BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:
microsoft

Internet Explorer execCommand Use-After-Free

Disclosed September 17, 2012    Fully Patched
Vendors: Microsoft
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:
Categories:
Zeroday Tracker
img-63

New Integration of Retina CS & PowerBroker Windows to Provide Context-Aware Privilege Management

Posted September 16, 2012    Peter McCalister

Every day there are new vulnerabilities being discovered that can be used to compromise your organizations computing environment.

Categories:
General
Tags:
, , ,
trendmicro

Trend Micro InterScan Messaging Multiple Vulnerabilities

Disclosed September 13, 2012    No Patch Available
Vendors: Trend Micro
Vulnerability Severity: Medium
Exploit Impact: Cross-Site Request Forgery, Cross-Site Scripting
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
9.11

September 11th – Lest We Forget.

Posted September 11, 2012    Marc Maiffret

Today marks the 11 year anniversary of the “September 11th” attacks. It is on these days of remembrance that our memory serves as a tool to heal us, to free us from the emotional burdens that can keep us from moving forward. This happens not by allowing these memories to fade from our consciousness, but…

Categories:
General
Tags:
, , , , , , ,
scanner-ui

Xen Server Escape Exploit News

Posted September 10, 2012    Jerome Diggs

In today’s ever expanding virtualized data center it’s critical to ensure hypervisors/host systems are properly secured and patched to prevent bleed over into often dense populations of the corporate infrastructure.  According to a recent blog post on Threatpost, French research firm VUPEN security has revealed exploit code that takes advantage of a vulnerability in Xen…

Categories:
General
Tags:
, , , , , , , , , , , ,
img13

4 Tips to Identify, Patch & Report on the Oracle Java Vulnerability

Posted September 7, 2012    Jerome Diggs

Last week our security research team provided some very enlightening information on a nasty Oracle Java vulnerability that until recently was a zero-day.  Oracle provided a patch for the vulnerability found in advisory (CVE-2012-4681)  and as a follow-up to the blog post by our security research team we wanted to share with you some easy…

Categories:
Vulnerability Management
Tags:
, , , , ,
helpdesk

Helpdesk Troubleshooting with PowerBroker

Posted September 5, 2012    Peter McCalister

In the past, organizations would rely on helpdesk technicians walking from desktop to desktop to troubleshoot desktop problems for end users. Nowadays, “Sneakernet” is almost dead, and helpdesks are levering remote control products to troubleshoot problems for end users. Remote control is great for troubleshooting, but when a user is running as a standard user…

Categories:
General
cyberlink

CyberLink StreamAuthor Insecure Library Loading Vulnerability

Disclosed September 3, 2012    Zeroday : 696 days
Vendors: CyberLink
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability: Publicly Available
Categories:
Zeroday Tracker
Java-Logo

Java Pwns Everyone…Again.

Posted August 30, 2012    BeyondTrust Research Team

Java has a nasty habit of getting you owned. This latest 0day is no exception to the long-lived trend of reliable Java-based exploitation. Here’s what you need to know: The current exploitation method being employed in the wild right now leverages two zero day flaws in Java. The first flaw leverages an implementation issue (logic bug) within ClassFinder.findClass(), which is only present in Java 7.

Categories:
Vulnerability Management
Tags:
, , , , , , , ,
ScanMetrics-screenshot

Apache 2.4.x XSS and Back-end Connection Vulnerabilities News

Posted August 28, 2012    Peter McCalister

Two new audits have been released recently in our Retina vulnerability scan engine to close a security vulnerability that can enable an attacker to upload files remotely via a XSS flaw or lead to privacy issues because of a back end connection closing issue (CVE-2012-2687 and CVE-2012-3502, respectively). These two new audits have been released…

Categories:
General