This has been a rough quarter for Office vulnerabilities… there seems to be a pattern, Microsoft patch day, then…. zero-day exploit within a week for an Office component. First Word, then Excel and now this month our vulnerable app is Powerpoint. The Security Fix has some coverage and notes the pattern – the likely motivation is so that there will be more time to exploit before the vulnerability is patched. The moral of the story is to be suspicious of Powerpoint attachments/files from untrusted sources. i.e. verify that you should be receiving an attachment even from KNOWN sources.
Tag: KNOWN
-
Detecting Rootkits on a Linux machine
Rootkits are a piece (or pieces) of software that someone can be used once a system is compromised to a) regain access to a system and b) remove traces of a compromise and c) many times hide itself. There are some tools for linux based systems that can be run to detect traces of rootkits and probably the best known is a tool called chkrootkit. I’ve know of it for what seems like years now and it can run a relatively quick test for traces of a wide range of KNOWN linux rootkits.