Security News

First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges
2017-09-26 06:57

Nearly a year after the disclosure of the Dirty COW vulnerability that affected the Linux kernel, cybercriminals have started exploiting the vulnerability against Android users, researchers have...

Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root (Threatpost)
2017-08-24 14:32

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.

Local Root Exploit Found on Lenovo Smartphone (Security Week)
2017-07-03 15:10

The Lenovo VIBE smartphone was found to include vulnerabilities that could allow an attacker with physical access to the device to gain root privileges. read more

Linux Systemd Gives Root Privileges to Invalid Usernames (Security Week)
2017-07-03 10:21

A bug in Linux’s systemd init system causes root permissions to be given to services associated with invalid usernames, and while this could pose a security risk, exploitation is not an easy task....

Stack Clash bug could give root privileges to attackers on Unix, Linux systems (Help Net Security)
2017-06-20 21:37

Qualys researchers have unearthed a serious privilege escalation bug affecting a wide variety of Unix and Unix-based operating systems, and has been working with vendors to develop patches since...

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered (The Hackers News)
2017-06-20 00:57

Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited...

Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access (Threatpost)
2017-06-19 17:05

Patches are available for a newly discovered Linux, BSD and Solaris vulnerability called Stack Clash that bypasses stack guard-page mitigations and enables root access.

Motorola Moto G4, G5 Vulnerable to Local Root Shell Attacks (Threatpost)
2017-06-08 18:53

Moto G4 and Moto G5 model Motorola phones are vulnerable to kernel command line injection vulnerabilities.

High-Severity Linux Sudo Flaw Allows Users to Gain Root Privileges (The Hackers News)
2017-06-01 01:28

A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system. The vulnerability, identified as...

Linux Flaw Allows Sudo Users to Gain Root Privileges (Security Week)
2017-05-31 17:31

A vulnerability affecting the manner in which Sudo parsed tty information could have resulted in the user gaining root privileges and being able to overwrite any file on the filesystem on...