There’s a four-year-old bug in the Secure Shell implementation known as libssh that makes it trivial for just about anyone to gain unfettered administrative control of a vulnerable server. While the authentication-bypass flaw represents a major security hole that should be patched immediately, it wasn’t immediately clear what sites or devices were vulnerable since neither the widely used OpenSSH nor Github’s implementation of libssh was affected.
The vulnerability, which was introduced in libssh version 0.6 released in 2014 makes it possible to log in by presenting a server with a SSH2_MSG_USERAUTH_SUCCESS message rather than the SSH2_MSG_USERAUTH_REQUEST message the server was expecting, according to an advisory published Tuesday. Exploits are the hacking equivalent of a Jedi mind trick, in which an adversary uses the Force to influence or confuse weaker-minded opponents. The last time the world saw an authentication-bypass bug with such serious consequences and requiring so little effort was 11 months ago, when Apple’s macOS let people log in as admin without entering a password.
The effects of malicious exploits, assuming there were any during the four-plus years the bug was active, are hard to fathom. In a worst-case scenario, attackers would be able to use exploits to gain complete control over vulnerable servers. The attackers could then steal encryption keys and user data, install rootkits and erase logs that recorded the unauthorized access. Anyone who has used a vulnerable version of libssh in server mode should consider conducting a thorough audit of their network immediately after updating.
Video-sharing site shows an blank website instead of its usual selection of videos.
Hiding under an assumed name to avoid discrimination, Repairnator is unmasked
Luc Escape leads a double life. The software engineer on the Spirals research team at the University of Lille in France goes by another name, Repairnator.…
It's a pricey proposition, too, with its base model starting at $73,900.
The late physicist's last book tackles Brief Answers to the Big Questions.
Even with a big performance boost, more RAM and a cool new matte black color, this still feels more like a Surface Laptop 1.5.
The FCC chairman also calls on wireless carriers to let victims "change carriers without penalty."
Big Blue's $18.8bn revenue falls short of expectations
IBM saw its stock price take a hit Tuesday afternoon after the enterprise tech giant saw quarterly revenues miss the mark.…
But then again, he's not denying it, either.
The Birdcage, Wonder and Kick-Ass are coming to Amazon.
Nothing to do with lousy infrastructure, poor public transport etc
As any Bay Area resident knows traffic is bad and getting worse, but San Francisco thinks it has found the culprit - ride-hailing companies.…
Blowout quarter? It's the kind of formulaic plot Netflix loves.
To All the Boys I've Loved Before was one of Netflix's most watched films yet.
What's it like to be someone who watches banned content on social media so you don't have to?
But you'll definitely want to check out the libssh bug
Oracle has released a wide-ranging security update to address more than 300 CVE-listed vulnerabilities in its various enterprise products.…
It’s weird to love a $300 video game. But that’s the funny thing about nostalgia.
The advert mimicked a horror movie and was likely to scare youngsters, the ad authority says.
Social code biz makes bid to turn workflows into code
At San Francisco's Palace of Fine Arts on Tuesday, GitHub held its annual tech touting talk in a space that once housed the city's Exploratorium science show.…
TLS (Transport Layer Security) is used to secure connections on the Web. TLS is essential to the Web, providing the ability to form connections that are confidential, authenticated, and tamper-proof. This has made it a big focus of security research, and over the years, a number of bugs that had significant security implications have been found in the protocol. Revisions have been published to address these flaws.
The original TLS 1.0, heavily based on Netscape's SSL 3.0, was first published in January 1999. TLS 1.1 arrived in 2006, while TLS 1.2, in 2008, added new capabilities and fixed these security flaws. Irreparable security flaws in SSL 3.0 saw support for that protocol come to an end in 2014; the browser vendors now want to make a similar change for TLS 1.0 and 1.1.
According to four people who spoke to Politico on conditions of anonymity, the Trump administration's plan to bail out coal and nuclear plants has hit a speed bump within the White House itself.
The most recent plan from the Department of Energy (DOE) involved invoking the Defense Production Act of 1950, a wartime rule that allows the president to incentivize and prioritize purchases from American industries that are considered vital to national security.
Another potential plan involved invoking Section 202(c) of the Federal Power Act to mandate that struggling coal and nuclear plants stay open either through compulsory purchases by grid managers or through subsidies. FirstEnergy, a power corporation whose coal and nuclear units are under Chapter 11 bankruptcy, petitioned the DOE to use this power in April.