Skip to main content

Posts

Showing posts with the label vulnerabilities

Multiple Critical Security Vulnerabilities Discovered In Linux Systemd

Researchers have discovered some serious security flaws threatening Linux. These vulnerabilities exist in Linux systemd component. According to the researchers, the vulnerabilities pose a risk to all systemd-based Linux distros. Linux Systemd Barraged With Multiple Vulnerabilities Allegedly, researchers at Qualys have disclosed some bugs targeting the Linux systemd component. Systemd provides the core building blocks for Linux and handles major processes after booting. As revealed, three vulnerabilities have targeted the systemd-journald, which is responsible for data collection and log storage. The vulnerabilities let an attacker gain root privileges on the target device. The researchers state that these vulnerabilities threaten all Linux distros based on systemd except a few. As stated in their  report , “To the best of our knowledge, all systemd-based Linux distributions are vulnerable, but SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29 are not explo

Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers

Once again, MikroTik Routers make it into the news. Allegedly, a researcher discovered several vulnerabilities in MikroTik Routers that could result in a complete system compromise. Moreover, he also found a new way to exploit a previously discovered vulnerability through which an attacker could gain root access to the device. Vulnerabilities In RouterOS Used In MikroTik Routers A researcher at Tenable has discovered several vulnerabilities in the Mikrotik Routers. Precisely, he discovered four different security flaws in the RouterOS that could trigger hacking attacks. As discovered by Jacob Baines, the Tenable researcher, the Mikrotik’s operating system RouterOS had around four different security flaws. These include a remote code execution vulnerability (CVE-2018-1156), File upload memory exhaustion flaw (CVE-2018-1157), recursive JSON parsing stack exhaustion (CVE-2018-1158), and www memory corruption (CVE-2018-1159). All these vulnerabilities, despite being different,