Confidential CERT information was also leaked in March. Confidential vulnerability information managed by the CERT Coordination Center at Carnegie Mellon University has again been leaked to the public, following a flurry of such leaks in March. The latest information concerns a flaw in PDF readers for Unix that could allow a remote attacker to trick users into executing malicious code on their machines, according to a copy of the leaked vulnerability report. As with confidential CERT information that was leaked in March, the latest report was posted to a vulnerability discussion list by an individual using the name “hack4life.” The leaked information was taken from communication sent from CERT to software vendors affected by the PDF problem, according to Jeffrey Carpenter, manager of CERT. The information appears to be from a vulnerability report submitted to CERT by a Cincinnati security researcher by the name of Martyn Gilmore. Gilmore did not respond to requests for comment, and CERT would not comment on how it obtained the PDF vulnerability information or on Gilmore’s relationship with the Pittsburgh-based software vulnerability monitoring organization. Full Story
About OODA Analyst
OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.