Malware Devil

Thursday, August 6, 2020

Summarizing the BlackHat Threat Intelligence Report – Matthew Gardiner – BH2020

Matthew Gardiner, Principal Security Strategist, from Mimecast will provide and overview of Mimecast and the results of their Threat Intelligence Report, BlackHat USA Edition, August 2020.

This segment is sponsored by Mimecast.

Visit https://securityweekly.com/mimecastbh to learn more about them!

Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.

Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4

Show Notes: https://securityweekly.com/bh204



https://www.malwaredevil.com/2020/08/06/summarizing-the-blackhat-threat-intelligence-report-matthew-gardiner-bh2020/?utm_source=rss&utm_medium=rss&utm_campaign=summarizing-the-blackhat-threat-intelligence-report-matthew-gardiner-bh2020

Threat Hunting & Incident Resp w/ Google Cloud & Tanium – Anton Chuvakin, Matt Hastings – BH2020

Matt and Anton will discuss the new integration between Tanium and Chronicle, designed for distributed IT in a remote-work world. The two will explore some of the unique challenges that security teams are facing in light of this change. They will also provide details on the new integrations, which combines comprehensive endpoint telemetry from Tanium with Chronicle’s cloud-scale analytics to inform threat hunting and investigations with one year of recorded endpoint activity.

This is just the beginning of the partnership between Google Cloud and Tanium. Check out the blog post on Tanium’s website to learn more about the future of the partnership and what it means for security.

This segment is sponsored by Tanium.

Visit https://securityweekly.com/tanium to learn more about them!
Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.

Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4
Show Notes: https://securityweekly.com/bh204



https://www.malwaredevil.com/2020/08/06/threat-hunting-incident-resp-w-google-cloud-tanium-anton-chuvakin-matt-hastings-bh2020/?utm_source=rss&utm_medium=rss&utm_campaign=threat-hunting-incident-resp-w-google-cloud-tanium-anton-chuvakin-matt-hastings-bh2020

Hacked Data Broker Accounts Fueled Phony COVID Loans, Unemployment Claims

A group of thieves thought to be responsible for collecting millions in fraudulent small business loans and unemployment insurance benefits from COVID-19 economic relief efforts gathered personal data on people and businesses they were impersonating by leveraging several compromised accounts at a little-known U.S. consumer data broker, KrebsOnSecurity has learned.

In June, KrebsOnSecurity was contacted by a cybersecurity researcher who discovered that a group of scammers was sharing highly detailed personal and financial records on Americans via a free web-based email service that allows anyone who knows an account’s username to view all email sent to that account — without the need of a password.

The source, who asked not to be identified in this story, said he’s been monitoring the group’s communications for several weeks and sharing the information with state and federal authorities in a bid to disrupt their fraudulent activity.

The source said the group appears to consist of several hundred individuals who collectively have stolen tens of millions of dollars from U.S. state and federal treasuries via phony loan applications with the U.S. Small Business Administration (SBA) and through fraudulent unemployment insurance claims made against several states.

KrebsOnSecurity reviewed dozens of emails the fraud group exchanged, and noticed that a great many consumer records they shared carried a notation indicating they were cut and pasted from the output of queries made at Interactive Data LLC, a Florida-based data analytics company.

Interactive Data, also known as IDIdata.com, markets access to a “massive data repository” on U.S. consumers to a range of clients, including law enforcement officials, debt recovery professionals, and anti-fraud and compliance personnel at a variety of organizations.

The consumer dossiers obtained from IDI and shared by the fraudsters include a staggering amount of sensitive data, including:

-full Social Security number and date of birth;
-current and all known previous physical addresses;
-all known current and past mobile and home phone numbers;
-the names of any relatives and known associates;
-all known associated email addresses
-IP addresses and dates tied to the consumer’s online activities;
-vehicle registration, and property ownership information
-available lines of credit and amounts, and dates they were opened
-bankruptcies, liens, judgments, foreclosures and business affiliations

Reached via phone, IDI Holdings CEO Derek Dubner acknowledged that a review of the consumer records sampled from the fraud group’s shared communications indicates “a handful” of authorized IDI customer accounts had been compromised.

“We identified a handful of legitimate businesses who are customers that may have experienced a breach,” Dubner said.

Dubner said all customers are required to use multi-factor authentication, and that everyone applying for access to its services undergoes a rigorous vetting process.

“We absolutely credential businesses and have several ways do that and exceed the gold standard, which is following some of the credit bureau guidelines,” he said. “We validate the identity of those applying [for access], check with the applicant’s state licensor and individual licenses.”

Citing an ongoing law enforcement investigation into the matter, Dubner declined to say if the company knew for how long the handful of customer accounts were compromised, or how many consumer records were looked up via those stolen accounts.

“We are communicating with law enforcement about it,” he said. “There isn’t much more I can share because we don’t want to impede the investigation.”

The source told KrebsOnSecurity he’s identified more than 2,000 people whose SSNs, DoBs and other data were used by the fraud gang to file for unemployment insurance benefits and SBA loans, and that a single payday can land the thieves $20,000 or more. In addition, he said, it seems clear that the fraudsters are recycling stolen identities to file phony unemployment insurance claims in multiple states.

ANALYSIS

Hacked or ill-gotten accounts at consumer data brokers have fueled ID theft and identity theft services of various sorts for years. In 2013, KrebsOnSecurity broke the news that the U.S. Secret Service had arrested a 24-year-old man named Hieu Minh Ngo for running an identity theft service out of his home in Vietnam.

Ngo’s service, variously named superget[.]info and findget[.]me, gave customers access to personal and financial data on more than 200 million Americans. He gained that access by posing as a private investigator to a data broker subsidiary acquired by Experian, one of the three major credit bureaus in the United States.

Ngo’s ID theft service superget.info

Experian was hauled before Congress to account for the lapse, and assured lawmakers there was no evidence that consumers had been harmed by Ngo’s access. But as follow-up reporting showed, Ngo’s service was frequented by ID thieves who specialized in filing fraudulent tax refund requests with the Internal Revenue Service, and was relied upon heavily by an identity theft ring operating in the New York-New Jersey region.

Also in 2013, KrebsOnSecurity broke the news that ssndob[.]ms, then a major identity theft service in the cybercrime underground, had infiltrated computers at some of America’s large consumer and business data aggregators, including LexisNexis Inc., Dun & Bradstreet, and Kroll Background America Inc.

The now defunct SSNDOB identity theft service.

In 2006, The Washington Post reported that a group of five men used stolen or illegally created accounts at LexisNexis subsidiaries to lookup SSNs and other personal information more than 310,000 individuals. And in 2004, it emerged that identity thieves masquerading as customers of data broker Choicepoint had stolen the personal and financial records of more than 145,000 Americans.

Those compromises were noteworthy because the consumer information warehoused by these data brokers can be used to find the answers to so-called knowledge-based authentication (KBA) questions used by companies seeking to validate the financial history of people applying for new lines of credit.

In that sense, thieves involved in ID theft may be better off targeting data brokers like IDI and their customers than the major credit bureaus, said Nicholas Weaver, a researcher at the International Computer Science Institute and lecturer at UC Berkeley.

“This means you have access not only to the consumer’s SSN and other static information, but everything you need for knowledge-based authentication because these are the types of companies that are providing KBA data.”

The fraud group communications reviewed by this author suggest they are cashing out primarily through financial instruments like prepaid cards and a small number of online-only banks that allow consumers to establish accounts and move money just by providing a name and associated date of birth and SSN.

While most of these instruments place daily or monthly limits on the amount of money users can deposit into and withdraw from the accounts, some of the more popular instruments for ID thieves appear to be those that allow spending, sending or withdrawal of between $5,000 to $7,000 per transaction, with high limits on the overall number or dollar value of transactions allowed in a given time period.

KrebsOnSecurity is investigating the extent to which a small number of these financial instruments may be massively over-represented in the incidence of unemployment insurance benefit fraud at the state level, and in SBA loan fraud at the federal level. Anyone in the financial sector or state agencies with information about these apparent trends may confidentially contact this author at krebsonsecurity @ gmail dot com, or via the encrypted message service Wickr at “krebswickr“.

The looting of state unemployment insurance programs by identity thieves has been well documented of late, but far less public attention has centered on fraud targeting Economic Injury Disaster Loan (EIDL) and advance grant programs run by the U.S. Small Business Administration in response to the COVID-19 crisis.

Late last month, the SBA Office of Inspector General (OIG) released a scathing report (PDF) saying it has been inundated with complaints from financial institutions reporting suspected fraudulent EIDL transactions, and that it has so far identified $250 million in loans given to “potentially ineligible recipients.” The OIG said many of the complaints were about credit inquiries for individuals who had never applied for an economic injury loan or grant.

The figures released by the SBA OIG suggest the financial impact of the fraud may be severely under-reported at the moment. For example, the OIG said nearly 3,800 of the 5,000 complaints it received came from just six financial institutions (out of several thousand across the United States). One credit union reportedly told the U.S. Justice Department that 59 out of 60 SBA deposits it received appeared to be fraudulent.

Read More



https://www.malwaredevil.com/2020/08/06/hacked-data-broker-accounts-fueled-phony-covid-loans-unemployment-claims/?utm_source=rss&utm_medium=rss&utm_campaign=hacked-data-broker-accounts-fueled-phony-covid-loans-unemployment-claims

Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack

Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear.
Read More



https://www.malwaredevil.com/2020/08/06/black-hat-2020-satellite-comms-globally-open-to-300-eavesdropping-hack/?utm_source=rss&utm_medium=rss&utm_campaign=black-hat-2020-satellite-comms-globally-open-to-300-eavesdropping-hack

ESB-2020.2701 – [Cisco] Cisco Cyber Vision Center Software Access Control: Unauthorised access – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2701
  Cisco Cyber Vision Center Software Access Control Bypass Vulnerability
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Cyber Vision Center Software Access Control
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3448  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cvc-bypass-K99Cb2ff

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Cyber Vision Center Software Access Control Bypass Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-cvc-bypass-K99Cb2ff

First Published: 2020 August 5 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds available

Cisco Bug IDs:   CSCvt81670

CVE-2020-3448    

CWE-284

CVSS Score:
5.8  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in an access control mechanism of Cisco Cyber Vision Center
    Software could allow an unauthenticated, remote attacker to bypass
    authentication and access internal services that are running on an affected
    device.

    The vulnerability is due to insufficient enforcement of access control in
    the software. An attacker could exploit this vulnerability by directly
    accessing the internal services of an affected device. A successful exploit
    could allow an attacker to impact monitoring of sensors that are managed by
    the software.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-cvc-bypass-K99Cb2ff

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco Cyber Vision
    Center Software releases earlier than releases 3.0.4 and 3.1.0.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco Cyber Vision Center Software releases
    3.0.4 and later and releases 3.1.0 and later contained the fix for this
    vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-cvc-bypass-K99Cb2ff

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   |          | Final  | 2020-AUG-05  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=h0AF
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2701-cisco-cisco-cyber-vision-center-software-access-control-unauthorised-access-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2701-cisco-cisco-cyber-vision-center-software-access-control-unauthorised-access-remote-unauthenticated

ESB-2020.2699 – [Cisco] Cisco Identity Services Engine: Access confidential data – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2699
     Cisco Identity Services Engine Password Disclosure Vulnerability
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Identity Services Engine
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3525  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-pass-disclosure-K8p2Nsgg

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Identity Services Engine Password Disclosure Vulnerability

Priority:        Medium

Advisory ID:     cisco-sa-ise-pass-disclosure-K8p2Nsgg

First Published: 2020 August 5 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds available

Cisco Bug IDs:   CSCvs42441

CVE-2020-3525    

CWE-200

CVSS Score:
4.3  AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:X

Summary

  o A vulnerability in the Admin portal of Cisco Identity Services Engine (ISE)
    could allow an authenticated, remote attacker to recover service account
    passwords that are saved on an affected system.

    The vulnerability is due to the incorrect inclusion of saved passwords when
    loading configuration pages in the Admin portal. An attacker with read or
    write access to the Admin portal could exploit this vulnerability by
    browsing to a page that contains sensitive data. A successful exploit could
    allow the attacker to recover passwords and expose those accounts to
    further attack.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-ise-pass-disclosure-K8p2Nsgg

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco ISE releases
    earlier than Release 2.7p2.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco ISE releases 2.7p2 and later contained
    the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o Cisco would like to thank Richard Conner of the IBM XFR UKI Team for
    reporting this vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-ise-pass-disclosure-K8p2Nsgg

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2020-AUG-05  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXyuptuNLKJtyKPYoAQhSnQ/+IepOdy/hw0nXig+n2wGe/ipySM6Ppc/X
01c+5xVXBesg/UdZfStCMqR+7eEzJO5ZVuv0FRrkNXZM8ZCW3IjzJK7e9fuPZ5tV
P0DuEe2Po545bAveH6EwOPyG7dWkpHvhOmZuE7J9lpG0JHuzgJKlkGVdiZFzT0qb
iFjEVp9iZdSd7CmRBgUDkitMas9uZGeAGemojKPziv6C0SMbklwTcRXVnolt1ytV
wh/L/RBU0NuF3NVC+SXSdoiHGL7hShZfnsLm/w72KbVaHen6/eeu/Kjtlss4FQmc
uN/xF4yLk6PcPHzChUqu+Dv4G9UG2LVs1+/3A/OSIfEGH5YzlW5PtjC5Cr/5Be3Y
vz85+EUlRHurfg5/AhuHtzaSGeiVU55ttgSFRcfHolEzXFwvSB5zB+mTxaTVSmot
eR0MhgcOwBY/g85tGCt84bUSyWLTqCr7gIaWiiKBH54Xj4tDrriqqE9lYG9p8257
R/wI0M7fo2lNceFRrtgMKWxjMa8Qd3sA8fk1BaQvPf9dc6bqx3kVj1r0y0aMey/c
yULv5nTRV9W0A2qrVlraITbHxm40xIByOql7pFQ7T3Jjr3ucWUaM0YOzCrATwNm1
qDyHw9cyr3eLMnuZeZkhDywHGxjLWC+oEw5vLmvJ8nwnst5YRb/4ReRcuV+fl0Dg
D2NQ44yyk2Y=
=BZqp
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2699-cisco-cisco-identity-services-engine-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2699-cisco-cisco-identity-services-engine-access-confidential-data-existing-account

ESB-2020.2698 – [Cisco] Cisco Small Business Smart and Managed Switches: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2698
         Cisco Small Business Smart and Managed Switches Denial of
                           Service Vulnerability
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Small Business Smart and Managed Switches
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3363  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbss-ipv6-dos-3bLk6vA

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability

Priority:        High

Advisory ID:     cisco-sa-sbss-ipv6-dos-3bLk6vA

First Published: 2020 August 5 16:00 GMT

Version 1.0:     Final

Workarounds:     No workarounds available

Cisco Bug IDs:   CSCvt45834

CVE-2020-3363    

CWE-20

CVSS Score:
8.6  AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o A vulnerability in the IPv6 packet processing engine of Cisco Small
    Business Smart and Managed Switches could allow an unauthenticated, remote
    attacker to cause a denial of service (DoS) condition on an affected
    device.

    The vulnerability is due to insufficient validation of incoming IPv6
    traffic. An attacker could exploit this vulnerability by sending a crafted
    IPv6 packet through an affected device. A successful exploit could allow
    the attacker to cause an unexpected reboot of the switch, leading to a DoS
    condition.

    This vulnerability is specific to IPv6 traffic. IPv4 traffic is not
    affected.

    Cisco has released software updates that address this vulnerability for
    devices that have not reached the end of software maintenance. There are no
    workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-sbss-ipv6-dos-3bLk6vA

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a vulnerable software release:

       250 Series Smart Switches
       350 Series Managed Switches
       350X Series Stackable Managed Switches
       550X Series Stackable Managed Switches
       Small Business 200 Series Smart Switches
       Small Business 300 Series Managed Switches
       Small Business 500 Series Stackable Managed Switches

    For information about which Cisco software releases are vulnerable, see the
    Fixed Software section of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license: https://www.cisco.com/c/en/us/products/
    end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Cisco fixed this vulnerability in Release 2.5.5.47 for the following Cisco
    products:

       250 Series Smart Switches
       350 Series Managed Switches
       350X Series Stackable Managed Switches
       550X Series Stackable Managed Switches

    Customers can download the firmware from the Software Center on Cisco.com
    by clicking Browse all and navigating to Switches > LAN Switches - Small
    Business .

    The following Cisco products have passed the end-of-software-maintenance
    milestone. Although these switches are vulnerable, Cisco will not provide a
    firmware fix.

       Small Business 200 Series Smart Switches
       Small Business 300 Series Managed Switches
       Small Business 500 Series Stackable Managed Switches

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-sbss-ipv6-dos-3bLk6vA

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2020-AUG-05  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=VNXr
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2698-cisco-cisco-small-business-smart-and-managed-switches-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2698-cisco-cisco-small-business-smart-and-managed-switches-denial-of-service-remote-unauthenticated

ESB-2020.2697 – [Appliance] Industrial Automation CNCSoft ScreenEditor: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2697
Advisory (icsa-20-217-01) Delta Industrial Automation CNCSoft ScreenEditor
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Industrial Automation CNCSoft ScreenEditor
Publisher:         ICS-CERT
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
                   Access Confidential Data        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-16203 CVE-2020-16201 CVE-2020-16199

Original Bulletin: 
   https://us-cert.cisa.gov/ics/advisories/icsa-20-217-01

- --------------------------BEGIN INCLUDED TEXT--------------------

ICS Advisory (ICSA-20-217-01)

Delta Industrial Automation CNCSoft ScreenEditor

Original release date: August 04, 2020

Legal Notice

All information products included in https://us-cert.gov/ics are provided"as
is" for informational purposes only. The Department of Homeland Security (DHS)
does not provide any warranties of any kind regarding any information contained
within. DHS does not endorse any commercial product or service, referenced in
this product or otherwise. Further dissemination of this product is governed by
the Traffic Light Protocol (TLP) marking in the header. For more information
about TLP, see https://www.us-cert.gov/tlp/ .



1. EXECUTIVE SUMMARY

  o CVSS v3 7.8
  o ATTENTION: Low skill level to exploit
  o Vendor: Delta Electronics
  o Equipment: Industrial Automation CNCSoft ScreenEditor
  o Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Read, Access of
    Uninitialized Pointer

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to
read/modify information, execute arbitrary code, and/or crash the application.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Industrial Automation CNCSoft ScreenEditor, an HMI,
are affected:

  o Industrial Automation CNCSoft ScreenEditor Versions 1.01.23 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121

Multiple stack-based buffer overflow vulnerabilities may be exploited by
processing specially crafted project files, which may allow an attacker to read
/modify information, execute arbitrary code, and/or crash the application.

CVE-2020-16199 has been assigned to these vulnerabilities. A CVSS v3 base score
of 7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U
/C:H/I:H/A:H ).

3.2.2 OUT-OF-BOUNDS READ CWE-125

Multiple out-of-bounds read vulnerabilities may be exploited by processing
specially crafted project files, which may allow an attacker to read
information.

CVE-2020-16201 has been assigned to this vulnerability. A CVSS v3 base score of
3.3 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/
C:L/I:N/A:N ).

3.2.3 ACCESS OF UNINITIALIZED POINTER CWE-824

An uninitialized pointer may be exploited by processing a specially crafted
project file. Successful exploitation of this vulnerability may allow an
attacker to read/modify information, execute arbitrary code, and/or crash the
application.

CVE-2020-16203 has been assigned to this vulnerability. A CVSS v3 base score of
7.8 has been calculated; the CVSS vector string is ( AV:L/AC:L/PR:N/UI:R/S:U/
C:H/I:H/A:H ).

3.3 BACKGROUND

  o CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  o COUNTRIES/AREAS DEPLOYED: Worldwide
  o COMPANY HEADQUARTERS LOCATION: Taiwan

3.4 RESEARCHER

Anonymous and kimiya working with Trend Micro's Zero Day Initiative reported
these vulnerabilities to CISA.

4. MITIGATIONS

Delta Electronics recommends the following:

  o Update to the latest version of CNCSoft ScreenEditor Version 1.01.26
  o Restrict the interaction of the application to trusted files.

CISA recommends users take the following measures to protect themselves from
social engineering attacks:

  o Do not click web links or open unsolicited attachments in email messages.
  o Refer to Recognizing and Avoiding Email Scams for more information on
    avoiding email scams.
  o Refer to Avoiding Social Engineering and Phishing Attacks for more
    information on social engineering attacks.

CISA reminds organizations to perform proper impact analysis and risk
assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on us-cert.gov . Several recommended practices are available
for reading and download, including Improving Industrial Control Systems
Cybersecurity with Defense-in-Depth Strategies .

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage on us-cert.gov in the Technical Information Paper,
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation
Strategies .

Organizations observing any suspected malicious activity should follow their
established internal procedures and report their findings to CISA for tracking
and correlation against other incidents.

No known public exploits specifically target these vulnerabilities. These
vulnerabilities are not exploitable remotely.

For any questions related to this report, please contact the CISA at:

Email: CISAservicedesk@cisa.dhs.gov
Toll Free: 1-888-282-0870

CISA continuously strives to improve its products and services. You can help by
choosing one of the links below to provide feedback about this product.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXyuopuNLKJtyKPYoAQidvQ/+Ozi4XpPhlPJlyjN9ven8TCrZJjYwXhPq
xvFs7LbDYOplWQI7DOFEmqDsPSDe+vah2Pe4x2HqtOntXUlpNtGn7V0vl+7OBFXx
sQdcFzBEFXwH3wHe01bWEJIHtd1xGIw2N660LYr+nvyG9C6ijLa8YC7TFOuoNnvB
6F39Xg5fL/H9yZXaUV3XpAeMH8RhRm7EVDjn7st6ql55cYnzsE5O+Ess4EdVQ2yg
5LQ9B7DdiQflhdakbpXn8VYTeyGFnc2y5lr5auVAuPiqBv8yDmT2eJkHscxLkROD
9oaOy+ZxgN42r6UaH51p/vRVoqnP6QZujEpLm3ZAGNypMc4damlTF+2T2MjUxuj1
UfSaKFzgIYTBkkoS9Ij0F3Ygek8tjWVExe3L9Cz6ZhsAj/KTdICrjeDNowXzXQST
Rs3+VxYi0ZXxLy+EFIdHVjnALY92ijuAdEDA/UZKhxP1RG+pn/SsGwzCcON93rG3
L4T65+cAetDVf0NHRs9JkqbUf0/5cO9AoB1aXjWwOV8ZyvPeb2eAk1SQYrdA3tps
hUE6gGGczgvHuKMpMwm63e9ajkRrGIHUC6WRhIIu64abkpVjam3iVN9+7DHMFixX
Uyw6vb6RouY3BL6XWyBIc7Y1rIADW/ubb/TMccPB5Tpy4Xv3TSay0fcsZ2x7zGhv
iizng616Vxs=
=liJ4
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2697-appliance-industrial-automation-cncsoft-screeneditor-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2697-appliance-industrial-automation-cncsoft-screeneditor-multiple-vulnerabilities

ESB-2020.2695 – [Linux][SUSE] python-rtslib-fb: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2695
                   Security update for python-rtslib-fb
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-rtslib-fb
Publisher:         SUSE
Operating System:  SUSE
                   Linux variants
Impact/Access:     Access Confidential Data -- Existing Account
                   Reduced Security         -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14019  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20202109-1

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than SUSE. It is recommended that administrators 
         running python-rtslib-fb check for an updated version of the 
         software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for python-rtslib-fb

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:2109-1
Rating:            moderate
References:        #1173257
Cross-References:  CVE-2020-14019
Affected Products:
                   SUSE Linux Enterprise Module for Python2 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-rtslib-fb fixes the following issues:

  o Update to version v2.1.73 (bsc#1173257 CVE-2020-14019): * version 2.1.73 *
    save_to_file: fix fd open mode * saveconfig: copy temp configfile with
    permissions * saveconfig: open the temp configfile with modes set * Fix "is
    not" with a literal SyntaxWarning * Fix an incorrect config path in two
    comments * version 2.1.72 * Do not change dbroot after drivers have been
    registered * Remove '_if_needed' from RTSRoot._set_dbroot()'s name
    Replacing old tarball with python-rtslib-fb-v2.1.73.tar.xz

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Python2 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Python2-15-SP2-2020-2109=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2109=1

Package List:

  o SUSE Linux Enterprise Module for Python2 15-SP2 (noarch):
       python2-rtslib-fb-2.1.73-3.3.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
       python3-rtslib-fb-2.1.73-3.3.1


References:

  o https://www.suse.com/security/cve/CVE-2020-14019.html
  o https://bugzilla.suse.com/1173257

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YcJH
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2695-linuxsuse-python-rtslib-fb-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2695-linuxsuse-python-rtslib-fb-multiple-vulnerabilities

ESB-2020.2696 – [SUSE] xen: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2696
                          Security update for xen
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xen
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise        -- Existing Account
                   Increased Privileges   -- Existing Account
                   Access Privileged Data -- Existing Account
                   Denial of Service      -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-11742 CVE-2020-11741 CVE-2020-11740
                   CVE-2020-8608 CVE-2020-7211 CVE-2019-19583
                   CVE-2019-19580 CVE-2019-19579 CVE-2019-19578
                   CVE-2019-19577 CVE-2019-18425 CVE-2019-18424
                   CVE-2019-18421 CVE-2019-18420 CVE-2019-11135
                   CVE-2018-12207  

Reference:         ASB-2020.0047
                   ASB-2019.0330
                   ESB-2020.2546
                   ESB-2020.2544
                   ESB-2020.2364
                   ESB-2020.1575

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-202014444-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for xen

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:14444-1
Rating:            important
References:        #1152497 #1154448 #1154456 #1154458 #1154461 #1155945
                   #1157888 #1158004 #1158005 #1158006 #1158007 #1161181
                   #1163019 #1168140 #1169392 #1174543
Cross-References:  CVE-2018-12207 CVE-2019-11135 CVE-2019-18420 CVE-2019-18421
                   CVE-2019-18424 CVE-2019-18425 CVE-2019-19577 CVE-2019-19578
                   CVE-2019-19579 CVE-2019-19580 CVE-2019-19583 CVE-2020-11740
                   CVE-2020-11741 CVE-2020-11742 CVE-2020-7211 CVE-2020-8608
Affected Products:
                   SUSE Linux Enterprise Server 11-SP4-LTSS
                   SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

An update that fixes 16 vulnerabilities is now available.

Description:

This update for xen fixes the following issues:

  o bsc#1174543 - secure boot related fixes
  o bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf()
    usages
  o bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy
  o bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues
  o bsc#1161181 - CVE-2020-7211: potential directory traversal using relative
    paths via tftp server on Windows host
  o bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci
    assignment methods
  o bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions
    and blocked states
  o bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts
  o bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type
    change operations
  o bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables
  o bsc#1154448 - CVE-2019-18420: VCPUOP_initialise DoS
  o bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in
    x86 PV emulation
  o bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change
    operations
  o bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host
    memory after deassignment
  o bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size
    Change (aka IFU issue)
  o bsc#1152497 - CVE-2019-11135: TSX Asynchronous Abort (TAA) issue

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 11-SP4-LTSS:
    zypper in -t patch slessp4-xen-14444=1
  o SUSE Linux Enterprise Debuginfo 11-SP4:
    zypper in -t patch dbgsp4-xen-14444=1

Package List:

  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):
       xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1
       xen-libs-4.4.4_42-61.52.1
       xen-tools-domU-4.4.4_42-61.52.1
  o SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64):
       xen-4.4.4_42-61.52.1
       xen-doc-html-4.4.4_42-61.52.1
       xen-libs-32bit-4.4.4_42-61.52.1
       xen-tools-4.4.4_42-61.52.1
  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586):
       xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1
  o SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
       xen-debuginfo-4.4.4_42-61.52.1
       xen-debugsource-4.4.4_42-61.52.1


References:

  o https://www.suse.com/security/cve/CVE-2018-12207.html
  o https://www.suse.com/security/cve/CVE-2019-11135.html
  o https://www.suse.com/security/cve/CVE-2019-18420.html
  o https://www.suse.com/security/cve/CVE-2019-18421.html
  o https://www.suse.com/security/cve/CVE-2019-18424.html
  o https://www.suse.com/security/cve/CVE-2019-18425.html
  o https://www.suse.com/security/cve/CVE-2019-19577.html
  o https://www.suse.com/security/cve/CVE-2019-19578.html
  o https://www.suse.com/security/cve/CVE-2019-19579.html
  o https://www.suse.com/security/cve/CVE-2019-19580.html
  o https://www.suse.com/security/cve/CVE-2019-19583.html
  o https://www.suse.com/security/cve/CVE-2020-11740.html
  o https://www.suse.com/security/cve/CVE-2020-11741.html
  o https://www.suse.com/security/cve/CVE-2020-11742.html
  o https://www.suse.com/security/cve/CVE-2020-7211.html
  o https://www.suse.com/security/cve/CVE-2020-8608.html
  o https://bugzilla.suse.com/1152497
  o https://bugzilla.suse.com/1154448
  o https://bugzilla.suse.com/1154456
  o https://bugzilla.suse.com/1154458
  o https://bugzilla.suse.com/1154461
  o https://bugzilla.suse.com/1155945
  o https://bugzilla.suse.com/1157888
  o https://bugzilla.suse.com/1158004
  o https://bugzilla.suse.com/1158005
  o https://bugzilla.suse.com/1158006
  o https://bugzilla.suse.com/1158007
  o https://bugzilla.suse.com/1161181
  o https://bugzilla.suse.com/1163019
  o https://bugzilla.suse.com/1168140
  o https://bugzilla.suse.com/1169392
  o https://bugzilla.suse.com/1174543

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=eaPW
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2696-suse-xen-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2696-suse-xen-multiple-vulnerabilities

ESB-2020.2693 – [RedHat] Red Hat Ansible Tower: Access confidential data – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2693
                  Red Hat Ansible Tower - RHEL7 Container
                               6 August 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Ansible Tower
Publisher:         Red Hat
Operating System:  Red Hat
                   Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-14337 CVE-2020-14329 CVE-2020-14328
                   CVE-2020-14327  

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:3328
   https://access.redhat.com/errata/RHSA-2020:3329

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Ansible Tower 3.7.2-1 - RHEL7 Container
Advisory ID:       RHSA-2020:3328-01
Product:           Red Hat Ansible Tower
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3328
Issue date:        2020-08-05
CVE Names:         CVE-2020-14327 CVE-2020-14328 CVE-2020-14329 
                   CVE-2020-14337 
=====================================================================

1. Summary:

Red Hat Ansible Tower 3.7.2-1 - RHEL7 Container

2. Description:

* Updated Named URLs to allow for testing the presence or absence of
objects (CVE-2020-14337)
* Fixed Tower Server Side Request Forgery on Credentials (CVE-2020-14327)
* Fixed Tower Server Side Request Forgery on Webhooks (CVE-2020-14328)
* Fixed Tower sensitive data exposure on labels (CVE-2020-14329) 
* Added local caching for downloaded roles and collections so they are not
re-downloaded on nodes where they have already been updated
* Fixed Towerâx{128}x{153}s task scheduler to no longer deadlock for clustered
installations with large numbers of nodes 
* Fixed the Credential Type definitions to no longer allow superusers to
run unsafe Python code
* Fixed credential lookups from CyberArk AIM to no longer fail unexpectedly
* Fixed upgrades from 3.5 to 3.6 on RHEL8 in order for PostgreSQL client
libraries to be upgraded on Tower nodes, which fixes the backup/restore
function
* Fixed backup/restore for PostgreSQL usernames that include capital
letters
* Fixed manually added host variables to no longer be removed on VMWare
vCenter inventory syncs
* Fixed Red Hat Satellite inventory syncs to allow Tower to properly
respect the ``verify_ssl flag``

3. Solution:

For information on upgrading Ansible Tower, reference the Ansible Tower
Upgrade and Migration Guide:
https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/
index.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1856785 - CVE-2020-14327 Tower: SSRF: Server Side Request Forgery on Credential
1856786 - CVE-2020-14328 Tower: SSRF: Server Side Request Forgery on webhooks
1856787 - CVE-2020-14329 Tower: Sensitive Data Exposure on Label
1859139 - CVE-2020-14337 Tower: Named URLs allow for testing the presence or absence of objects

5. References:

https://access.redhat.com/security/cve/CVE-2020-14327
https://access.redhat.com/security/cve/CVE-2020-14328
https://access.redhat.com/security/cve/CVE-2020-14329
https://access.redhat.com/security/cve/CVE-2020-14337
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=0wzO
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Ansible Tower 3.6.5-1 - RHEL7 Container
Advisory ID:       RHSA-2020:3329-01
Product:           Red Hat Ansible Tower
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:3329
Issue date:        2020-08-05
CVE Names:         CVE-2020-14327 
=====================================================================

1. Summary:

Red Hat Ansible Tower 3.6.5-1 - RHEL7 Container

2. Description:

* Removed reports option for Satellite inventory script
* Fixed Tower Server Side Request Forgery on Credentials (CVE-2020-14327)
* Fixed the ``Job Type`` field to render properly when editing a Job
Template
* Fixed a notable delay running large project update clones
* Fixed Tower to properly sync host facts for Red Hat Satellite 6.7
inventories
* Fixed installations on Red Hat OpenShift 4.3 to no longer fail
* Fixed the usage of certain SSH keys on RHEL8 when FIPS is enabled to work
properly
* Fixed upgrades from 3.5 to 3.6 on RHEL8 in order for PostgreSQL client
libraries to be upgraded on Tower nodes, which fixes the backup/restore
function
* Fixed credential lookups from CyberArk AIM to no longer fail unexpectedly
* Fixed the ability to add a user to an organization when they already had
roles in the organization
* Fixed manually added host variables to no longer be removed on VMWare
vCenter inventory syncs
* Fixed a number of issues related to Towerâx{128}x{153}s reporting of metrics to Red
Hat Automation Analytics

3. Solution:

For information on upgrading Ansible Tower, reference the Ansible Tower
Upgrade and Migration Guide:
https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/
index.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1856785 - CVE-2020-14327 Tower: SSRF: Server Side Request Forgery on Credential

5. References:

https://access.redhat.com/security/cve/CVE-2020-14327
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXyrG7tzjgjWX9erEAQjTpA/9EkZENU9KqxjLw4K1CynuMe4NmCMsphgJ
K8PPdrQNcGbZyAdFPoX0c1zzHWsEFJ8pcwGN4zO+qh3lpm2AuxJ3xiz8JRNMy62o
87qoVUbuP1RSWlkdkldK49j3XQcYs2LzWaokM9Y5H/wRGfaRDhg3Og4pOH4Lnkqi
GK8UGLcxFkS0MCkIad7Uh0MrcvQ/5h3ijD9xWdg4/R2AxvOqn2RoW26clPJOZLVB
QCP04WyUascWjBQBZHNBfdPqvJ1CfGrHnXcnRpNF7GdSPjCWtRBS9OyMjFVDz2a/
9TA5WflLRhtVxB2FEFxeStewSsv9zOwSbu44Lf/6SDr1HlpKDR8PcViIlM+X6+N0
H1AevHi3H/uXTpGTLlTBlXG1BcJ8VGgP4FTu5N4y1gCoO7dAKyD1uMrDNAE3U5o0
bnNDo6nG2zJ9OuVgBEzyGUzxsX41mfRYs6dV/0hiKfzX7ZBu2tckLRUmGX0itLhT
iiDUuDdffjBkUXRqYifBsW3cUttwR/nvFFLGyZMXLDJasd1YV2p4hXfto1rsUui/
XMVSJ+UrmqsLgmzlSnzM7w/HfheUy8+3xBJyVUUB7vHPM8Ajo29yLauCkGXl70T3
Dqv0lC4dD76a4d8KcVZPghW2benk5cIeYVSD94EnzllEje4pesS9p0eSqmQC7Amd
F44f3+Z1Q9Y=
=1XgD
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=MoQy
-----END PGP SIGNATURE-----

Read More



https://www.malwaredevil.com/2020/08/06/esb-2020-2693-redhat-red-hat-ansible-tower-access-confidential-data-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2693-redhat-red-hat-ansible-tower-access-confidential-data-remote-unauthenticated

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...