Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43445
  • Total Topics: 16537
  • Online today: 3188
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 0
Guests: 3011
Total: 3011









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 11. October 2015., 10:13:20 »



Google Project Zero hacker Tavis Ormandy has found a since-patched vulnerability in Avast antivirus that allows attackers to gain remote code execution privileges.

Ormandy says the man-in-the-middle diddle Avast uses to conduct encrypted traffic analysis as it hits browsers is insecure, thanks to bad X.509 certificate parsing.

It appears Avast users would need to follow a link generated by attackers and possibly ignore any code execution warnings in order to be p0wned.

"If you're gonna MITM Chrome's SSL at least get an intern to skim your X.509 parsing before shipping it," Ormandy says: https://twitter.com/taviso/status/647408764505579520

The hacker noted the vendor's seven day patch turn around time but chided one Avast security bod, saying in a tweet that the vendor is lucky attackers have not built worms targeting its products.

Ormandy released proof of concept information on the Google Project Zero asset: https://code.google.com/p/google-security-research/issues/detail?id=546

Avast has not yet updated its site detailing the patch release notes.

(ElReg)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023