ADVISORIES | September 28, 2015

Harman-Kardon UConnect Vulnerability

UConnect 8.4AN/RA3/RA4 are vehicle-based infotainment systems. UConnect systems are integrated in certain makes of Chrysler, Dodge, Jeep, and Ram vehicles.

The UConnect infotainment system allowed an unauthenticated connection from other access points on the Sprint Network. An attacker could issue commands to other components within the vehicle through the infotainment system. (more…)

ADVISORIES | September 3, 2015

Admin ACL Bypass and Double Fetch Issue in F-Secure Internet Security 2015

Local users of F-Secure Internet Security 2015 could elevate their privileges to local admin/system/kernel. (more…)

ADVISORIES | April 30, 2015

CyberLock CyberKey-based Access Control Solutions

CyberLock CyberKey-based access control solutions can be easily cloned, and new keys can be created from lost cylinders and keys regardless of the permissions granted to the key. (more…)

ADVISORIES | April 14, 2015

Lenovo System Update Multiple Privilege Escalations

CVE-2015-2219 Local, least-privileged users can run commands as the SYSTEM user.

CVE-2015-2233 Local and potentially remote attackers can bypass signature validation checks and replace trusted Lenovo applications with malicious applications.

CVE-2015-2234 Local, unprivileged users can run commands as an administrative user. (more…)

ADVISORIES | April 10, 2015

Petcube Remote Wireless Pet Camera Vulnerabilities

The security and privacy of Petcube users could be compromised through unauthorized access. (more…)

ADVISORIES | December 9, 2014

X Font Service Protocol Handling Issues in libXfont Library

Ilja van Sprundel, an IOActive security researcher, discovered several issues in the way the libXfont library handles the responses it receives from XFS servers. Mr. van Sprundel has worked with X.Org’s security team to analyze, confirm, and fix these issues. Most of these issues stem from libXfont trusting the font server to send valid protocol data and not verifying that the values will not overflow or cause other damage.

This code is commonly called from the X server when an X Font Server is active in the font path, so it may be running in a setuid-root process, depending on the X server in use. Exploits of this path can be used by a local, authenticated user to attempt to raise privileges, or by a remote attacker who can control the font server to try to execute code with the privileges of the X server. (more…)

ADVISORIES | November 1, 2014

Facebook Access Token Sent in Plaintext

Attackers can steal Facebook access tokens to impersonate Facebook users and perform malicious actions that include, but are not limited to, posting content on behalf of users and accessing friend lists. (more…)

ADVISORIES | October 21, 2014

OpenBSD ≤ 5.5 Local Kernel Panic

A non-privileged use could cause a local Denial-of-Service (DoS) condition by triggering a kernel panic through a malformed ELF executable. (more…)

ADVISORIES | July 1, 2014

Belkin WeMo Home Automation Vulnerabilities

The WeMo devices connect to the Internet using the STUN/TURN protocol. This gives users remote control of the devices and allows them to perform firmware updates from anywhere in the world. A generated GUID is the primary source of access control.

WeMo also uses a GPG-based, encrypted firmware distribution scheme to maintain device integrity during updates. Unfortunately, attackers can easily bypass most of these features due to the way they are currently implemented in the WeMo product line. The command for performing firmware updates is initiated over the Internet from a paired device. Also, firmware update notices are delivered through an RSS-like mechanism to the paired device, rather than the WeMo device itself, which is distributed over a non-encrypted channel. As a result, attackers can easily push firmware updates to WeMo users by spoofing the RSS feed with a correctly signed firmware. (more…)

ADVISORIES |

Steam Client Creates World-writable Shell Script

While performing a routine world-writable file scan, one of IOActive’s consultants discovered that the Steam Client for Mac OS X creates world-writable shell scripts when installing games. (more…)