Home Tags Marvel

Tag: Marvel

Spiderman closes out PlayStation E3 presser with web-slinging awesomeness

Skyrim VR, God of War, new Shadow of the Colossus remaster, and much more.

14% off LEGO Marvel Super Heroes for PlayStation 4 and Xbox...

Smash, swing and fly in the first LEGO videogame featuring more than 100 of your favorite super heroes and villains from the Marvel Universe.
In single and multiplayer modes, travel across a LEGO New York and visit key locations from the Marvel univers...

Universal’s Dark Universe risks being yet another extended universe franchise

Already, red flags: no Dracula; no great protagonists; the shadow of Monster Squad.

Decrypted: American Gods gives us a spider we can’t forget

In the new episode of our TV podcast, we discuss the gods of slaves, television, and DC Comics.

Power Rangers film would’ve been better as a CW series

A phenomenal teen-acting ensemble gets screwed by feature-length aspirations, bad VFX.

First trailer for Netflix’s Iron Fist series is oddly bland

So far it's not breaking out of the mold like Jessica Jones and Luke Cage did.

Avengers-like team of Square Enix devs are making next Avengers game

Deal marks beginning of “multi-game” deal with Marvel.

D-Link DWR-932 B owner? Trash it, says security bug-hunter

More than 20 vulns in SOHOpeless LTE gateway If you've got a D-Link DWR-932 B LTE router, you might want to fire it into the sun – or hope that a firmware upgrade lands soon. Following the consumer broadband industry's consistently lackadaisical attitude to security, the device suffers from everything from backdoor accounts to default credentials, leaky credentials, firmware upgrade vulns and insecure UPnP. Pierre Kim outlines the litany of SOHOpelessness here, noting that many of the vulns are inherited from the Quanta LTE device that forms the basis of the badge-engineered marvel. The messes Kim found include: SSH and the telnet daemon are enabled by default, with two backdoor accounts (admin:admin, and root:1234); If an attacker sends a crafted UDP string to the appmgr program, it will launch telnetd; The Wi-Fi Protected Setup (WPS) has a hard-coded PIN (28296607); Should a user decide to generate a different temporary WPS PIN, Kim writes, it's a weak PIN because it's based on srand(time(0)); The HTTP daemon, qmiweb is a horror that inherits five vulnerabilities from the Quanta device; Its remote firmware over-the-air update mechanism uses hardcoded credentials (qdpc:qdpc, qdpe:qdpe and qdp:qdp); and For the full set of steak knives: the UPnP configuration allows any user on the LAN to add their own port forwarding rules. There's more, but the killer Kim points out is that the router has a big processor and lots of memory, and is so badly secured it would be trivial to recruit it into a botnet. Kim says he contacted D-Link in June, and with no update forthcoming, he says he obtained CERT's advice to publish the vulns. ®

RHSA-2016:1943-2: Important: kvm security update

An update for kvm is now available for Red Hat Enterprise Linux 5.Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. KVM (for Kernel-based Virtual Machine) is a full virtualization solution forLinux on x86 hardware. Using KVM, one can run multiple virtual machines runningunmodified Linux or Windows images.

Each virtual machine has private virtualizedhardware: a network card, disk, graphics adapter, etc.Security Fix(es):* An out-of-bounds read/write access flaw was found in the way QEMU's VGAemulation with VESA BIOS Extensions (VBE) support performed read/writeoperations using I/O port methods.

A privileged guest user could use this flawto execute arbitrary code on the host with the privileges of the host's QEMUprocess. (CVE-2016-3710)* Quick Emulator(QEMU) built with the virtio framework is vulnerable to anunbounded memory allocation issue.
It was found that a malicious guest usercould submit more requests than the virtqueue size permits. Processing a requestallocates a VirtQueueElement results in unbounded memory allocation on the hostcontrolled by the guest. (CVE-2016-5403)Red Hat would like to thank Wei Xiao (360 Marvel Team) and Qinghao Tang (360Marvel Team) for reporting CVE-2016-3710 and hongzhenhao (Marvel Team) forreporting CVE-2016-5403. For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258Note: The procedure in the Solution section must be performed before this updatewill take effect.RHEL Desktop Multi OS (v. 5 client) SRPMS: kvm-83-276.el5_11.src.rpm     MD5: 184ec1bd563381d705aece55ff297fc9SHA-256: bee01bdf5d0265082a898780154cfdccacdf5c08a77c1fbcc531f86fc0167bd9   x86_64: kmod-kvm-83-276.el5_11.x86_64.rpm     MD5: 0de0b74e24f36856154c36665a6f2bb2SHA-256: c66d341ccba983fdd9609806746975de54133b6ef8284a8aac343e33219d734a kmod-kvm-debug-83-276.el5_11.x86_64.rpm     MD5: 0731d90a6019acaff8f9a9b497ccd711SHA-256: f8efd16e180a182604754d74f56baa86989c66248dfe9539d1a37c5e03828b80 kvm-83-276.el5_11.x86_64.rpm     MD5: 15239f782cc51109aaa127ca836e6345SHA-256: 0bf2bbdcbe0b8f3dad3533a644eeb3b275087468c1044c46490d5510774108ae kvm-debuginfo-83-276.el5_11.x86_64.rpm     MD5: 3a83aa0ff0be3c22abbcab370567cf9dSHA-256: 4bef7af13a7f6bba4cc137211d2d50b082ed66dc6373cc1cea10332a464fda31 kvm-qemu-img-83-276.el5_11.x86_64.rpm     MD5: 73b60ef46a478029a6521be2731253f3SHA-256: bef7e25d66d9d2363932a464f7e9d9370bc15dc5f247eee02c49455d7bbb36fe kvm-tools-83-276.el5_11.x86_64.rpm     MD5: 65f02b3c895cdd864e3d6f3f279a8404SHA-256: e42334787afae25919b24ddba3228aa032ed5adf6b7e54b6ef07686f8883bc92   RHEL Virtualization (v. 5 server) SRPMS: kvm-83-276.el5_11.src.rpm     MD5: 184ec1bd563381d705aece55ff297fc9SHA-256: bee01bdf5d0265082a898780154cfdccacdf5c08a77c1fbcc531f86fc0167bd9   x86_64: kmod-kvm-83-276.el5_11.x86_64.rpm     MD5: 0de0b74e24f36856154c36665a6f2bb2SHA-256: c66d341ccba983fdd9609806746975de54133b6ef8284a8aac343e33219d734a kmod-kvm-debug-83-276.el5_11.x86_64.rpm     MD5: 0731d90a6019acaff8f9a9b497ccd711SHA-256: f8efd16e180a182604754d74f56baa86989c66248dfe9539d1a37c5e03828b80 kvm-83-276.el5_11.x86_64.rpm     MD5: 15239f782cc51109aaa127ca836e6345SHA-256: 0bf2bbdcbe0b8f3dad3533a644eeb3b275087468c1044c46490d5510774108ae kvm-debuginfo-83-276.el5_11.x86_64.rpm     MD5: 3a83aa0ff0be3c22abbcab370567cf9dSHA-256: 4bef7af13a7f6bba4cc137211d2d50b082ed66dc6373cc1cea10332a464fda31 kvm-qemu-img-83-276.el5_11.x86_64.rpm     MD5: 73b60ef46a478029a6521be2731253f3SHA-256: bef7e25d66d9d2363932a464f7e9d9370bc15dc5f247eee02c49455d7bbb36fe kvm-tools-83-276.el5_11.x86_64.rpm     MD5: 65f02b3c895cdd864e3d6f3f279a8404SHA-256: e42334787afae25919b24ddba3228aa032ed5adf6b7e54b6ef07686f8883bc92   (The unlinked packages above are only available from the Red Hat Network) 1331401 - CVE-2016-3710 qemu: incorrect banked access bounds checking in vga module1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Surprise! House Oversight report blames OPM leadership for breach of records

OPM officials did nearly everything wrong as far as security goes and then lied about it, House Oversight Committee Republicans said in a final report on the OPM breach.Photo illustration by Sean Gallagher, based on image by Colin Feds Under Attack: OPM Breach CIA officers pulled from China because of OPM breach US counter-intel czar to hack victims: “raise shields” against spearphishing China and Russia cross-referencing OPM data, other hacks to out US spies Obama administration decides not to blame China publicly for OPM hack Government IT official ran law enforcement data systems for years with faked degrees View more storiesreader comments 19 Share this story A report from the Republican majority on the House Oversight and Government Reform Committee published today places blame for the 2014 and 2015 data breaches at the Office of Personnel Management squarely on the OPM's leadership.

The report finds that the long-time network infiltration that exposed sensitive personal information on about 21.5 million individuals could have been prevented but for "the longstanding failure of OPM's leadership to implement basic cyber hygiene." "Tools were available that could have prevented the breaches, but OPM failed to leverage those tools to mitigate the agency's extensive responsibilities," the report concluded.

And the committee's majority report also asserted that former OPM Chief Information Officer Donna Seymour lied repeatedly during her testimony, misstating how the agency responded to the breach and misleading Congress and the public about the damage done by the attack.

Ars extensively covered the shortfalls in OPM's security last year. The House Oversight report reveals that there were two separate extensive breaches—one beginning as early as November of 2013, which went undiscovered until March 2014 and was finally shut down completely two months later, allowed attackers to obtain manuals and technical information about the types of data stored in OPM systems.

A second attack began shortly afterward, targeting background investigation data, personnel records, and fingerprint data.

These breaches were determined to be likely conducted by the "Axiom Group" and "Deep Panda," respectively, two China-based hacking groups alleged to have ties to the Chinese government.

The attacks used a series of domains—some with OPM-related names (opmsecurity.org and opmlearning.org) and registered under the names of Marvel superheroes Tony Stark (Iron Man) and Steve Rogers (Captain America)—to control malware and exfiltrate stolen data. Ironically, the tool that discovered the ongoing breach, CyFIR from CyTech Services, was never actually purchased by OPM.

Though Seymour told Congress OPM had purchased licenses after a trial in a segregated test network, the tool was actually demonstrated on OPM's live network, and no licenses were ever purchased. OPM officials returned the trial software after deleting images from OPM's own incident response—images that included "more than 11,000 files and directories" of forensic data, the report noted. "Documents and testimony show CyTech provided a service to OPM and OPM did not pay," the report found, noting that this violated federal law against accepting voluntary services. The report recommended that federal agencies "must ensure agency CIOs are empowered, accountable, competent, and retained for more than the current average of two years," and that agencies promptly provide justification to Congress for continuing to use systems when their "authority to operate" (ATO)—the certification that they are operating in compliance with federal information security regulations—lapses.

Eleven of OPM's systems had been operating without an ATO at the time of the breach, in some cases for over a year or more. The report also recommended that OMB and other federal agencies move toward a "zero trust IT security model" where users on the network are treated with the same level of security as users outside the network and that agencies reduce the use of Social Security numbers in identifying employees to reduce the risk of exposure of personal identifying information. Reuters reports that Rep.

Elijah Cummings (D-Md.), the ranking minority member of the House Oversight Committee, rejected the Republicans' report, claiming factual deficiencies. Rep.

Cummings also said that the errors made by OPM's contractors were not sufficiently taken into account in the assessment.

Two OPM contractors were involved in breaches of background investigation data.

RHSA-2016:1655-1: Moderate: qemu-kvm-rhev security update

An update for qemu-kvm-rhev is now available for Red Hat Enterprise LinuxOpenStack Platform 5.0 (Icehouse) for RHEL 7.Red Hat Product Security has rated this update as having a security impact ofModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-spacecomponent for running virtual machines using KVM in environments managed by RedHat Enterprise Virtualization Manager.Security Fix(es):* Quick Emulator(Qemu) built with the Block driver for iSCSI images support(virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur whileprocessing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could usethis flaw to crash the Qemu process resulting in DoS or potentially leverage itto execute arbitrary code with privileges of the Qemu process on the host.(CVE-2016-5126)* Quick emulator(Qemu) built with the virtio framework is vulnerable to anunbounded memory allocation issue. It was found that a malicious guest usercould submit more requests than the virtqueue size permits. Processing a requestallocates a VirtQueueElement and therefore causes unbounded memory allocation onthe host controlled by the guest. (CVE-2016-5403)Red Hat would like to thank hongzhenhao (Marvel Team) for reportingCVE-2016-5403. For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, shut down all running virtual machines. Once allvirtual machines have shut down, start them again for this update to takeeffect.Red Hat OpenStack 5.0 for RHEL 7 SRPMS: qemu-kvm-rhev-2.3.0-31.el7_2.21.src.rpm     MD5: 388489747503bf7e5679a1334e8edea8SHA-256: a94c0e89ace45eac3032f11f18d6d39953a42c6ee261d2d578600b9a38452dff   x86_64: libcacard-devel-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: b69cefdcf266192b300525fa2a55db44SHA-256: 757414615b1d96df3cea8c01a62ef66975eadfce01f344d8cb4205cd83e6087b libcacard-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 236884551ff81b5f896399f128998d0bSHA-256: 7c50554554d757cfed5786d347bd66191825effa36184875b0ebcf6c4a39ad79 libcacard-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: cc5e87b0e239b613dcba8c3d52de17f4SHA-256: 60d6c5f595b58134b837fcbfc38e4124c7bb7ff66bc95779a45cd6e9d89c9d3e qemu-img-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 2528cc222087bd4ee7c9a4ac8bf85d70SHA-256: 4cde725205c07e2397f86948aba8a34258d6a0200abe5e19f4825e86759962ab qemu-kvm-common-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: ff206f645105d15a1cd85c48c5962482SHA-256: 70516a1ac8707862fd95d32ecf8f4f1552f91e509bfc20e6b5570109068d00f6 qemu-kvm-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 8a92dd969c8696e7531b22fe5e1ed68fSHA-256: f3a9662980f6687eeb37e52174a0cdfed256cc38092dee7d6fbd33a764399926 qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 9b5e3c480f49bf2eb5912bdd23b16307SHA-256: e3e9eeb357e7fb33f425308913b12601252caa00f863ba7fd36875ead3bc4e48 qemu-kvm-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 88d1ebfc3d8e0d7de2110c02e4cabb33SHA-256: 334203df05dafc3e9a043320a0a48a09bcd7bf4f0c1c5e3b1275ff0d118e52ef   (The unlinked packages above are only available from the Red Hat Network) 1340924 - CVE-2016-5126 Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2016:1654-1: Moderate: qemu-kvm-rhev security update

An update for qemu-kvm-rhev is now available for Red Hat Enterprise LinuxOpenStack Platform 6.0 (Juno) for RHEL 7.Red Hat Product Security has rated this update as having a security impact ofModerate. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linuxon AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-spacecomponent for running virtual machines using KVM in environments managed by RedHat Enterprise Virtualization Manager.Security Fix(es):* Quick Emulator(Qemu) built with the Block driver for iSCSI images support(virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur whileprocessing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could usethis flaw to crash the Qemu process resulting in DoS or potentially leverage itto execute arbitrary code with privileges of the Qemu process on the host.(CVE-2016-5126)* Quick emulator(Qemu) built with the virtio framework is vulnerable to anunbounded memory allocation issue. It was found that a malicious guest usercould submit more requests than the virtqueue size permits. Processing a requestallocates a VirtQueueElement and therefore causes unbounded memory allocation onthe host controlled by the guest. (CVE-2016-5403)Red Hat would like to thank hongzhenhao (Marvel Team) for reportingCVE-2016-5403. For details on how to apply this update, which includes the changes described inthis advisory, refer to:https://access.redhat.com/articles/11258After installing this update, shut down all running virtual machines. Once allvirtual machines have shut down, start them again for this update to takeeffect.Red Hat OpenStack 6.0 for RHEL 7 SRPMS: qemu-kvm-rhev-2.3.0-31.el7_2.21.src.rpm     MD5: 388489747503bf7e5679a1334e8edea8SHA-256: a94c0e89ace45eac3032f11f18d6d39953a42c6ee261d2d578600b9a38452dff   x86_64: libcacard-devel-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: b69cefdcf266192b300525fa2a55db44SHA-256: 757414615b1d96df3cea8c01a62ef66975eadfce01f344d8cb4205cd83e6087b libcacard-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 236884551ff81b5f896399f128998d0bSHA-256: 7c50554554d757cfed5786d347bd66191825effa36184875b0ebcf6c4a39ad79 libcacard-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: cc5e87b0e239b613dcba8c3d52de17f4SHA-256: 60d6c5f595b58134b837fcbfc38e4124c7bb7ff66bc95779a45cd6e9d89c9d3e qemu-img-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 2528cc222087bd4ee7c9a4ac8bf85d70SHA-256: 4cde725205c07e2397f86948aba8a34258d6a0200abe5e19f4825e86759962ab qemu-kvm-common-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: ff206f645105d15a1cd85c48c5962482SHA-256: 70516a1ac8707862fd95d32ecf8f4f1552f91e509bfc20e6b5570109068d00f6 qemu-kvm-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 8a92dd969c8696e7531b22fe5e1ed68fSHA-256: f3a9662980f6687eeb37e52174a0cdfed256cc38092dee7d6fbd33a764399926 qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 9b5e3c480f49bf2eb5912bdd23b16307SHA-256: e3e9eeb357e7fb33f425308913b12601252caa00f863ba7fd36875ead3bc4e48 qemu-kvm-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm     MD5: 88d1ebfc3d8e0d7de2110c02e4cabb33SHA-256: 334203df05dafc3e9a043320a0a48a09bcd7bf4f0c1c5e3b1275ff0d118e52ef   (The unlinked packages above are only available from the Red Hat Network) 1340924 - CVE-2016-5126 Qemu: block: iscsi: buffer overflow in iscsi_aio_ioctl1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest leading to DoS These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: