News for Admins

Tech News

Article from ADMIN 50/2019
F5 Acquires NGINX for $670 Million; No One Is Safe – Citrix Networks Breached; A 19-Year-Old Bug in WinRAR; An Image Can Compromise Your Android Device and LibreOffice Vulnerable to Remote Code Execution Flaw

F5 Acquires NGINX for $670 Million

NGINX, a name synonymous with web and proxy servers, is an open source technology that has dethroned the Apache web server. Now, NGNIX, Inc., the parent company of NGINX project, is being acquired for $670 million by F5, a provider of multi-cloud application services (

In an exclusive interview, representatives from both F5 and NGINX told us that under F5, NGINX's open source projects will continue to be developed as usual.

F5 will maintain the NGNIX brand and leadership. Customers of both companies will be able to buy whichever products and services they want.

Since both companies operated in different spaces, there are no overlaps. None of the services will be discontinued or integrated into F5 services. The acquisition is meant to bridge a gap. "We bridge the divide between NetOps and DevOps with consistent application services across an enterprise's multi-cloud environment," said François Locoh-Donou, president and CEO of F5.

In the long run, there will be better integration and user experience for those who want to buy services from either NGINX or F5.

No One Is Safe; Citrix Networks Breached

Citrix, a software giant that offers a wide range of products and services, admitted that its networks were breached (

Stan Black, chief information security officer at Citrix, wrote in a blog post that attackers stole "business documents." Citrix still doesn't know which specific documents were accessed or stolen.

"At this time, there is no indication that the security of any Citrix product or service was compromised," he wrote.

What's worrying is that Citrix itself didn't detect the breach; it was the FBI that informed Citrix about an attack on March 6.

If a major player like Citrix is unaware of any such attack, what chance does an average company have to learn about similar attacks?

Citrix also didn't tell when the attack started and how long it lasted. It should worry the almost half a million enterprise customers who use Citrix to manage their VPNs.

FBI said that attackers supposedly used a password spraying technique to exploit weak passwords. Once they gained basic access, they tackled additional layers of security.

A 19-Year-Old Bug in WinRAR

WinRAR is some of the most popular archive manager software in the Windows world – a Swiss Army knife that handles compression and extraction of multiple archive formats, including RAR and ZIP.

According to HackerNews (, there are more than 500 million WinRAR users in the world, and all these users are now at risk of compromise. A 19-year-old bug was discovered in WinRAR that allows hackers to execute arbitrary code on a targeted system. The bug called "Absolute Path Traversal" bug (CVE-2018-20250) is found in a UNACEV2.DLL, a third-party library. It allows attackers to extract a compressed executable file from the ACE archive, which automatically runs in the Windows machine upon reboot.

A proof of concept exploit code has already been published, and hackers are already using it to attack Windows users. WinRAR has already released an update, which Windows users should install immediately.

HackerNews reported that the WinRAR team had lost the access to the source code for the vulnerable UNACEV2.DLL library in 2005; instead of fixing the issue, the team released WINRar version 5.70 beta 1, which doesn't support the DLL and ACE format. This fix addressed the bug, but at the same time it removed all ACE support from WinRAR.

The discovery of the WinRAR bug underscores an important rule that all users should apply to their everyday life: don't click on any files that you don't know.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=