Google Project Zero to Discover Ghostscript Vulnerability

Users of popular Linux distributers pre-installed apps are under the thread
23 August 2018   343

Researchers from Google Project Zero reported a vulnerbility in the Ghostscript - open-source interpreter for PostScript and PDF files. An attacker can gain access to applications and servers that work with meentioned software. There is no patch for the vulnerability, therefore, experts recommend turning off all crypters for .PS, .EPS, .PDF and .XPS by default in the policy.xml file.

Employee of the Google Division Tavis Ormandy said that the security hole exploits ways to bypass the isolated environment -dSAFER, through which cybercriminals can send a victim a file with malicious code. When a vulnerable version of Ghostscript opens such a file, the code contained in it will be executed, which will give an opportunity to take control over the management of applications and servers.

The vulnerability has already been confirmed by the developers of the interpreter - Artifex Software, and it does not have its own CVE-identifier yet.

Users of the ImageMagick, Evince and GIMP are at risk. These set of apps are included in many Linux distributions: RedHat, SUSE, Ubuntu, Fedora, FreeBSD, Debian, CentOS. Tavis Ormandi on Twitter to disable Ghostscript encoders for files with .PS, .EPS, .PDF and .XPS extensions in the policy.xml document:

Cloudflare to Develop IPFS Gateway

According to the developers, new gateway will allow to create P2P based websites
20 September 2018   80

Cloudflare told about the IPFS gateway, which will allow creating sites based on P2P network. The company said that access to content will be done without having to install special software on the devices.

As a technology feature, Cloudflare experts note decentralization. Using a standard network scheme with servers involves physical storage of data in one place. Hacking the server or damage to communications as a result of an emergency (for example, a natural disaster) will lead to inaccessibility of information or its loss. The same is threatened with information if the server owner has decided to refuse it.

Cloudflare Network
Cloudflare Network

The IPFS gateway combines computers, on each of which some information is stored, to the worldwide network. Therefore, the inaccessibility of one computer does not mean that the content can not be viewed or downloaded. Therefore, the key differences are two:

  1. With IPFS, anyone can freely post information instead of storing it on remote servers and paying for their services.
  2. Requests for access to data are carried out using cryptographic hashing, rather than by IP address. The query data is converted to a series of letters and numbers, by which the system finds the required files. For example, the query for any information will not like "get information that is located at IP address", but the kind "get information with hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy". This hash sum is part of the desired file and is on several computers.

The system automatically determines the authenticity of the file. If we take as an example a query with a hash sum QmXnnyufdzAWL5CqZ2RnSNgPbvCc1ALT73s6epPrRnZ1Xy, then when receiving the information it should remain the same. If the hash value differs, then the file has been changed. In other words, the hash-sum can be represented as a unique fingerprint:

IPFS Security
IPFS Security

Supporters of decentralization are also in a number of other companies. Mozilla employees believe that consumers should not be tied to a particular product, brand or platform. In early August 2018, developers published a version of the IoT gateway Things Gateway 0.5. In it, they realized the possibility of loading third-party icons and an interface for complex devices.