Menu
VBulletin resets patches and issues emergency patches following breach

VBulletin resets patches and issues emergency patches following breach

Evidence suggests that hackers had access to at least one zero-day exploit

VBulletin Solutions has reset the passwords for over 300,000 accounts on its website following a security breach, and also released emergency security patches. The company's Internet forum software is used on tens of thousands of websites.

It's not clear if the patches were prompted by the security breach, but the hacker who claimed to have compromised the vBulletin.com database put a zero-day vBulletin exploit -- an exploit for an unpatched vulnerability -- up for sale on Monday.

VBulletin Solutions did not immediately respond to an inquiry seeking more details about the patches and their relationship to the breach.

The company says that more than 100,000 community websites are using vBulletin, including some operated by Zynga, Electronic Arts, Sony Pictures, NASA, Valve Corporation and other well known companies and organizations.

Patches were released for vBulletin versions 5.1.4 to 5.1.9 after someone reported a security issue to the company, vBulletin Solutions said in an advisory published Monday.

The company advised all users to update their installations as soon as possible.

On Saturday, someone using the online handle Coldzer0 claimed on various websites that he compromised vBulletin.com and extracted information on almost 480,000 users from its database. The user also claimed to have hacked the support forum of Foxit Software, which uses vBulletin.

The vBulletin.com forum has 344,629 members, according to statistics displayed on the site. This number doesn't match the one claimed by the hacker, but it's possible that for some reason more user entries existed in the site's database.

On Monday, a listing for a "vBulletin 5.x.x Remote Code Execution 0day Exploit" appeared on a website that specializes in exploit sales. The listing was posted by a user named Coldzer0.

Tuesday, after vBulletin released its patches, a Twitter user using the handle @_cutz published the details of a remote code execution flaw in vBulletin that supposedly has existed for the past three years. Cutz published the details because "it's fixed now anyway."

It's not clear whether the vBulletin patches address the vulnerability exploited by Coldzer0 or the one disclosed by _cutz, or if they're the same flaw. But regardless, the administrators of vBulletin-based forums should deploy the patches immediately because the likelihood of attacks is high.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments