Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security //

Database Security

7/19/2016
10:15 AM
100%
0%

Ubuntu Forums Database Hacked

Canonical probe reveals user account details of 2 million stolen, passwords safe.

Ubuntu Forums’ database was recently discovered hacked after Canonical, the company behind Ubuntu, was alerted that someone claimed to have a copy of the Forums database. An investigation revealed that a security breach had exposed usernames, email, and IP addresses for 2 million users. Passwords, however, were not accessed. 

Canonical explained in a blog: "No active passwords were accessed; the passwords stored in this table were random strings as the Ubuntu Forums rely on Ubuntu Single Sign On for logins. The attacker did download these random strings (which were hashed and salted)."

The company further explained that the breach was due to a SQL injection vulnerability in the platform which powers the forum and which had not been patched.

“The attacker had the ability to inject certain formatted SQL to the Forums database on the Forums database servers…. This gave them the ability to read from any table, but we believe they only ever read from the ‘user’ table,” says Canonical.

The website was shut down as a precautionary measure and the server wiped clean and rebuilt.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PAKIKO
50%
50%
PAKIKO,
User Rank: Apprentice
11/16/2016 | 5:47:46 AM
security and protections
Database security it is responsible to ensure all access in the whole system with real protections.
LeviB623
50%
50%
LeviB623,
User Rank: Apprentice
10/14/2016 | 2:09:11 AM
How to database security ?
DataSunrise Data and Database Security, high-performance software solution for databases and data real-time protection in heterogeneous environments.
LeviB623
50%
50%
LeviB623,
User Rank: Apprentice
9/28/2016 | 6:01:17 AM
database security
data security services is a platform against malware and other attacks like Sql injection . You can buy online security for you large scale data from our website.DataSunrise Database Security,  real-time protection in heterogeneous environments.  Visit Here:-  https://www.datasunrise.com/
arafata636
100%
0%
arafata636,
User Rank: Apprentice
9/1/2016 | 9:15:04 AM
Re: Correct- but what about the authrized entities such as DBA.
Database Forensic (DBF) is a field of digital forensic investigation which deals with database contents and their metadata. It is considered as a significant field by which to identify, detect, acquire, analyse, and reconstruct database incidents and reveal an intruder's activities.  DBF has suffered from several issues which have resulted in it becoming a heterogeneous, confusing and unstructured domain. Examples of these issues include:  a variety of database systems infrastructure; the multidimensional nature of database systems; and domain knowledge effectively being scattered in all directions.  A variety of database systems infrastructures with multidimensional nature have enabled the DBF domain to be able to deal with specific incidents. Therefore, each database management system (DBMS) has a specific forensic investigation model/approach. Consequently, the issues of different concepts and terminologies in terms of forensic investigation process, as well as the scattering of domain knowledge in all directions have produced other challenges for DBF investigators and practitioners. This knowledge (such as models, processes, techniques, tools, frameworks, methods, activities, approaches, and algorithms) is neither organized nor structured, Further, it is universally dispersed such as in: the internet;  books, journals, conferences, online databases, book chapters, dissertations, reports, and organizations. Consequently, there is a lack of generic/standardized models by which to unify concepts and terminologies which may be used to reduce confusion and assist in organizing and structuring domain knowledge. This study discusses the DBF domain from several perspectives in order to highlight, extract, compare, merge and derive common concepts of domain, as well as to harmonize and reconcile concepts and definitions such as:  i) Database dimensions perspective; ii) Database ForensicTechnology perspective; and  iii) Database Forensic Investigation process perspective.
LeviB623
100%
0%
LeviB623,
User Rank: Apprentice
8/25/2016 | 1:24:39 AM
database security
A DBMS typically includes a database security and authorization subsystem that is responsible for ensuring the security portions of a database against unauthorized access.The security mechanism of a DBMS must include provisions for restricting access to the database as a whole. 
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
How Attackers Infiltrate the Supply Chain & What to Do About It
Shay Nahari, Head of Red-Team Services at CyberArk,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-10102
PUBLISHED: 2019-07-22
The Linux Foundation ONOS 1.15.0 and ealier is affected by: Improper Input Validation. The impact is: The attacker can remotely execute any commands by sending malicious http request to the controller. The component is: Method runJavaCompiler in YangLiveCompilerManager.java. The attack vector is: ne...
CVE-2019-10102
PUBLISHED: 2019-07-22
Frog CMS 1.1 is affected by: Cross Site Scripting (XSS). The impact is: Cookie stealing, Alert pop-up on page, Redirecting to another phishing site, Executing browser exploits. The component is: Snippets.
CVE-2019-10102
PUBLISHED: 2019-07-22
Ilias 5.3 before 5.3.12; 5.2 before 5.2.21 is affected by: Cross Site Scripting (XSS) - CWE-79 Type 2: Stored XSS (or Persistent). The impact is: Execute code in the victim's browser. The component is: Assessment / TestQuestionPool. The attack vector is: Cloze Test Text gap (attacker) / Corrections ...
CVE-2019-9959
PUBLISHED: 2019-07-22
The JPXStream::init function in Poppler 0.78.0 and earlier doesn't check for negative values of stream length, leading to an Integer Overflow, thereby making it possible to allocate a large memory chunk on the heap, with a size controlled by an attacker, as demonstrated by pdftocairo.
CVE-2019-4236
PUBLISHED: 2019-07-22
A IBM Spectrum Protect 7.l client backup or archive operation running for an HP-UX VxFS object is silently skipping Access Control List (ACL) entries from backup or archive if there are more than twelve ACL entries associated with the object in total. As a result, it could allow a local attacker to ...