Dennis Fisher and Mike Mimoso talk about the Bash Shellshock bug nightmare and the BadUSB code release.
Browsing Category: Vulnerabilities
Researcher Michal Zalewski published details on two recently discovered Shellshock vulnerabilities in Bash.
Two researchers published attack code exploiting weaknesses in USB similar to the BadUSB research presented at this year’s Black Hat conference.
There is another same-origin policy bypass vulnerability in the Android browser in versions prior to 4.4 that allows an attacker to steal data from a user’s browser.
A security update for the Joomla content management system was pulled and re-issued after problems with the first set of patches for a remote file inclusion and denial of service vulnerability were discovered.
VMware issued a progress report on fixes for four different types of products as they relate to the Bash vulnerability.
There’s a remotely exploitable directory traversal vulnerability in more than 20 individual products from Schneider Electric that can enable an attacker to gain control of an affected machine.
Google is again increasing the amount of money it offers to researchers who report vulnerabilities in Chrome as part of the company’s bug bounty program.
OpenVPN was found to be vulnerable to the Shellshock vulnerability in Bash as well. Fredrik Stromberg of Mullvad said the vulnerability is dangerous because it’s pre-authentication in OpenVPN.
Apple released its patch for the Bash vulnerability, repairing versions of OS X vulnerable to Shellshock exploits.