Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
The Internet

Microsoft Issues Emergency Fix For Internet Explorer Zero Day (bleepingcomputer.com) 39

An anonymous reader quotes a report from Bleeping Computer: Microsoft has released an out-of-band security update that fixes an actively exploited vulnerability in Internet Explorer. This vulnerability has been assigned ID CVE-2018-8653 and was discovered by Google's Threat Analysis Group when they saw the vulnerability being used in targeted attacks. According to Microsoft's security bulletin this is vulnerability in how the Internet Explorer scripting engine handles objects in memory. Attackers can use this vulnerability to corrupt memory in such a way that attackers could execute code under the security privileges of the logged in user. This vulnerability can also be used to launch attacks through specially crafted web sites that utilize the exploit code. This means that attackers can utilize this feature in exploit kits or by compromising legitimate sites and adding code that exploits the vulnerability.

"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer," states Microsoft's advisory. "The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."

Oracle

Disgruntled Security Researcher Publishes Major VirtualBox 0-Day Exploit (zdnet.com) 130

"A Russian security researcher has published details about a zero-day vulnerability affecting VirtualBox, an Oracle software application for running virtual machines," reports ZDNet. According to a text file uploaded on GitHub, Saint Petersburg-based researcher Sergey Zelenyuk has found a chain of bugs that can allow malicious code to escape the VirtualBox virtual machine (the guest OS) and execute on the underlying (host) operating system. Once out of the VirtualBox VM, the malicious code runs in the OS' limited userspace (kernel ring 3), but Zelenyuk said that attackers can use many of the already known privilege escalation bugs to gain kernel-level access (ring 0). "The exploit is 100% reliable," Zelenyuk said. "It means it either works always or never because of mismatched binaries or other, more subtle reasons I didn't account."

The Russian researcher says the zero-day affects all current VirtualBox releases, works regardless of the host or guest operating system the user is running, and is reliable against the default configuration of newly created VMs. Besides a detailed write-up of the entire exploit chain, Zelenyuk has also published video proof, showing the zero-day in action against an Ubuntu VM running inside VirtualBox on an Ubuntu host OS.

Long-time Slashdot reader Artem Tashkinov warns that the exploit utilizes "bugs in the data link layer of the default E1000 network interface adapter which makes this vulnerability critical for everyone who uses virtualization to run untrusted code." According to ZDNet, the same security researcher "found and reported a similar issue in mid-2017, which Oracle took over 15 months to fix."

"This lengthy and drawn-out patching process appears to have angered Zelenyuk, who instead of reporting this bug to Oracle, has decided to publish details online without notifying the vendor."
Government

FDA Wants Medical Devices To Have Mandatory Built-In Update Mechanisms (bleepingcomputer.com) 96

Catalin Cimpanu, writing for BleepingComputer: The US Food & Drug Administration plans to ask Congress for more funding and regulatory powers to improve its approach towards medical device safety, including on the cybersecurity front. An FDA document released this week reveals several of the FDA's plans, including the desire to force device makers to include mandatory update systems inside products for the purpose of delivering critical security patches.

In addition, the FDA also plans to force device makers to create a document called "Software Bill of Materials" that will be provided for each medical device and will include software-related details for each product. Hospitals, healthcare units, contractors, or users will be able to consult the medical device's bill of materials and determine how it functions, what software is needed for what feature, and what technologies are used in each device.

Microsoft

Microsoft's Meltdown and Spectre Patch Is Bricking Some AMD PCs (betanews.com) 299

Mark Wilson writes: As if the Meltdown and Spectre bug affecting millions of processors was not bad enough, the patches designed to mitigate the problems are introducing issues of their own. Perhaps the most well-known effect is a much-publicized performance hit, but some users are reporting that Microsoft's emergency patch is bricking their computers. We've already seen compatibility issues with some antivirus tools, and now some AMD users are reporting that the KB4056892 patch is rendering their computer unusable. A further issue -- error 0x800f0845 -- means that it is not possible to perform a rollback.
The Almighty Buck

Female Computer Programmers Make $0.72 For Every Dollar Made By Male: Study (siliconbeat.com) 455

An anonymous reader cites an article on The Mercury News' Silicon Beat tech blog: Female computer programmers make 72 cents for every dollar earned by male programmers. That difference is after researchers adjust for factors such as age, education, years of experience, job title, employer and location, according to a new study by Glassdoor (PDF), the jobs and recruiting marketplace, which looked at salary data of more than 500,000 people over 140 professions. The well-known U.S. wage gender gap is 76 cents for every dollar men earn. But women earn 94.6 cents for every man's dollar after adjusting for all factors other than gender. In other words, the wage gap in the U.S. is about 5.4 percent.

Submission + - Explaining the Lack of Quality Journalism In the Internet Age 1

schnell writes: While many lament the seeming lack of quality in-depth journalism today, a Gawker article argues that the inescapable problem is that you need a paying (in some form) audience (of a large enough size) to do it. There are plenty of free "news" sources to be found online, especially blogs simply regurgitating and putting a spin on wire news reports. But as the article notes, "The audience for quality prestige content is small. Even smaller than the actual output of quality prestige content, which itself is smaller than most media outlets like to imagine." Even highly respected news sources like the New York Times are resorting to wine clubs and the Washington Post is giving free subscriptions to Amazon Prime members to drive more corporate synergy and revenue. Rich parent companies are giving up on boutique high-quality niche journalism projects like ESPN's Grantland and Al Jazeera America because there simply aren't enough TV viewers/online ad clickers to pay the bills. So how do we reconcile our collectively stated desire for high quality journalism with our (seeming) collective unwillingness to pay for it?

Submission + - Netflix decides to stomp out VPN users (netflix.com)

An anonymous reader writes: Netflix have announced they'll be taking further steps to ensure users are not circumventing geo-restrictions. David Fullagar, Vice President of Content Delivery and Architecture at Netflix says "Some members use proxies or “unblockers” to access titles available outside their territory. To address this, we employ the same or similar measures other firms do. This technology continues to evolve and we are evolving with it. That means in coming weeks, those using proxies and unblockers will only be able to access the service in the country where they currently are."

Submission + - NASA awards Sierra Nevada's Dream Chaser an ISS commercial resupply contract (examiner.com)

MarkWhittington writes: The Verge reported that NASA has awarded the second round of contracts for the commercial resupply program. Two companies, SpaceX, and Orbital Sciences, which have been hauling cargo to the International Space Station in the first phase of the program, will receive contracts to fly at least six flights each to the ISS through 2024, the anticipated end of operations year for the space station. But Sierra Nevada has also gotten a six flight commitment, using a cargo version of its Dream Chaser spacecraft.

Slashdot Top Deals

There are no games on this system.

Working...