Trend Micro Facebook TrendLabs Twitter Malware Blog RSS Feed You Tube - Trend Micro
Search our blog:


  • Recent Posts

  • Calendar

    April 2015
    S M T W T F S
    « Mar    
     1234
    567891011
    12131415161718
    19202122232425
    2627282930  
  • Email Subscription

  • About Us


    Archive for the ‘Vulnerabilities’ Category




    Almost every Patch Tuesday cycle contains one bulletin that (for convenience) rolls up multiple Internet Explorer vulnerabilities into a single bulletin. February's Patch Tuesday cumulative IE bulletin (MS15-009) included a fix for a particularly interesting vulnerability that could be used to bypass one of the key anti-exploit technologies in use today, address space layout randomization (ASLR). This vulnerability was designated CVE-2015-0071. To be used in an attack, this vulnerability must be combined with another one that is capable of actually running ...

    Posted in Exploits, Vulnerabilities |



    Today Microsoft released their monthly Patch Tuesday posting, with a total of 14 security bulletins that include 5 bulletins that were listed as Critical. This batch of patches addresses vulnerabilities in Microsoft Windows, Microsoft Office, Microsoft Exchange, and Internet Explorer. Fixes for FREAK One of the more notable bugs covered by this posting include the recent FREAK (Factoring RSA Export Keys) vulnerability seen in early March, which forces a secure connection to use weaker encryption—making it easier for attackers to decrypt and ...

    Posted in Vulnerabilities |



    The Samba team reported CVE-2015-0240 last February 23, 2015. This vulnerability is very difficult to exploit and we are not aware of successful exploitation. However, it is quite interesting from the point for view of detection. There are two important facts: The vulnerability resides in the Netlogon Remote Protocol implementation of Samba which is a very high-level application protocol that can be used over different transports configurations. To execute the vulnerable code the attacker doesn’t need be authenticated and can use many ...

    Posted in Exploits, Vulnerabilities |



    phpMoAdmin (short for PHP MongoDB administration tool) is a free and open source MongoDB GUI tool. phpMoAdmin is written in PHP and is a popular administration tool to manage the noSQL database MongoDB. A zero-day remote code execution vulnerability was seen in phpMoAdmin which allows an attacker to execute arbitrary code without requiring any authentication. The vulnerability is a command injection flaw which generally occurs when the web application executes certain operating system command based on user inputs, which are part of ...

    Posted in Vulnerabilities |


    Mar4
    1:54 pm (UTC-7)   |    by

    Security researchers and news outlets are reporting about a newly discovered vulnerability believed to exist since the 90s. This vulnerability, dubbed as FREAK (Factoring RSA Export Keys), forces a secure connection to use weaker encryption—making it easy for cybercriminals to decrypt sensitive information. Vulnerable since the 1990s The flaw came about in the 1990s. Back then, the US government mandated that software intended for export use “export cipher suites that involved encryption keys no longer than 512 bits.” According to researchers, that ...



     

    © Copyright 2013 Trend Micro Inc. All rights reserved. Legal Notice