<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#187; IT Vulnerability</title>
	<atom:link href="http://bcognizance.iiita.ac.in/archive/aug-nov14/?cat=9&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/aug-nov14</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:56:11 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Bash Vulnerability</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=778</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=778#comments</comments>
		<pubDate>Fri, 14 Nov 2014 08:27:07 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[IT Vulnerability]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=778</guid>
		<description><![CDATA[What is Bash Vulnerability? Bash Vulnerability, or Shellshock, as the name suggests, attacks Bash which is used to execute scripts and commands by UNIX based systems. Bash is free and often used as the built in command line interface distributed with the Linux. Environment variables are defined in Bash along with the scripts and functions<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=778" title="Read Bash Vulnerability">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p><strong>What is Bash Vulnerability?</strong></p>
<p>Bash Vulnerability, or Shellshock, as the name suggests, attacks Bash which is used to execute scripts and commands by UNIX based systems. Bash is free and often used as the built in command line interface distributed with the Linux. Environment variables are defined in Bash along with the scripts and functions which can be executed. An attacker if allowed to execute Bash, could also execute other arbitrary commands or scripts or other exploits without the knowledge of the user.</p>
<p><strong>How it affects the system?</strong></p>
<p>Thus, Bash vulnerability allows remote code execution through a lot of default configurations and is a serious risk to a wide range infrastructure on the Internet and the severity is extreme as bash is part of the default configuration of most Linux servers. </p>
<p>Bash is commonly used in UNIX software packages or servers such as web and mail and it is not commonly allowed to be accessed by external users. Only the system administrators and the maintenance crew use Bash to administrate their servers as well as perform the maintenance works.</p>
<p>This doesn&#8217;t sound so bad right? But in truth, if any external user sends any carefully and specifically formatted request to the web server, the servers than pass it on to Bash. This is when the problem begins to show itself. The carefully formatted request, when it reaches Bash, can now execute and programmed scripts or commands on the Bash shell even though it doesn&#8217;t have any security or access level clearances.</p>
<p><strong>Future of Bash/Shellshock bug?</strong></p>
<p>A patch was released which allowed Unix and OS X users to update their BASH shell to fix this vulnerability. However, it isn&#8217;t a complete fix. The patch only makes it harder to exploit the vulnerability while it still exists. Millions of user remain at risk and any systems that haven&#8217;t been patched yet can be compromised. A hacker community with resources may exploit this bug to create wide scale panic and affect the systems. </p>
<p><strong>How do we fix it?</strong></p>
<p>Although no complete solution has been found yet, the easiest way to protect yourself from Shellshock is to update Bash. That&#8217;s it. If not a complete fix, it mitigates the risk and makes it much harder to exploit.<br />
An easy way to check if the vulnerability exists is to run the command line:<br />
env &#8216;VAR=() { :;}; echo Bash is vulnerable!&#8217; &#8216;FUNCTION()=() { :;}; echo Bash is vulnerable!&#8217; bash -c &#8220;echo Bash Test&#8221;<br />
A &#8220;Bash is vulnerable!&#8221; output means the vulnerability exists. Ubuntu/Debiandistros can update their bash using the following command line:<br />
sudo apt-get update &#038;&#038;sudo apt-get install &#8211;only-upgrade bash</p>
<blockquote><p><strong><em>Arshad Ahmed<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=778</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Finding Security Vulnerabilities in Web Applications with Taint Analysis</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=776</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=776#comments</comments>
		<pubDate>Fri, 14 Nov 2014 08:24:45 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[IT Vulnerability]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=776</guid>
		<description><![CDATA[Security vulnerabilities in Web applications such as SQL injections, cross-site scripting, and HTTP splitting attacks often stem from unchecked input, and also due to the vulnerabilities residing in Java libraries. In the past, studies had focused on guarding against problems caused by the unsafe nature of C, such as buffer overruns and format string vulnerabilities.<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=776" title="Read Finding Security Vulnerabilities in Web Applications with Taint Analysis">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Security vulnerabilities in Web applications such as SQL injections, cross-site scripting, and HTTP splitting attacks often stem from unchecked input, and also due to the vulnerabilities residing in Java libraries. In the past, studies had focused on guarding against problems caused by the unsafe nature of C, such as buffer overruns and format string vulnerabilities. However, nowadays, Java has emerged as the language of choice of programmers for building large Web applications. It is more secure as it doesn’t allow direct memory access and also eliminate buffer overrun problem. In spite of Java’s secure nature, a simple programming mistake could leave a Web application vulnerable to unauthorized data access, and application crashes leading to DDOS attacks, which are very difficult to handle. Code reviews are often used to find vulnerabilities before running an application. However, they are often time consuming. Static Analysis can be performed for checking the untrustworthiness of the input. Eclipse supports SOOT that is used for performing Taint checking on Java Byte code. A Jimple i.e. Three Address Code representation of Java program is analysed statically using SOOT plugin of Eclipse. In Taint Analysis, input is considered to be tainted. Our aim is to find the propagation of taint i.e. we want to find all variables which are affected by the source variables. Finally, we check if the vulnerable functions are influenced. We refer to them as ‘sink’. Injecting malicious data is possible through Parameter Tampering, URL Tampering, Hidden Field Manipulation, HTTP Header Manipulation, and Cookie Poisoning. Once, malicious data has been injected it can be exploited through Cross-site Scripting Vulnerabilities, HTTP Response Splitting and Shell Script Injection.</p>
<p>SQL Injection Example:<br />
1 HttpServletRequest request = &#8230;;<br />
2 Statement s = &#8230;;<br />
3 String client = request.getParameter(‘‘client’’);<br />
4 StringBuffer s1 = &#8230;;<br />
5 s1.append (”SELECT ∗ FROM Users WHERE name =”);<br />
6 s1.append (user);<br />
7 String query = s1.toString ();<br />
8 s.executeQuery(query);</p>
<p>SQL injection is one of the vulnerabilities that can be expressed as tainted object propagation problems. An object is tainted if it is obtained by applying relation derived to a source object zero or more times. In our example, if a tainted object is passed as a parameter i.e. the return value of HttpServletRequest.getParameter() to Statement.executeQuery(String p) (the sink), then there is a security vulnerability. Datalogqueries gives user complete control. On other hand it exposes program’s internal representation. So it is considered less practical. Instead, we use PQL, a program query language. PQL serves as syntactic sugar for Datalog queries, allowing users to express vulnerability patterns in a familiar Java-like syntax; we can then easily translate tainted object propagation queries from PQL into Datalog.</p>
<p>Penetration testing and runtime monitoring integrated with static taint analysis seems to be a promising approach for finding vulnerabilities besides manual code reviews.</p>
<blockquote><p><strong><em>Niharika Gupta,<br />
M.Tech, Computer Science Engineering<br />
Indraprastha Institute of Information Technology, Delhi<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=776</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Zero day vulnerability management</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=773</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=773#comments</comments>
		<pubDate>Fri, 14 Nov 2014 08:23:02 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[IT Vulnerability]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=773</guid>
		<description><![CDATA[With the use of big data in many firms the vulnerabilities, threats and the risk involved with the data also goes to an extended height. There are various system holes which give attackers an advent opportunity to infiltrate the corporate system and fetches out the confidential information of the firm. A zero-day attack is the<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=773" title="Read Zero day vulnerability management">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>With the use of big data in many firms the vulnerabilities, threats and the risk involved with the data also goes to an extended height. There are various system holes which give attackers an advent opportunity to infiltrate the corporate system and fetches out the confidential information of the firm.</p>
<p>A zero-day attack is the one that exploits the unknown vulnerability of the system prior to the knowledge of software maker about the flaws. The known targets are telecom, government, NATO, Energy and academic. Although the bug bounty tries to point out the flaws as soon as possible but sometimes because of the non-availability of the security patches the attackers get to know about the unknown vulnerabilities and hence it is called as zero-day. The vulnerability window length may vary from 1 day to 10 years or more on an average it is around 10 months. Microsoft releases its security patches on every second Tuesday of the month. By analysing this patch the attackers immediately exploits the previous vulnerability and with this comes the term ‘exploit Wednesday’.  The exploiters use various techniques such as Fuzz Technology to find out the bugs and snoop through PC.  In the recent updates FireEye revealed the campaign of Russianattackers exploited two zero-day bugs for 32-bit windows which were impacted by the TTF flaw in the office documents. The attack vectors used by malware writers have made Microsoft to release MS14-058 for TTF flaw in office document and MS14-060 for OLE package to protect the systems. One of the major concern is for windows XP users as Microsoft has declared that it would discontinue the support for windows XP and it will have zero-day forever because of reverse engineered secure patch for the newer versions of windows. </p>
<p>US-CERT is an organisation which analyses the cyber threat and reduce the vulnerabilities and coordinate the incident response activities as well as has an expertise to target on the the malicious activities on the networks. As a protection scheme by any organisation against the zero day threat it is advisable to follow the guidelines provided by US-CERT. </p>
<p>There are several tactics given below for a zero day offense<br />
1.	Using more robust form of vulnerability management system and having resilient layers to protect against the zero day attack.<br />
2.	Having well configured firewalls<br />
3.	Providing full protection to the critical systems<br />
4.	Identification of the threat at an early stage<br />
5.	The testing of software codes at a more advance level.</p>
<blockquote><p><strong><em>Archita Srivastava<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=773</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
