Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

7/27/2007
02:45 AM
50%
50%

Attack of the Black Hats

Get ready, Vegas - with this crew in town, even the slot machines aren't safe

10:45 AM -- They work toward it all year: The most devious minds in the industry come up with the most dangerous security vulnerabilities and exploits they can find -- and then they get together and share them.

Next week in Las Vegas, some of the world's smartest and most cunning researchers will convene at Black Hat USA 2007. During two days' worth of presentations, security managers will get more to worry about than in a year's worth of Patch Tuesdays.

We've seen previews of some of the vulnerabilities already. On Wednesday, renowned researcher HD Moore explained how he plans to demonstrate powerful hacking techniques that neither exploit unpatched vulnerabilities nor zero-day bugs. Apparently, now even fully-patched systems aren't safe. (See Hacking Without Exploits.)

Meanwhile, researchers at Watchfire offered a peek at their discovery of a means to hack a broad range of applications using a common programming error called a "dangling pointer." Their discovery raises some serious questions about software bugs that have previously been overlooked because they didn't appear to have security implications. (See Pointing to Danger.)

And last week, researchers gave us a look at some holes in so-called "data leak prevention" tools, an emerging class of products that has received a lot of hype but still needs a lot of work. A pair of researchers at Black Hat will demonstrate multiple types of flaws in various vendors' DLP products that would let an attacker evade them, alter their records of stolen data, and even use them to bot-infect client machines. (See Black Hat: DLP Hack.)

These are just the tip of the iceberg. A look at the Black Hat schedule of briefings lets you walk through abstracts of a wide range of exploits, including one guy who says he can hack computers without ever touching a keyboard.

We hope that many of you will be able to attend the Black Hat sessions in person, but for those who can't, Dark Reading will be your eyes and ears in the coming week. When you pull up our site next week, you'll see a special news section containing all of our coverage of Black Hat -- including the stories we've already covered, as well as our up-to-the-minute coverage from Las Vegas. Later in the week, we'll also have some new video that will give you a view of what's happening at the show. A number of Black Hat video interviews and features will follow in the weeks to come.

Hold onto your black hats, security pros, it's going to be a scary ride. And a note to the casino operators in Vegas: Keep a close eye on your electronic networks. With these clever devils in town, anything could be fair game.

— Tim Wilson, Site Editor, Dark Reading

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16404
PUBLISHED: 2019-10-21
Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.
CVE-2019-17400
PUBLISHED: 2019-10-21
The unoconv package before 0.9 mishandles untrusted pathnames, leading to SSRF and local file inclusion.
CVE-2019-17498
PUBLISHED: 2019-10-21
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a ...
CVE-2019-16969
PUBLISHED: 2019-10-21
In FusionPBX up to 4.5.7, the file app\fifo_list\fifo_interactive.php uses an unsanitized "c" variable coming from the URL, which is reflected in HTML, leading to XSS.
CVE-2019-16974
PUBLISHED: 2019-10-21
In FusionPBX up to 4.5.7, the file app\contacts\contact_times.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.