Brainfoldb4u's Blog

Just another WordPress.com weblog

Archive for January 11th, 2010

Oracle to Patch 24 Security Flaws

Posted by brainfoldb4u on January 11, 2010

Database server giant oracle is joining Microsoft and Adobe this patch Tuesday

Ten of the patches affect Oracle’s database, and two of the vulnerabilities addressed can be remotely exploited over a network without the need for a username and password, Oracle said.

Affected database components include Application Express Application Builder, Listener, Data Pump, OLAP, Secure Backup, Spatial and Universal Installer. Both 11g and 10g database releases are affected.

The update also includes three fixes for Oracle’s application server. All three address vulnerabilities that can be exploited without a username or password. They affect the server’s Access Manager Identity Server and Oracle Containers for J2EE components.

Continue reading:  Oracle to Patch 24 Security Flaws.

Posted in Information Security, Patch/Solution, Vulnerability | Tagged: , | Leave a Comment »

Adobe blacklisting framework

Posted by brainfoldb4u on January 11, 2010

As abode said it is not practically feasible to disable whole of javascript in adobe, it introduced a feature called black listing. This allows users to define any specific javascript API as a black list item, which then it wont be allow it to be called. Say we found a vulnerability in docmedia.newplayer, you can add this to black list and hence you can safeguard your system by doing so.
By putting that into the black list, then any PDF document that it attempts to call that, that call will be denied.  And so, it’ll deny valid calls as well as malicious calls that try to corrupt the call in order to create a crash. And this is something individual users can do, and also administrators for managed desktop environments can also do this using group policy objects to roll-out the change as a registry key. Below video should demonstrate on how to add a javascript function to blacklist item.

Given that Adobe currently has no automatic updates in place, my question is how will a normal user will get to know what needed to be blacklisted. This fix may help the technical users but for average user they have to wait for adobe’s next major update which is likely to be within next three months.

Posted in Exploit, Hacking, Information Security, Vulnerability | Tagged: , , | Leave a Comment »

Dlink router with HNAP vulnerability

Posted by brainfoldb4u on January 11, 2010

A flawed implementation of the Home Network Administration Protocol (HNAP) reportedly allows attackers to gain unauthorised admin access to numerous D-Link router models

SourceSec Security research webpages claims finding a flaw in D-Link’s CAPTCHA implementation, around a way to view and edit D-Link router settings without any administrative credentials.

Simply said,  D-Link routers have a second administrative interface, which uses the Home Network Administration Protocol. While HNAP does require basic authentication, the mere existence of HNAP on D-Link routers allows attackers and malware to bypass CAPTCHA “security”. Further, HNAP authentication is not properly implemented, allowing anyone to view and edit administrative settings on the router.

For detailed vulnerability summary click there pdf

Posted in Exploit, Hacking, Information Security, Vulnerability | Tagged: , | Leave a Comment »

USB's hardware encryption cracked

Posted by brainfoldb4u on January 11, 2010

Kingston, SanDisk and Verbatim all sell quite similar USB Flash drives with AES 256-bit hardware encryption that supposedly meet the highest security standards. NIST validates the USB drives for use with sensitive government data. Security firm SySS, however, has found that despite this it is relatively easy to access the unencrypted data, even without the required password.

The hole could allow unauthorized access to encrypted data on a USB flash drive by circumventing the password authorization software on a host computer.

“It’s really onerous. It’s a stupid crypto mistake and they screwed up, and they should be rightfully embarrassed for making it,” said cryptographer and computer security specialist Bruce Schneier.

The USB drives in question encrypt the stored data via the practically uncrackable AES 256-bit hardware encryption system. Therefore, the main point of attack for accessing the plain text data stored on the drive is the password entry mechanism. When analysing the relevant Windows program, the SySS security experts found a rather blatant flaw that has quite obviously slipped through testers’ nets. During a successful authorisation procedure the program will, irrespective of the password, always send the same character string to the drive after performing various crypto operations – and this is the case for all USB Flash drives of this type.

Read computer world for complete analysis on the vulnerability

Posted in Exploit, Vulnerability | Tagged: | Leave a Comment »

Android's malicious apps

Posted by brainfoldb4u on January 11, 2010

Android, a Linux based mobile operating system intially developed by Android Inc., and later purchased by Google. Google recently released their new mobile “Nexus One”with android OS. Google allows developers to write managed code in the Java language, controlling the device via Google developed Java libraries.

So far in 2010 Google android has proven to be a hot topic with increasing popularity. As it popularity increases it becomes the target for hackers and malware writers to explore its security.  As per kaspersky, “2010 promises to be a difficult time for iPhone and Android users,”.

As per kaspersky press release

An increase in attacks on iPhone and Android mobile platforms. 2010 promises to be a difficult time for iPhone and Android users. The first malicious programs for these mobile platforms appeared in 2009, a sure sign that they have aroused the interest of cybercriminals. The only iPhone users currently at risk are those with compromised devices; however the same is not true for Android users who are all vulnerable to attack. The increasing popularity of mobile phones running the Android OS combined with a lack of effective checks to ensure third-party software applications are secure, will lead to a number of high-profile malware outbreaks.

They also made five other predictions on greatest threats and new attack vector and they are

  • A rise in attacks originating from file sharing networks. This year, we will see a shift in the types of attacks on users, from attacks via websites and applications toward attacks originating from file sharing networks.
  • An increase in mass malware epidemics via P2P networks. In 2009 a series of mass malware epidemics has been “supported” by malicious files that are spread via file sharing networks. This method has been used to spread notorious threats such as TDSS and Virut as well as the first backdoor for Mac OS X. In 2010, we expect to see a significant increase in these types of incidents on P2P networks.
  • Continuous competition for traffic from cybercriminals. The modern cybercriminal world is making more and more of an effort to legalize itself and there are lots of ways to earn money online using the huge amount of traffic that can be generated by botnets. In the future, we foresee the emergence of more “grey” schemes in the botnet services market. These so-called “partner programs” enable botnet owners to make a profit from activities such as sending spam, performing denial of service (DoS) attacks or distributing malware without committing an explicit crime.
  • A decline in fake anti-virus programs. The decline in gaming Trojans witnessed in 2009 is likely to be repeated for fake anti-virus programs in 2010. Conficker installed a rogue anti-virus program on infected computers. The fake anti-virus market has now been saturated and the profits for cybercriminals have fallen. Additionally, this kind of activity is now being closely monitored by both IT security companies and law enforcement agencies, making it increasingly difficult to distribute fake anti-virus programs.
  • An interest in attacking Google Wave. When it comes to attacks on web services, Google Wave looks like it will be making all the headlines in 2010. Attacks on this new Google service will no doubt follow the usual pattern: first, the sending of spam, followed by phishing attacks, then the exploiting of vulnerabilities and the spreading of malware.

Users of mobile devices with Android software may have noticed several applications available for download in the Android Marketplace. If you see any applications provided by the user Droid09, please do not download these applications. Android applications provided by Droid09 are fraudulent. Please remove any applications by Droid09 from your mobile device and contact your mobile provider to evaluate whether any other applications or information stored on your mobile device have been compromised.”

Here is a link describing the fraudulent app that attempts to steal bank information has made it to the Android app store.

To know more about android and its architecture visit android developer center or click here

Posted in Google, Linux, Open Source | Tagged: , , | Leave a Comment »