SMALL BUSINESS UNDER ATTACK a Guide to Understanding Your Risks and Protecting Your Future

Total Page:16

File Type:pdf, Size:1020Kb

SMALL BUSINESS UNDER ATTACK a Guide to Understanding Your Risks and Protecting Your Future SMALL BUSINESS UNDER ATTACK A guide to understanding your risks and protecting your future. SMALL BUSINESS UNDER ATTACK INTRODUCTION: TARGETING SMALL BUSINESS No matter what size your business, you can’t risks you face and the solutions available to About 55% of small and medium business ignore cybercrime. You can’t ignore hackers defend your data. (SMBs) participating in the Ponemon and the increasingly sophisticated malware Institute’s 2016 State of Cybersecurity Hackers never give up looking for they are continually unleashing on the in Small and Medium-Sized Business undiscovered vulnerabilities and keep internet. You can’t be complacent and think study said their companies had suffered conjuring new, creative ways to break you’re not a target. Everyone is a target. a cyberattack and 50% reported “they into networks. No business is immune. had data breaches involving customer Too many small businesses still believe that And any belief that you are not a target and employee information in the past 12 their data has no value. That they are too may very well have severe consequences, months.” Only 14% of participants rated small for cybercriminals to bother targeting such as compromising employee and as highly effective their “ability to mitigate them. The harsh reality is that your data is customer data; losing intellectual property cyber risks, vulnerabilities and attacks.” valuable. Cybercriminals who successfully and crushing your competitiveness in steal personally identifiable information, the market; suffering a data breach that Even if cybercriminals aren’t necessarily medical records and trade secrets sell them destroys your reputation; incurring penalties interested in your company’s data, for a tidy profit every day. for non-compliance with federal and state they often try to use small businesses regulators; insurmountable remediation as unwitting pawns to breach larger If you handle sensitive data such as costs; losing customers and partners… The organizations. That’s what happened in Social Security numbers and credit card list goes on, but the point is clear; data the 2013 cyberattack on retail giant Target, information or have any intellectual property breaches can be devastating to a small which exposed credit card and personal you want to ensure doesn’t fall into the business. data of more than 110 million consumers. wrong hands, you need to understand the Hackers reportedly broke into the company’s VIPREANTIVIRUS.COM 2 SMALL BUSINESS UNDER ATTACK network after stealing the credentials of Other threats for which you need defenses some of the common mistakes users make a company that provides heating and air – and which are discussed more in- that can create cyber risks for your business. conditioning services to Target. depth in this guide – include web-based The sad reality of doing business in a threats, such as clickjacking and drive-by modern, connected world is there is Investigators believe the Target attack downloads, and exploit kits. started with a phishing email sent to Fazio no shortage of cyber risks. The cost of Mechanical Services, the HVAC company, Included in this guide is a discussion on cybercrime keeps rising, and is projected which according to owner Ron Fazio had a how to implement BYOD (bring your own to reach $2 trillion by 2019. A cyberattack data connection with Target for electronic device) policies to avoid creating new costs companies an average of $4 million. billing, contract submission and project vulnerabilities by letting employees connect These are scary numbers, but you are not management. their own smartphones, tablets and laptops completely defenseless against cyber risks. to the network. We also share security best That’s what we intend to show you in the Phishing has become a favorite cyberattack practices for SMB companies, and address following pages. method. It’s easy and inexpensive for attackers and often succeeds because it preys on users’ trust and curiosity. It also plays a major role in ransomware infections: 93% of phishing emails currently contain ransomware, according to researchers. Phishing and ransomware are just two examples of cyber threats against which SMB companies need to defend. Phishing and ransomware have received a lot of focus in the last couple of years because of their prevalence, but cyber threats are numerous and varied – and you need to deploy systems, implement policies and educate users to combat them all. VIPREANTIVIRUS.COM 3 SMALL BUSINESS UNDER ATTACK WHAT YOU NEED TO KNOW ABOUT PHISHING Phishing vexes a lot of organizations because you can’t Fraudsters have no shortage of material for bait. A solve the problem by just throwing technology at it. phishing email may pass itself off as an Apple Store Preventing phishing attacks requires a combination of message, a message from a Facebook friend, a package robust email security and user training. delivery notification, a resume from a job applicant or myriad other disguises. The victim clicks on an The human factor is the tough part. Even when attachment that proceeds to download malicious code users understand the risks of clicking on suspicious onto their machine, potentially infecting the whole attachments or URLs, some still do it. In a recent study, network, or visits a website that asks for private data, about half of the subjects in an experiment clicked on which the user provides thinking it’s a legitimate request. links from strangers in e-mails and Facebook messages – even though most of them claimed to be aware of the Three Phishing Approaches risks. Phishing currently breaks down into three main It really takes a sustained effort to educate users to stop categories. Regular phishing casts a wide net, with doing what they intuitively know they shouldn’t do but cybercriminals sending emails to large groups in an do it anyway. attempt to ensnare as many victims as possible. And that’s one of the reasons phishing is so successful. A second, more refined approach – spear phishing – Rather than trying to hack into secured systems, targets specific groups or individuals. Spear phishing cybercriminals sneak into the path of least resistance by usually consists of attempts to steal private information tricking distracted or trusting users into opening the door such as social security numbers, credit card numbers and for them. financial account information. VIPREANTIVIRUS.COM 4 SMALL BUSINESS UNDER ATTACK This technique is, by far, the most successful on the internet today, accounting Secure Your #1 Threat Vector for greater than 90% of attacks. Spear phishers gather personal information The biggest security vulnerability within any about victims from social media and other sources to use in bait emails to organization is its employees, and they are more increase the chances users will believe them. often targeted through email than any other threat A third technique, called whaling, focuses on bigger targets, such as C-level vector. Deploy the protection you need with best- executives, politicians and celebrities. “Whaling emails and websites are highly in-class email security that doesn’t slow you down. customized and personalized, often incorporating the target’s name, job title VIPRE Email Security for Exchange is an advanced, or other relevant information gleaned from a variety of sources,” according to powerful, policy-based email security solution that TechTarget. defends networks against spam, phishing, viruses and other security threats transmitted via email. Protect Yourself VIPRE Email Security for Exchange enables you to: To prevent phishing attacks, you need to train users to identify and avoid • Help prevent malware infections – including phishing emails. Beyond that, you need email security with advanced features ransomware – targeting users via email designed specifically to combat this threat. • Improve the performance and reliability of Such features include a sender policy framework, which checks if incoming Microsoft® Exchange servers by eliminating spam email was sent by authorized hosts; auto-whitelisting, which automatically • Cut expenses by reducing the time and adds and removes listings based on preset criteria; and a regularly updated complexity of managing email security issues spam filter that recognizes and sifts out potential phishes. • Enforce stronger malware defense with a Phishing is the most successful attack vector used by cybercriminals and the policy-based email security framework primary method used to deliver ransomware. Failing to address phishing opens you to a cyberattack. Learn more at www.VIPREAntivirus.com/Business VIPREANTIVIRUS.COM 5 SMALL BUSINESS UNDER ATTACK RECOGNIZE & FEND OFF WEB-BASED THREATS Phishing poses a serious cyber risk to SMB organizations, WATERING HOLE ATTACKS – Compromising a group but it’s far from the only one. Cybercriminals still use of users through infected websites that targeted group plenty of other methods to break into networks and steal members are known to visit. Once a user visits one of the data. The hacker bag of tricks contains plenty of web- websites, malware is downloaded or sensitive information based threats such as website hijacks, drive-by downloads is stolen to gain network access. and plug-in exploits. PLUG-IN VULNERABILITIES – Exploiting vulnerabilities in Hackers use web-based attacks to download malicious commonly used tools such as Java and file formats such code onto networks to alter files, disrupt network as PDF, CSV and HTML to deliver malware. operations and steal information. Common
Recommended publications
  • Malvertising - a Rising Threat to the Online Ecosystem
    2016 Proceedings of the Conference on Information Systems Applied Research ISSN: 2167-1508 Las Vegas, Nevada USA v9 n4266 __________________________________________________________________________________________________________________________ Malvertising - A Rising Threat To The Online Ecosystem Catherine Dwyer [email protected] Ameet Kanguri [email protected] Seidenberg School of Computer Science & Information Systems Pace University New York, New York, USA Abstract Online advertising is a multi-billion dollar industry that supports web content providers around the globe. A sophisticated technology known as real time bidding (RTB) dominates the advertising landscape, connecting advertisers with specific online customers of interest. With RTB, when web visitors connect to a site, advertising networks are notified of space available on that site along with what can be gleaned about the visitor. These combinations of space and visitor are auctioned, and the winning bid’s ad content is served to the web visitor. The entire process, from a visitor landing on a publisher’s page to ads being auctioned, selected and served, takes 200 milliseconds, the time needed to snap your fingers. This tightly choreographed interaction is a technical marvel, but one with built in risks. The just-in-time collaboration between ever changing technology providers gives an opening to malicious actors, who through devious means, use ad networks to deliver malware rather than ads. Delivering malware as an ad is called malvertising, and its presence on otherwise credible sites is dangerous, undermining the business models of trustworthy publishers and legitimate online advertisers. The purpose of this paper is to introduce malvertising, describe its relationship with online advertising, and identify the risks RTB and malvertising bring to the online ecosystem.
    [Show full text]
  • Clickjacking
    Security Now! Transcript of Episode #168 Page 1 of 18 Transcript of Episode #168 ClickJacking Description: Steve and Leo discuss yet another challenge to surfing safely in the web world: Known as "ClickJacking," or more formally as "UI Redressing," this class of newly popular threats tricks web users into performing web-based actions they don't intend by leading them to believe they are doing something else entirely. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-168.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-168-lq.mp3 INTRO: Netcasts you love, from people you trust. This is TWiT. Leo Laporte: Bandwidth for Security Now! is provided by AOL Radio at AOL.com/podcasting. This is Security Now! with Steve Gibson, Episode 168 for October 30, 2008: Clickjacking. It's time for Security Now!, the show where we cover everything you'd ever want to know about security. And we do it with a guy who is the king, really, as far as I'm concerned, the man who discovered spyware, named spyware, wrote some of the most used security utilities out there, including ShieldsUP!, Mr. Steve Gibson of GRC.com. Hi, Steve. Steve Gibson: Yes, in fact sometimes we're discussing things that you'd rather wish weren't the case. I mean... Leo: Well, lately it's been kind of bleak because it's like, there's bad stuff, and there doesn't really seem like there's any cure. Steve: Yes, that's true.
    [Show full text]
  • A Semi-Automated Security Advisory System to Resist Cyber-Attack in Social Networks
    A Semi-Automated Security Advisory System to Resist Cyber-attack in Social Networks Samar Muslah Albladi and George R S Weir University of Strathclyde, Glasgow G1 1XH, UK {samar.albladi; george.weir}@strath.ac.uk Abstract. Social networking sites often witness various types of social engi- neering (SE) attacks. Yet, limited research has addressed the most severe types of social engineering in social networks (SNs). The present study in- vestigates the extent to which people respond differently to different types of attack in a social network context and how we can segment users based on their vulnerability. In turn, this leads to the prospect of a personalised security advisory system. 316 participants have completed an online-ques- tionnaire that includes a scenario-based experiment. The study result re- veals that people respond to cyber-attacks differently based on their de- mographics. Furthermore, people’s competence, social network experience, and their limited connections with strangers in social networks can decrease their likelihood of falling victim to some types of attacks more than others. Keywords: Advisory System, Social Engineering, Social Networks. 1 Introduction Individuals and organisations are becoming increasingly dependent on working with computers, accessing the World Wide Web and, more importantly, sharing data through virtual communication. This makes cyber-security one of today’s greatest issues. Pro- tecting people and organisations from being targeted by cybercriminals is becoming a priority for industry and academia [1]. This is due to the huge potential damage that could be associated with losing valuable data and documents in such attacks. Previous research focuses on identifying factors that influence people’s vulnerability to cyber-attack [2] as the human has been characterised as the weakest link in infor- mation security research.
    [Show full text]
  • Financial Fraud and Internet Banking: Threats and Countermeasures
    Report Financial Fraud and Internet Banking: Threats and Countermeasures By François Paget, McAfee® Avert® Labs Report Financial Fraud and Internet Banking: Threats and Countermeasures Table of Contents Some Figures 3 U.S. Federal Trade Commission Statistics 3 CyberSource 4 Internet Crime Complaint Center 4 In Europe 5 The Many Faces of Fraud 6 Small- and large-scale identity theft 7 Carding and skimming 8 Phishing and pharming 8 Crimeware 9 Money laundering 10 Mules 10 Virtual casinos 11 Pump and dump 12 Nigerian advance fee fraud (419 fraud) 12 Auctions 14 Online shopping 16 Anonymous payment methods 17 Protective Measures 18 Scoring 18 Europay, MasterCard, and Visa (EMV) standard 18 PCI-DSS 19 Secure Sockets Layer (SSL) and Transport Secured Layer (TLS) protocols 19 SSL extended validation 20 3-D Secure technology 21 Strong authentication and one-time password devices 22 Knowledge-based authentication 23 Email authentication 23 Conclusion 24 About McAfee, Inc. 26 Report Financial Fraud and Internet Banking: Threats and Countermeasures Financial fraud has many faces. Whether it involves swindling, debit or credit card fraud, real estate fraud, drug trafficking, identity theft, deceptive telemarketing, or money laundering, the goal of cybercriminals is to make as much money as possible within a short time and to do so inconspicuously. This paper will introduce you to an array of threats facing banks and their customers. It includes some statistics and descriptions of solutions that should give readers—whether they are responsible for security in a financial organization or a customer—an overview of the current situation. Some Figures U.S.
    [Show full text]
  • Clickjacking: Attacks and Defenses
    Clickjacking: Attacks and Defenses Lin-Shung Huang Alex Moshchuk Helen J. Wang Carnegie Mellon University Microsoft Research Microsoft Research [email protected] [email protected] [email protected] Stuart Schechter Collin Jackson Microsoft Research Carnegie Mellon University [email protected] [email protected] Abstract such as a “claim your free iPad” button. Hence, when Clickjacking attacks are an emerging threat on the web. the user “claims” a free iPad, a story appears in the user’s In this paper, we design new clickjacking attack variants Facebook friends’ news feed stating that she “likes” the using existing techniques and demonstrate that existing attacker web site. For ease of exposition, our description clickjacking defenses are insufficient. Our attacks show will be in the context of web browsers. Nevertheless, the that clickjacking can cause severe damages, including concepts and techniques described are generally applica- compromising a user’s private webcam, email or other ble to all client operating systems where display is shared private data, and web surfing anonymity. by mutually distrusting principals. We observe the root cause of clickjacking is that an Several clickjacking defenses have been proposed and attacker application presents a sensitive UI element of a deployed for web browsers, but all have shortcomings. target application out of context to a user (such as hiding Today’s most widely deployed defenses rely on frame- the sensitive UI by making it transparent), and hence the busting [21, 37], which disallows a sensitive page from user is tricked to act out of context. To address this root being framed (i.e., embedded within another web page).
    [Show full text]
  • A Case Study on Clickjacking Attack and Location Leakage
    International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 190 ISSN 2229-5518 A Case Study on Clickjacking Attack and Location Leakage Lim Chin Nei, Loo Yow Cherng, Manmeet Mahinderjit Singh Abstract— The advanced in technologies such as mobile devices, GSP, WIFI, and 3G has encourage the information sharing using social media. The large amount of information shared on social media often lead to security issues which are unaware by the users. This information may include sensitive information such as a person’s name, location, relationship status and many more and can be dangerous if is put in a wrong hand. In this research, we provide a review on the type of social media ad what are the current threat in social media. We then focus on two specific threat namely clickjacking and location leakage, and proposed a solution for each of it as well as the evaluation of the solution. Index Terms—Security; Social media; Attack; Defense Machine, Clickjacking, Location leakage —————————— —————————— 1 INTRODUCTION This rapid shift of technologies in this era of informa- media. With this large amount of information shared online, tion and communication has dramatically boosted the usage the social media actually has become a perfect platform for of the social media. With the advanced in technologies such hackers to find their victims. The information shared using as smart mobile devices, GPS, WIFI, and 3G services, user social media often contain sensitive and private information were able to connect to the internet regardless of time and which can be easily compromised by the hackers.
    [Show full text]
  • Cisco 2017 Midyear Cybersecurity Report
    Cisco 2017 Midyear Cybersecurity Report 1 Executive Summary Table of Contents Executive Summary ..........................................................03 Vulnerabilities update: Rise in attacks following key disclosures ................................................................ 47 Major Findings ..................................................................05 Don’t let DevOps technologies leave the Introduction ......................................................................07 business exposed ............................................................ 50 Attacker Behavior .............................................................09 Organizations not moving fast enough to patch Exploit kits: Down, but not likely out ................................. 09 known Memcached server vulnerabilities ......................... 54 How defender behavior can shift attackers’ focus ...........11 Malicious hackers head to the cloud to shorten the path to top targets ..................................................... 56 Web attack methods provide evidence of a mature Internet ............................................................. 12 Unmanaged infrastructure and endpoints leave organizations at risk ......................................................... 59 Web block activity around the globe ................................ 13 Security Challenges and Opportunities Spyware really is as bad as it sounds............................... 14 for Defenders ...................................................................61
    [Show full text]
  • Comparisons of Machine Learning Techniques for Detecting Malicious Webpages ⇑ H.B
    Expert Systems with Applications 42 (2015) 1166–1177 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa Comparisons of machine learning techniques for detecting malicious webpages ⇑ H.B. Kazemian , S. Ahmed Intelligent Systems Research Centre, School of Computing, London Metropolitan University, United Kingdom article info abstract Article history: This paper compares machine learning techniques for detecting malicious webpages. The conventional Available online 16 September 2014 method of detecting malicious webpages is going through the black list and checking whether the web- pages are listed. Black list is a list of webpages which are classified as malicious from a user’s point of Keywords: view. These black lists are created by trusted organizations and volunteers. They are then used by modern K-Nearest Neighbor web browsers such as Chrome, Firefox, Internet Explorer, etc. However, black list is ineffective because of Support Vector Machine the frequent-changing nature of webpages, growing numbers of webpages that pose scalability issues Naive Bayes and the crawlers’ inability to visit intranet webpages that require computer operators to log in as authen- Affinity Propagation ticated users. In this paper therefore alternative and novel approaches are used by applying machine K-Means Supervised and unsupervised learning learning algorithms to detect malicious webpages. In this paper three supervised machine learning techniques such as K-Nearest Neighbor, Support Vector Machine and Naive Bayes Classifier, and two unsupervised machine learning techniques such as K-Means and Affinity Propagation are employed. Please note that K-Means and Affinity Propagation have not been applied to detection of malicious web- pages by other researchers.
    [Show full text]
  • UI Redressing and Clickjacking: About Click Fraud and Data Theft
    Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking: About click fraud and data theft Marcus Niemietz [email protected] Ruhr-University Bochum Chair for Network and Data Security 25th of November 2011 Marcus Niemietz, RUB @Zeronights UI Redressing and Clickjacking Introduction Attack vectors Counteractive measures Conclusion and outlook Short and crisp details about me Studying \IT-Security/Information Technology", RUB \Computer Science", Distance University Hagen B.Sc. in \IT-Security/Information Technology" Books Authentication Web Pages with Selenium ≥Feb. 2012: Clickjacking und UI-Redressing International speaker Work: RUB, Pixelboxx, ISP and IT-Security, Freelancer (trainings, penetration tests) Twitter: @mniemietz Marcus Niemietz, RUB @Zeronights UI Redressing and Clickjacking Introduction Attack vectors Counteractive measures Conclusion and outlook Contents 1 Introduction UI redressing Clickjacking 2 Attack vectors UI redressing Round up Clickjacking Tool 3 Counteractive measures Frame busting Busting frame busting Clickjacking statistics 4 Conclusion and outlook Marcus Niemietz, RUB @Zeronights UI Redressing and Clickjacking Introduction Attack vectors UI redressing Counteractive measures Clickjacking Conclusion and outlook Introduction Google Inc. can generate a profit of over $8.5 billion in 2010 Interesting for commercial companies to offer web applications shopping banking share status messages New attacks available that can bypass existing protection mechanisms CSRF
    [Show full text]
  • Glossary Updated – July 2014
    Glossary Updated – July 2014 Ad Blocker - A software utility which can be either a browser add-on or integrated within a browser which prevents advertisements from being displayed or third party content from being served. Examples include Adblock Plus and Noscript. Leading browsers offer limited controls to block third party content including Microsoft Internet Explorer 9 and Mozilla Firefox. Address Specification (also known as: email address spec or addr-spec) - Addresses occur in several message header fields to indicate senders and recipients of messages. An address may either be an individual mailbox, or a group of mailboxes. [RFC 2822] Ad Exchange - Ad exchanges facilitate auction-based, real-time buying and serving of ads. Ad exchanges operate by serving as intermediaries between ad networks, publishers, and advertisers. Ad exchanges provide a sales channel to publishers and ad networks, as well as aggregated inventory to advertisers. Ad exchanges’ business models and practices may include features that are similar to those offered by ad networks. Ad Impression (or impressions) -Total number of times an ad (or malvertisement) is served on one or more sites. A single malvertising creative may be served to multiple users as a result of a single incident with upwards to 100,000 or more impressions, depending on the site(s) the malvertising is served on and the frequency of rotation of the ad on the site(s) and the life of the campaign. Ad Network - An ad network is a company that works with a group of Web sites and sells advertising space on their behalf. Ad networks provide an outsourced sales capability for publishers and a means to aggregate inventory and audiences from numerous sources in a single buying opportunity for media buyers.
    [Show full text]
  • Scams and Spam to Avoid on Facebook
    Security Response in association with: Scams and Spam to Avoid on Facebook Candid Wüest Principal Software Engineer foreword by the Facebook Security Team Foreword Contents At Facebook, we work hard to protect the people that use our service. We in- Foreword ............................................................ 1 vest in equipment, develop proprietary tools, create innovative security fea- Summary ............................................................ 2 tures and devote hundreds of employees around the world to keep you and Introduction ...................................................... 2 your data safe. But we can’t do this alone, which is why we worked on a guide Attack types ....................................................... 2 with our friends at Symantec to educate people on the most prevalent threats Like/share-baiting ........................................ 3 we are seeing and the best ways for users to keep their data safe while online. Like clickjacking ........................................... 4 We process a huge amount of content to protect the people on Facebook – Malicious (iFrame) application ................... 5 every single day we vet over 26 billion pieces of content and 2 trillion link Self-XSS copy/paste attacks ....................... 6 clicks. But with more than 800 million people visiting our site each month Tagging ......................................................... 8 and more than 400 million visiting every day, Facebook has become an Phishing ......................................................
    [Show full text]
  • Security Now! #521 - 08-18-15 Security Is Difficult
    Security Now! #521 - 08-18-15 Security is Difficult This week on Security Now! ● Android StageFright, two steps forward, one step back ● Windows 10 new privacy concerns ● High profile Malvertising surfaces ● Kaspersky, Lenovo, HTC and AT&T each in their own doghouses. ● Some miscellaneous tidbits... ● Some additional thoughts about surfing safety and web advertising. Security News Android StageFright: ● First the good news: Phones are getting patched and reporting non-vulnerable. ● Ernest Koch @nullconmedia ○ @SGgrc After yesterday's patch, my Nexus 6 is showing not vulnerable. ● Simon Zerafa confirmed that both his Nexus 6 & 7 were just updated. ○ Nexus 6 Android 5.1.1 build LMY48I gets 6 greens on the Zimperium StageFright test :-) ● Joe McDaniel @joem5636 ○ @SGgrc just got my Nexus 5.1.1 upgrade. Oddly, did not change version! ○ (Confirmed that all testing apps now show safe.) ● Eric Throndson @EricThrondson ○ @SGgrc My Nexus 6 is getting MMS messages from random numbers that I assume have #Stagefright. I'm patched, but nervous and annoyed. ● Bob Thibodeau @bobthibincs ○ @SGgrc: got a notice from AT&T to update, no longer vulnerable to Stagefright, One of the critical Android Stagefright patches was incomplete ● Exodus Intelligence: (CVE-2015-3864) Stagefright: Mission Accomplished? ○ https://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished/ ● Stagefright Patch Incomplete Leaving Android Devices Still Exposed ○ https://threatpost.com/stagefright-patch-incomplete-leaving-android-devices-still-e xposed/114267 ● Patch Comment: When the sum of the 'size' and 'chunk_size' variables is larger than 2^32, an integer overflow occurs. Using the resulting (overflowed) value to allocate memory leads to an undersized buffer allocation and later a potentially exploitable heap corruption condition.
    [Show full text]