Malware Devil

Monday, October 12, 2020

Preparing the Edge for a Big Year in Live Streaming

Next year is shaping up to be a big one for live streaming. Typically characteristic of even years, when many major international sporting events take place, 2021 looks like it could defy the trend. Akamai is predicting an unprecedented surge in live streaming that will start in late 2020 and continue throughout 2021. During this stretch, we could realistically see 50 million people concurrently streaming a single live event. That’s roughly double the largest number of viewers we’ve seen during a single event in the past. With this in mind, Akamai has used much of 2020 to prepare new capabilities included in the Akamai Platform Update that will help customers prepare for this surge in live streaming.

The post Preparing the Edge for a Big Year in Live Streaming appeared first on Security Boulevard.

Read More

The post Preparing the Edge for a Big Year in Live Streaming appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/preparing-the-edge-for-a-big-year-in-live-streaming/?utm_source=rss&utm_medium=rss&utm_campaign=preparing-the-edge-for-a-big-year-in-live-streaming

What’s the 411 with the updated CySA+?

What’s Changing? The CompTIA CySA+ (CS0 – 001) will retire on October 21, 2020. The new CySA+ (CS0 – 002) is now available and includes more coverage of the following areas: Software and application security Automation Threat hunting  IT regulatory compliance The exam domain changes will be as follows: CYSA 001 CYSA 002 Threat Management: […]

The post What’s the 411 with the updated CySA+? appeared first on Phoenix TS.

The post What’s the 411 with the updated CySA+? appeared first on Security Boulevard.

Read More

The post What’s the 411 with the updated CySA+? appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/whats-the-411-with-the-updated-cysa/?utm_source=rss&utm_medium=rss&utm_campaign=whats-the-411-with-the-updated-cysa

Software AG Continues Efforts Against $20M Ransomware Attack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

imageSpecial Report: Computing’s New NormalThis special report examines how IT security organizations have adapted to the “new normal” of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
image

Flash Poll

How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world — and enterprise computing — on end. Here’s a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-26546
PUBLISHED: 2020-10-12

** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in HelpDeskZ 1.0.2. The feature to auto-login a user, via the RememberMe functionality, is prone to SQL injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2020-15250
PUBLISHED: 2020-10-12

In JUnit4 before version 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system’s temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they ar…

CVE-2020-13903
PUBLISHED: 2020-10-12

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-12254. Reason: This candidate is a reservation duplicate of CVE-2020-12254. Notes: All CVE users should reference CVE-2020-12254 instead of this candidate. All references and descriptions in this candidate have been removed to preve…

CVE-2020-25825
PUBLISHED: 2020-10-12

In Octopus Deploy 3.1.0 to 2020.4.0, certain scripts can reveal sensitive information to the user in the task logs.

CVE-2020-12670
PUBLISHED: 2020-10-12

XSS exists in Webmin 1.941 and earlier affecting the Save function of the Read User Email Module / mailboxes Endpoint when attempting to save HTML emails. This module parses any output without sanitizing SCRIPT elements, as opposed to the View function, which sanitizes the input correctly. A malicio…

The post Software AG Continues Efforts Against $20M Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/software-ag-continues-efforts-against-20m-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=software-ag-continues-efforts-against-20m-ransomware-attack

Microsoft on the counter­attack! Trickbot malware network takes a hit

The crooks haven’t yet been caught and arrested, but their malware distribution network has been hit hard.
Read More

The post Microsoft on the counter­attack! Trickbot malware network takes a hit appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/microsoft-on-the-counterattack-trickbot-malware-network-takes-a-hit/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-on-the-counterattack-trickbot-malware-network-takes-a-hit

Navigating Complexity: Orienting Your Security Solutions – Mike Lloyd – BSW #191

Typical security teams have 20-50 technologies, and enough staff to be expert in about 3 of them. This makes taming complexity very challenging – the short staffing is showing no signs of letting up. How do we choose which defensive technologies are truly essential? This segment is sponsored by RedSeal.

Visit https://securityweekly.com/redseal to learn more about them!
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Show Notes: https://securityweekly.com/bsw191

The post Navigating Complexity: Orienting Your Security Solutions – Mike Lloyd – BSW #191 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/navigating-complexity-orienting-your-security-solutions-mike-lloyd-bsw-191/?utm_source=rss&utm_medium=rss&utm_campaign=navigating-complexity-orienting-your-security-solutions-mike-lloyd-bsw-191

Security Firms & Financial Group Team Up to Take Down Trickbot

Microsoft and security firms ESET, Black Lotus Labs, and Symantec collaborated with the financial services industry to cut off the ransomware operation’s C2 infrastructure.

Technology and security companies teamed up with the financial services and telecommunications industries to disrupt the command-and-control (C2) infrastructure used to manage the well-known Trickbot ransomware to infect more than a million computing devices, the firms behind the takedown said on Monday.

Microsoft worked with security researchers from ESET, Lumen’s Black Lotus Labs, and Broadcom’s Symantec to identity key components of Trickbot’s C2 and sever the ransomware’s ability to connect to infected systems. The companies worked with the Financial Services Information Sharing and Analysis Committee (FS-ISAC) to obtain a court order that allowed telecommunications firms to shut down the servers on which the operation relied.

The group believes its efforts will hobble the botnet’s operations and make efforts to reinfect systems much more difficult, says Jean-Ian Boutin, head of threat research at security firm ESET.

“By trying to disrupt the normal operations of the Trickbot botnet, we hope that it will result in a decrease in the offering of potential ransomware victims,” he says. “As Trickbot was a platform for cybercriminals to pick their next ransomware target, by making it unavailable we hope to see a decrease in these devastating attacks.”

Trickbot is a modular infection platform that has been distributed through phishing, and by using other infectors, such as Emotet, to install Trickbot. ESET, for example, collected 28 different plug-in modules for the platform that, among other things, collect credentials, modify network traffic, and spread to other systems.

Once on a system, Trickbot has often been used as a banking Trojan, stealing victims’ credentials and using them to gain access to banks. The software also often uses web injects, a technique that allows the attacker to control what a victim sees while on a particular site. An infected system, for example, may not display the victim’s true banking balance but instead display the balance the attacker wants them to see.

In March, Trickbot’s operators switched their focus from attacks on financial institutions to ransomware. The Ryuk ransomware — which infected a number of cities, healthcare facilities, and schools — is often installed by Trickbot.

“The criminal gang behind Trickbot has regularly updated its malicious software, adding modules with new functionality to increase its effectiveness and potential to cause harm,” researchers from Black Lotus Labs, a part of enterprise technology company Lumen, said in their analysis. “They have incorporated tools such as Mimikatz and Cobalt Strike — often used by penetration testers and criminal attackers — to map victim networks, steal operating system credentials, and spread inside organizations.”

Microsoft and the FS-ISAC were defendants in the civil case against the Trickbot operators. The software giant had concerns that the platform could be used to attack election sites and machinery ahead of the US presidential election.

“As the United States government and independent experts have warned, ransomware is one of the largest threats to the upcoming elections,” Tom Burt, corporate vice president of customer security and trust for Microsoft, said in a blog post. “Adversaries can use ransomware to infect a computer system used to maintain voter rolls or report on election-night results, seizing those systems at a prescribed hour optimized to sow chaos and distrust.”

Microsoft analyzed 61,000 samples of the Trickbot malware. Other companies lent their analyses to the effort as well. The ransomware platform has widely used COVID-themed phishing attacks to convince users to click on malicious links or open malware, Microsoft said.

Monday’s action followed Microsoft and the FS-ISAC suing the Trickbot operators in the United States District Court for the Eastern District of Virginia, which granted their request for a court order to take down the servers at specific IP addresses identified by the companies’ investigation.

“This action also represents a new legal approach that our [Digital Crimes Unit] is using for the first time,” Microsoft stated in its blog post. “Our case includes copyright claims against Trickbot’s malicious use of our software code. This approach is an important development in our efforts to stop the spread of malware, allowing us to take civil action to protect customers in the large number of countries around the world that have these laws in place.”

Civil lawsuits have become the focus on Microsoft’s efforts to stop massive cybercriminal operations. While the participants in the latest takedown hope to see the criminals behind the malicious program prosecuted, often the perpetrators do not face justice.

For companies, the best steps to take are defensive, says ESET’s Boutin, who published his own analysis on the attack.

“The best way to protect your organization is to not get compromised in the first place,” he says. “A typical infection vector for malware families like Trickbot, that are known to drop ransomware, is malicious emails. On top of endpoint security, hardening security of email systems so that they can detect malicious emails before they arrive in the target’s inbox is a good investment.”

Microsoft fully expects the Trickbot operators to make a comeback, albeit slowly.

“We fully anticipate Trickbot’s operators will make efforts to revive their operations, and we will work with our partners to monitor their activities and take additional legal and technical steps to stop them,” Microsoft stated.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Security Firms & Financial Group Team Up to Take Down Trickbot appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/security-firms-financial-group-team-up-to-take-down-trickbot/?utm_source=rss&utm_medium=rss&utm_campaign=security-firms-financial-group-team-up-to-take-down-trickbot

Top MDM Providers Approach

Learn what MDM vendors need to provide to meet the growing needs of IT departments and managed service providers. Try JumpCloud Free.

The post Top MDM Providers Approach appeared first on JumpCloud.

The post Top MDM Providers Approach appeared first on Security Boulevard.

Read More

The post Top MDM Providers Approach appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/top-mdm-providers-approach/?utm_source=rss&utm_medium=rss&utm_campaign=top-mdm-providers-approach

Application Security Best Practices – James Manico – ASW #125

Managing passwords is a critical developer task. Developers tasked with building or augmenting legacy authentication systems have a daunting task when facing modern adversaries. This session will review some of the changes suggested in NIST SP800-63b the “Digital Identity Guideline on Authentication and Lifecycle Management regarding password policy”.
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/asw125

The post Application Security Best Practices – James Manico – ASW #125 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/application-security-best-practices-james-manico-asw-125/?utm_source=rss&utm_medium=rss&utm_campaign=application-security-best-practices-james-manico-asw-125

Accurics Adds Support for HashiCorp Terraform Cloud and Sentinel Policy as Code

By Jon Jarboe, Developer Advocate We’ve long been fans of the fantastic products coming out of HashiCorp.  Terrascan and Accurics both launched with support for Terraform, helping developers detect and fix compliance and security risks in their infrastructure as code with the goal of mitigating issues before cloud infrastructure is deployed. Today, we’re excited to announce a new integration which streamlines the..

The post Accurics Adds Support for HashiCorp Terraform Cloud and Sentinel Policy as Code appeared first on Security Boulevard.

Read More

The post Accurics Adds Support for HashiCorp Terraform Cloud and Sentinel Policy as Code appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/accurics-adds-support-for-hashicorp-terraform-cloud-and-sentinel-policy-as-code/?utm_source=rss&utm_medium=rss&utm_campaign=accurics-adds-support-for-hashicorp-terraform-cloud-and-sentinel-policy-as-code

43% of Global Employees Are Not Sure What a Phishing Attack Is

  • Employees want to keep working remotely but admit they are not as productive as in the office
  • A third of remote workers consider IT security a low priority
  • Almost half of global employees don’t fully understand the notion of a phishing attack

The post 43% of Global Employees Are Not Sure What a Phishing Attack Is appeared first on Security Boulevard.

Read More

The post 43% of Global Employees Are Not Sure What a Phishing Attack Is appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/43-of-global-employees-are-not-sure-what-a-phishing-attack-is/?utm_source=rss&utm_medium=rss&utm_campaign=43-of-global-employees-are-not-sure-what-a-phishing-attack-is

The Social Dilemma

In episode 142 for October 12th 2020: My conversation about the pros and cons of the Netflix documentary “The Social Dilemma” with frequent guest, Kevin Johnson. The Social Dilemma is a popular documentary (dramamentary?) on Netflix about how social media is causing unintended harm to people and society. Several engineers and leaders that worked at […]

The post The Social Dilemma appeared first on The Shared Security Show.

The post The Social Dilemma appeared first on Security Boulevard.

Read More

The post The Social Dilemma appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/the-social-dilemma/?utm_source=rss&utm_medium=rss&utm_campaign=the-social-dilemma

How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions

“Gartner projections show the growth in cybersecurity spending is slowing. Cybersecurity grew at 12% (CAGR) in 2018, and it is projected to decline to only 7% (CAGR) by 2023. Gartner clients are also reporting that after years of quarterly reporting on cybersecurity to their boards, that boards are now pushing back and asking for improved […]… Read More

The post How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions appeared first on The State of Security.

The post How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions appeared first on Security Boulevard.

Read More

The post How Cybersecurity Leaders Can Understand the Value of Their Organization’s Security Solutions appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/how-cybersecurity-leaders-can-understand-the-value-of-their-organizations-security-solutions/?utm_source=rss&utm_medium=rss&utm_campaign=how-cybersecurity-leaders-can-understand-the-value-of-their-organizations-security-solutions

Deepfake Voice Technology Iterates on Old Phishing Strategies

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms has allowed malicious hackers, scammers and cyber criminals who work tirelessly behind the scenes to stay one step ahead of the authorities, making […]… Read More

The post Deepfake Voice Technology Iterates on Old Phishing Strategies appeared first on The State of Security.

The post Deepfake Voice Technology Iterates on Old Phishing Strategies appeared first on Security Boulevard.

Read More

The post Deepfake Voice Technology Iterates on Old Phishing Strategies appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/deepfake-voice-technology-iterates-on-old-phishing-strategies/?utm_source=rss&utm_medium=rss&utm_campaign=deepfake-voice-technology-iterates-on-old-phishing-strategies

ISC Stormcast For Monday, October 12th 2020 https://isc.sans.edu/podcastdetail.html?id=7204, (Mon, Oct 12th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, October 12th 2020 https://isc.sans.edu/podcastdetail.html?id=7204, (Mon, Oct 12th) appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/isc-stormcast-for-monday-october-12th-2020-https-isc-sans-edu-podcastdetail-htmlid7204-mon-oct-12th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-october-12th-2020-https-isc-sans-edu-podcastdetail-htmlid7204-mon-oct-12th

ESB-2020.2255.2 – UPDATE [Win][UNIX/Linux][Linux][AIX] Db2: Multiple Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2255.2
           IBM Db2 is vulnerable to buffer overflow leading to a
                   privileged escalation (CVE-2020-4363)
                              12 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Db2
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Increased Privileges            -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4363  

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6242332

Revision History:  October 12 2020: Linux/Unix images updated for V9.7
                   July     1 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db2 is vulnerable to buffer overflow leading to a privileged escalation
(CVE-2020-4363)

Security Bulletin

Summary

IBM Db2 is vulnerable to a buffer overflow, caused by improper bounds checking
which could allow a local attacker to execute arbitrary code on the system with
root privileges.

Vulnerability Details

CVEID: CVE-2020-4363
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
is vulnerable to a buffer overflow, caused by improper bounds checking which
could allow a local attacker to execute arbitrary code on the system with root
privileges.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
178960 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program can
download the special build containing the interim fix for this issue from Fix
Central. These special builds are available based on the most recent fixpack
level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, 11.1 FP5,
and V11.5 GA. They can be applied to any affected fixpack level of the
appropriate release to remediate this vulnerability.

+-------+----------------+-------+--------------------------------------------+
|Release|Fixed in fix    |APAR   |Download URL                                |
|       |pack            |       |                                            |
+-------+----------------+-------+--------------------------------------------+
|V9.7   |TBD             |IT32360|Special Build for V9.7 FP11:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |                                            |
|       |                |       |Note: Windows images updated 2020/08/18     |
|       |                |       |                                            |
|       |                |       |Linux/Unix images updated 2020/10/09        |
+-------+----------------+-------+--------------------------------------------+
|V10.1  |TBD             |IT32359|Special Build for V10.1 FP6:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V10.5  |TBD             |IT32358|Special Build for V10.5 FP11:               |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |Inspur                                      |
+-------+----------------+-------+--------------------------------------------+
|V11.1  |TBD             |IT32356|Special Build for V11.1 FP5:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V11.5  |TBD             |IT32357|Build for V11.5.4 GA:                       |
|       |                |       |                                            |
|       |                |       |https://www.ibm.com/support/pages/node/     |
|       |                |       |6241724                                     |
+-------+----------------+-------+--------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GuGj
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.2255.2 – UPDATE [Win][UNIX/Linux][Linux][AIX] Db2: Multiple Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/esb-2020-2255-2-update-winunix-linuxlinuxaix-db2-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2255-2-update-winunix-linuxlinuxaix-db2-multiple-vulnerabilities

ESB-2020.2262.2 – UPDATE [Win][UNIX/Linux][AIX] Db2: Access confidential data – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2262.2
    IBM Db2 is vulnerable to an information disclosure. (CVE-2020-4387)
                              12 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Db2
Publisher:         IBM
Operating System:  AIX
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4387  

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6242336

Revision History:  October 12 2020: Linux/Unix images updated for V9.7
                   July     1 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db2 is vulnerable to an information disclosure. (CVE-2020-4387)

Security Bulletin

Summary

IBM Db2 could allow a local user to obtain sensitive information using a race
condition of a symbolic link.

Vulnerability Details

CVEID: CVE-2020-4387
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
could allow a local user to obtain sensitive information using a race condition
of a symbolic link.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
179269 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program can
download the special build containing the interim fix for this issue from Fix
Central. These special builds are available based on the most recent fixpack
level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, 11.1 FP5,
and V11.5 GA. They can be applied to any affected fixpack level of the
appropriate release to remediate this vulnerability.

+-------+----------------+-------+--------------------------------------------+
|Release|Fixed in fix    |APAR   |Download URL                                |
|       |pack            |       |                                            |
+-------+----------------+-------+--------------------------------------------+
|V9.7   |TBD             |IT32693|Special Build for V9.7 FP11:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |                                            |
|       |                |       |Note: Windows images updated 2020/08/18     |
|       |                |       |                                            |
|       |                |       |Linux/Unix images updated 2020/10/09        |
+-------+----------------+-------+--------------------------------------------+
|V10.1  |TBD             |IT32692|Special Build for V10.1 FP6:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V10.5  |TBD             |IT32691|Special Build for V10.5 FP11:               |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |Inspur                                      |
+-------+----------------+-------+--------------------------------------------+
|V11.1  |TBD             |IT32690|Special Build for V11.1 FP5:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V11.5  |TBD             |IT32689|Build for V11.5.4 GA:                       |
|       |                |       |                                            |
|       |                |       |https://www.ibm.com/support/pages/node/     |
|       |                |       |6241724                                     |
+-------+----------------+-------+--------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX4PuPuNLKJtyKPYoAQh5Jw//SpkKREZ2HtL+c4TsGhRbrmeOvOCRlLbg
BVwRkO7HM5SLi/khdAHJnPpNzHN2Meeep25avzC8cUt/xhJVVdiFegIkpfE78uu6
ghseV80Ml8frtYuJihGSNe9L8dv6ZX72RzqGF4TKHcYwQlfi/uZXOb4kmfo3B+hH
WL3eMvpwPCkTl4e5jqvQthUHqQ8YvnZMOGh3N5E3P7Dp5sDGHvgXr+DQQfuVaytR
zIoSvL/idUCbd2Lsy8fqfb9RiEhJZ6Y6PEpgukVkSau4HOBhVnYEjhg74+6Ev047
O7YCEv3rt54uoQsl6wqwUPhx7au8r3a9j9aIM0MN3tQI8ljkATOeX43DyCH2IO39
3Iu+A7ra4hdbZHGTmppt4xfdjxfPIRrwRSvlezeb1reUgTdgB4bL4bMSbgWFea9r
IeRXkqPbiMFdnVbNBj7LCkxtDRYghWfb4OuBFK9PcaUD/flkGrxkFKuXiTzpQ+lH
TtmmLqSSuh7DtLQoocUexqen+9IraZKoEjB5co3l7ZTwDZK5oqFyZ63qxS2nTohx
cyzeW+yM+wArUmP+jlItIV9tLjjkmBuJNaPx8Ffqu0EKadTJXC5I86KHhESxquzt
9wB5d49ugPNe3q+EvRbJrb4UbXDpXejbeZXF4iuv35AhhlBU2rFcS807vM9YcEI1
rZrWGULCZeo=
=fwjL
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.2262.2 – UPDATE [Win][UNIX/Linux][AIX] Db2: Access confidential data – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/esb-2020-2262-2-update-winunix-linuxaix-db2-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2262-2-update-winunix-linuxaix-db2-access-confidential-data-existing-account

ESB-2020.2263.2 – UPDATE [Win][UNIX/Linux][AIX] Db2: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2263.2
    IBM Db2 is vulnerable to a denial of service attack (CVE-2020-4420)
                              12 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Db2
Publisher:         IBM
Operating System:  AIX
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4420  

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6242362

Revision History:  October 12 2020: Linux/Unix images updated for V9.7
                   July     1 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db2 is vulnerable to a denial of service attack (CVE-2020-4420)

Security Bulletin

Summary

IBM Db2 could allow an unauthenticated attacker to cause a denial of service
due to a hang in the execution of a terminate command.

Vulnerability Details

CVEID: CVE-2020-4420
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
could allow an unauthenticated attacker to cause a denial of service due a hang
in the execution of a terminate command.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
180076 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program can
download the special build containing the interim fix for this issue from Fix
Central. These special builds are available based on the most recent fixpack
level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, 11.1 FP5,
and V11.5 GA. They can be applied to any affected fixpack level of the
appropriate release to remediate this vulnerability.

+-------+----------------+-------+--------------------------------------------+
|Release|Fixed in fix    |APAR   |Download URL                                |
|       |pack            |       |                                            |
+-------+----------------+-------+--------------------------------------------+
|V9.7   |TBD             |IT32822|Special Build for V9.7 FP11:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |                                            |
|       |                |       |Note: Windows images updated 2020/08/18     |
|       |                |       |                                            |
|       |                |       |Linux/Unix images updated 2020/10/09        |
+-------+----------------+-------+--------------------------------------------+
|V10.1  |TBD             |IT32821|Special Build for V10.1 FP6:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V10.5  |TBD             |IT32362|Special Build for V10.5 FP11:               |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |Inspur                                      |
+-------+----------------+-------+--------------------------------------------+
|V11.1  |TBD             |IT32287|Special Build for V11.1 FP5:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V11.5  |TBD             |IT32363|Build for V11.5.4 GA:                       |
|       |                |       |                                            |
|       |                |       |https://www.ibm.com/support/pages/node/     |
|       |                |       |6241724                                     |
+-------+----------------+-------+--------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX4PsWONLKJtyKPYoAQgIDg/+OTqpTutPMhkOKylkeXmI77i3zBTVpgin
25oaWdc/n1norP3+NFalCl5toTlWyEYnN/j07tDnmCEiVq85+aiN5E8sbmLvI9fc
FsfrZarMlBWAYksJOocgBL0xEF70yf15ywsszgtY1AWdXSA+MRnsXmpa7eYvTKZj
TIVOekW1FI9YUf/1qHuFwa59Lkw7jNd+ln6o+APUe5ajpgPeRC6ILK5dpU5rxXUc
jiThvxcdDDM/uBG95iDFZS2ydmGyGxT3HbqbYS6eMUclCc1gMWm39cvPNTwtH582
skOjO0edXERIvd/8BaqmV8jum/4EsQIDsFFNHglww3pwwXpL59zQytxKFJyuR4Zg
7e5gMrLHJ6OTev+6XE6noDWx9REcQq5gzE4lbZIzC7LH7FI+jLcJ13Ss8Y5FtqCe
1WGwsHi55rd7X/pboCDE1fOqauCtpfD+A9FfvLLdZmlqQJQ2Tc6SfYZ/0I4ZIoea
cuy2ceqjOIJCvkV/5K/Y3/mMtILIrBrGqIjJnR18q1HJ+oN8JIatxaxIMxJmsHCn
qo7BcIXDpjGBsCrMD8yNIk5SxvaN2z3Iz9/RoReyNWYyX4G6i0V5R8v5XMdbGUbp
c4tpxM75hd0USvjIC4n2ypq595H9LRQNwsOKnaMRQG0h5saxkOfWmcFnCTYpT+LF
AT4lx7/txg0=
=/3U2
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.2263.2 – UPDATE [Win][UNIX/Linux][AIX] Db2: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/esb-2020-2263-2-update-winunix-linuxaix-db2-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2263-2-update-winunix-linuxaix-db2-denial-of-service-remote-unauthenticated

ESB-2020.2256.2 – UPDATE [Win][UNIX/Linux][Linux][AIX] Db2: Access confidential data – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2256.2
           IBM Db2 could allow a local user to obtain sensitive
           information using a race condition of a symbolic link
                              12 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Db2
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4386  

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6242342

Revision History:  October 12 2020: Linux/Unix images updated V9.7
                   July     1 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db2 is vulnerable to an information disclosure. (CVE-2020-4386)

Security Bulletin

Summary

IBM Db2 could allow a local user to obtain sensitive information using a race
condition of a symbolic link.

Vulnerability Details

CVEID: CVE-2020-4386
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
could allow a local user to obtain sensitive information using a race condition
of a symbolic link.
CVSS Base score: 6.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
179268 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program can
download the special build containing the interim fix for this issue from Fix
Central. These special builds are available based on the most recent fixpack
level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, 11.1 FP5,
and V11.5 GA. They can be applied to any affected fixpack level of the
appropriate release to remediate this vulnerability.

+-------+----------------+-------+--------------------------------------------+
|Release|Fixed in fix    |APAR   |Download URL                                |
|       |pack            |       |                                            |
+-------+----------------+-------+--------------------------------------------+
|V9.7   |TBD             |IT32740|Special Build for V9.7 FP11:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |                                            |
|       |                |       |Note: Windows images updated 2020/08/18     |
|       |                |       |                                            |
|       |                |       |Linux/Unix images updated 2020/10/09        |
+-------+----------------+-------+--------------------------------------------+
|V10.1  |TBD             |IT32739|Special Build for V10.1 FP6:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V10.5  |TBD             |IT32738|Special Build for V10.5 FP11:               |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |Inspur                                      |
+-------+----------------+-------+--------------------------------------------+
|V11.1  |TBD             |IT32737|Special Build for V11.1 FP5:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V11.5  |TBD             |IT32714|Build for V11.5.4 GA:                       |
|       |                |       |                                            |
|       |                |       |https://www.ibm.com/support/pages/node/     |
|       |                |       |6241724                                     |
+-------+----------------+-------+--------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=WKAV
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.2256.2 – UPDATE [Win][UNIX/Linux][Linux][AIX] Db2: Access confidential data – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/esb-2020-2256-2-update-winunix-linuxlinuxaix-db2-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2256-2-update-winunix-linuxlinuxaix-db2-access-confidential-data-existing-account

ESB-2020.2258.2 – UPDATE [Win][Linux][AIX] Db2: Multiple Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.2258.2
          IBM Db2 is vulnerable to an information disclosure and
                     denial of service (CVE-2020-4414)
                              12 October 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Db2
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Access Confidential Data -- Existing Account
                   Denial of Service        -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-4414  

Original Bulletin: 
   https://www.ibm.com/support/pages/node/6242356

Revision History:  October 12 2020: Linux/Unix images updated for V9.7
                   July     1 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Db2 is vulnerable to an information disclosure and denial of service
(CVE-2020-4414)

Security Bulletin

Summary

IBM Db2 could allow a local attacker to perform unauthorized actions on the
system, caused by improper usage of shared memory. By sending a
specially-crafted request, an attacker could exploit this vulnerability to
obtain sensitive information or cause a denial of service.

Vulnerability Details

CVEID: CVE-2020-4414
DESCRIPTION: IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server)
could allow a local attacker to perform unauthorized actions on the system,
caused by improper usage of shared memory. By sending a specially-crafted
request, an attacker could exploit this vulnerability to obtain sensitive
information or cause a denial of service.
CVSS Base score: 5.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
179989 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)

Affected Products and Versions

All fix pack levels of IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on
all platforms are affected.

Remediation/Fixes

Customers running any vulnerable fixpack level of an affected Program can
download the special build containing the interim fix for this issue from Fix
Central. These special builds are available based on the most recent fixpack
level for each impacted release: V9.7 FP11, V10.1 FP6, V10.5 FP11, 11.1 FP5,
and V11.5 GA. They can be applied to any affected fixpack level of the
appropriate release to remediate this vulnerability.

+-------+----------------+-------+--------------------------------------------+
|Release|Fixed in fix    |APAR   |Download URL                                |
|       |pack            |       |                                            |
+-------+----------------+-------+--------------------------------------------+
|V9.7   |TBD             |IT32744|Special Build for V9.7 FP11:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |                                            |
|       |                |       |Note: Windows images updated 2020/08/18     |
|       |                |       |                                            |
|       |                |       |Linux/Unix images updated 2020/10/09        |
+-------+----------------+-------+--------------------------------------------+
|V10.1  |TBD             |IT32743|Special Build for V10.1 FP6:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V10.5  |TBD             |IT32742|Special Build for V10.5 FP11:               |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |HP-UX 64-bit                                |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER big endian              |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Solaris 64-bit, x86-64                      |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
|       |                |       |Inspur                                      |
+-------+----------------+-------+--------------------------------------------+
|V11.1  |TBD             |IT32741|Special Build for V11.1 FP5:                |
|       |                |       |                                            |
|       |                |       |AIX 64-bit                                  |
|       |                |       |Linux 32-bit, x86-32                        |
|       |                |       |Linux 64-bit, x86-64                        |
|       |                |       |Linux 64-bit, POWER little endian           |
|       |                |       |Linux 64-bit, System z, System z9 or zSeries|
|       |                |       |Solaris 64-bit, SPARC                       |
|       |                |       |Windows 32-bit, x86                         |
|       |                |       |Windows 64-bit, x86                         |
+-------+----------------+-------+--------------------------------------------+
|V11.5  |TBD             |IT32716|Build for V11.5.4 GA:                       |
|       |                |       |                                            |
|       |                |       |https://www.ibm.com/support/pages/node/     |
|       |                |       |6241724                                     |
+-------+----------------+-------+--------------------------------------------+

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GE7l
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.2258.2 – UPDATE [Win][Linux][AIX] Db2: Multiple Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/esb-2020-2258-2-update-winlinuxaix-db2-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-2258-2-update-winlinuxaix-db2-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...