Zum Inhalt wechseln

Als Gast hast du nur eingeschränkten Zugriff!


Anmelden 

Benutzerkonto erstellen

Du bist nicht angemeldet und hast somit nur einen sehr eingeschränkten Zugriff auf die Features unserer Community.
Um vollen Zugriff zu erlangen musst du dir einen Account erstellen. Der Vorgang sollte nicht länger als 1 Minute dauern.

  • Antworte auf Themen oder erstelle deine eigenen.
  • Schalte dir alle Downloads mit Highspeed & ohne Wartezeit frei.
  • Erhalte Zugriff auf alle Bereiche und entdecke interessante Inhalte.
  • Tausche dich mich anderen Usern in der Shoutbox oder via PN aus.
 

   

Foto

'Unauthorized code' that decrypts VPNs found

- - - - -

  • Bitte melde dich an um zu Antworten
2 Antworten in diesem Thema

#1
SourceKing

SourceKing

    Lamer

  • Banned
  • PIPPIPPIP
  • Likes
    7
  • 17 Beiträge
  • 3 Bedankt
  • Android, Android [root], iPhone
  • Windows, Linux, Mac OS

Juniper Networks has admitted that †œunauthorized code† has been found in ScreenOS, the operating system for its NetScreen firewalls.

 

The code †œcould allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections.†

 

And on reading of the situation, the unauthorised code may have been present since 2008, an assertion we make because Juniper's notice about the problem says it impacts ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20. ScreenOS 6.2 was released in 2008. Screen OS 6.3 came out in 2009.

 

We've asked Juniper if it has any theories about the origin of the code and have been told the company has nothing to say on the matter beyond the post we've linked to above and canned statements from its PR team.

 

Just what happened is therefore obscure for now, but the obvious scenarios aren't good news for Juniper.

 

The first scenario we're considering is an internal SNAFU that saw rejected code left in production releases of ScreenOS. That's an unfortunate error with potentially terrifying consequences, but also a rather "better" reason than our second scenario: parties unknown snuck the code into ScreenOS in order to do ill to Juniper customers. Would such malfeasants have done so in hope of finding something interesting, or in order to target known Juniper users?

 

Whatever the source of the code, the fact remains that a major vendor's security appliances have been revealed †“ by the vendor †“ to contain very dangerous code about which it knew nothing. For years. During which time customers' confidential communications may well have been monitored.

 

Juniper's issued an out-of-band patch for the problem and strongly recommends its application †œas soon as possible.†

 

 

Source:

Please Login HERE or Register HERE to see this link!


Bearbeitet von SourceKing, 19 December 2015 - 13:40 Uhr.

A wizard is never late, nor is he early, he arrives precisely when he means to >;)

 


#2
lNobodyl

lNobodyl

    Hacktivist

  • Premium Member
  • Likes
    55
  • 67 Beiträge
  • 22 Bedankt
  • iPhone
  • Windows, Mac OS

Please add your source to your post. :)


  • Crap gefällt das
Kind regards,

Nobody

nobody@xmpp.ninja


#3
SourceKing

SourceKing

    Lamer

  • Banned
  • PIPPIPPIP
  • Likes
    7
  • 17 Beiträge
  • 3 Bedankt
  • Android, Android [root], iPhone
  • Windows, Linux, Mac OS

My mistake have edit post :) Ty


  • lNobodyl gefällt das

A wizard is never late, nor is he early, he arrives precisely when he means to >;)

 




  Thema Forum Themenstarter Statistik Letzter Beitrag

Besucher die dieses Thema lesen:

Mitglieder: , Gäste: , unsichtbare Mitglieder:


This topic has been visited by 23 user(s)


    Ar@m!s, blue_eyed_devil, bumg2, Bypass, Caruso, casamonica, ChEeTaH182, Crap, easysurfer, Framerater, Hydra, JohnR, lNobodyl, loginman1, madamor45xx, notfound, PaulaAbdul, pdr0, R3s1stanc3, SepaX, shiznith, SourceKing, Take1T
Die besten Hacking Tools zum downloaden : Released, Leaked, Cracked. Größte deutschsprachige Hacker Sammlung.