The UK’s National Cyber Security Centre has launched a Cyber League to monitor emerging cyber-threats
Yearly Archives: 2024
Smashing Security podcast #355: Fishy Rishi, 23andMe, and the labour of love
Has the British Prime Minister been caught secretly profiting from a cryptocurrency app? Were 23andMe right to blame their users after a data breach? And Indian men have hard feelings after falling for a money-for-sex scam.
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown’s Thom Langford.
Legends of IdleOn – I Reject Your RNG And Substitute My Own
Posted by Soatok Dreamseeker on Jan 17
Hello Full Disclosure mailing list!
Legends of IdleOn is a popular free-to-play game on Android, iOS, Steam,
and Web. While playing around with it last year, I got curious and noticed
a trivial way to manipulate the random number generator.
After six months of radio silence from the developer, including asking the
Discord moderators for help getting the developer’s attention, I’ve decided
to publish this publicly:…
Buffer over-read in dtls_sha256_update of TinyDTLS
Posted by Meng Ruijie on Jan 17
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. A buffer over-read exists in the dtls_sha256_update
function. This bug allows remote attackers to cause a denial of service (crash) and possibly read sensitive information
by sending a malformed packet with an over-large fragment length field, due to servers incorrectly handling malformed
packets.
[Vulnerability Type]
Buffer Overflow
[Vendor of…
Misues same epoch number within TCP lifetime in TinyDTLS
Posted by Meng Ruijie on Jan 17
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. DTLS servers allow remote attackers to reuse the
same epoch number within two times the TCP maximum segment lifetime, which is prohibited in RFC6347. This vulnerability
allows remote attackers to obtain sensitive application (data of connected clients).
[VulnerabilityType Other]
Improper Handling of exception conditions
[Vendor of Product]…
Assertion failure in check_certificate_request() of TinyDTLS
Posted by Meng Ruijie on Jan 17
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. An assertion failure in check_certificate_request()
causes the server to exit unexpectedly (a denial of service).
[VulnerabilityType Other]
Improper Handling of exception conditions
[Vendor of Product]
https://github.com/contiki-ng/tinydtls
[Affected Product Code Base]
contiki-ng tinydtls – master branch 53a0d97
[Affected Component]
the service of dtls…
Buffer over-read in TinyDTLS
Posted by Meng Ruijie on Jan 17
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. Incorrect handling of over-large packets in
dtls_ccm_decrypt_message() causes a buffer over-read that can expose sensitive information.
[Vulnerability Type]
Buffer Overflow
[Vendor of Product]
https://github.com/contiki-ng/tinydtls
[Affected Product Code Base]
contiki-ng tinydtls – master branch 53a0d97
[Affected Component]
the service of dtls servers…
Infinite loop leading to buffer overflow in TinyDTLS
Posted by Meng Ruijie on Jan 17
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. An infinite loop bug exists during the handling of a
ClientHello handshake message. This bug allows remote attackers to cause a denial of service by sending a malformed
ClientHello handshake message with an odd length of cipher suites, which triggers an infinite loop (consuming all
resources) and a buffer over-read that can disclose sensitive…
Mishandle epoch number in TinyDTLS servers
Posted by Meng Ruijie on Jan 17
About CVE-2021-42142:
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. DTLS servers mishandle the early use of a large
epoch number. This vulnerability allows remote attackers to cause a denial of service and false-positive packet drops.
[VulnerabilityType Other]
Improper Handling of exception conditions
[Vendor of Product]
https://github.com/contiki-ng/tinydtls
[Affected Product Code Base]…
Incorrect handshake in TinyDTLS
Posted by Meng Ruijie on Jan 17
About CVE-2021-42141:
[Suggested description]
An issue was discovered in Contiki-NG tinyDTLS through 2018-08-30. One incorrect handshake could complete with
different epoch numbers in the packets Client_Hello, Client_key_exchange, and Change_cipher_spec, which may cause
denial of service.
[VulnerabilityType Other]
Improper Handling of exception conditions
[Vendor of Product]
https://github.com/contiki-ng/tinydtls
[Affected Product Code…