<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	>

<channel>
	<title>ServerBuddies Support Blog</title>
	<atom:link href="http://blog.serverbuddies.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.serverbuddies.com</link>
	<description>Linux Support Blog</description>
	<pubDate>Sat, 30 May 2020 20:13:55 +0000</pubDate>
	<generator>http://wordpress.org/?v=2.5.1</generator>
	<language>en</language>
			<item>
		<title>Fix Sectigo AddTrust External CA Root Expiring May 30, 2020</title>
		<link>http://blog.serverbuddies.com/fix-sectigo-addtrust-external-ca-root-expiring-may-30-2020/</link>
		<comments>http://blog.serverbuddies.com/fix-sectigo-addtrust-external-ca-root-expiring-may-30-2020/#comments</comments>
		<pubDate>Sat, 30 May 2020 20:13:55 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[General]]></category>

		<category><![CDATA[Security]]></category>

		<category><![CDATA[AddTrust External CA Root]]></category>

		<category><![CDATA[comodo root certificate]]></category>

		<category><![CDATA[expired CA root]]></category>

		<category><![CDATA[sectigo]]></category>

		<category><![CDATA[sectigo expired SSL]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1486</guid>
		<description><![CDATA[On May 30, 2020 the commonly used Sectigo (Comodo) Root certificate, named the &#8220;AddTrust External CA&#8221; Root, will expire.
Any websites that depend on this cross-signed root must be updated by May, 2020 or run the risk of outage or displayed error message. Clients running server cronjobs with tools such as curl, wget, internal servers tasks [...]]]></description>
			<content:encoded><![CDATA[<p>On May 30, 2020 the commonly used Sectigo (Comodo) Root certificate, named the &#8220;AddTrust External CA&#8221; Root, will expire.</p>
<p>Any websites that depend on this cross-signed root must be updated by May, 2020 or run the risk of outage or displayed error message. Clients running server cronjobs with tools such as curl, wget, internal servers tasks that depends on connecting to the website using a https connection will suffer downtime as a cause of this problem.</p>
<p>Clients looking for an immediate fix can purchase a <a href="https://www.serverbuddies.com/hour-server-support.php">1x Hour of Support plan</a>. Our emergency support is always available 24/7.</p>
<p>As for our Server Management customers, we&#8217;ve already taken actions to scan and replace outdated CA Root certificates in all your servers, so we&#8217;ve got your back!</p>
<p>Should you&#8217;ve any questions please don&#8217;t hesitate to email us or reach our LiveChat! Interface.</p>
<p>Thank you for choosing ServerBuddies!</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/fix-sectigo-addtrust-external-ca-root-expiring-may-30-2020/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Important Dirty COW (CVE-2016-5195) exploit for Debian, Ubuntu, RHEL and CentOS</title>
		<link>http://blog.serverbuddies.com/important-dirty-cow-cve-2016-5195-exploit-for-debian-ubuntu-rhel-and-centos/</link>
		<comments>http://blog.serverbuddies.com/important-dirty-cow-cve-2016-5195-exploit-for-debian-ubuntu-rhel-and-centos/#comments</comments>
		<pubDate>Sat, 29 Oct 2016 20:01:44 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[DirectAdmin Support]]></category>

		<category><![CDATA[Ensim Support]]></category>

		<category><![CDATA[General]]></category>

		<category><![CDATA[Linux Support]]></category>

		<category><![CDATA[Plesk Support]]></category>

		<category><![CDATA[Security]]></category>

		<category><![CDATA[Webmin Support]]></category>

		<category><![CDATA[cPanel Support]]></category>

		<category><![CDATA[centos exploit]]></category>

		<category><![CDATA[copy on write exploit]]></category>

		<category><![CDATA[cow]]></category>

		<category><![CDATA[cpanel exploit]]></category>

		<category><![CDATA[debian exploit]]></category>

		<category><![CDATA[dirty cow]]></category>

		<category><![CDATA[Exploit]]></category>

		<category><![CDATA[rhel exploit]]></category>

		<category><![CDATA[ubuntu exploit]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1485</guid>
		<description><![CDATA[Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel.
A race condition was found in the way the Linux kernel&#8217;s memory  subsystem handled the copy-on-write (COW) breakage of private read-only  memory mappings.
Impact

An unprivileged local user could use this flaw to gain write access  to otherwise read-only memory mappings and thus [...]]]></description>
			<content:encoded><![CDATA[<p>Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel.</p>
<p>A race condition was found in the way the Linux kernel&#8217;s memory  subsystem handled the copy-on-write (COW) breakage of private read-only  memory mappings.</p>
<h3>Impact</h3>
<ul>
<li>An unprivileged local user could use this flaw to gain write access  to otherwise read-only memory mappings and thus increase their  privileges on the system and gain root access instantly.</li>
<li>This flaw allows an attacker with a local system account to modify  on-disk binaries, bypassing the standard permission mechanisms that  would prevent modification without an appropriate permission set.</li>
</ul>
<p>It&#8217;s highly recommended to patch the system kernel in all Debian, Ubuntu, CentOS and RHEL distros to prevent system breakage.</p>
<p>Are you running a vulnerable version?</p>
<p>If you are not a customer subscribed under our Server Management plan   and would like to have this vulnerability patched please purchase a 1x  <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/important-dirty-cow-cve-2016-5195-exploit-for-debian-ubuntu-rhel-and-centos/feed/</wfw:commentRss>
		</item>
		<item>
		<title>New MySQL/MariaDB Remote Root Code Execution Vulnerability (CVE-2016-6662)</title>
		<link>http://blog.serverbuddies.com/new-mysqlmariadb-remote-root-code-execution-vulnerability-cve-2016-6662/</link>
		<comments>http://blog.serverbuddies.com/new-mysqlmariadb-remote-root-code-execution-vulnerability-cve-2016-6662/#comments</comments>
		<pubDate>Thu, 15 Sep 2016 14:07:04 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[CVE-2016-6662]]></category>

		<category><![CDATA[mariadb vulnerability]]></category>

		<category><![CDATA[mysql exploit]]></category>

		<category><![CDATA[mysql vulnerability]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1484</guid>
		<description><![CDATA[On 12 September, 2016, an independent researcher revealed multiple MySQL  vulnerabilities. This advisory focuses on a vulnerability with a CVEID  of CVE-2016-6662 which can allow attackers to (remotely) inject  malicious settings into MySQL configuration files (my.cnf) under certain  configurations, leading to critical consequences.
The vulnerability affects all MySQL servers in the default  configuration [...]]]></description>
			<content:encoded><![CDATA[<p>On 12 September, 2016, an independent researcher revealed multiple MySQL  vulnerabilities. This advisory focuses on a vulnerability with a CVEID  of CVE-2016-6662 which can allow attackers to (remotely) inject  malicious settings into MySQL configuration files (my.cnf) under certain  configurations, leading to critical consequences.</p>
<p>The vulnerability affects all MySQL servers in the default  configuration in all version branches (5.7, 5.6, and 5.5) including the  latest versions, and can be exploited by both local and remote  attackers. Both the authenticated access to MySQL databases (via network  connection or web interfaces such as phpMyAdmin) and SQL Injection  could be used as exploitation vectors if a MySQL user has the <em> <strong>SUPER</strong> </em> privilege granted. Additionally, MySQL users with both<strong> <em>SELECT</em> </strong> and <em> <strong>FILE</strong> </em> privileges granted are also affected.</p>
<p>A  successful exploitation could allow attackers to execute arbitrary code  with root privileges which would then allow them to fully compromise  the server on which an affected version of MySQL or MariaDB is running.</p>
<p>Are you running a vulnerable version?</p>
<p>If you are not a customer subscribed under our Server Management plan  and would like to have this vulnerability patched please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/new-mysqlmariadb-remote-root-code-execution-vulnerability-cve-2016-6662/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Important All in One SEO Pack Plugin 2.3.7 WordPress Vulnerability</title>
		<link>http://blog.serverbuddies.com/important-all-in-one-seo-pack-plugin-237-wordpress-vulnerability/</link>
		<comments>http://blog.serverbuddies.com/important-all-in-one-seo-pack-plugin-237-wordpress-vulnerability/#comments</comments>
		<pubDate>Mon, 15 Aug 2016 19:40:58 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[all in one]]></category>

		<category><![CDATA[clean malware]]></category>

		<category><![CDATA[malware cleanup]]></category>

		<category><![CDATA[plugin bug]]></category>

		<category><![CDATA[plugin vulnerability]]></category>

		<category><![CDATA[wordpress exploit]]></category>

		<category><![CDATA[wordpress plugin]]></category>

		<category><![CDATA[wordpress vulnerability]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1483</guid>
		<description><![CDATA[A new vulnerability in the All in One SEO Pack WordPress plugin has been discovered. Users of the popular All In One SEO Pack plugin are advised to update to the most recent version as soon as possible.
A flaw in versions older than 2.3.7 could leave sites vulnerable to a cross-site scripting attack that would
allow [...]]]></description>
			<content:encoded><![CDATA[<p>A new vulnerability in the All in One SEO Pack WordPress plugin has been discovered. Users of the popular All In One SEO Pack plugin are advised to update to the most recent version as soon as possible.</p>
<p>A flaw in versions older than 2.3.7 could leave sites vulnerable to a cross-site scripting attack that would<br />
allow malicious third-parties to take control.</p>
<p>When the feature blocks a malicious bot, it displays the HTTP request  sent by the bot in the WordPress site’s dashboard. Because the request  is not sanitized, a maliciously crafted request could include code,  which, when the dashboard is loaded by an administrator, would send  sensitive data, including authentication cookies, to the attacker.</p>
<p>Mitigating the risk of the attack is mandatory in order to prevent code injections.</p>
<p>Customers using this plugin are advised to contact us for steps on how to solve this issue.</p>
<p>If you are not a customer subscribed under our Server Management plan and would like to have this vulnerability patched please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a title="LiveChat!" href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/important-all-in-one-seo-pack-plugin-237-wordpress-vulnerability/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Important GHOST: glibc new RHEL/CentOS vulnerability (CVE-2015-0235)</title>
		<link>http://blog.serverbuddies.com/important-ghost-glibc-new-vulnerability-cve-2015-0235%e2%80%8f/</link>
		<comments>http://blog.serverbuddies.com/important-ghost-glibc-new-vulnerability-cve-2015-0235%e2%80%8f/#comments</comments>
		<pubDate>Mon, 02 Feb 2015 21:40:47 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[centos ghost]]></category>

		<category><![CDATA[centos glibc exploit]]></category>

		<category><![CDATA[ghost]]></category>

		<category><![CDATA[ghost vulnerability]]></category>

		<category><![CDATA[glibc]]></category>

		<category><![CDATA[glibc exploit]]></category>

		<category><![CDATA[glibc vulnerability]]></category>

		<category><![CDATA[rhel ghost]]></category>

		<category><![CDATA[rhel glibc exploit]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1482</guid>
		<description><![CDATA[A potential high security vulnerability was found in the glibc library, which  has been assigned CVE-2015-0235 and is commonly referred to as &#8216;GHOST&#8217;.
GHOST is a &#8216;buffer overflow&#8217; bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote  attacker that is able to make an application call [...]]]></description>
			<content:encoded><![CDATA[<p>A potential high security vulnerability was found in the glibc library, which  has been assigned CVE-2015-0235 and is commonly referred to as &#8216;GHOST&#8217;.</p>
<p>GHOST is a &#8216;buffer overflow&#8217; bug affecting the <code>gethostbyname()</code> and <code>gethostbyname2()</code> function calls in the glibc library. This vulnerability allows a remote  attacker that is able to make an application call to either of these  functions to execute arbitrary code with the permissions of the user  running the application.</p>
<p>Currently, all versions of glibc shipped with all variants of Red Hat Enterprise  Linux and CentOS are affected, patching/upgrading the OS is highly recommended to avoid server compromise.</p>
<p>ServerBuddies support is available 24&#215;7 to assist you in case you need the patch  applied or to check if your server is vulnerable or any other  assistance.</p>
<p>In order to have this vulnerability immediately checked and patched by us please submit a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan</a>, customers under our Server Management plan are already patched.</p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a title="LiveChat!" href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/important-ghost-glibc-new-vulnerability-cve-2015-0235%e2%80%8f/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Important SSLv3 (POODLE) vulnerability found in all Linux distributions (CVE-2014-3566)</title>
		<link>http://blog.serverbuddies.com/important-sslv3-poodle-vulnerability-found-in-all-linux-distributions-cve-2014-3566/</link>
		<comments>http://blog.serverbuddies.com/important-sslv3-poodle-vulnerability-found-in-all-linux-distributions-cve-2014-3566/#comments</comments>
		<pubDate>Wed, 15 Oct 2014 16:07:21 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[cpanel sslv3]]></category>

		<category><![CDATA[cpanel vulnerability]]></category>

		<category><![CDATA[CVE-2014-3566]]></category>

		<category><![CDATA[plesk vulnerability]]></category>

		<category><![CDATA[POODLE]]></category>

		<category><![CDATA[ssl3]]></category>

		<category><![CDATA[SSLv3]]></category>

		<category><![CDATA[SSLv3 exploit]]></category>

		<category><![CDATA[SSLv3 vulnerability]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1481</guid>
		<description><![CDATA[A flaw named POODLE was found in the way SSL 3.0 handled padding bytes when  decrypting messages encrypted using block ciphers in cipher block  chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM)  attacker to decrypt a selected byte of a cipher text in as few as 256  tries if they [...]]]></description>
			<content:encoded><![CDATA[<p>A flaw named POODLE was found in the way SSL 3.0 handled padding bytes when  decrypting messages encrypted using block ciphers in cipher block  chaining (CBC) mode. This flaw allows a man-in-the-middle (MITM)  attacker to decrypt a selected byte of a cipher text in as few as 256  tries if they are able to force a victim application to repeatedly send  the same data over newly created SSL 3.0 connections.</p>
<p>In other words, the vulnerability allows an attacker to add padding to a request in  order to then calculate the plaintext of encryption using the SSLv3  protocol. Effectively, this allows an attacker to compromise the  encryption when using the SSLv3 protocol.</p>
<p>The risk from this vulnerability is that an attacker can exchange over an encrypted  connection using that protocol and be intercepted and read.</p>
<p>As NO patch has been released yet by REDHAT current it is <strong>highly </strong>recommended  to use only TLSv1.1 and TLSv1.2. Backwards compatibility can be done  using TLSv1.0. It is <strong>NOT </strong>recommended to use SSLv2 and SSLv3 as they are  considered insecure.</p>
<p>SSLv3 for all our Server Management and Monitoring customers have been all disabled.</p>
<p>If you are not a Server Management customer and would like to have this vulnerability patched/disabled please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a title="LiveChat!" href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/important-sslv3-poodle-vulnerability-found-in-all-linux-distributions-cve-2014-3566/feed/</wfw:commentRss>
		</item>
		<item>
		<title>[CRITICAL] Bash exploit found in all Linux Distributions (CVE-2014-6271, CVE-2014-7169)</title>
		<link>http://blog.serverbuddies.com/critical-bash-exploit-found-in-all-linux-distributions-cve-2014-6271-cve-2014-7169/</link>
		<comments>http://blog.serverbuddies.com/critical-bash-exploit-found-in-all-linux-distributions-cve-2014-6271-cve-2014-7169/#comments</comments>
		<pubDate>Thu, 25 Sep 2014 15:34:59 +0000</pubDate>
		<dc:creator>SBDavid</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[bash vulnerability]]></category>

		<category><![CDATA[CVE-2014-6271]]></category>

		<category><![CDATA[CVE-2014-7169]]></category>

		<category><![CDATA[new bash exploit]]></category>

		<category><![CDATA[new centos exploit]]></category>

		<category><![CDATA[new debian exploit]]></category>

		<category><![CDATA[new redhat exploit]]></category>

		<category><![CDATA[shell shock exploit]]></category>

		<category><![CDATA[shellshock]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1480</guid>
		<description><![CDATA[Red Hat has been made aware of a vulnerability affecting all versions of  the bash package as shipped with RedHat/CentOS/Debian and other products.
This vulnerability allows arbitrary code execution. Certain services and  applications allow remote unauthenticated attackers to provide  environment variables, allowing them to exploit this issue.
This issue affects all products which use [...]]]></description>
			<content:encoded><![CDATA[<p>Red Hat has been made aware of a vulnerability affecting all versions of  the bash package as shipped with RedHat/CentOS/Debian and other products.</p>
<p>This vulnerability allows arbitrary code execution. Certain services and  applications allow remote unauthenticated attackers to provide  environment variables, allowing them to exploit this issue.</p>
<p>This issue affects all products which use the Bash shell and parse  values of environment variables. This issue is especially dangerous as  there are many possible ways Bash can be called by an application. Quite  often if an application executes another binary, Bash is invoked to  accomplish this. Because of the pervasive use of the Bash shell, this  issue is quite serious and should be treated as such.</p>
<p>To better understand the magnitude of this issue and how it affects  various configurations, the below list is not exhaustive, but is meant  to give some examples of how this issue affects certain configurations,  and why the high level of complexity makes it impossible to specify  something is not affected by this issue. The best course of action is to  upgrade Bash to a fixed version.</p>
<table border="1">
<tbody>
<tr>
<th>Package</th>
<th>Description</th>
</tr>
<tr>
<td>httpd</td>
<td>CGI scripts are likely affected by this issue: when a CGI script is  run by the web server, it uses environment variables to pass data to the  script. These environment variables can be controlled by the attacker.  If the CGI script calls Bash, the script could execute arbitrary code as  the httpd user. mod_php, mod_perl, and mod_python do not use  environment variables and we believe they are not affected.</td>
</tr>
<tr>
<td>Secure Shell (SSH)</td>
<td>It is not uncommon to restrict remote commands that a user can run  via SSH, such as rsync or git. In these instances, this issue can be  used to execute any command, not just the restricted command.</td>
</tr>
<tr>
<td>dhclient</td>
<td>The Dynamic Host Configuration Protocol Client (dhclient) is used to  automatically obtain network configuration information via DHCP. This  client uses various environment variables and runs Bash to configure the  network interface. Connecting to a malicious DHCP server could allow an  attacker to run arbitrary code on the client machine.</td>
</tr>
<tr>
<td>CUPS</td>
<td>It is believed that CUPS is affected by this issue. Various user  supplied values are stored in environment variables when cups filters  are executed.</td>
</tr>
<tr>
<td>sudo</td>
<td>Commands run via sudo are not affected by this issue. Sudo  specifically looks for environment variables that are also functions. It  could still be possible for the running command to set an environment  variable that could cause a Bash child process to execute arbitrary  code.</td>
</tr>
<tr>
<td>Firefox</td>
<td>We do not believe Firefox can be forced to set an environment  variable in a manner that would allow Bash to run arbitrary commands. It  is still advisable to upgrade Bash as it is common to install various  plug-ins and extensions that could allow this behavior.</td>
</tr>
<tr>
<td>Postfix</td>
<td>The Postfix server will replace various characters with a ?. While  the Postfix server does call Bash in a variety of ways, we do not  believe an arbitrary environment variable can be set by the server. It  is however possible that a filter could set environment variables.</td>
</tr>
</tbody>
</table>
<p>Customers having their servers under our Server Management and Monitoring subscription have been all patched.</p>
<p>If you are not a Server Management customer and would like to have this vulnerability patched please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don&#8217;t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a title="LiveChat!" href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/critical-bash-exploit-found-in-all-linux-distributions-cve-2014-6271-cve-2014-7169/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Another high risk OpenSSL vulnerability has been discovered one month after HeartBleed chaos: SSL/TLS MITM vulnerability (CVE-2014-0224)</title>
		<link>http://blog.serverbuddies.com/another-high-risk-openssl-vulnerability-has-been-discovered-one-month-after-heartbleed-chaos-ssltls-mitm-vulnerability-cve-2014-0224/</link>
		<comments>http://blog.serverbuddies.com/another-high-risk-openssl-vulnerability-has-been-discovered-one-month-after-heartbleed-chaos-ssltls-mitm-vulnerability-cve-2014-0224/#comments</comments>
		<pubDate>Thu, 05 Jun 2014 22:54:28 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[heartbleed]]></category>

		<category><![CDATA[heartbleed bug]]></category>

		<category><![CDATA[new openssl bug]]></category>

		<category><![CDATA[openssl]]></category>

		<category><![CDATA[openssl bug]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1479</guid>
		<description><![CDATA[Still cleaning up after the Heartbleed debacle, OpenSSL is issuing fixes  for several vulnerabilities, one of them exploitable to run arbitrary  code on the client or server.
Unlike Heartbleed, which had been introduced into the  program not long before, affects all versions of OpenSSL, including  those that were patched to fix Heartbleed.
The [...]]]></description>
			<content:encoded><![CDATA[<p>Still cleaning up after the Heartbleed debacle, OpenSSL is issuing fixes  for several vulnerabilities, one of them exploitable to run arbitrary  code on the client or server.</p>
<p>Unlike Heartbleed, which had been introduced into the  program not long before, affects all versions of OpenSSL, <strong>including  those that were patched to fix Heartbleed</strong>.</p>
<p>The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1.</p>
<p>All client versions of OpenSSL are vulnerable. The bug  was reported to  OpenSSL on May 1 via JPCERT/CC.</p>
<p>OpenSSL provides this advice:</p>
<ul>
<li>OpenSSL 0.9.8 DTLS users should upgrade to 0.9.8za</li>
<li>OpenSSL 1.0.0 DTLS users should upgrade to 1.0.0m</li>
<li>OpenSSL 1.0.1 DTLS users should upgrade to 1.0.1h</li>
</ul>
<p>Non-OpenSSL clients (IE, Firefox, Chrome on Desktop  and iOS, Safari etc) aren&#8217;t affected. None the less, all OpenSSL users  should be updating.</p>
<p>If you would like to have this vulerability patched please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/another-high-risk-openssl-vulnerability-has-been-discovered-one-month-after-heartbleed-chaos-ssltls-mitm-vulnerability-cve-2014-0224/feed/</wfw:commentRss>
		</item>
		<item>
		<title>Critical CentOS/RHEL 6 vulnerability found (CVE-2014-0196)</title>
		<link>http://blog.serverbuddies.com/important-centosrhel-6-vulnerability-found-cve-2014-0196/</link>
		<comments>http://blog.serverbuddies.com/important-centosrhel-6-vulnerability-found-cve-2014-0196/#comments</comments>
		<pubDate>Fri, 16 May 2014 15:22:46 +0000</pubDate>
		<dc:creator>Nick</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[CVE-2014-0196]]></category>

		<category><![CDATA[new centos exploit]]></category>

		<category><![CDATA[new el6 exploit]]></category>

		<category><![CDATA[new rhel exploit]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1478</guid>
		<description><![CDATA[The new memory-corruption vulnerability, allows unprivileged users to crash or execute malicious code on vulnerable systems and gain root privileges. The flaw resides in the n_tty_write function controlling the Linux pseudo tty device.
While the vulnerability can be exploited only by someone with an existing account, the requirement may not be hard to satisfy in hosting [...]]]></description>
			<content:encoded><![CDATA[<p><span>The new memory-corruption vulnerability, </span><span>allows unprivileged users to crash or execute malicious code on vulnerable systems and gain root privileges</span><span>. The flaw resides in the n_tty_write function controlling the </span><a href="http://linux.die.net/man/7/pty">Linux pseudo tty device</a><span>.</span></p>
<p><span>While the vulnerability can be exploited only by someone with an existing account, the requirement may not be hard to satisfy in hosting facilities that provide shared servers so an upgrade is mandatory.</span></p>
<p><span>This issue affects the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux / CentOS 6 prior to version kernel-2.6.32-358.6.2.el6</span></p>
<p>If you would like to have this vulerability patched or ensure your server is not affected, please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don’t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/important-centosrhel-6-vulnerability-found-cve-2014-0196/feed/</wfw:commentRss>
		</item>
		<item>
		<title>critical bug found in OpenSSL - Heartbleed</title>
		<link>http://blog.serverbuddies.com/critical-bug-found-in-openssl-heartbleed/</link>
		<comments>http://blog.serverbuddies.com/critical-bug-found-in-openssl-heartbleed/#comments</comments>
		<pubDate>Wed, 09 Apr 2014 01:18:31 +0000</pubDate>
		<dc:creator>SBDavid</dc:creator>
		
		<category><![CDATA[Security]]></category>

		<category><![CDATA[centos vulnerability]]></category>

		<category><![CDATA[heart bleed]]></category>

		<category><![CDATA[heartbleed bug]]></category>

		<category><![CDATA[openssl new bug]]></category>

		<category><![CDATA[openssl vulerability]]></category>

		<guid isPermaLink="false">http://blog.serverbuddies.com/?p=1477</guid>
		<description><![CDATA[A very serious vulnerability has just been discovered in OpenSSL, a very popular cryptographic library.
According to the freshly released security bulletin by The OpenSSL Project, a missing bounds check in the handling of the TLS Heartbeat Extension can be used to reveal up to 64k of memory to a connected client or server.
In practice, this [...]]]></description>
			<content:encoded><![CDATA[<p>A very serious vulnerability has just been discovered in OpenSSL, a very popular cryptographic library.</p>
<p>According to the freshly released security <a href="https://github.com/openssl/openssl/commit/7e840163c06c7692b796a93e3fa85a93136adbb2">bulletin</a> by The OpenSSL Project, a missing bounds check in the handling of the TLS Heartbeat Extension<strong> </strong>can be used to reveal up to 64k of memory to a connected client or server.</p>
<p>In practice, this allows the stealing of protected information by the SSL/TLS encryption used.</p>
<p>SSL/TLS protocols provide communication security and privacy over the  Internet for applications such as web, email, instant messaging (IM)  and some virtual private networks (VPNs). Attackers can steal secret  keys, user names and passwords, instant messages, emails and business’  critical documents and communication – all of this without leaving a  trace.</p>
<p>The Heartbleed bug allows anyone on the Internet to read the memory of  the systems protected by the vulnerable versions of the OpenSSL  software. This compromises the secret keys used to identify the service  providers and to encrypt the traffic, the names and passwords of the  users and the actual content. This allows attackers to eavesdrop on  communications, steal data directly from the services and users and to  impersonate services and users.</p>
<p>As of today, a number of Nix*-like operating systems are affected, since they are packaged with vulnerable OpenSSL:</p>
<ul>
<li>Debian Wheezy (Stable), OpenSSL 1.0.1e-2+deb7u4)</li>
<li>Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11)</li>
<li>CentOS 6.5, OpenSSL 1.0.1e-15)</li>
<li>Fedora 18, OpenSSL 1.0.1e-4</li>
<li>OpenBSD 5.3 (OpenSSL 1.0.1c) ? 5.4 (OpenSSL 1.0.1c)</li>
<li>FreeBSD 8.4 (OpenSSL 1.0.1e) ? 9.1 (OpenSSL 1.0.1c)</li>
<li>NetBSD 5.0.2 (OpenSSL 1.0.1e)</li>
<li>OpenSUSE 12.2 (OpenSSL 1.0.1c)</li>
</ul>
<p>Packages with older OpenSSL versions – Debian Squeeze (oldstable),  OpenSSL 0.9.8o-4squeeze14, SUSE Linux Enterprise Server – are free of  this flaw.</p>
<h4>What versions of the OpenSSL are affected?</h4>
<p>Status of different versions:</p>
<ul>
<li>OpenSSL 1.0.1 through 1.0.1f (inclusive) are vulnerable</li>
<li>OpenSSL 1.0.1g is NOT vulnerable</li>
<li>OpenSSL 1.0.0 branch is NOT vulnerable</li>
<li>OpenSSL 0.9.8 branch is NOT vulnerable</li>
</ul>
<p>If you would like to have this vulerability patched please purchase a 1x <a href="http://www.serverbuddies.com/hour-server-support.php">Hour of Support plan.</a></p>
<p>Don&#8217;t hesitate to contact us for any questions you may have through our <a href="http://www.serverbuddies.com/contact-us.php">Contact Form</a> page or <a href="javascript:void(window.open('https://www.serverbuddies.com/webchat/chat.php','','width=590,height=580,left=0,top=0,resizable=yes,menubar=no,location=no,status=yes,scrollbars=yes'))">LiveChat!</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.serverbuddies.com/critical-bug-found-in-openssl-heartbleed/feed/</wfw:commentRss>
		</item>
	</channel>
</rss>
