Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Debian: 2573-1: radsecproxy: SSL certificate verificatio

Nov13
by Ike on November 13, 2012 at 1:51 pm
Posted In: Other

(Nov 10) Ralf Paffrath reported that Radsecproxy, a RADIUS protocol proxy, mixed up pre- and post-handshake verification of clients. This vulnerability may wrongly accept clients without checking their certificate chain under certain configurations. [More…]

└ Tags: RADIUS, SSL, vulnerability
 Comment 

Ubuntu: 1626-2: Glance vulnerability

Nov13
by Ike on November 13, 2012 at 1:32 pm
Posted In: Other

(Nov 9) Glance could be made to delete arbitrary images.

 Comment 

Red Hat: 2012:1413-01: thunderbird: Important Advisory

Nov13
by Ike on November 13, 2012 at 1:06 pm
Posted In: Other

(Oct 29) An updated thunderbird package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More…]

└ Tags: Red Hat, security, update
 Comment 

Phishing attacks using HTML attachments

Nov13
by Ike on November 13, 2012 at 12:50 pm
Posted In: Netcraft Services

Netcraft has recently seen an increase in the number of phishing attacks using attached HTML forms to steal victims’ credentials. This type of attacks is not new – we have received reports of them from our phishing community since 2009 – but have become more popular amongst fraudsters during this year.

The attack works in a conventional way with the distinction that instead of linking to a form hosted on a web server, the form is attached to the mail.

Example drop site mail

A drop site phishing mail against Barclays customers asking the recipient to complete the attached form.

On opening the attachment, the form asks the victim to fill in their credentials. However, because the form is stored locally, it is less likely to be blocked by anti-phishing mechanisms. Some attachments also make use of obfuscated JavaScript to try and prevent anti-phishing software detecting the fraudulent content.

HTML form attachment screenshot

The form is hosted locally on the user’s own computer.

Nevertheless these phishing attacks still have to send the sensitive data to the fraudster. This communication is usually done by sending a POST request to a remote web server, which then processes the information. This POST request can be detected and blocked, thus the user can still be protected. For example, a web browser, or a piece of security software or spam filter can use Netcraft’s Phishing Site Feed to detect the phishing attack and block it.

Code Snippet

The form posts the details to a remote web-server.

These phishing attacks are sometimes referred to as “drop site” phishing attacks. This is because the only publicly accessible URL is a page into which the victim’s details are “dropped”. Drop sites can be difficult to recognise without the accompanying phishing mail. Usually, the “drop” page just processes the victim’s details and provides no indication as to its true nature. Some drop sites redirect to the target’s real website. This merits suspicion for anti-phishing groups, but may not provide enough evidence for them to block the URL without the accompanying mail.

HTTP Headers for an example drop site

Without the accompanying mail, the drop site URL appears to just be a page that redirects.

Netcraft has recently made improvements to its detection and handling of drop sites, which should be reported to Netcraft by forwarding the original phishing mail, including the HTML attachment(s), to [email protected].

As of 1st November 2012, the Netcraft Toolbar community has blocked over 5.5 million phishing attacks. To provide an incentive for the community to continue sending Netcraft reports of phishing sites, Netcraft currently sends reporters the following:

Prize When
Netcraft Branded Mug after 100 validated phishing reports
Netcraft Polo Shirt after 400
Targus Laptop Backpack after 1,000
iPad after 5,000

As a further incentive, reporters become eligible for a separate competition when they reach 5,000 validated reports. To track the progress, we have a leaderboard displaying the people with the largest number of accepted reports so far this month.

└ Tags: Netcraft Services
 Comment 

Upgrading PPA Beta #2 to RTM is now Available!

Nov13
by Ike on November 13, 2012 at 11:02 am
Posted In: Plesk, Releases

PPA team is pleased to introduce a tool for upgrading PPA Beta #2 to RTM version.

└ Tags: PPA, RTM
 Comment 
  • Page 2,794 of 2,986
  • « First
  • «
  • 2,792
  • 2,793
  • 2,794
  • 2,795
  • 2,796
  • »
  • Last »

What’s New?

  • Fedora 42: roundcubemail Important XSS Fix with Advisory ID 2025-fec36f9eaf
  • Fedora 42: Fix for Critical 7-Zip Remote Code Execution in RetroArch
  • Fedora 42: mingw-libsoup Critical Out-of-Bounds Read CVE-2025-11021
  • Fedora 42: mingw-python3 Critical Denial Service Fix CVE-2025-12084
  • Fedora 42: Fix for Important Integer Overflow Vulnerability in mingw-glib2
  • Fedora 43: mingw-libsoup Security Update for CVE-2025-11021 Advisory
  • Fedora 42 pgadmin4 Critical Remote Code Exec Fix 2025-b08763f674
  • Fedora: Gobuster Critical Update Released for CVE-2025-58188 Advisory
  • Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294
  • Debian Trixie WordPress Security Advisory DSA-6091-1 for CVE-2025-58246
  • Debian: Chromium Important Code Exec and Info Disclosure DSA-6089-1
  • Debian Trixie: php8.4 Important DoS Memory Disclosure DSA-6088-1
  • Fedora 42: uriparser CVE-2025-67899 Fix for Unbounded Recursion Issue
  • Fedora 42: util-linux Critical Buffer Overflow CVE-2025-14104 Advisory
  • Fedora 42: mqttcli Update 0.2.8 Critical Integer Overflow Issues
  • Fedora 42: Chromium High CVE-2025-14765 Out of Bounds Security Risks
  • Debian: Roundcube Important XSS and Information Leak Fix DSA-6087-1
  • Debian: MediaWiki DSA-6085-1 Security Updates for DoS and XSS
  • Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282
  • Plesk 2025: A Year in Review
  • Ubuntu 24.04: Linux Xilinx Important Kernel Security Fix USN-7931-4
  • Ubuntu 22.04 LTS: Linux Kernel Critical Fix for Raspberry Pi USN-7928-4
  • Ubuntu 18.04 LTS – Oracle Kernel Critical Security Flaws USN-7922-3
  • Ubuntu 24.04: Advisory USN-7921-2 for Real-time Kernel CVE-2025-39946
  • Debian Trixie: c-ares Critical Denial of Service Advisory DSA-6084-1

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

52 queries. 8.75 mb Memory usage. 0.306 seconds.