their database software following the discoveryVulnerability-related.DiscoverVulnerabilityand disclosureVulnerability-related.DiscoverVulnerabilityof a critical remote code execution vulnerability . The flaw , dubbed CVE-2018-3110 was given a CVSS base score of 9.9 ( out of 10 ) and Oracle warnsVulnerability-related.DiscoverVulnerabilitythat successful exploit of the bug `` can result in complete compromise of the Oracle Database and shell access to the underlying server . '' `` Due to the nature of this vulnerability , Oracle strongly recommends that customers take action without delay , '' Oracle says . Vulnerable versions of Database Server include 11.2.0.4 , 12.1.0.2 , 12.2.0.1 , and 18 . Admins are advised to install Oracle 's update as soon as possible . No credit was given for discovery or reporting . The flaw itself is foundVulnerability-related.DiscoverVulnerabilityin the JavaVM component of Oracle Database Server and is not considered a remote code exploit flaw , as it requires the attacker have a connection to the server via Oracle Net , the protocol Oracle servers use to connect with client applications . Other than that , however , there is little else required for a successful attack that gives complete control over the host server . The Oracle patch will only pile on to what is going to be a busy week for IT departments and administrators . In addition to this fixVulnerability-related.PatchVulnerability, Microsoft is releasingVulnerability-related.PatchVulnerabilityits monthly Patch Tuesday security update for Windows , Office , and Internet Explorer/Edge today , and Adobe has postedVulnerability-related.PatchVulnerabilityfixes for security holes in Flash Player , Acrobat/Reader , Creative Cloud , and Experience manager . Our advice is to keep a pot of coffee handy and reserve a table at the pub for when this is all over with .
A flaw in certificate pinning exposed customers of a number of high-profile banks to man-in-the-middle attacks on both iOS and Android devices . A vulnerability in the mobile apps of major banks could have allowed attackers to stealAttack.Databreachcustomers ' credentials including usernames , passwords , and pin codes , according to researchers . The flaw was foundVulnerability-related.DiscoverVulnerabilityin apps by HSBC , NatWest , Co-op , Santander , and Allied Irish bank . The banks in question have now all updatedVulnerability-related.PatchVulnerabilitytheir apps to protect against the flaw . UncoveredVulnerability-related.DiscoverVulnerabilityby researchers in the Security and Privacy Group at the University of Birmingham , the vulnerability allows an attacker who is on the same network as the victim to perform a man-in-the-middle attack and steal information . The vulnerability lay inVulnerability-related.DiscoverVulnerabilitythe certificate pinning technology , a security mechanism used to prevent impersonation attacks and use of fraudulent certificates by only accepting certificates signed by a single pinned CA root certificate . While certificate pinning usually improves security , a tool developed by the researchers to perform semi-automated security-testing of mobile apps found that a flaw in the technology meant standard tests failed to detect attackers trying to take control of a victim 's online banking . As a result , certificate pinning can hide the lack of proper hostname verification , enabling man-in-the-middle attacks . The findings have been outlinedVulnerability-related.DiscoverVulnerabilityin a research paper and presentedVulnerability-related.DiscoverVulnerabilityat the Annual Computer Security Applications Conference in Orlando , Florida . The tool was run on 400 security critical apps in total , leading to the discoveryVulnerability-related.DiscoverVulnerabilityof the flaw . Tests foundVulnerability-related.DiscoverVulnerabilityapps from some of the largest banks contained the flaw which , if exploitedVulnerability-related.DiscoverVulnerability, could have enabled attackers to decrypt , view , and even modify network traffic from users of the app . That could allow them to view information entered and perform any operation that app can usually perform -- such as making payments or transferring of funds . Other attacks allowed hackers to perform in-app phishing attacksAttack.Phishingagainst Santander and Allied Irish bank users , allowing attackers to take over part of the screen while the app was running and stealAttack.Databreachthe entered credentials . The researchers have worked with the National Cyber Security Centre and all the banks involved to fixVulnerability-related.PatchVulnerabilitythe vulnerabilities , noting that the current version of all the apps affectedVulnerability-related.DiscoverVulnerabilityby the pinning vulnerability are now secure . A University of Birmingham spokesperson told ZDNet all the banks were highly cooperative : `` once this was flagged to them they did work with the team to amend it swiftly . ''
Researchers from several German universities have checked the PHP codebases of over 64,000 projects on GitHub , and foundVulnerability-related.DiscoverVulnerability117 vulnerabilities that they believe have been introduced through the use of code from popular but insufficiently reviewed tutorials . The researchers identified popular tutorials by inputing search terms such as “ mysql tutorial ” , “ php search form ” , “ javascript echo user input ” , etc . into Google Search . The first five results for each query were then manually reviewed and evaluated for SQLi and XSS vulnerabilities by following OWASP ’ s guidelines ( Reviewing Code for SQL Injection , Cross Site Scripting Prevention Cheat Sheat ) . This resulted in the discoveryVulnerability-related.DiscoverVulnerabilityof 9 tutorials containing vulnerable code ( 6 with SQLi , 3 with XSS ) . Based on these , they created two types of queries that they used against the aforementioned data set obtained from GitHub . “ We use strict queries to identify known vulnerable patterns in web applications , and normal queries to identify code analogues of tutorial code , ” they explained . The results were , finally , manually reviewed by the researchers . “ Thanks to our framework , we have uncoveredVulnerability-related.DiscoverVulnerabilityover 100 vulnerabilities in web application code that bear a strong resemblance to vulnerable code patterns foundVulnerability-related.DiscoverVulnerabilityin popular tutorials . More alarmingly , we have confirmedVulnerability-related.DiscoverVulnerabilitythat 8 instances of a SQLi vulnerability present inVulnerability-related.DiscoverVulnerabilitydifferent web applications are an outcome of code copied from a single vulnerable tutorial , ” they noted . “ Our results indicateVulnerability-related.DiscoverVulnerabilitythat there is a substantial , if not causal , link between insecure tutorials and web application vulnerabilities. ” “ [ Our findings ] suggest that there is a pressing need for code audit of widely consumed tutorials , perhaps with as much rigor as for production code , ” they pointed out . In their research , they evaluated only PHP application code , but their approach can be easily used to evaluate codebases in other programming languages , especially because they have made available their crawler ( GithubSpider ) and code analogue detector ( CADetector ) tools . Unfortunately , such a search can be easily replicated – “ even with limited resources such as a standard PC and a broadband DSL connection ” – by individuals or groups intent of discoveringVulnerability-related.DiscoverVulnerabilityvulnerabilities in software for future exploitation .
Hundreds of thousands of internet gateway devices around the world , primarily residential cable modems , are vulnerableVulnerability-related.DiscoverVulnerabilityto hacking because of a serious weakness in their Simple Network Management Protocol implementation . SNMP is used for automated network device identification , monitoring and remote configuration . It is supported and enabled by default in many devices , including servers , printers , networking hubs , switches and routers . Independent researchers Ezequiel Fernandez and Bertin Bervis recently foundVulnerability-related.DiscoverVulnerabilitya way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers . Their internet scans revealedVulnerability-related.DiscoverVulnerabilityhundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they foundVulnerability-related.DiscoverVulnerabilityand dubbed StringBleed . The leakingAttack.Databreachof sensitive configuration data through the default `` public '' SNMP community string is a known problem that has affectedVulnerability-related.DiscoverVulnerabilitymany devices over the years . The two researchers first locatedVulnerability-related.DiscoverVulnerabilitya small number of vulnerable devices , including the Cisco DPC3928SL cable modem that 's now part of Technicolor 's product portfolio following the company 's acquisition of Cisco 's Connected Devices division in 2015 . The researchers claimVulnerability-related.DiscoverVulnerabilitythat when they reportedVulnerability-related.DiscoverVulnerabilitythe issue to Technicolor , the company told them that it was the result of an access misconfiguration by a single ISP in Mexico rather than a problem with the device itself . This prompted the researchers to perform a wider internet scan that resulted in the discoveryVulnerability-related.DiscoverVulnerabilityof 78 vulnerable cable modem models from 19 manufacturers , including Cisco , Technicolor , Motorola , D-Link and Thomson . Regardless of the cause , the problem is serious , as attackers could exploit this flaw to extract administrative and Wi-Fi passwords or to hijack devices by modifying their configurations . There 's not much that users can do if their ISP supplied them with a vulnerable device , other than ask for a different model or install their own modem . Unfortunately , not many ISPs allow their residential customers to use their own gateway devices , because they want uniformity and remote management capabilities on their networks . Determining if a particular device is vulnerableVulnerability-related.DiscoverVulnerabilityto this issue is possible , but requires a bit of work . An online port scanner like ShieldsUp can be used to determine if the device responds to SNMP requests over its public IP address . If SNMP is open , a different online tool can be used to check if the device 's SNMP server returns valid responses when the `` public '' or random community strings are used . At the very least this would indicate an information leak problem .