

The first app named “File Recovery and Data Recovery” (com.spot.music.filedate) has over 1 million installs, and the second one named “File Manager” (com.file.box.master.gkd) has over 500,000 installs.

forwardvoid, to europe in Pro-Russia hackers target critical infrastructure in North America and Europe

“Pro-russia hacktivists” that’s a weird way to say “state sponsored hackers”. Also they are using open VNC and default passwords? Really? The parties responsible for that infrastructure should be ashamed.

Greg, to europe in Pro-Russia hackers target critical infrastructure in North America and Europe

So pro Russia hacktivists are running Microsoft for the last ~7 years you say?

techcrunch.com/…/microsoft-lost-keys-government-h…

qjkxbmwvz, to cybersecurity in Cisco warns of XSS flaw in end-of-life small business routers

Am I reading it correctly that it only affects remote admin? Isn’t that generally considered to be a Very Bad Idea? My home network has remote admin disabled, but with VPN access I can remotely manage it, which is (afaik?) a way more secure method than having public https access to your network gear…

Still pretty unimpressive by Cisco to basically just say “sucks to be you” to the owners. I get that it’s EOL but still.

Xin_shill, to cybersecurity in Cisco warns of XSS flaw in end-of-life small business routers

This seems kinda criminal

slazer2au, to cybersecurity in Cisco warns of XSS flaw in end-of-life small business routers

Oh It’s that time of year again where Cisco says the Cisco RV series is broken move off it.

Corkyskog,

They should move to a service only business model. Or the business model where Oracle just sues you for daring to be their customer…

kid, to cybersecurity in Threat actors breached two crucial systems of the US CISA

The shoemaker’s son always goes barefoot.

resetbypeer, to cybersecurity in Ukraine's GUR hacked the Russian Ministry of Defense

Pity they published it. Imho this should kept under the radar as long as possible, like with the enigma machine code breaking.

kid,

Maybe they are using this as propaganda to get resources from west.

resetbypeer,

Only reason I would imagine being this to the public is because they lost access or gained what they needed to gain and can show it off now. in any active breach as the actor performing this, you want to be as quiet as possible. Because to quote Kali. The quieter you are the more you hear.

Zer0_F0x,

I think that was the moto even from the BackTrack days

sugar_in_your_tea, to cybersecurity in U.S. Judge ordered NSO Group to hand over the Pegasus spyware code to WhatsApp

On what grounds does Meta deserve the source code here? Unless Pegasus is considered a “derivative work,” the most Meta should be able to demand is money.

Ajen,

They need to know how they were hacked so they can fix the vulnerability. NSO broke the law when they hacked whatsapp, it seems reasonable that they’re forced to share details to prevent others from using the same method.

I’m wondering on what grounds is NSO allowed to keep the names of their co-conspirators (AKA clients) secret?

sugar_in_your_tea,

I think it’s reasonable to require them to share details, but source code is a copyright issue and shouldn’t be given up. I’m guessing the source has a lot more than just the one attack.

But yeah, I’m also surprised they’re not obligated to reveal the names of anyone involved in planning or ordering the attack. Surely that could be subpoenad.

EmperorHenry, to cybersecurity in Crooks stole €15 Million from European retail company Pepco
@EmperorHenry@infosec.pub avatar

Here in the US it’s the employees that get stolen from the most.

glamourpunk,

yerp, wage theft is in the billions in the US

EmperorHenry,
@EmperorHenry@infosec.pub avatar

Trillions, if you count all the taxpayer money that corpos get for free

Kissaki, to cybersecurity in Crooks stole €15 Million from European retail company Pepco

Big numbers like that certainly show that training (of employees to not get phished) is worth it.

Somewhat lucky for everyone that in this case it was “only” money, no security or data breach, which has more lasting damage.

NGC2346, to linux in Root access vulnerability in glibc library impacts many Linux distros

Local attacker

Important detail

as i said on reddit

gayhitler420, to linux in Root access vulnerability in glibc library impacts many Linux distros

I replied to another comment with this, but Debian 12(stable, bookworm) and 13(testing, trixie) are affected by this but 12(stable, bookworm) has a patch out in the security repo.

If you wanna know wether or not you’re affected,

apt list libc

will show your version and the one you want is 2.36-9+deb12u4

If you don’t have that,

apt update && apt upgrade

will straighten you out

13(testing, trixie) has 2.37, but it’s not fixed yet.

E: Edited to use apt list instead of apt show.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • tester
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • osvaldo12
  • ethstaker
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • ngwrru68w68
  • kavyap
  • GTA5RPClips
  • JUstTest
  • cisconetworking
  • InstantRegret
  • khanakhh
  • cubers
  • everett
  • Durango
  • tacticalgear
  • Leos
  • modclub
  • normalnudes
  • provamag3
  • anitta
  • lostlight
  • All magazines