Threat Advisory

Threat Update| “JASBUG"

On February 10th, 2015, Microsoft released two critical patches for “JASBUG” – MS15-011 and MS15-014. The design flaws were indirectly discovered by JAS Global Advisors LLC with assistance from simMachines’s analytics. The patches have been published by Microsoft in order to resolve design flaws found in Active Directory Group Policies. The two vulnerabilities – or rather, design flaws – occur... Read More
February 11, 2015

Threat Update | GNU C Library (glibc) Vulnerability: "GHOST"

A new UNIX vulnerability has been published - CVE-2015-0235. This is a critical vulnerability within the GNU C library (glibc) that allows an attacker the ability to execute malicious code. The vulnerability lies within the “_gethostbyname” function call, hence the name GHOST. This vulnerability is present in nearly all versions of glibc as far back as glibc-2.2 (Released in November... Read More
January 28, 2015

Threat Update | Network Time Protocol Vulnerabilities

Network Time Protocol (NTP) is used to synchronize time between systems. Keeping time synchronized is important in the operation and logging information between systems. There are multiple vulnerabilities in NTP in versions prior to 4.2.8. These vulnerabilities could allow an attacker to run software with privileges of the NTP software. It is recommended that versions of NTP software be upgraded... Read More
December 22, 2014

Threat Update | X.Org Security Advisory

This advisory outlines vulnerabilities affecting servers running "X Windows", a graphical user interface common in Unix, Linux and related platforms, and less commonly on MS Windows computers when installed by end-users. This is rated CRITICAL due to the possibility of denial of service attacks or the possibility of allowing unauthorized and undesirable programs to execute. There are effective controls and... Read More

Threat Update: BASH Vulnerability

What is the vulnerability? Akamai security researcher, Stephane Chazelashas, has discovered a critical vulnerability in the command-line shell known as BASH, or GNU Bourne-again Shell, the most widely deployed shell for Unix-based systems. The vulnerability has had several variations and now uses CVE identifiers CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186 and CVE-2014-7187 and is being referred to as "Shellshock". While BASH... Read More
October 6, 2014

Internet Explorer Threat Update

Microsoft has published Security Advisory 2963983 on April 26th 2014. This Advisory is related to a vulnerability that was discovered in Internet Explorer, versions 6 through 11. This vulnerability is present in nearly all versions of Internet Explorer, regardless of the Windows OS Version that is in use. The vulnerability (CVE-2014-1776) exploits a bug in Adobe Flash that allows an... Read More
April 26, 2014

Open SSL TLS/DTLS Heartbeat Read Overrun Vulnerability

Executive Summary On April 7th 2014 OpenSSL and a team of security engineers published advisories regarding a severe vulnerability that “allows anyone  on the Internet to read the memory of systems protected  by vulnerable versions of the OpenSSL   software [1].    They have dubbed this vulnerability “Heartbleed” as it refers to a memory leak in a heartbeat function used by OpenSSL. ... Read More
April 9, 2013