
PsychOS comes packed with a great software selection and dozens of pre-installed applications for all your needs. The desktop menu also offers them access to various other functions. To access the application menu and pre-installed apps, users must right-click anywhere on the desktop. The desktop layout features a panel located on the left side of the screen from where users can access the task manager and favorite/pinned apps. PsychOS comes with a very light desktop interface that borrows elements from the lightweight Xfce desktop environment and IceWM window manager. Boot optionsīeing based on Devuan GNU/Linux, PsychOS comes with the same boot menu, which allows users to start the live system in normal or failsafe mode, run a memory test to check the integrity of the physical RAM, as well as to boot an existing OS installed on the first disk drive. Unlike Debian GNU/Linux, Devuan GNU/Linux doesn't uses systemd as default init system, and so is PsychOS GNU/Linux. We work closely with external researchers, and are grateful for the opportunity to improve our products.PsychOS is a freely distributed and open-source computer operating system based on Devuan GNU/Linux, which, in turn, is based on Debian GNU/Linux. "A fix was released two days after it was reported to us and we have seen no evidence it has ever been used in the wild. "A vulnerability in Malwarebytes Anti-Malware 2.2.0 was reported to us by an independent researcher," a Malwarebytes spokesperson told Softpedia.

Proof of concept code is available on GitHub and via the Protek Research Lab website. Malwarebytes, a company that has entered the antivirus market in 2008 and has gained quite a reputation in the meantime, responded to the finding and issued a security patch for its product in no more than two days. Provencher and COSIG reported the issue to Malwarebytes Corporation, the company behind Malwarebytes Anti-Malware (MBAM), the antivirus solution where the vulnerability was discovered.

This leads to a memory corruption on the user's computer, which in turn exposes the system to situations where arbitrary code can be executed by an attacker leveraging this issue.Ī memory corruption occurs when the content of a memory location is unintentionally modified by programming errors, or in this case, by malicious code. Provencher, the vulnerability is triggered "when a malformed executable with an invalid integer (-1) in the 'SizeOfRawData' in UPX section is parsed by Malwarebytes.

The discovery was made by Francis Provencher, a member of the COSIG research & pentesting team based in Quebec, Canada.Īccording to Mr.

A security vulnerability has been discovered and patched in the Malwarebytes antivirus for Windows, as COSIG (Centre Opérationnel de Sécurité Informatique Gouvernemental) is reporting.
