GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 09-Aug-2024 03:34:38 JST Kevin Beaumont Kevin Beaumont

    Before anybody starts to get too excited about the OpenVPN vulnerabilities Microsoft are doing a publicity tour for, they need authentication and are client side - so nothing particularly risky.

    https://www.microsoft.com/en-us/security/blog/2024/08/08/chained-for-attack-openvpn-vulnerabilities-discovered-leading-to-rce-and-lpe/

    In conversation about 9 months ago from cyberplace.social permalink

    Attachments


    1. https://cyberplace.social/system/media_attachments/files/112/927/835/152/177/340/original/37e0d946779ef42b.jpeg
    2. Domain not in remote thumbnail source whitelist: www.microsoft.com
      Chained for attack: OpenVPN vulnerabilities discovered leading to RCE and LPE | Microsoft Security Blog
      from Microsoft Security Threat Intelligence
      Microsoft researchers found multiple vulnerabilities in OpenVPN that could lead to an attack chain allowing remote code execution and local privilege escalation. This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 09-Aug-2024 03:37:27 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Press will probably largely run with the opening few sentences, but if you keep reading your interest will change as the risk changes substantially.

      In conversation about 9 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/112/927/846/271/199/101/original/509b7d9056ec1e58.jpeg
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 09-Aug-2024 03:48:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      To be clear about this, there are 4 CVEs - 3 are for the OpenVPN *client* on Windows, and 1 is for the Android client.

      I don’t know why the MS blog post is going on about binaries on millions of routers, as those are the OpenVPN *server* - which is different.

      The RCE one here is against the client, not server, and needs you to be on a VPN with a compromised host doing SMB/RPC traffic back to your system (you have Windows Firewall, though) and know creds on your system.

      In conversation about 9 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 09-Aug-2024 03:51:32 JST Kevin Beaumont Kevin Beaumont
      in reply to

      It’s valid research and people should apply updates as usual, ie no panic.

      It would be good if Microsoft could turn their researchers attention to their own products, where gaping holes exist in things like legacy (still enabled) components in Windows OS, Office etc etc.

      Or maybe just look at the long list of known issues in SmartScreen, DWM etc etc rather than waiting for Kaspersky to tell them after people have already been owned.

      In conversation about 9 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Friday, 09-Aug-2024 04:52:27 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Microsoft incorrectly call these vulnerabilities “zero-days” repeatedly.

      They aren’t - patches have been available since earlier this year and exploitation was never detected in the wild.

      In conversation about 9 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/112/928/142/015/833/968/original/e26eeb58136f32d4.jpeg
    • Embed this notice
      ludiofines (ludiofines@cyberplace.social)'s status on Friday, 09-Aug-2024 16:58:09 JST ludiofines ludiofines

      @GossiTheDog another linkedin ban incoming?

      In conversation about 9 months ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.