Vulnerabilities / Threats
1/29/2014
03:01 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Researchers Find Critical Vulnerability On Wikipedia, Other ‘Wiki’ Sites

Vulnerability left MediaWiki, which includes Wikipedia.org, exposed to remote code execution

January 29, 2013 – SAN CARLOS, CA -- Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today released its findings of a critical vulnerability in the MediaWiki project Web platform, a popular open-source Web platform used to create and maintain 'wiki' Web sites. The MediaWiki platform includes Wikipedia.org, the sixth most visited Web site in the world[1] with over 94 million unique visitors per month.[2]

Check Point researchers discovered that this critical vulnerability left MediaWiki (version 1.8 onwards) exposed to remote code execution (RCE), where an attacker can gain complete control of the vulnerable web server. Check Point immediately alerted the WikiMedia Foundation about the vulnerability, and after verification, the Foundation issued an update and patch to the MediaWiki software. Check Point also delivered updated protections to its worldwide customers in conjunction with the WikiMedia Foundation's software update.

Key Findings:

If the vulnerability had not been uncovered, an attacker would have been able to control the Wikipedia.org Web server, or any other 'wiki' site running on MediaWiki, and potentially inject and serve malware-infecting code to users visiting these sites

The WikiMedia Foundation released a software update after learning of the vulnerability from Check Point and encouraged all MediaWiki customers to apply the patch as soon as possible

Since 2006, this is only the third RCE vulnerability found in the MediaWiki platform[3]

Check Point's Vulnerability Research Group regularly performs assessments of common software to ensure the security of Internet users worldwide. Customers with the Check Point Intrusion Prevention System (IPS) Software Blade automatically received detections for this vulnerability.

"It only takes a single vulnerability on a widely adopted platform for a hacker to infiltrate and wreak widespread damage. The Check Point Vulnerability Research Group focuses on finding these security exposures and deploying the necessary real-time protections to secure the Internet. We're pleased that the MediaWiki platform is now protected against attacks on this vulnerability, which would have posed great security risk for millions of daily 'wiki' site users," said Dorit Dor, vice president of products at Check Point Software Technologies.

For additional details, visit: http://www.checkpoint.com/threatcloud-central/index.html

1 According to Alexa, www.alexa.com/topsites

2 According to Compete.com, http://siteanalytics.compete.com/wikipedia.org

3 According to CVE Details, http://www.cvedetails.com/product/4125/Mediawiki-Mediawiki.html

Follow Check Point via

Twitter: www.twitter.com/checkpointsw

Facebook: https://www.facebook.com/checkpointsoftware

YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.