Thursday, July 31, 2008

DNS attack writer a victim of his own creation

One week after releasing attack code, HD Moore has fallen victim to a cache poisoning attack Read More

Microsoft ActiveX Snapshot Viewer for Microsoft Access could allow a remote attacker to execute arbitrary code on the system.  Targeted exploitation was reported on July 7, but X-Force has been monitoring toolkit-related mass exploitation since July 10.  As of July 24, exploitation has continued to escalate.  See technical description for more details. Read More

IBM will buy business rules management system vendor Read More

Read More

Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More

Read More

The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More

But 35% are still in the internet slow lane, just ahead of Colombia Read More

Read More

Patches have slowed servers running BIND Read More

Microsoft Windows DirectX could allow a remote attacker to execute arbitrary code on the system. Read More

No comments: