bi

Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer

The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation.




bi

Debian Security Advisory 3417-1

Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers.




bi

Debian Security Advisory 3457-1

Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2.




bi

Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation

Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities.




bi

Debian Security Advisory 3967-1

Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates.




bi

Debian Security Advisory 4138-1

Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code.




bi

Debian Security Advisory 4147-1

Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code.




bi

Debian Security Advisory 4296-1

Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks.





bi

Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) Null Free Shellcode

47 bytes small Linux/x86 (NOT|ROT+8 Encoded) execve(/bin/sh) null free shellcode.




bi

Linux/x86 Random Bytes Encoder + XOR/SUB/NOT/ROR execve(/bin/sh) Shellcode

114 bytes small Linux/x86 random bytes encoder and XOR/SUB/NOT/ROR execve(/bin/sh) shellcode.




bi

Windows/x86 Dynamic Bind Shell / Null-Free Shellcode

571 bytes small Microsoft Windows x86 dynamic bind shell and null-free shellcode.




bi

Linux Password Protected Bindshell Shellcode

272 bytes small Linux/x86_64 null free password protected bindshell shellcode.







bi

QRadar Community Edition 7.3.1.6 Arbitrary Object Instantiation

QRadar Community Edition version 7.3.1.6 is vulnerable to instantiation of arbitrary objects based on user-supplied input. An authenticated attacker can abuse this to perform various types of attacks including server-side request forgery and (potentially) arbitrary execution of code.





bi

Newbie CMS Insecure Cookie Handling

Newbie CMS suffers from an insecure cookie handling vulnerability.




bi

Babil CMS Insecure Cookie Handling

Babil CMS suffers from an insecure cookie handling vulnerability.








bi

Cisco Patches Critical Vulnerabilities In Policy Suite





bi

Debian Security Advisory 4584-1

Debian Linux Security Advisory 4584-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis.




bi

FBI Arrests Man Suspected Of Dozens Of Swatting Calls




bi

Apache OFBiz 17.12.03 Cross Site Request Forgery

Apache OFBiz version 17.12.03 suffers from a cross site request forgery vulnerability.





bi

ATutor 2.2.4 Arbitrary File Upload / Command Execution

ATutor version 2.2.4 suffers from a language_import arbitrary file upload that allows for command execution.




bi

Integria IMS 5.0.86 Arbitrary File Upload

Integria IMS version 5.0.86 suffers from an arbitrary file upload vulnerability that allows for remote command execution.




bi

Dokeos 1.8.6.1 / 1.8.6.3 Arbitrary File Upload

Dokeos versions 1.8.6.1 and 1.8.6.3 suffer from a remote file upload vulnerability via an fckeditor.




bi

IBM Bigfix Platform 9.5.9.62 Arbitary File Upload / Code Execution

IBM Bigfix Platform version 9.5.9.62 suffers from an arbitrary file upload vulnerability as root that can achieve remote code execution.




bi

Linear eMerge E3 1.00-06 Arbitrary File Upload Remote Root Code Execution

Linear eMerge E3 versions 1.00-06 and below arbitrary file upload remote root code execution exploit.




bi

Online Book Store 1.0 Arbitrary File Upload

Online Book Store version 1.0 suffers from an arbitrary file upload vulnerability.




bi

Joomla GMapFP 3.30 Arbitrary File Upload

Joomla GMapFP component version 3.30 suffers from an arbitrary file upload vulnerability.




bi

WordPress Event-Registration 5.43 Arbitrary File Upload

WordPress Event-Registration plugin version 5.43 suffers from an arbitrary file upload vulnerability.




bi

Playable 9.18 Script Insertion / Arbitrary File Upload

Playable version 9.18 for iOS suffers from script insertion and arbitrary file upload vulnerabilities.




bi

Air Sender 1.0.2 Arbitrary File Upload

Air Sender version 1.0.2 for iOS suffers from an arbitrary file upload vulnerability.




bi

HardDrive 2.1 Arbitrary File Upload

HardDrive version 2.1 for iOS suffers from an arbitrary file upload vulnerability.




bi

Online Clothing Store 1.0 Arbitrary File Upload

Online Clothing Store version 1.0 suffers from an arbitrary file upload vulnerability.