Hírolvasó

ECHO Network · 2 óra 51 perc

Most Common Python Vulnerabilities and How To Avoid Them

Everybody knows about Python. It’s now the second-most popular programming language worldwide, having overtaken Java. Not only is it used widely for machine learning and data science, but it’s also easy to learn for beginner programmers because of its easy code syntax, mimicking the English language.
ECHO Network · 3 óra 10 másodperc

CVE-2021-32489

Description. An issue was discovered in the _send_secure_msg() function of Yubico yubihsm-shell through 2.0.3. The function does not correctly validate the embedded length field of an authenticated message received from the device because response_msg.st.
ECHO Network · 3 óra 21 perc

Security Bulletin: IBM OpenPages with Watson has addressed a cross-site scripting vulnerability (CVE-2020-4535)

May 10, 2021 8:00 pm EDT | Medium Severity IBM OpenPages with Watson has addressed an information disclosure vulnerability caused by improper validation. May 10, 2021 8:00 pm EDT | Medium Severity IBM OpenPages with Watson has addressed a cross-site scripting vulnerability caused by improper validation.
ECHO Network · 3 óra 57 perc

Medium CVE-2020-28008: EXIM EXIM

Description: Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.
ECHO Network · 3 óra 57 perc

Medium CVE-2020-28007: EXIM EXIM

Description: Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.
ECHO Network · 4 óra 5 perc

CVE-2021-28359 (airflow, python)

Current Description. The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions <1.10.15 in 1.x series and affects 2.0.0 and 2.0.1 and 2.x series. This is the same as CVE-2020-13944 & CVE-2020-17515 but the implemented fix did not fix the issue completely.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23369

In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23370

In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23371

Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23373

Cross-site scripting (XSS) vulnerability in admin/nav/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23374

Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23376

NoneCMS v1.3 has a CSRF vulnerability in public/index.php/admin/nav/add.html, as demonstrated by adding a navigation column which can be injected with arbitrary web script or HTML via the name parameter to launch a stored XSS attack.
NVD: all CVE · 4 óra 14 perc

CVE-2020-23575

A directory traversal vulnerability exists in Kyocera Printer d-COPIA253MF plus. Successful exploitation of this vulnerability could allow an attacker to retrieve or view arbitrary files from the affected server.
ECHO Network · 4 óra 33 perc

USN-4942-1: Firefox vulnerability

. 10 May 2021. Firefox could be made to crash or run programs as your login if it opened a malicious website. Releases Details. A race condition was discovered in Web Render Components. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit this to execute arbitrary code.
ECHO Network · 5 óra 7 perc

Security at risk as PC users continue to use end-of-life Windows 7

Almost a quarter of PC users are still using the end-of-life operating system Windows 7, new research has revealed. Security firm Kaspersky conducted a study based on anonymised OS metadata provided by consenting Kaspersky Security Network users. The survey has found 22% are still using Windows 7,....
AusCERT - Security Bulletins · 5 óra 12 perc

ESB-2021.1583 - [Win][UNIX/Linux] Squid: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1583 Squid security update 11 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Squid Publisher: Squid Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-31808 CVE-2021-31807 CVE-2021-31806 CVE-2021-28662 CVE-2021-28652 CVE-2021-28651 Original Bulletin: http://lists.squid-cache.org/pipermail/squid-announce/2021-May/000129.html http://lists.squid-cache.org/pipermail/squid-announce/2021-May/000130.html http://lists.squid-cache.org/pipermail/squid-announce/2021-May/000131.html http://lists.squid-cache.org/pipermail/squid-announce/2021-May/000132.html http://lists.squid-cache.org/pipermail/squid-announce/2021-May/000133.html Comment: This bulletin contains five (5) Squid security advisories. This advisory references vulnerabilities in products which run on platforms other than Squid. It is recommended that administrators running Squid check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- Squid Proxy Cache Security Update Advisory SQUID-2021:1 __________________________________________________________________ Advisory ID: | SQUID-2021:1 Date: | May 10, 2021 Summary: | Denial of Service in URN processing Affected versions: | Squid 2.0 -> 4.14 | Squid 5.x -> 5.0.5 Fixed in version: | Squid 4.15 and 5.0.6 __________________________________________________________________ __________________________________________________________________ Problem Description: Due to a buffer management bug Squid is vulnerable to a Denial of service attack against the server it is operating on. This attack is limited to proxies which attempt to resolve a "urn:" resource identifier. Support for this resolving is enabled by default in all Squid. __________________________________________________________________ Severity: This problem allows a malicious server in collaboration with a trusted client to consume arbitrarily large amounts of memory on the server running Squid. Lack of available memory resources impacts all services on the machine running Squid. Once initiated the DoS situation will persist until Squid is shutdown. CVSS Score of 8.5 __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: Squid older than 3.5.28 have not been tested and should be assumed to be vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.5 are vulnerable. __________________________________________________________________ Workaround: Disable URN processing by the proxy. Add these lines to squid.conf: acl URN proto URN http_access deny URN __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Amos Jeffries of Treehouse Networks Ltd. __________________________________________________________________ Revision history: 2021-02-22 06:55:38 UTC Initial Report 2021-02-24 00:53:21 UTC Patch Released 2021-03-17 06:19:09 UTC CVE Assignment - -------------------------------------------------------------------------------- Squid Proxy Cache Security Update Advisory SQUID-2021:2 __________________________________________________________________ Advisory ID: | SQUID-2021:2 Date: | May 10, 2021 Summary: | Denial of Service in HTTP Response Processing Affected versions: | Squid 4.x -> 4.14 | Squid 5.x -> 5.0.5 Fixed in version: | Squid 4.15, 5.0.6 __________________________________________________________________ __________________________________________________________________ Problem Description: Due to an input validation bug Squid is vulnerable to a Denial of Service against all clients using the proxy. __________________________________________________________________ Severity: This problem allows a remote server to perform Denial of Service when delivering HTTP Response messages. The issue trigger is a header which can be expected to exist in HTTP traffic without any malicious intent by the server. CVSS Score of 7.9 __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: All Squid older than 4.0 are not vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.5 are vulnerable. __________________________________________________________________ Workaround: There are no known workarounds for this vulnerability. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Alex Rousskov of The Measurement Factory. __________________________________________________________________ Revision history: 2021-03-08 19:45:14 UTC Initial Report 2021-03-16 15:45:11 UTC Patch Released 2021-03-18 01:33:50 UTC CVE Allocation - -------------------------------------------------------------------------------- Squid Proxy Cache Security Update Advisory SQUID-2021:4 __________________________________________________________________ Advisory ID: | SQUID-2021:4 Date: | May 10, 2021 Summary: | Multiple issues in HTTP Range header Affected versions: | Squid 2.5 -> 2.7.STABLE9 | Squid 3.x -> 3.5.28 | Squid 4.x -> 4.14 | Squid 5.x -> 5.0.5 Fixed in version: | Squid 4.16, 5.0.6 __________________________________________________________________ __________________________________________________________________ Problem Description: Due to an incorrect input validation bug Squid is vulnerable to a Denial of Service attack against all clients using the proxy. Due to an incorrect memory management bug Squid is vulnerable to a Denial of Service attack against all clients using the proxy. Due to an integer overflow bug Squid is vulnerable to a Denial of Service attack against all clients using the proxy. __________________________________________________________________ Severity: These problems all allow a trusted client to perform Denial of Service when making HTTP Range requests. The integer overflow problem allows a remote server to perform Denial of Service when delivering responses to HTTP Range requests. The issue trigger is a header which can be expected to exist in HTTP traffic without any malicious intent. CVSS Score of 8.0 __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: Squid 5: If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: Squid older than 3.5.28 have not been tested and should be assumed to be vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.5 are vulnerable. __________________________________________________________________ Workaround: There are no workarounds known for these problems. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Alex Rousskov of The Measurement Factory. __________________________________________________________________ Revision history: 2021-03-19 06:49:52 UTC Initial Report of Denial of Service 2021-03-24 08:51:08 UTC Additional Report of Use-After-Free 2021-03-25 21:57:07 UTC Additional Report of integer-overflow - -------------------------------------------------------------------------------- Squid Proxy Cache Security Update Advisory SQUID-2021:3 __________________________________________________________________ Advisory ID: | SQUID-2021:3 Date: | May 10, 2021 Summary: | Denial of Service issue in Cache Manager Affected versions: | Squid 1.x -> 3.5.28 | Squid 4.x -> 4.14 | Squid 5.x -> 5.0.4 Fixed in version: | Squid 4.15 and 5.0.5 __________________________________________________________________ __________________________________________________________________ Problem Description: Due to an incorrect parser validation bug Squid is vulnerable to a Denial of Service attack against the Cache Manager API. __________________________________________________________________ Severity: This problem allows a trusted client to trigger memory leaks which over time lead to a Denial of Service against Squid and the machine it is operating on. This attack is limited to clients with Cache Manager API access privilege. CVSS Score of 7.8 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H/E:F/RL:O/RC:C/CR:X/IR:X/AR:H/MAV:N/MAC:H/MPR:H/MUI:N/MS:C/MC:X/MI:X/MA:H&version=3.1 __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: Squid 5: If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: Squid older than 3.5.28 have not been tested and should be assumed to be vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.4 are vulnerable. __________________________________________________________________ Workaround: Either, Disable Cache Manager access entirely if not needed. Place the following line in squid.conf before lines containing "allow" : http_access deny manager Or, Harden Cache Manager access privileges. For example; require authentication or other access controls in http_access beyond the default IP address restriction. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Amos Jeffries of Treehouse Networks Ltd. __________________________________________________________________ Revision history: 2021-03-03 17:02:25 UTC Initial Report 2021-03-16 01:59:45 UTC Patch Released 2021-03-17 06:19:09 UTC CVE Assignment - -------------------------------------------------------------------------------- Squid Proxy Cache Security Update Advisory SQUID-2021:5 __________________________________________________________________ Advisory ID: | SQUID-2021:5 Date: | May 10, 2021 Summary: | Denial of Service in HTTP Response Processing Affected versions: | Squid 2.x -> 2.7.STABLE9 | Squid 3.x -> 3.5.28 | Squid 4.x -> 4.14 | Squid 5.x -> 5.0.5 Fixed in version: | Squid 4.15, 5.0.6 __________________________________________________________________ __________________________________________________________________ Problem Description: Due to an input validation bug Squid is vulnerable to a Denial of Service against all clients using the proxy. __________________________________________________________________ Severity: This problem allows a remote server to perform Denial of Service when delivering HTTP Response messages. The issue trigger is a header which can be expected to exist in HTTP traffic without any malicious intent by the server. CVSS Score of 8.8 __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: Squid 5: If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: Squid older than 4.15 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.0.5 are vulnerable. __________________________________________________________________ Workaround: There are no known workarounds to this issue. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Alex Rousskov of The Measurement Factory. __________________________________________________________________ Revision history: 2021-03-05 22:11:43 UTC Initial Report - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJmt+ONLKJtyKPYoAQhY7g/9HPBaht6GBO4yj2wPTYcN2D10E3yV+t1t WdebcxmYWKCAm3QCWGeLniWOyjB4zUhHv3WJNKjDdsPbXhsxDnonpByKAGzm3ATq 2CxkOdFjhmp9rA6U7cku2DCXlgpZrqAKpINhfZR/J8ycL8Um2PJcIB8U+4kTkEZc LSE+Iga4xqpIzp+cvfW9PAH0h13vYJX3uGbFVOIZyd0gPr7D1RwQ2t5tIaatvgJA hKmVsWaBT9k6LzofoKaa11PZzLd1tHkAHwvwKQSwprZxHMGs16OASpUpBY+hfs0Y ThtPnY0Xp4E4VarucbRYrZV1CCYKGw6eIsc6gRdtX0MrZnWRytzFCB/ipNlI43LY nbqmI/LLGyZY+epQHmM4btkmAvTYWly+AXlI6HsyQwQSgAYXa6e/PrIz5Pxrtq+7 eAaeaWY3nwyRHXf0C8RFY4HfT2plMEEtEMfJdLAisOnhphqTHzvuu7x6WzuS+CwH CTe2cu4E2gP/UInGI3ekTJp1xJJPn2sGMsHyiW/6FzHdm5SGBeiAqcTbJirrM7NO By3FEBfr7yECm/hHT36YkUHkfitNZicC56WBAasR9PfnYihCA0/TfQPdMBhB4AZZ msYcijSOuMe254IuAvF31zuJL3YIDX7zqoWQy8DrOTgl0No69m2v0kQp6cjJR7Wq 5rojNhVG7/M= =MdNu -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 5 óra 12 perc

ESB-2021.1582 - [Ubuntu] WebKitGTK: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1582 USN-4939-1: WebKitGTK vulnerabilities 11 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WebKitGTK Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-1871 CVE-2021-1844 CVE-2021-1788 Reference: ESB-2021.1566 ESB-2021.1486 ESB-2021.1420 ESB-2021.0827 Original Bulletin: https://ubuntu.com/security/notices/USN-4939-1 - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4939-1: WebKitGTK vulnerabilities 10 May 2021 Several security issues were fixed in WebKitGTK. Releases o Ubuntu 20.10 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS Packages o webkit2gtk - Web content engine library for GTK+ Details A large number of security issues were discovered in the WebKitGTK Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10 o libwebkit2gtk-4.0-37 - 2.32.0-0ubuntu0.20.10.1 o libjavascriptcoregtk-4.0-18 - 2.32.0-0ubuntu0.20.10.1 Ubuntu 20.04 o libwebkit2gtk-4.0-37 - 2.32.0-0ubuntu0.20.04.1 o libjavascriptcoregtk-4.0-18 - 2.32.0-0ubuntu0.20.04.1 Ubuntu 18.04 o libwebkit2gtk-4.0-37 - 2.32.0-0ubuntu0.18.04.1 o libjavascriptcoregtk-4.0-18 - 2.32.0-0ubuntu0.18.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes. References o CVE-2021-1871 o CVE-2021-1844 o CVE-2021-1788 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJmrpeNLKJtyKPYoAQjLIQ//WHtE8VH3yZbkDIIKRazzYORjUq3lZ/vq gUn8LaMfNh497ijC1QT/skTwjKchxYkv3Xhzg1thfW5E3b985F+TXTxyMS4/Rmv9 9zFcYlxO6kA1wzx3Jyq9v+rLM8HPxzMFH8BtCDgHVJnQSdU/vl7s22RScvsRJRr/ LXtmqNoXvQpL1U5zbHw6SB83Smktmxex01V0YfJSLgWjHMTunxoKMkisGv8WaL3D uffq8sftk/dI1692GifEUq3hBD/XKqofmKk23F4BXsyvpXJ5iJ22PcGQfk0jFDNQ Ysi1gmOrZNN42JWPheqFL3uAT6K4bmQ7Mb3f6vFK46XzWTdKHgZ5YGJpNvROof6g UIuXg/SAy1fsPAU8keMNWxC2229FdVFUJXdDqGMCFX5aXiXMLIE8PHa5rA6dWP+t FiRLe8+7iORcMUpWBPCwe/EUgYExyynxFUlsnGD4NeVE1rbehs+mTG/SircBehx3 dhQ61Vi/rLnZ/7iubpt6JifXQlL3nsvSEj0175Mpa3dCjTq5hjslP5frnQk2O8xE CX5pdf04FMryCKVIs2qbAHggtD3aUcL94x9q8G5CJvf4rOMHqLflrmMcaTx2R21g VixzIRZGCk9N0UOC9pLGP84bMxay1fM7/ickps5VDnVv7Dq39xHKT7hLx8ihoLXs 7ZJ5tgjZnCA= =po7d -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 5 óra 12 perc

ESB-2021.1581 - [Appliance] Traffix SDC: Access confidential data - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1581 Linux kernel vulnerability CVE-2020-1749 11 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Traffix SDC Publisher: F5 Networks Operating System: Network Appliance Impact/Access: Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-1749 Reference: ESB-2021.1212 ESB-2021.0377 ESB-2020.1204 Original Bulletin: https://support.f5.com/csp/article/K02186513 - --------------------------BEGIN INCLUDED TEXT-------------------- K02186513: Linux kernel vulnerability CVE-2020-1749 Original Publication Date: 10 May, 2021 Security Advisory Description A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. (CVE-2020-1749) Impact This may allow anyone in between the two endpoints of the tunnel to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. Security Advisory Status F5 Product Development has assigned ID SDC-1086 (Traffix) to this vulnerability. To determine if your product and version have been evaluated for this vulnerability, refer to the Applies to (see versions) box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases, point releases, or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to K51812227: Understanding security advisory versioning. Note: After a fix is introduced for a given minor branch, that fix applies to all subsequent maintenance and point releases for that branch, and no additional fixes for that branch will be listed in the table. For example, when a fix is introduced in 14.1.2.3, the fix also applies to 14.1.2.4, and all later 14.1.x releases (14.1.3.x., 14.1.4.x). For more information, refer to K51812227: Understanding security advisory versioning. Additionally, software versions preceding those listed in the following table have reached the End of Technical Support (EoTS) phase of their lifecycle and are no longer evaluated for security issues. For more information, refer to the Security hotfixes section of K4602: Overview of the F5 security vulnerability response policy. +------------+------+--------------+----------+----------+------+-------------+ | | |Versions known|Fixes | |CVSSv3|Vulnerable | |Product |Branch|to be |introduced|Severity |score^|component or | | | |vulnerable^1 |in | |2 |feature | +------------+------+--------------+----------+----------+------+-------------+ | |16.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |15.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |14.x |None |Not | | | | |BIG-IP (all | | |applicable|Not | | | |modules) +------+--------------+----------+vulnerable|None |None | | |13.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |12.x |None |Not | | | | | | | |applicable| | | | | +------+--------------+----------+ | | | | |11.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ | |8.x |None |Not | | | | | | | |applicable| | | | |BIG-IQ +------+--------------+----------+ | | | |Centralized |7.x |None |Not |Not |None |None | |Management | | |applicable|vulnerable| | | | +------+--------------+----------+ | | | | |6.x |None |Not | | | | | | | |applicable| | | | +------------+------+--------------+----------+----------+------+-------------+ |F5OS |1.x |None |Not |Not |None |None | | | | |applicable|vulnerable| | | +------------+------+--------------+----------+----------+------+-------------+ |Traffix SDC |5.x |5.1.0 |None |High |7.5 |Linux kernel | +------------+------+--------------+----------+----------+------+-------------+ ^1F5 evaluates only software versions that have not yet reached the End of Technical Support (EoTS) phase of their lifecycle. ^2The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge. Recommended Actions If you are running a version listed in the Versions known to be vulnerable column, you can eliminate this vulnerability by installing a version listed in the Fixes introduced in column. If the Fixes introduced in column does not list a version for your branch, then no update candidate currently exists for that branch and F5 recommends upgrading to a version with the fix (refer to the table). If the Fixes introduced in column lists a version prior to the one you are running, in the same branch, then your version should have the fix. Mitigation None Supplemental Information o K41942608: Overview of security advisory articles o K4602: Overview of the F5 security vulnerability response policy o K4918: Overview of the F5 critical issue hotfix policy o K8986: F5 software lifecycle policy o K9502: BIG-IP hotfix and point release matrix o K13123: Managing BIG-IP product hotfixes (11.x - 16.x) o K167: Downloading software and firmware from F5 o K9970: Subscribing to email notifications regarding F5 products o K9957: Creating a custom RSS feed to view new and updated documents - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJmpZ+NLKJtyKPYoAQgUVw/6AoCk9Haif2MdhZw1U43+Yku2Io+uMeDo +2ZOR0wdWvO79jjfaGAcX2DnnTSKQTPHgEjJt/9xUcL/59DIITUgGeL5RNmvYLzb pz7jy1YGyvWEDKLd1ZdMMD5yg60XltlqfZBvbWUUp2X4JuF0zOkmHc4x9oOopquq HY+WpnDpEa1Ab1fJ1cf3u5brIsAyZvr8U9n7kThYaVTiLDIzOPCleZPD2dxQAy9I gN+jpLlrTeu0dpQvkBHtqXNm3NFXJhj6gVSx0JefoAtvVSlAWm5qkKaoULBR6McH Qgq/wWiBlBFdEbTvW/Oj2ZrFfbJMrT2xs647dT6pBYuUaGudOIoFMHiHoK4E3tAy XuNWaNiGivrqLwiopNc4aX3P1bIqgI1wSGukuVvosZ5KgbhQ+nlYaOkdjeF+9AGb d2cnrwopgNjuIMo/4kLKRycFMkoNhTt6LrITUMXR+M+4eLWobU2IT8sFmiei3f3j +/l6bp+IsxM1k+9BvHRBBxN15gqRXc93iKOls1rXXALASCe3hESunZuDnnNipqHI hfSwGoymSUHyoWlbY0HPA5MHeJU1k7nk6ekYDYXwq89S+WIQ8G/pvw5LHopALIU9 9DJKDLoEeBWw+Hs/9p/Sk0lzLGSQjpXHIylXJ8nDRdKZREWmLqrlwdbJl2JXfsrs Jpnniq7/L70= =VDi9 -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 5 óra 12 perc

ESB-2021.1580 - [Win][UNIX/Linux][Ubuntu] PyYAML: Execute arbitrary code/commands - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1580 USN-4940-1: PyYAML vulnerability 11 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: PyYAML Publisher: Ubuntu Operating System: Ubuntu Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-14343 Original Bulletin: https://ubuntu.com/security/notices/USN-4940-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running PyYAML check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4940-1: PyYAML vulnerability 10 May 2021 PyYAML could be made to run programs if it opened a specially crafted YAML file. Releases o Ubuntu 20.10 o Ubuntu 20.04 LTS Packages o pyyaml - YAML parser and emitter for Python Details It was discovered that PyYAML incorrectly handled untrusted YAML files with the FullLoader loader. A remote attacker could possibly use this issue to execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10 o python3-yaml - 5.3.1-2ubuntu0.1 Ubuntu 20.04 o python-yaml - 5.3.1-1ubuntu0.1 o python3-yaml - 5.3.1-1ubuntu0.1 In general, a standard system update will make all the necessary changes. References o CVE-2020-14343 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJmm2+NLKJtyKPYoAQirng/8CG9uMwT1S85SZv4ySa7ELDS+cZ1Y2jSb JyBVlNv8GXKGmbCllI+jwqUlQLD5QA/39yonxZXrU55/F7BmKjwrcs2zmmDvFnei LeVdP1gUmXy7GQNUnu5YRoG1SYrNNya2QAqolJrJ3JaoEaXwwYH9GpvWLLfjdc8k LDftSwXdv52nCIny7Bqh6CXL64iW9rjK9dSlj5JvbKa662Qpkqsi9mJzPyG0hBBp pfwfc+jBaUNe6oWAJ/yS9fFDbsIbIIo9lOteCmBPW46lcNbOXVCE27LHORMZxEBK N2SbBG7wAS0/iZAcQ7tGujyysZXKADF7X68HdBbwuYk5na91P/E5/SZn1CqJVs1P nRwkjtPgwIwbY2S1I4yx/eUnXpDyayFJ2a9fUyp7+soIUpOgfXBmg6ZqW2Rh6PGw S2HAIHyUcT+8tpNcBacFsvMtig1xA1Y0q9PULso6XBzxDqCR2rl5MYzIHk3nnVc8 3I26jizesMhvoNdPyQDQbwbmlBqT66QnphF9Mu3myqfPQA5lH3a0wigvwSd3TAXl JyqJe+zrrCCoMzlx3DLCL5ZEJylitcQw9IV/e//TJJ8SD7k6GesYnuqIVF7UZiVT q3/ZL9x2pWOF0xsGoTr5f8yyEE+TJ32caop1RjFcxpeW+g/LDPbKDmu2WReEfDwm hancKZNmTnc= =1ZZR -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 5 óra 12 perc

ESB-2021.1579 - [Win][UNIX/Linux][Debian] hivex: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1579 hivex security update 11 May 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: hivex Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote with User Interaction Read-only Data Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-3504 Original Bulletin: https://lists.debian.org/debian-security-announce/2021/msg00094.html Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running hivex check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-4913-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff May 10, 2021 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : hivex CVE ID : CVE-2021-3504 Debian Bug : 988024 Jemery Galindo discovered an out-of-bounds memory access in Hivex, a library to parse Windows Registry hive files. For the stable distribution (buster), this problem has been fixed in version 1.3.18-1+deb10u1. We recommend that you upgrade your hivex packages. For the detailed security status of hivex please refer to its security tracker page at: https://security-tracker.debian.org/tracker/hivex Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmCZgWcACgkQEMKTtsN8 TjbspQ/9HW9L+0iWMZaHrY1M/5eESsKIOtCj/b1YqXDAcvpj1pF9SlHoWQMwdDht i6HDRiEbyYSOacASAq1aS88ynh5LYyYRcXNBOIqGY/n0EYu8+4GMxvqsCBc/057o kjMmTdzr5xRa1gL1EER+PwZ/kF7kFY7kReg1zgBT4ZSjlbEeZm1dGF1TAHwfVLQ+ jp7EPUIvCzJF4wmvUTrFOxZPbaoYckFwNfcPxetArc3JgZWlPl3MZtJzUTyis/Nf PZCuc7Qo2aVScPsGQHym4efB/WB7eJ6CP3qmgtV9kRrkmQXWNPVtwfXk/EKPtdCc rxP/Fvv3I2JpPUMaM8n/O8HSXq2qPK0DpF6YcP0Fgcbis/6wrNHo5ZeEautLyFzq Dne1GL2pqfh2xO14iMGPkkG99v39p0rEr7hgknkleIQt1NBaRSZqGm7SmF1BXmyj O0+Jcnx6A80MrqpA9GMvPAITGunD/rpHhkSgxxpQeUnsflIeoCS5WMvFbwZ0xVwB gqbOROe1UuyT4kBxawVAR9u0UhzpKeV4vXrZCNRAVq63CBUX+2QEvRGMDSmecM3J QLThqTH1DGFinPXIa8DwWDKNdv7w1rnocJ2dseSI0sra0LsK9L8vDsjbgpFuOOe3 WRUt/X+Oj/5knMUSM0CnDiZH92PhrhGisk5DoRSPnu9aTEKf3cI= =0RQ5 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYJmlpuNLKJtyKPYoAQjPJw//Vvrn47SV52VtehIg2tceXxTQroZAmwpQ E6VLLBWe1kGXZMPegxWa0z9V9fZ4r38FOYhnkboYvIo4nmnHvF3g046HrIqNghfl L37ry4OPgK0fqBGOvSG29oDv4K6JpBFOkq4ArlIbZ8HEfOX6VEyXbb4XVcLsgPMN X46Az4eAKOHzh65//lAZGUteJ5ZSLYwtxFzdoCHSSjEaf3xv2LTbd69F9jcs6P4O Uxo7aE71Zxk4l/sH6KJkh9/xp9hoeag9MSLfT9zHwVFu8bvzS8/4VFP6Z1Wd3rlt 656FXmtNix4o8xgMiDLIa4uWSy93hJLB9aK3v+ikAK84Wptc/bAzDzhCkQOZLyz3 KU8N+3zAKTmn9pxPmPr/OAoTv7lSctkf6Gouq/TAIfwzmmu7QMDMym3PEQXp3Oqc V8L8zoEIptkv2gtZoiyJhxkwBVk3zQzh3DdweSKiRlS5GPcs2avUkTcNCIhdw830 MvfCHOXuG3CMj92Kuk8wvoWDkultEK1yme+CLipFw3V9B6jLapbckkY7qcbkDo3T pQuwH+H7+VCI2tW76o7LpOUxS3pPN/7GzvzFWtWuqNkVci3shfPXXxSAG7ceDdhK C71tEUgyZNCMucTFojKDQLDxOYrxDapGSEbzKBBesiZZukXSztjjr1Dwg5dx9rs6 7s/3+743l+c= =hh6+ -----END PGP SIGNATURE-----