Archive | April, 2010

DAVTest – WebDAV Vulnerability Scanning (Scanner) Tool

Don't let your data go over to the Dark Side!


When facing off against a WebDAV enabled server, there are two things to find out quickly: can you upload files, and if so, can you execute code?

DAVTest attempts help answer those questions, as well as enable the pentester to quickly gain access to the host. DAVTest tries to upload test files of various extension types (e.g., “.php” or “.txt”), checks if those files were uploaded successfully, and then if they can execute on the server. It also allows for uploading of the files as plain text files and then trying to use the MOVE command to rename them to an executable.

Assuming you can upload an executable, a test file does you no good–so DAVTest can automatically upload a fully functional shell. It ships with shells for PHP, ASP, ASPX, CFM, JSP, CGI, and PL, and dropping a file in the right directory will let you upload any back-door you like.

Features


  • Upload with executable extension or .txt
  • Checks for successful upload and execution
  • Supports MOVE and MKCOL
  • Can upload backdoor/shell or arbitrary files
  • Basic authentication

DAVTest is written in PERL and licensed under the GPLv3.

You can download DAVTest v1.0 here:

davtest-1.0.zip

Or read more here.


Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,327 views
- AJAX: Is your application secure enough? - 120,029 views
- eEye Launches 0-Day Exploit Tracker - 85,481 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Texas Man Pleads Guilty To Bot Network For Hire

Don't let your data go over to the Dark Side!


Another botnet herder bites the dust, the latest news in the malware arena is about David Anthony Edwards from Texas who has admitted he and his accomplice had offered tailor made malware and DDoS attacks for rent.

22,000 zombies is a reasonable number of bots for a herder to control on their own, and assuming they are all on broadband connections, could generate enough network noise to saturate most connections.

A Texas man has agreed to plead guilty to charges he trained a botnet on a popular internet service provider so he could demonstrate custom-made malware to a potential customer.

David Anthony Edwards of Mesquite, Texas admitted that in August 2006 he and alleged accomplice Thomas James Frederick Smith unleashed a flood of data on ThePlanet.com to demonstrate the effectiveness of bot software they called Nettick, according to court documents. The men allegedly told one purchaser they had 22,000 zombie machines under their control and would sell them for 15 cents apiece in minimum batches of 5,000.

Smith, most recently of Parris Island, South Carolina, has pleaded not guilty to the charges. A trial is scheduled to begin May 17.

Even though he has admitted to wrong-doing he has pleaded not guilty to the charges, I guess we’ll have to wait for the trial in May to see what actually happens and if he is sentenced. Seen as though it’s not a trumped up terrorism charge I personally think he’ll get off without a huge sentence.

Perhaps a hefty fine and a couple of years ‘suspended sentence’.

In a plea agreement signed by Edwards, he also said that he and Smith breached servers operated by webhost, T35.net. They then extracted password files and made hundreds of thousands of user IDs and access codes available online, the document, filed in US District Court in Dallas, stated. The pair went on to deface the website, Edwards added.

According to an indictment, they also rebuked T35 admins with the words “How are all the users going to be compensated?”

Edwards, who went by the online handle Z00k, said the costs to T35.net were between $5,000 and $10,000. He is scheduled to enter his plea in court on Thursday. He faces a maximum of five years in prison, a $250,000 fine, and he will be required to pay restitution to the victims. ®

It seems like they got up to some other dodgy business too hacking and defacing a webhost – that’s not really a great way to keep yourself low-profile. They should take some lessons from the Eastern European bot herders who stay completely off the grid.

Anyway it seems like the legal system is starting to catch up with these kind of ‘underground’ business schemes and slowly but surely shutting them down.

Sadly the fact remains, the bad guys are always one step ahead of the good guys.

Source: The Register


Posted in: Legal Issues, Malware

Tags: , , , , , , , , , , , , , , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment
Recent in Legal Issues:
- FBI Backed Off Apple In iPhone Cracking Case
- TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details
- More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open

Related Posts:

Most Read in Legal Issues:
- Class President Hacks School Grades - 80,690 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,594 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,599 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


fuzzdb – Comprehensive Set Of Known Attack Sequences

Don't let your data go over to the Dark Side!


fuzzdb is a comprehensive set of known attack pattern sequences, predictable locations, and error messages for intelligent brute force testing and exploit condition identification of web applications.

Many mechanisms of attack used to exploit different web server platforms and applications are triggered by particular meta-characters that are observed in more than one product security advisory. fuzzdb is a database attack patterns known to have caused exploit conditions in the past, categorized by attack type, platform, and application.

Because of the popularity of a small number of server types, platforms, and package formats, resources such as logfiles and administrative directories are typically located in a small number of predictable locations. A comprehensive database of these, sorted by platform type, makes brute force fuzz testing a scalpel-like approach.

Since system errors contain predictable strings, fuzzdb contains lists of error messages to be pattern matched against server output in order to aid detection software security defects.

Primary sources used for attack pattern research:

  • researching old web exploits for repeatable attack strings
  • scraping scanner patterns from http logs
  • various books, articles, blog posts, mailing list threads
  • patterns gleaned from other open source fuzzers and pentest tools
  • analysis of default app installs
  • system and application documentation
  • error messages

It’s like a non-automated open source scanner without the scanner. You can download fuzzdb v1.06 here:

fuzzdb-1.06.tgz

It’s recommended to sync via SVN though as the contents will be a lot fresher as compared to the files in the tar.

Or read more here.


Posted in: Hacking Tools, Programming

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Programming | Add a Comment
Recent in Hacking Tools:
- The Backdoor Factory (BDF) – Patch Binaries With Shellcode
- Gdog – Python Windows Backdoor With Gmail Command & Control
- SPF (SpeedPhish Framework) – E-mail Phishing Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,973,018 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,399,757 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 675,767 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Seattle Computer Security Expert Turns Tables On The Police

Don't let your data go over to the Dark Side!


Honestly there’s been nothing much going on for the past few days or over the weekend, Microsoft retracted some patches citing ‘quality issues’ and there was announcement about Metasploit Express version.

But well that was about it! This was the only story I found vaguely interesting, because well we all love to flip the bird to ‘The Man‘ don’t we? That’s why we do what we do.

A ‘cyber PI’ in Seattle turned the tables on the police when they tried to give him the run around when he was arrested after refusing to identify himself.

A computer security expert used his elite skills to turn the tables on Seattle Police who arrested him for doing nothing more than refusing to identify himself during a drunken street golf game in 2008.

Eric Rachner, identified by The Seattle PI as a cyber security expert, fought the charges for obstructing a police officer, and as part of his defense, he demanded access to the video and audio recordings of his arrest. The recordings are automatically made using cameras mounted to squad car dashboards and microphones on police uniforms.

Seattle Police refused and prosecutors eventually dropped the charges, but that wasn’t good enough for Rachner. He filed a request under a Washington state public disclosure law demanding access to the recordings and was again turned down.

“These recordings are both past our retention period and can no longer be obtained,” Seattle Police Department officials responded in writing. “Please note that the majority of 911 calls and videos are retained for a period of ninety (90) days.”

The whole story is quite laughable and extremely indicative to how government organizations generally act – trying to brush people off. It’s good to see a citizen standing up for his rights and calling them out when actually he’s done nothing wrong and he was punished for non-compliance.

It turns out he wasn’t even the one that prompted the 911 call in the first place, one of the street golfers accidentally sliced the foam ball and hit a passerby in the face. He wasn’t injured but after being heckled by the golfers he called the police.


So Rachner researched the video and audio recording system used by the department and discovered that permanent logs index every recording and show when it is uploaded, flagged for retention, played, copied, or deleted.

Armed with this new information, Rachner filed a public records request for the log, and that’s when he hit pay dirt. It showed that the recordings had been flagged for retention after his arrest and still existed. Soon enough, he had them, and they backed his contention that he was arrested solely for refusing to provide identification to police. (Officers claimed otherwise but never elaborated).

Police now say their earlier claim that the videos couldn’t be obtained was the result of a server error, which sounds like the modern-day equivalent of the dog-ate-my-homework excuse.

It’s a good result and I hope it prompts more people to stand up for their civil rights and stop the US becoming a totalitarian state “Papers please”.

You can read the full report from the Seattle PI here including a quote from Dan Kaminsky:

Local computer security expert investigates police practices

Source: The Register


Posted in: General News

Tags: , , , , , , , , , ,

Posted in: General News | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,377 views
- eEye Launches 0-Day Exploit Tracker - 85,481 views
- Seattle Computer Security Expert Turns Tables On The Police - 43,705 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


ReFrameworker – General Purpose Framework Modifier

Cybertroopers storming your ship?


ReFrameworker is a general purpose Framework modifier, used to reconstruct framework Runtimes by creating modified versions from the original implementation that was provided by the framework vendor. ReFrameworker performs the required steps of runtime manipulation by tampering with the binaries containing the framework’s classes, in order to produce modified binaries that can replace the original ones.

It was developed to experiment with and demonstrate deployment of MCR (Managed Code Rootkits) code into a given framework.

Features

  • Performs all the required steps needed for modifying framework binaries (disassemble, code injection, reassemble, precompiled images cleaning, etc.)
  • Fast development and deployment of a modified behavior into a given framework
  • Auto generated deployers
  • Modules: a separation between general purpose “building blocks” that can be injected into any given binary, allowing the users to create small pieces of code that can be later combined to form a specific injection task.
  • Can be easily adapted to support multiple frameworks by minimal configuration (currently comes preconfigured for the .NET framework)
  • Comes with many “preconfigured” proof-of-concept attacks (implemented as modules) that demonstrate its usage that can be easily extended to perform many other things.

ReFrameworker, as a general purpose framework modification tool, can be used in other contexts besides security such as customizing frameworks for performance tuning, Runtime tweaking, virtual patching, hardening, and probably other usages – It all depends on what it is instructed to do.

You can download ReFrameworker v1.1 here:

Software – ReFrameworker_V1.1.zip
Source Code: ReFrameworker_V1.1_Source_Code.zip

Or read more here.


Posted in: Hacking Tools, Malware, Programming

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Malware, Programming | Add a Comment
Recent in Hacking Tools:
- The Backdoor Factory (BDF) – Patch Binaries With Shellcode
- Gdog – Python Windows Backdoor With Gmail Command & Control
- SPF (SpeedPhish Framework) – E-mail Phishing Toolkit

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,973,018 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,399,757 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 675,767 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


PayPal Patches Critical Security Vulnerabilities

Cybertroopers storming your ship?


PayPal in the news again for a series of fairly high-profile vulnerabilities discovered by the same guy that found the XSS bugs in Google Calendar and Twitter (Nir Goldshlager).

I’m glad people are looking at PayPal as I’m sure the volume of monetary transactions that pass through their site on a daily basis is huge. It’s still the leading payment processing solution, especially for International transactions.

Seems to be more on the business side rather than effecting users, but exposing so much customer is never a good thing.

A security researcher has uncovered multiple vulnerabilities affecting PayPal, the most critical of which could have enabled attackers to access PayPal’s business and premier reports back-end system.

The vulnerabilities were patched recently by PayPal after security researcher Nir Goldshlager of Avnet Technologies brought the vulnerabilities to the site’s attention. The most critical bug was a permission flow problem in business.paypal.com, and could have potentially exposed a massive amount of customer data.

“An attacker was able to access and watch any other user’s financial, orders and report information with unauthorized access to the report backend application,” Goldshlager explained. “When users have a premier account or business account the transaction details of their orders are saved in the reports application … an attacker can look at any finance reports of premier or business accounts in the PayPal reports application and get a full month [and] day summary of the orders reports.”

That includes information such as the PayPal buyer’s full shipping address, the PayPal transaction ID of the buyer and the date and amount of transaction.

It’s good to see responsible disclosure by the researcher and swift action on behalf of PayPal fixing the flaws. It seems pretty rare these days with the walls of bullshit companies push our via their PR/comms channels try to create enough smoke and mirrors to distract everyone from the real issues.

Hijacking a users account on PayPal is a pretty serious issue as the attacker could simply transfer all the persons funds to their own account, if they weren’t very active they wouldn’t even notice. Even more dangerous if their account is linked to a Credit or Debit card.

The other vulnerabilities Goldshlager found included an XSS (cross-site scripting) vulnerability affecting the paypal.com and business.paypal.com sites that an attacker could use to steal session IDs and hijack user accounts, as well as a CSRF (cross-site request forgery) bug that exposed user account information. The CSRF vulnerability impacts the IPN (Instant Payment Notification) system, a PayPal service that sends a message once a transaction has taken place.

Once IPN is integrated, sellers can automate their back offices so they don’t have to wait for payments to come in to fulfill orders, Goldshlager explained.

“This CSRF exploit method exposes the same information from the buyer as the first vulnerability … to exploit a CSRF attack that adds a Instant Payment Notification access, the attacker will make an attack that adds his own Website address to the victim account IPN settings, and when there is transaction on PayPal the victim’s transaction details will be sent to the attacker’s Website,” he said.

The IPN issue is dangerous too as you could develop some software to place bogus orders on ecommerce sites then generate a fake IPN back to the site to get the goods for free without any actual payment taking place.

Some other minor CSRF flaws were also discovered, but according to Paypal ‘nearly all‘ have been fixed.

Source: eWeek (Thanks to Nir Goldshlager himself for e-mailing me the article)


Posted in: Exploits/Vulnerabilities, Privacy, Web Hacking

Tags: , , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,327 views
- AJAX: Is your application secure enough? - 120,029 views
- eEye Launches 0-Day Exploit Tracker - 85,481 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


The Conscience of a Hacker AKA The Hacker’s Manifesto By The Mentor

Cybertroopers storming your ship?


This is a seminal piece of writing from the underground, forgotten by many but adored by many more. It still resonates with me and has as much meaning as it did back in the day when I first read it in Phrack Issue 7.

The Hacker's Manifesto

If you don’t know anything about this text or have never even heard of it, read it and read it carefully. It dates back to 1986 and was penned by Loyd Blankenship AKA The Mentor shortly after his arrest by the FBI for computer related crimes (more at Wikipedia).

Enjoy The Hacker’s Manifesto.

I found the text when I was switching over the new server and thought it’d probably be better if I hosted it up here on the new site instead of in the nasty old HTML.

I guess many of you have read it before, and I hope you enjoy reading it again. My main aim though is to introduce it to newer people in the industry and hope they share it amongst their peers as it still embodies the hacker ethos.


Posted in: Old Skool Philes

Tags: , , , , , , , , , , , , , , ,

Posted in: Old Skool Philes | Add a Comment
Recent in Old Skool Philes:
- Hacking Windows NT Through IIS & FTP
- Writing Worms for Fun or Profit
- Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript

Related Posts:

Most Read in Old Skool Philes:
- Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript - 311,446 views
- Remote Network Penetration via NetBios Hack/Hacking - 234,874 views
- How to get Ops and takeover a channel on IRC Hack Hacking - 179,374 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


China Reports Millions Of Conficker Infections

Don't let your data go over to the Dark Side!


Conficker has been giving us all headaches for quite some time now, the latest news it that China hosts up to 28% of the World Conficker infections at its peak.

7 million separate hosts infected with Conficker at the end of 2009, that’s more than the population of some countries!

It’s a pretty nasty piece of malware and doesn’t seem to be going away anytime soon, especially with many new nations, cities & areas coming online with users inexperienced in the ways of the web – more infections are bound to happen.

China last year hosted more than one in four of the world’s computers infected with a major variant of the Conficker worm, according to an official report, highlighting the wide reach of malware inside the country. China had about 7 million Internet Protocol (IP) addresses infected with Conficker B at the end of last year, according to a recent annual security report posted on the Web site of China’s National Computer Network Emergency Response Technical Team (CNCERT). The number of infections varied during the second half of the year, which the report covered, but was higher than 5 million during all but one week.

The huge figures gave China up to 28 percent of the world’s Conficker B infections depending on the week, the report shows.The controllers of Conficker so far have hardly used their network of infected computers, but they could potentially use it to launch a crippling denial-of-service attack by ordering all of the computers to contact a victim server at the same time.

7 million infected hosts, that’s one mean looking DDoS network right there. That’s assuming all the Conficker infections are controlled by the same herders (which IMHO is unlikely). There are probably multiple groups using variations of the same malware, different infection vectors and different control channels.

I wonder if they are going to do anything with Conficker because Conficker Day on April 1st last year was a non-event and when they did start dropping some payloads – well nothing much happened either.

Malware is a growing problem worldwide, but Chinese PC users may be more easily hit than others. Over 4 percent of China’s more than 380 million Internet users run no security software, according to a recent survey. Software piracy is also rampant in the country, with unlicensed versions of Windows XP running on many PCs that are unlikely to receive regular security updates.

Conficker began spreading late in 2008 and has become the most widespread known botnet. But attention to the worm fell off last year when April 1, a day the worm was due to update, came and passed without incident. Millions of PCs worldwide remain infected with the worm.

China also had anywhere from 125,000 to over 300,000 IPs infected with Conficker C during the second half of last year, giving it up to 20 percent of the world’s infections for that variant, according to the report.

The figures from the China based report are considerably higher than those from Shadowserver, which as of April 2010 only reports about 2 million Conficker infections in China (stats here).

I would say the problems in China have many angles, the main ones being pirated software leaving users with vulnerable software and lack of education meaning people aren’t using Antivirus software and are wide open to infections.

Source: Network World


Posted in: Malware

Tags: , , , , , , , , , , , , , , , , , ,

Posted in: Malware | Add a Comment
Recent in Malware:
- PEiD – Detect PE Packers, Cryptors & Compilers
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan
- Veil Framework – Antivirus Evasion Framework

Related Posts:

Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,474 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,594 views
- US considers banning DRM rootkits – Sony BMG - 44,979 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Netsparker Community Edition – Web Application Security Scanner

Cybertroopers storming your ship?


Netsparker is a Web Application Security Scanner that claims to be False-Positive Free. The developers thought that if you need to investigate every single identified issue manually what’s the point of having an automated scanner? So they developed a new technology which can confirm vulnerabilities on demand which allowed us to develop the first false positive free web application security scanner.

When Netsparker identifies an SQL Injection, it can identify how to exploit it automatically and extract the version information from the application. When the version is successfully extracted Netsparker will report the issue as confirmed so that you can make sure that the issue is not a false-positive.

Same applies to other vulnerabilities such as XSS (Cross-site Scripting) where Netsparker loads the injection in an actual browser and observes the execution of JavaScript to confirm that the injection will actually get executed in the browser.

Thanks to its comprehensive and powerful JavaScript engine it’s possible to simulate a real attacker successfully. This means it can successfully analyse websites that rely on AJAX and JavaScript.

You don’t need to be a security expert, get training or read a long manual to start. Since the user interface is easy to use and can confirm and show you the impact, you can just fire it up and start using it.

Netsparker - Community Edition

You can download Netsparker – Community Edition here:

NetSparkerCommunityEditionSetup.exe

Or read more here.


Posted in: Countermeasures, Database Hacking, Security Software, Web Hacking

Tags: , , , , , , , , , , , , ,

Posted in: Countermeasures, Database Hacking, Security Software, Web Hacking | Add a Comment
Recent in Countermeasures:
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response
- PEiD – Detect PE Packers, Cryptors & Compilers
- NAXSI – Open-Source WAF For Nginx

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,029 views
- Password Hasher Firefox Extension - 117,718 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,707 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Oracle Releases Emergency Patch for Java Vulnerability

Don't let your data go over to the Dark Side!


After informing a researcher just a few days ago that “they do not consider this vulnerability to be of high enough priority to break their quarterly patch cycle” they have made a 180 turn on the issue and pushed out an emergency patch to mitigate against the Serious Java Bug That Exposes Users To Code Execution.

They fell under heavy criticism after their statement as it was demonstrated by multiple people that the vulnerability was fairly trivial to exploit and could cause some serious damage.

I’m glad to see they took the proactive step of understanding the vulnerability and pushing out a patch. I just wish they would fix the way in which Java manages updates (multiple redundant copies of the software with minor differences).

Under criticism for not patching a critical vulnerability in its recently acquired Java virtual machine, Oracle on Thursday released an emergency update that eliminates the zero-day threat.

Functionality in the Java Web Start component made it trivial for attackers to remotely execute malicious code on end-user machines. Tavis Ormandy, one of the researchers who first discovered the threat, said he alerted Java handlers inside Oracle’s Sun division, but they decided no patch was necessary before the next update release scheduled for July.

It would appear that Oracle officials had a change of heart. On early Thursday, they pushed out Java 6, update 20, which makes changes to the Java Network Launch Protocol, according to release notes. The JNLP is closely associated with Java Web Start, which makes it easy for end users to install custom libraries needed to run Java applications.

Java 6, Update 20 is now publicly available and seems at least in part to fix the issue. I guess we’ll have to wait until next week when researchers have had some time to do more extensive testing to see if the issue is actually properly fixed.

There are unconfirmed reports however that the patch doesn’t completely eliminate the vulnerability. I wouldn’t be surprised if it’s not totally fixed, but I’ll be happy to see it is. But then from the report it only effects the way in which the Firefox plugin deals with the update so the majority (IE users) should be safe.

There are unconfirmed reports that the patch doesn’t completely eliminate the threat, most notably in this Google translation of a report from Heise. A researcher who asked not to be named said there may be upgrade problems with the npapi plugin used by Firefox that may leave a stale version behind. Internet Explorer should be safe, however.

The out-of-cycle update is a smart move, but Oracle still has unfinished work to make Java patching more seamless. First, Java needs to stop flogging the Yahoo Toolbar each time an update is available. Patches are about security, not marketing the unwanted bloat of partners.

Another gripe we’ve long had about Java updates is that they reset some default settings. A case in point: If you have Java configured to check for updates daily, instead of monthly as the program does by default, you’ll have to reset that preference each and every time you update. That means it could take a full 30 days to get critical security patches like the one released Thursday.

I have to agree with the comments about the Java updates, I just noticed a few days ago my Firefox had about 15 Java add-ons from all the previous versions of the JVM. Why can’t it just upgrade over the existing version like every other sane piece of software does?

Anyway it’s a good move by Oracle and I hope more companies follow suit by taking security issues seriously and dealing with them in a timely fashion.

Source: The Register


Posted in: Countermeasures, Exploits/Vulnerabilities, Programming

Tags: , , , , , , , , , , , , , , , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Programming | Add a Comment
Recent in Countermeasures:
- Google Rapid Response (GRR ) – Remote Live Forensics For Incident Response
- PEiD – Detect PE Packers, Cryptors & Compilers
- NAXSI – Open-Source WAF For Nginx

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,029 views
- Password Hasher Firefox Extension - 117,718 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,707 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95