several high-risk security vulnerabilities in EOS ’ s blockchain platform . These vulnerabilities would enable remote attacks on all EOS nodes , Qihoo 360 claimedVulnerability-related.DiscoverVulnerabilityon Weibo Tuesday , May 29 . Qihoo 360 writesVulnerability-related.DiscoverVulnerabilitythat they reportedVulnerability-related.DiscoverVulnerabilitythe vulnerability to the EOS team and that the EOS mainnet will not launch until the security problems are resolvedVulnerability-related.PatchVulnerability. Local news outlet Jinse , which noted that EOS asked 360 not to reportVulnerability-related.DiscoverVulnerabilitythe vulnerability , claimed that the vulnerabilities have been fixedVulnerability-related.PatchVulnerabilityon the same day , by around 2:00 pm China Standard Time . According to 360 ’ s Weibo postVulnerability-related.DiscoverVulnerability, the vulnerability would allow an attacker to use a smart contract with malicious code to open a security hole , and then use the supernode to enter the malicious smart contract into a new block , thus putting all network nodes under the attacker ’ s control . Once this action has been completed , the attacker could then control the digital currency on the EOS network , obtain user ’ s private keys and data , launch a cyber attack , or begin mining for other cryptocurrencies . 360 describesVulnerability-related.DiscoverVulnerabilitythese vulnerabilities as a new “ series of unprecedented security risks ” that could affect other blockchain platforms besides EOS : “ 360 expressed [ hope ] that the discovery and disclosureVulnerability-related.DiscoverVulnerabilityof this loophole will cause the blockchain industry and security peers to pay more attention to the security of such issues and jointly enhance the security of the blockchain network. ” EOS , whose mainnet is scheduled to launch on June 2 , is currently down by 2.76 percent over a 24 hour period , trading at around $ 11.70 by press time , according to Coinmarketcap data .
Google Nest ’ s Dropcam , Dropcam Pro , Nest Cam Outdoor and Nest Cam Indoor security cameras can be easily disabled by an attacker that ’ s in their Bluetooth range , a security researcher has foundVulnerability-related.DiscoverVulnerability. The vulnerabilities are present inVulnerability-related.DiscoverVulnerabilitythe latest firmware version running on the devices ( v5.2.1 ) . They were discoveredVulnerability-related.DiscoverVulnerabilityby researcher Jason Doyle last fall , and their existence responsibly disclosedVulnerability-related.DiscoverVulnerabilityto Google , but have still not been patchedVulnerability-related.PatchVulnerability. The first two flaws can be triggered and lead to a buffer overflow condition if the attacker sends to the camera a too-long Wi-Fi SSID parameter or a long encrypted password parameter , respectively . That ’ s easy to do as Bluetooth is never disabled after the initial setup of the cameras , and attackers ( e.g . burglars ) can usually come close enough to them to perform the attack . Triggering one of these flaws will make the devices crash and reboot . The third flaw is a bit more serious , as it allows the attacker to force the camera to temporarily disconnect from the wireless network to which it is connected by supplying it a new SSID to connect to . If that particular SSID does not exist , the camera drops its attempt to associate with it and return to the original Wi-Fi network , but the whole process can last from 60 to 90 seconds , during which the camera won ’ t be recording . Unfortunately , Bluetooth can ’ t be disabled on these cameras , so there is little users can do to minimize this particular risk . Nest has apparently already preparedVulnerability-related.PatchVulnerabilitya patch but hasn’t pushed it outVulnerability-related.PatchVulnerabilityyet . It is supposedly scheduled to be releasedVulnerability-related.PatchVulnerabilitysoon , but no definite date has been offered
Using an SSL proxy that simplistically stored certificates , Kaspersky Anti-Virus left its users open to TLS certificate collisions . By Chris Duckett Google 's Project Zero has foundVulnerability-related.DiscoverVulnerabilitythat it was previously trivial to create an SSL certificate collision thanks to Kaspersky using only the first 32 bits of an MD5 hash in its SSL proxy packaged with its Anti-Virus product . `` You do n't have to be a cryptographer to understand a 32-bit key is not enough to prevent brute-forcing a collision in seconds , '' Tavis Ormandy of Project Zero said in its issue tracker . `` They effectively proxy SSL connections , inserting their own certificate as a trusted authority in the system store and then replace all leaf certificates on the fly . This is why if you examine a certificate when using Kaspersky Anti-Virus , the issuer appears to be 'Kaspersky Anti-Virus Personal Root ' , '' he said . `` It seems incredible that Kaspersky have n't noticed that they sometimes get certificate errors for mismatching commonNames just by random chance . After Ormandy reportedVulnerability-related.DiscoverVulnerabilitythe bug and received acknowledgementVulnerability-related.DiscoverVulnerabilityfrom Kaspersky on November 1 , despite learning the security vendor was doing some commonName checks , the bug was still able to be exploitedVulnerability-related.DiscoverVulnerability. `` If you 're not being attacked , you would see random errors . A MITM [ man in the middle ] can send you packets from where you were expecting , '' Ormandy said on Twitter . Ormandy also foundVulnerability-related.DiscoverVulnerabilityanother bug on November 12 that allowed any unprivileged user to become a local certificate authority . In May last year , the Project Zero security researcher discoveredVulnerability-related.DiscoverVulnerabilitythat Symantec Antivirus Engine was vulnerable to buffer overflow when parsing malformed portable-executable header files that resulted in instant blue-screening and kernel memory corruption without user action on Windows . `` This is about as bad as it can possibly get , '' Ormandy said at the time . Because Symantec use a filter driver to intercept all system I/O , just emailing a file to a victim or sending them a link is enough to exploit it .
Commonly used office printers and multi-function devices can be exploitedVulnerability-related.DiscoverVulnerabilityto leak information and execute code , presenting multiple attack vectors that are often overlooked , a security researcher has foundVulnerability-related.DiscoverVulnerability. Jens Müller from the Ruhr-Universität Bochum in Germany publishedVulnerability-related.DiscoverVulnerabilitymultiple advisories on vulnerabilities that he had discoveredVulnerability-related.DiscoverVulnerabilityas part of his Master 's degree thesis on the security of printers . The vulnerabilites stem from vendors not separating page description languages such as PostScript and PJL/PCL used to generate the output from printer control . `` Potentially harmful commands can be executed by anyone who has the right to print , '' Müller said . Müller outlined multiple attacks on his Hacking Printers wiki , ranging from accessing print jobs to credentials disclosure and bypassing device security , and included proofs of concept . HP LaserJet 1200 , 4200N and 4250N as well as Dell 3130cn and Samsung Multipress 6345N have a vulnerableVulnerability-related.DiscoverVulnerabilityline printer daemon ( LPD ) service that can not handle usernames with 150 or more characters . Sending a long username to the LPD service on the above devices crashes the printer , requiring manual restart to bring it back up . Müller saidVulnerability-related.DiscoverVulnerabilitywith correct shellcode and return address , the vulnerability could be used for remote code execution . More printers than the above are likely to be vulnerable , he said . It is even possible to launch denial of service attacks against printers that support PJL , and permanently damage the non-volatile random access memory ( NVRAM ) that is used to persistently store settings for the devices , Müller found . He tested the NVRAM destruction attack on printers from Brother , Konica Minolta , Lexmark , Dell and HP , and verified that they are vulnerableVulnerability-related.DiscoverVulnerability. Printers can be attacked via networks or USB interfaces .
The bug could 've likely been exploitedVulnerability-related.DiscoverVulnerabilityto make a self-spreading worm too , according to hackers and security researchers . Steam 's operator Valve announced that it fixedVulnerability-related.PatchVulnerabilitythe bug earlier today , but with over 125 million monthly active users on its platform , the exploit could have wreaked havoc for thousands of people , and for the company itself . `` Anyone who views a specially crafted profile gets popped , '' a white hat hacker who has foundVulnerability-related.DiscoverVulnerabilityseveral bugs in Steam in the past , and asked to remain anonymous , told me in a Twitter DM . Several users and security researchers noticedVulnerability-related.DiscoverVulnerabilitythis week that it was possible to put malicious javascript code inside a Steam user 's profile page , and the code will execute whenever someone visits that profile page , without any need for the victim to click anywhere . This type of bug is known as a cross-site scripting vulnerability , or XSS , a problem that 's plagued Steam for years. `` Phishing scamsAttack.Phishingand virus downloads are possible at the very least , but if account take overs are possible , that 's about as bad as XSS gets , '' Jeremiah Grossman , a web security expert , said in a chat . A Valve spokesperson said the bug was fixedVulnerability-related.PatchVulnerabilityon Tuesday at noon , but there 's no telling how long the door was open for hackers to exploit it . ( The spokesperson did not immediately respond to a request for comment . ) The bug was so bad that the moderators of the Steam subreddit told users to refrain from visiting other user 's profiles . `` Do NOT click suspicious ( real ) steam profile links and Disable JavaScript on Browser , '' a moderator wrote in the warning post . Grossman and Jake Davis , a former LulzSec hacker , confirmed thatVulnerability-related.DiscoverVulnerabilitythe bug existed asVulnerability-related.DiscoverVulnerabilityof Tuesday morning and analyzed the potential attacks that bad guys could do if they were to exploit it . `` If something like this were to be foundVulnerability-related.DiscoverVulnerabilityon Google or Facebook , it would be a high-severity issue , '' said Grossman , who 's the Chief of Security Strategy at security firm SentinelOne .