In PHP version 8.0.* prior to 8.0.30, 8.1.* prior to 8.1.22, and 8.2.* prior to 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php |
||
fedoraproject fedora 38 |
||
debian debian linux 10.0 |
LockBit ransomware returns, restores servers after police disruption By Ionut Ilascu February 25, 2024 02:41 PM 0 The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector. In a message under a mock-up FBI leak - specifically to draw attention, the gang published a lengthy message about their negligence enabling the breach and the plans fo...
Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Authorities dismantle cybercrime royalty by making mockery of their leak site
In seizing and dismantling LockBit's infrastructure, Western authorities are now making a mockery of the ransomware criminals by promising a long, drawn-out disclosure of its secrets. After the infosec world was invigorated by the announcement of LockBit's site being seized yesterday, the authorities involved in the takedown operation – dubbed "Operation Cronos" – have now completely taken over the group's leak site and turned it into an exposé hub. The site retains the same general format ...