Vulnerabilities


Pwn2Own Rules Change Again, Flash, Java Now Fair Game for Contestants

For the second year in row, the organizers of the Pwn2Own hacking contest at the CanSecWest conference have changed up the rules, this time making the browser plug-ins that have been frequent targets for attackers for years fair game for the contestants, as well. Adobe Flash, Reader and Oracle’s Java are all going to be in the crosshairs during the contest, in addition to the classic lineup of Google Chrome, Internet Explorer and Mozilla Firefox.


Dennis Fisher talks with Costin Raiu and Ryan Naraine about the newly uncovered Red October cyberespionage campaign that has targeted embassies, diplomats, research facilities and military targets for more than five years now. Raiu explains the origins of the campaign, where the attackers likely are located, the complexity and scale of the malware tools involved and what other components might be lurking undiscovered out there.

Novell has fixed a vulnerability in its eDirectory service that could affect users who run the program on some Linux and WIndows platforms. The problem, a stack buffer overflow (CVE-2012-0432) is remotely exploitable and can be done without authentication, according to an alert issued yesterday by David Klein on the Full Disclosure mailing lists.