Skip to main content

Posts

Microsoft Issues Emergency Patch For Critical Flaw In Windows Containers. Just a few days prior to its monthly patch release, Microsoft released an emergency patch for a critical vulnerability in the Windows Host Compute Service Shim (hcsshim) library that could allow remote attackers to run malicious code on Windows computers. Windows Host Compute Service Shim (hcsshim) is an open source library that helps "Docker for Windows" execute Windows Server containers using a low-level container management API in Hyper-V. Discovered by Swiss developer and security researcher Michael Hanselmann, the critical vulnerability (tracked as CVE-2018-8115) is the result of the failure of the hcsshim library to properly validate input when importing a Docker container image. This, in turn, allows an attacker to remotely execute arbitrary code on the Windows host operating system, eventually letting the attacker create, remove, and replace files on the target host. As Hanselmann explained in his personal blog, "Importing a Docker container image or pulling one from a remote registry isn't commonly expected to make modifications to the host file system outside of the Docker-internal data structures." Hanselmann reported the issue to Microsoft in February this year, and the tech giant fixed the vulnerability a few days before this month’s patch Tuesday by releasing an updated version of hcsshim. Although the vulnerability has been assigned a critical severity rating, Microsoft says exploitation of this issue is unlikely. "To exploit the vulnerability, an attacker would place malicious code in a specially crafted container image which, if an authenticated administrator imported (pulled), could cause a container management service utilizing the Host Compute Service Shim library to execute malicious code on the Windows host," Microsoft says in its advisory. The patch for this vulnerability addresses the way hcsshim validates input from Docker container images, therefore blocking the loading of malicious code in specially crafted files. An updated version 0.6.10 of the Windows Host Compute Service Shim (hcsshim) file is available right now for download from GitHub. Full details of the vulnerability have not been released yet, but Hanselmann promises to publish in-depth technical details and a proof-of-concept exploit for the flaw on May 9, following an agreement with Microsoft security response center. Microsoft's May 2018 Patch Tuesday has been scheduled for release on May 8.

Microsoft Issues Emergency Patch For Critical Flaw In Windows Containers . Just a few days prior to its monthly patch release, Microsoft released an emergency patch for a critical vulnerability in the Windows Host Compute Service Shim (hcsshim) library that could allow remote attackers to run malicious code on Windows computers. Windows Host Compute Service Shim (hcsshim) is an open source library that helps "Docker for Windows" execute Windows Server containers using a low-level container management API in Hyper-V. Discovered by Swiss developer and security researcher  Michael Hanselmann , the critical vulnerability (tracked as CVE-2018-8115) is the result of the failure of the hcsshim library to properly validate input when importing a Docker container image. This, in turn, allows an attacker to remotely execute arbitrary code on the Windows host operating system, eventually letting the attacker create, remove, and replace files on the target host. As Hanselmann  explained

WATCH VIDEO. Video sent from Whatsapp. The first Cuban doctors at work.

via Instagram https://ift.tt/2HLD7zd

MUSEVENI IN 1985 IN NAIROBI. The problem in Uganda, especially in the leadership is mainly from the North. The Acholis are everywhere, in the army, big offices, police etc. These people must be sorted out. Is the leadership situation today any different than Museveni complained about in 1985? What did Museveni do to change it?. He used force. What are we waiting for?

via Instagram

MUSEVENI IN 1985 IN NAIROBI. The problem in Uganda, especially in the leadership is mainly from the North. The Acholis are everywhere, in the army, big offices, police etc. These people must be sorted out. Is the leadership situation today any different than Museveni complained about in 1985? What did Museveni do to change it?. He used force. What are we waiting for?

via Instagram

Details are inside, click on this photo to read.

HACKER WHO HACKED JAIL SYSTEMS TO RELEASE HIS FRIEND 'EARLY', GETS 7 YEARS IMPRISONMENT. **** By my friends in HACKER world**** Remember a young hacker who hacked jail systems in an attempt to release his prison inmate early? Well, that hacker will now be joining his inmate behind bars. Konrads Voits of Ypsilanti, Michigan, has been sentenced to seven years and three months in prison for attempting to hack the Washtenaw County Jail computer system and modifying prison records to get his friend released early. Besides spending 87 months in prison, Voits has also been ordered to pay $235,488 in fine to Washtenaw County for the cost accrued in investigating and cleaning up the infiltration that resulted in the compromise of personal information of around 1,600 employees, the US Justice Department announced last week. Between January 24th, 2017 and March 10th, 2017, Voits successfully tricked IT staff at Washtenaw County Jail into visiting a phony website at "ewashtenavv.org," which mimics the official URL, "ewashtenaw.org." The malicious website then installed malware on the IT staff computer that eventually gave Voits complete control over the Jail's network, allowing him to steal search warrant affidavits and personal details of over 1,600 employees, including names, email addresses, and passwords. Besides this, Voits also accessed the Washtenaw County Jail records and altered the electronic records of at least one inmate for early release. However, things did not work as Voits wanted them to. An IT employee cross-checked the release date of the inmate with hand-kept records and detected changes in the records. He alerted the FBI, who arrested Voits a month later. "Thanks to the quick response of the IT employees at Washtenaw County, and to the careful review of records by employees at the Washtenaw County Jail, nobody was released early," the DoJ said last week. "Washtenaw County spent thousands of dollars and numerous extra work hours responding to and investigating the breach, resulting in a loss of at least $235,488." The 27-year-old Michigan man pleaded guilty to one federal charge of damaging a protected computer in December last year and has now been jailed for seven years and three months behind bars, alongside up to 3 years of supervised release. Voits has also agreed to surrender his belongings he used during the attack, including his laptop, four mobile phones (using which he called prison staff), $385.49 worth of Bitcoin, and one "Green Integrated Circuit Component, Serial No. Y21A2123".

HACKER WHO HACKED JAIL SYSTEMS TO RELEASE HIS FRIEND 'EARLY', GETS 7 YEARS IMPRISONMENT. **** By my friends in HACKER world**** Remember a young hacker who hacked jail systems in an attempt to release his prison inmate early? Well, that hacker will now be joining his inmate behind bars. Konrads Voits  of Ypsilanti, Michigan, has been sentenced to seven years and three months in prison for attempting to hack the Washtenaw County Jail computer system and modifying prison records to get his friend released early. Besides spending 87 months in prison, Voits has also been ordered to pay $235,488 in fine to Washtenaw County for the cost accrued in investigating and cleaning up the infiltration that resulted in the compromise of personal information of around 1,600 employees, the US Justice Department  announced  last week. Between January 24th, 2017 and March 10th, 2017, Voits successfully tricked IT staff at Washtenaw County Jail into visiting a phony website at "ewashtenavv.or

Details are inside, click on this photo to read.