New Intel tech protects point-of-sale data

تاریخ ایجاد

ID: IRCNE2014102346
Date: 2014-10-19

According to “ZDNet”, a new technology from Intel will secure transaction data in point of sale endpoint devices from malicious software running on the device itself.
The retail industry has been hit by a plague of retail point of sale breaches involving malware running on the POS terminals themselves. Such terminals are generally Windows PCs with specialized hardware running point of sale software.
Intel's Data Protection Technology for Transactions utilizes the Dynamic Application Loader (DAL) technology available on second and third generation Core and some Atom processors. DAL accesses a protected execution area of the CPU, with all communications to and from it cryptographically protected.
The new technology protects even the communications from the point of card swipe or other payment device attached to the POS. As a result, the conventional POS software running in the conventional Windows environment never sees sensitive transaction data, and neither can malware on the terminal. Intel partnered with NCR in the development of the Data Protection Technology for Transactions, which will be available to retailers in 2015.
Especially when combined with other defensive technologies, such as software whitelisting, the new approach should block many of the attack techniques that have hit Target, Home Depot, KMart and others recently.
Intel states that the technology "...supports all modern forms of credit/debit payment including EMV, Magnetic Stripe and Near Field Communication (NFC) readers, including Apple Pay." It also supports all POS form factors, including tables, as long as they have a CPU that supports it.

برچسب‌ها

SQL injection flaw opens Drupal sites to attack

تاریخ ایجاد

ID: IRCNE2014102345
Date: 2014-10-19

According to “ZDNet”, the Drupal security team is reporting that versions of Drupal 7 prior to 7.32 are vulnerable to a "Highly Critical" SQL injection bug. Version 7.32 is now available to address the bug and the Drupal team strongly recommends that Drupal 7 admins update their sites immediately. Drupal is a popular content management system that is free and open source.
An attacker could exploit this vulnerability to achieve privilege escalation or execute arbitrary PHP code. Other unspecified attacks are said to be possible. At the time the vulnerability was disclosed no know exploits were being used. The attack can be launched by an anonymous user, meaning that no social engineering or other work is necessary to allow for it.
The Drupal team recommends that sites install the latest release, but a patch is also available for those who prefer it.
The vulnerability exists in the database abstraction API, one purpose of which is to sanitize database requests against just this sort of attack.
The vulnerability was found by Sektion Eins, a German PHP security firm that was hired to audit Drupal by an unnamed client.
The bug is also designated CVE-2014-3704.

برچسب‌ها

Google uncovers Poodle SSL 3.0 security flaw

تاریخ ایجاد

Number: IRCNE2014102344
Date: 2014/10/19

According to “itpro”, a vulnerability in the SSL 3.0 web encryption standard has been uncovered by Google security researchers that renders the widely-used protocol unsafe to use.
The flaw has been dubbed Poodle by the Google research team,who have published details of how it could be exploited to carry out man-in-the-middle-type attacks online in a security advisory.
“SSL 3.0 is nearly 15 years old, but support for it remains widespread. Most importantly, nearly all browsers support it,” Google explained in a supporting blog post.
The advisory document states that, despite being made obsolete by newer protocols - such as TLS 1.0, TLS 1.1 and TLS 1.2 - SSL 3.0 is still widely used and many of these standards are backwards-compatible with it.
As SSL 3.0 is used on websites and within web browsers, the issue has the potential to cause problems for a number of users, and make it easier for hackers to acquire sensitive information.
“In the web setting, this SSL 3.0 weakness can be exploited by a man-in-the-middle attacker to decrypt ‘secure’ HTTP cookies,” the advisory adds.
To avoid this, Google’s researchers recommend that people stop using the SSL 3.0 protocol, although it admits this may not be an appropriate course of action for those that need to run legacy systems.

برچسب‌ها

حذف یک به‌روزرسانی امنيتی توسط مايكروسافت

تاریخ ایجاد

شماره: IRCNE2014102342
تاريخ: 26/07/93

شركت مايكروسافت يكي از به روز رساني هاي امنيتي خود را كه روز سه شنبه منتشر كرده بود حذف كرد زيرا بنا به گزارش كاربران نصب اين اصلاحيه باعث راه اندازي مجدد سيستم مي شود.
اصلاحيه منتشر شده در راهنمايي امنيتي مايكروسافت با شماره 2949927 توصيف شده است و يك الگوريتم درهم سازي SHA-2 را به ويندوز 7 و ويندوز سرور 2008 R2 اضافه مي كند. اين اصلاحيه يكي از سه ويژگي امنيتي پيشگيرانه بوده كه در روز سه شنبه منتشر شده است.
روز جمعه شركت مايكروسافت راهنمايي امنيتي 2949927 را بازبيني كرده است. در اين راهنمايي امنيتي آمده است كه شركت مايكروسافت توصيه مي كند تا كاربراني كه با اين مشكل مواجه شده اند اين به روز رساني را حذف نمايند. مايكروسافت در حال بررسي اين مشكل است و هنگامي كه اطلاعات كامل تري در اين خصوص بدست آورد، اين به روز رساني را اصلاحج و مجددا منتشر خواهد كرد.

برچسب‌ها

انتشار اصلاحيه‌های اپل

تاریخ ایجاد

شماره: IRCNE2014102342
تاريخ: 26/07/93

شركت اپل علاوه بر انتشار اصلاحيه هاي OS X 10.10 Yosemite، تعدادي از نرم افزارهاي ديگر خود را به روز رساني كرد. اين برطرف كننده هاي امنيتي عبارتند از: به روز رساني امنيتي 2014-005 براي OS X Mountain Lion نسخه 10.8.5 و OS X Mavericks نسخه 10.9.5، OS X Server نسخه 2.2.5، 3.3.2 و 4.0، و iTunes نسخه 12.0.1. در مجموع 144 آسيب پذيري در اين محصولات اصلاح شده است.
بسياري از اين به روز رساني هاي امنيتي ممكن است روز دوشنبه 20 اكتبر همزمان با انتشار iOS نسخه 8.1 منتشر شوند.
در سيستم عامل Yosemite، حدود 45 آسيب پذيري اصلاح شده است. اين به روز رساني ها شامل اصلاحيه اي براي مشكل Shellshock در Bash shell مي باشد. هم چنين يك اصلاحيه براي نقص POODLE در طراحي SSL نسخه 3 پروتكل منتشر شده است. شركت اپل اين مشكل را با غيرفعال كردن رمزگذاري CBC هنگامي كه برقراري ارتباط با TLS با مشكل مواجه مي شود، برطرف كرده است.
بسياري از آسيب پذيري هاي ديگر جدي مي باشند و مي توانند منجر به اجراي كد دلخواه با حق دسترسي بالا شوند و هم چنين به كاربري اجازه دهند تا به تيكت هاي Kerberos ديگران دسترسي يابد يا به يك دستگاه بلوتوث خرابكار اجازه دهند تا ارتباطي بدون زوج كليدها برقرار كند.
در همين زمان شركت اپل به روز رساني امنيتي 2014-005 را براي OS X Mountain Lion نسخه 10.8.5 و OS X Mavericks نسخه 10.9.5 منتشر كرده است. اين به روز رساني ها شامل تنها دو اصلاحيه براي POODLE و Shellshock مي باشند.
نرم افزار iTunes نسخه 12.0.1 بزرگترين منتشر كننده اصلاحيه مي باشد و در مجموع 83 آسيب پذيري در اين نرم افزار اصلاح شده است. تمامي اين مشكلات مربوط به مسائل تخريب حافظه در موتور WebKit مرورگر مي باشند.
شركت اپل 18 آسيب پذيري را در OS X Server نسخه 4.0 برطرف كرده است. اكثر اين مشكلات مربوط به مولفه هاي شركت هاي ثالث مانند PostgreSQL و Bind مي باشند.
هم چنين نسخه هاي 3.3.2 و 2.2.5 سيستم عامل OS X Server منتشر شده است كه در آن ها تنها مشكل POODLE برطرف شده است و مشكلات ديگر اين سيستم عامل هم چنان اصلاح نشده است.

برچسب‌ها

انتشار به‌روزرسانی‌های فلش‌پلير و ColdFusion

تاریخ ایجاد

شماره: IRCNE2014102341
تاريخ: 26/07/93
شركت ادوب اصلاحيه هايي را براي فلش پلير و ColdFusion منتشر كرده است. اين به روز رساني ها سه آسيب پذيري بحراني را در فلش پلير بر روي تمامي پلت فرم ها برطرف كرده است. در نسخه هاي جديد ColdFusion نيز سه آسيب پذيري با اولويت پايين اصلاح شده است.
در جدول زير فهرست محصولات آسيب پذير و نسخه هاي اصلاح شده آن نشان داده شده است:
 

flash player


براي آگاهي از نسخه فلش پليري كه بر روي سيستم شما در حال اجراست، بر روي محتوي اجرا شده با فلش پلير كليك راست نماييد و از منو گزينه "About Adobe (or Macromedia) Flash Player" را انتخاب كنيد.
شركت مايكروسافت در نسخه جديد IE آسيب پذيري فلش پلير را اصلاح نموده است. هم چنين شركت گوگل در نسخه جديد كروم مشكلات فلش پلير را برطرف كرده است.
در اصلاحيه جديد ColdFusion يك مسئله امنيتي مجوزها برطرف شده است كه مي تواند توسط يك كاربر تاييد هويت نشده براي دور زدن آدرس IP و دسترسي به ColdFusion Administrator مورد سوء استفاده قرار بگيرد. هم چنين اين اصلاحيه آسيب پذيري هاي اسكريپت بين سايتي و درخواست بين سايتي را برطرف كرده است.

برچسب‌ها

Microsoft withdraws another buggy update

تاریخ ایجاد

Number: IRCNE2014102343
Date: 2014/10/18

According to “zdnet”, microsoft has withdrawn an update released this past Tuesday due to user reports of system reboots after installation.
The update released as described in Microsoft Security Advisory 2949927 added SHA-2 hash algorithm signing and verification for Windows 7 and Windows Server 2008 R2. It was one of three proactive security feature updates released on Tuesday in addition to the eight patches of Windows and Office.
On Friday, October 17 Microsoft revised the 2949927 advisory with the following statement:
Removed Download Center links for Microsoft security update 2949927. Microsoft recommends that customers experiencing issues uninstall this update. Microsoft is investigating behavior associated with this update, and will update the advisory when more information becomes available.

برچسب‌ها

Apple patches 144 security flaws across seven products

تاریخ ایجاد

Number: IRCNE2014102342
Date: 2014/10/18

According to “techworld”, in addition to OS X 10.10 Yosemite, Apple released a number of other software updates on Thursday, largely for security fixes: Security Update 2014-005 for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5; OS X Server versions 2.2.5, 3.3.2 and 4.0; and iTunes 12.0.1. In total, 144 separate vulnerabilities are addressed in these updates.
More security updates may be coming on Monday, October 20 when Apple releases iOS 8.1. Expect many of the bugs fixed in Yosemite also to be fixed in iOS.
Yosemite fixes 45 vulnerabilities across many parts of the operating system. Included is the fix for the Shellshock bug in the Bash shell, patched separately at the end of September. There is also a fix for the POODLE flaw in the design of the SSL version 3 protocol; Apple addressed it by disabling CBC cipher suites when TLS connection attempts fail.
Many of the other vulnerabilities are severe, allowing arbitrary code execution with high privileges, giving one user access to another's Kerberos tickets or letting a malicious Bluetooth device establish a connection without pairing.
At the same time, Apple released Security Update 2014-005 for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5. This update contains only two fixes, those for Shellshock and for POODLE.
iTunes 12.0.1 is the busiest update released today with 83 vulnerabilities fixed, all of them memory corruption issues in the WebKit browser engine.
Apple released OS X Server 4.0 Thursday as well, fixing 18 vulnerabilities. Many are in third-party components such as PostgreSQL and Bind.
OS X Server versions 3.3.2 and 2.2.5 were also released, but these only include the TLS change to block the POODLE attack, not any of the other bugs in OS X Server.

برچسب‌ها

Adobe patches Flash Player and ColdFusion

تاریخ ایجاد

Number: IRCNE2014102341
Date: 2014/10/18

According to “techworld”, Adobe has released updates for Flash Player and the ColdFusion web platform. The update fix three critical vulnerabilities in Flash Player on all platforms, as well as the AIR Runtime and SDK. The new versions of ColdFusion fix three lower-priority vulnerabilities.
The table below lists the affected and fixed versions of Flash Player and AIR:
 

flash player


To check the version of Flash Player you are running, access the About Flash Player page, or right-click on content running in Flash Player and select "About Adobe (or Macromedia) Flash Player" from the menu.
Microsoft will release a new version of Internet Explorer, which has Flash Player integrated since version 10, fixing this and other vulnerabilities later today. Google has already begun to release new versions of Chrome with the fixed Flash Player.
New hotfixes for ColdFusion address a security permissions issue that could be exploited by an unauthenticated local user to bypass IP address access control restrictions applied to the ColdFusion Administrator. The hotfix also fixes cross-site scripting and cross-site request forgery vulnerabilities.

برچسب‌ها

Microsoft updates Windows, IE, Office in busy Patch Tuesday

تاریخ ایجاد

ID: IRCNE2014102340
Date: 2014-10-15

According to “ZDNet”, Microsoft has released eight security bulletins and updates to address them. A total of 24 vulnerabilities are addressed in these updates, three of which are rated Critical.

  • MS14-056, MS14-058 and MS14-060 all fix vulnerabilities which have been exploited in the wild for some time. MS14-056 and MS14-058 are rated Critical by Microsoft and MS14-060 gets a lesser Important rating. See Multiple active zero-day vulnerabilities patched today for more details on some of these attacks.
  • MS14-056: Cumulative Security Update for Internet Explorer (2987107) — 14 of the 24 vulnerabilities fixed today are in this update. One of them has already been exploited in the wild. Note that today's new versions of IE 10 and 11 also include a new version of Adobe Flash Player.
  • MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (3000414) — This update fixes three vulnerabilities, at least one of which affects all supported versions of .NET and Windows. The most severe is a remote control execution bug that could allow remote code execution if an attacker sends a specially crafted URI request containing international characters to a .NET web application.
  • MS14-058: Vulnerability in Kernel-Mode Driver Could Allow Remote Code Execution (3000061) — This update fixes two vulnerabilities reported by FireEye which could be used to gain privileged access and to execute remote code.
  • MS14-059: Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass (2990942) — An attacker who convinced a user to click on a link to a malicious web site could then use that access to exploit other web sites.
  • MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869) — An attacker who convinced a user to open a malicious Office document could gain remote code execution.
  • MS14-061: Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434) — A malicious Word document could be used to compromise the user who opened it.
  • MS14-062: Vulnerability in Message Queuing Service Could Allow Elevation of Privilege (2993254) — A specially crafted input/output control (IOCTL) request to the Message Queuing service could cause elevation of privilege.
  • MS14-063: Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege (2998579) — Windows Server 2003, Windows Vista, and Windows Server 2008 could be compromised through improper management of FAT32 partitions.

Finally, there is a new version of the Windows Malicious Software Removal Tool. As described by Microsoft, this version addresses many new families of malware: Win32/Hikiti, Win32/Mdmbot, Win32/Moudoor, Win32/Plugx, Win32/Sensode, and Win32/Derusbi.

برچسب‌ها