Posts Tagged ‘Mac’
Thursday, April 10, 2014 @ 06:04 PM gHale
Adobe updated Flash Player to address four security holes.
Windows and Mac users should update their installations to version 22.214.171.124, while Linux users should update to 126.96.36.1990.
Google Chrome, Internet Explorer 10 and Internet Explorer 11 installations automatically update.
The first vulnerability addressed with the release of Adobe Flash Player 188.8.131.52 refers to a use-after-free bug that could end exploited for arbitrary code execution.
This vulnerability came to Adobe via VUPEN at the Pwn2Own competition that took place alongside the CanSecWest security conference.
The second flaw is a buffer overflow that could also result in code execution. This issue, also disclosed at Pwn2Own 2014, came via Zeguang Zhao and Liang Chen.
According to the description on NIST’s National Vulnerability Database, the bug “allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors.”
The updates also address a security bypass vulnerability that could lead to information disclosure, Adobe said.
Finally, a cross-site scripting (XSS) vulnerability also received a patch. Masato Kinugawa disclosed the XSS vulnerability.
Some of the vulnerabilities are critical because an attacker could exploit them to take control of the impacted system.
There’s no evidence that these security holes are under attack, but user should apply the updates as soon as possible.
Thursday, March 13, 2014 @ 06:03 PM gHale
Adobe released updates for Flash Player 184.108.40.206 for Windows and Mac, and Flash Player 220.127.116.111 for Linux to address security holes.
The company advises all users of Adobe Flash Player 18.104.22.168 and earlier versions for Windows and Mac to update their installations to version 22.214.171.124. Linux users who still utilize version 126.96.36.1991 and earlier should update to Flash Player 188.8.131.526.
The updates address two vulnerabilities. The first one has the CVE identifier CVE-2014-0503 and it refers to a flaw that could end up exploited to bypass the same origin policy. The second issue, CVE-2014-0504, could allow attackers to read the contents of the clipboard.
The same origin policy bypass vulnerability ended up discovered by Masato Kinugawa. The other security hole by Jordan Milne.
Adobe said Flash Player 184.108.40.206 installed with Chrome, Internet Explorer 10 and Internet Explorer 11 will update automatically to the latest version.
Flash Player vulnerabilities often end up leveraged by bad guys in their operations. Last month, Adobe released an emergency update to fix a Zero Day exploit.
Monday, February 17, 2014 @ 11:02 AM gHale
Adobe Systems released fixes for Shockwave addressing two vulnerabilities that could allow attackers to remotely take control of affected systems.
The new Shockwave Player version released last week is 220.127.116.11 and is available for Windows and Mac.
The update fixes two memory corruption vulnerabilities identified as CVE-2014-0500 and CVE-2014-0501 that could lead to code execution, Adobe said in a security advisory. The vulnerabilities ended up reported to the company by researcher Liangliang Song of Fortinet’s FortiGuard Labs.
The Shockwave Player update comes one week after Adobe broke out of its regular patching cycle to release an emergency update for Flash Player that addressed an actively exploited vulnerability. Unlike the Flash Player flaw, there are no reports that the Shockwave Player vulnerabilities are suffering from active exploitation.
Shockwave Player displays online content like games, product demonstrations, e-learning courses and simulations created with Adobe’s Director software. It’s not as widespread as Flash Player, but it is on over 450 million desktop computers according to Adobe, which makes it a potential target for hackers.
Shockwave Player installs a plug-in in Web browsers which means it can suffer attack with drive-by download exploits loaded from maliciously crafted or infected websites.
Thursday, January 16, 2014 @ 05:01 PM gHale
In a move to hike it browser security, Google pushed out a new stable version of Chrome for Windows, Mac, and Linux Tuesday.
The company rewarded the contributors for uncovering two use-after-free vulnerabilities, one in web workers and the other related to forms.
In addition, the developer eliminated a security issue that could cause address bar spoofing in the Android version of the web browser.
As Google rewards researchers that find vulnerabilities, the largest payment ($3,000) went to Joao Lucas Melo Brasio, an information security researcher and specialist from Brazil, for revealing a flaw that caused an unprompted synchronization of data with the Google account of an attacker.
Internal security work also added to improved security of the browser and other fixes have come into play because of audits, fuzz testing (brute force vulnerability discovery), and other initiatives.
Monday, November 18, 2013 @ 07:11 PM gHale
Adobe has been under fire this year for vulnerabilities, and the most recent fix to Flash Player is no different as it fixes security holes that could lead to compromise of the targeted system.
The new Flash Player 11.9.900.152 eliminates two memory corruption vulnerabilities (CVE-2013-5329 and CVE-2013-5330) that would allow an attacker to execute malicious native code on the targeted machine surreptitiously.
Adobe labeled both security updates as critical and have the highest priority rating (1) on Windows and Mac. This means administrators should install the latest version in the shortest time possible.
The company did not provide any information about possible exploitation of the vulnerabilities.
Adobe released a security hotfix for ColdFusion as well, for versions 10, 9.0.2, 9.0.1, and 9.0 for Windows, Macintosh, and Linux.
The patch addresses a flaw (reflected cross site scripting – CVE-2013-5326) that an attacker could leverage remotely when the CFIDE directory ends up exposed (in ColdFusion 10 and earlier).
Another security hole plugged by the ColdFusion hotfix would allow unauthorized remote read access.
Wednesday, September 11, 2013 @ 12:09 PM gHale
Adobe launched a series of updates and patches for vulnerabilities in Flash, Reader, Acrobat and Shockwave.
Adobe said quite a few of the vulnerabilities could end up running attacker code on vulnerable systems or crash those machines. The updates for Adobe Reader and Acrobat resolve memory corruption flaws and buffer overflows in the software for Windows and Mac.
From Adobe’s advisory for Reader and Acrobat:
• Updates resolve stack overflow vulnerabilities that could lead to code execution (CVE-2013-3351).
• Updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2013-3352, CVE-2013-3354, CVE-2013-3355).
• Updates resolve buffer overflow vulnerabilities that could lead to code execution (CVE-2013-3353, CVE-2013-3356).
• Updates resolve integer overflow vulnerabilities that could lead to code execution (CVE-2013-3357, CVE-2013-3358).
The update for Adobe Flash fixes four vulnerabilities that can lead to code execution on Windows, Mac and Linux systems.
“Adobe has released security updates for Adobe Flash Player 11.8.800.94 and earlier versions for Windows and Macintosh, Adobe Flash Player 18.104.22.1687 and earlier versions for Linux, Adobe Flash Player 22.214.171.124 and earlier versions for Android 4.x, and Adobe Flash Player 126.96.36.199 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system,” the advisory said.
As for Shockwave, the update fixes two memory corruption vulnerabilities that can lead to remote code execution on Windows and Mac.
Thursday, September 5, 2013 @ 05:09 PM gHale
The developers behind Bitcoin-QT, a software wallet used to protect and back up Bitcoin currency, have a new version of the client, fixing some security issues like a critical denial-of-service (DoS) bug.
Version 0.8.4 of the original Bitcoin client posted to SourceForge and anyone running an out of date version can update by either running the Windows installer or copying over the new code on Mac and Linux builds.
According to the update summary, an attacker could have sent a series of messages that would have resulted in an integer division-by-zero error in the Bloom Filter handling code. This DoS bug would have forced versions 0.8.0 through 0.8.3 of the program to crash.
The update also adds a constant-time algorithm to check RPC password guess attempts (CVE-2013-4165) and a fix for the fill-memory-with-orphan-transactions attack (CVE-2013-4627) that opened new vectors of attack by a previous buggy patch.
Bitcoins, the decentralized virtual currency that popped into the cultural mainstream this summer has already proved a popular target for attackers. Hackers knocked the Mt. Gox trading exchange offline in April.
Thursday, July 18, 2013 @ 04:07 PM gHale
Windows for quite some time now has had a monopoly on suffering from the ravages of ransomware, but now it appears Macs are joining in on the “fun.”
There is now a strain of Mac OS X ransomware, also known as “scareware,” which essentially takes a victim’s computer hostage until they pay a certain fee to unlock it, said researchers at security firm Malwarebytes.
In the case of the threat Malwarebytes found, users, after visiting a website filled with malicious code, had their browsers hijacked and then they received a message claiming to come from the FBI, senior security researcher Jerome Segura said in a blog post.
The faux alert tries to intimidate the victim with a legitimate-looking post that says their “browser has been blocked” because their computer either violated copyright laws, viewed porn or initiated some type of illegal access.
The scam demands $300 from the victim, who can pay it through Green Dot MoneyPak by purchasing a prepaid card and transferring the value to the attackers.
Paying the scammers is not what anyone recommends, but neither is trying to “force quit” the web page containing the bogus threat, said Malwarebytes researchers. Because of the Safari browser’s auto-restore feature, the page only will return when the browser starts back up.
Instead, users should click on the “Safari” tab on the navigation bar and choose “Reset Safari,” ensuring all of the boxes are checked. Then hit “Reset.”
The ransomware comes from websites where victims end lured after searching for popular search terms, Segura said. For example, Segura stumbled upon the scam after searching for “Taylor Swift” on Bing Images. Segura did not say how widespread the threat is.
Windows users have seen this type of threat before, but attackers appear headed in the same direction on Macs.
Thursday, July 11, 2013 @ 04:07 PM gHale
Google released Chrome 28 for Windows, Mac, and Chrome Frame which addresses a large number of vulnerabilities.
As what usually occurs, finding a vulnerability means some type of payout, so for one critical hole, a use-after-free with network sockets, Google awarded Collin Payne $6,267.40 for his work.
While that was a nice amount, the largest sum went to Andrey Labunets. Labunets identified a high-impact flaw described as “confusion setting up sign-in and sync.”
He also found a medium-severity “incorrect sync of NPAPI extension component.” Google appeared impressed by the combination of the two issues, so the company rewarded the researcher with $21,500.
Miaubiz found some other high-severity vulnerabilities – a use-after-free in input handling, and a use-after-free in resource loading – which earned the security researcher $3,000.
The Chrome team’s internal security work led to the discovery of various issues (CVE-2013-2880) labeled high risk.
In addition, Google fixed seven medium- and three low-impact security holes in Chrome 28. One of the low-impact issues affects only Macs.