Malware Devil

Monday, January 25, 2021

Kicking Off 2021 as a “Best Place to Work”

JumpCloud is honored by its inclusion on the Built In Colorado’s Best Places to Work list in 2021 as we continue to rapidly expand the team.

The post Kicking Off 2021 as a “Best Place to Work” appeared first on JumpCloud.

The post Kicking Off 2021 as a “Best Place to Work” appeared first on Security Boulevard.

Read More

The post Kicking Off 2021 as a “Best Place to Work” appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/kicking-off-2021-as-a-best-place-to-work/?utm_source=rss&utm_medium=rss&utm_campaign=kicking-off-2021-as-a-best-place-to-work

XKCD ‘Allow Captcha’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Allow Captcha’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Allow Captcha’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/xkcd-allow-captcha/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-allow-captcha

Cisco DNA Center Bug Opens Enterprises to Remote Attack

The high-severity security vulnerability (CVE-2021-1257) allows cross-site request forgery (CSRF) attacks.
Read More

The post Cisco DNA Center Bug Opens Enterprises to Remote Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/cisco-dna-center-bug-opens-enterprises-to-remote-attack/?utm_source=rss&utm_medium=rss&utm_campaign=cisco-dna-center-bug-opens-enterprises-to-remote-attack

Fun with NMAP NSE Scripts and DOH (DNS over HTTPS), (Mon, Jan 25th)

DOH (DNS over HTTPS) has been implemented into the various browsers over the last year or so, and there’s a fair amount of support for it on public DNS services.  Because it’s encrypted and over TCP, the mantra of “because privacy” has carried the day it looks like.  But why do network and system admins hate it so?

First of all, any name resolution that goes outside the organization, especially if it’s encrypted, can’t be easily logged.  I get that this is the entire point, but there are several attacks that can be prevented with simple DNS monitoring and sink-holing (blocking known malicious domains), and several attacks that can be mounted using just DNS (delivering malware via DNS TXT records for instance).   

What about DNS Tunneling you ask?  DNS tunnelling over DOH seems like a bit of a silly exercise – unless you’re decrypting at your perimeter, DNS tunnelling over DOH is just going to look like HTTPS – you might as well just use HTTPS.

Why do privacy advocates tend to lose this debate at work?

For starters, the expecation of 100% privacy, but then the desire to hold IT and Security folks accountable for any breach or security incident, while you’ve got their hands tied doesn’t hold water.  Especially for decryption, most organizations have broad exceptions by category – for instance, most organizations will not decrypt or inspect banking or financial information, interaction with government sites (taxes and so on), or healthcare sites of any kind.  Believe me, we don’t want your banking password any more than we want your AD password!  So out of the gate, both the written and technical policies around decryption for most organizations focus on the individual’s privacy, the goal is normally to protect against malware and attacks, HR violations (adult sites for instance), and illegal activity that could put the organization in jeopardy.

Also, the phrase “epxectation of privacy” is key here.  If you are at work, you don’t usually have that – you’re using the organizations systems and resources, and going about the business of the organization, and you’ve likely signed an Acceptable Use Policy (or something that covers that same ground) to that effect.  This protects you in that it defines what monitoring the company has, and protects the company in case any of it’s employees do anything illegal while at work.  Note that I am not a Lawyer, nor do I play one on TV .. but I have been involved in more than a few “illegal stuff at work” cases over the years (thankfully not as a direct participant) – this stuff is important for both the company and the individuals!

So, with all the politics done, what does a DOH request look like?  The simple approach is to use the dns-json method, as outlined below – it’ll save you base64 encoding the requests.  Let’s start with a raw request in curl, then refine it a bit:

json formatted data:

curl -s -H ‘accept: application/dns-json’ ‘https://1.1.1.1/dns-query?name=www.cisco.com&type=AAAA’
{“Status”:0,”TC”:false,”RD”:true,”RA”:true,”AD”:false,”CD”:false,”Question”:[{“name”:”www.cisco.com”,”type”:28}],”Answer”:[{“name”:”www.cisco.com”,”type”:5,”TTL”:3600,”data”:”www.cisco.com.akadns.net.”},{“name”:”www.cisco.com.akadns.net”,”type”:5,”TTL”:300,”data”:”wwwds.cisco.com.edgekey.net.”},{“name”:”wwwds.cisco.com.edgekey.net”,”type”:5,”TTL”:21600,”data”:”wwwds.cisco.com.edgekey.net.globalredir.akadns.net.”},{“name”:”wwwds.cisco.com.edgekey.net.globalredir.akadns.net”,”type”:5,”TTL”:3600,”data”:”e2867.dsca.akamaiedge.net.”},{“name”:”e2867.dsca.akamaiedge.net”,”type”:28,”TTL”:20,”data”:”2600:1408:5c00:3bc::b33″},{“name”:”e2867.dsca.akamaiedge.net”,”type”:28,”TTL”:20,”data”:”2600:1408:5c00:388::b33″}]}

Looks pretty straightforward – very much like any API that you might be used to.  DOH is an HTTPS request like any other, but with a specific user-agent string and a specific path on the target server (dns-query).  This raw output is great if you’re a python script, but let’s fix up the formatting a bit so it’s a bit more “human readable”

curl -s -H ‘accept: application/dns-json’ ‘https://1.1.1.1/dns-query?name=www.cisco.com&type=AAAA’ | jq
{
  “Status”: 0,
  “TC”: false,
  “RD”: true,
  “RA”: true,
  “AD”: false,
  “CD”: false,
  “Question”: [
    {
      “name”: “www.cisco.com”,
      “type”: 28
    }
  ],
  “Answer”: [
    {
      “name”: “www.cisco.com”,
      “type”: 5,
      “TTL”: 3597,
      “data”: “www.cisco.com.akadns.net.”
    },
    {
      “name”: “www.cisco.com.akadns.net”,
      “type”: 5,
      “TTL”: 297,
      “data”: “wwwds.cisco.com.edgekey.net.”
    },
    {
      “name”: “wwwds.cisco.com.edgekey.net”,
      “type”: 5,
      “TTL”: 21597,
      “data”: “wwwds.cisco.com.edgekey.net.globalredir.akadns.net.”
    },
    {
      “name”: “wwwds.cisco.com.edgekey.net.globalredir.akadns.net”,
      “type”: 5,
      “TTL”: 3597,
      “data”: “e2867.dsca.akamaiedge.net.”
    },
    {
      “name”: “e2867.dsca.akamaiedge.net”,
      “type”: 28,
      “TTL”: 17,
      “data”: “2600:1408:5c00:388::b33”
    },
    {
      “name”: “e2867.dsca.akamaiedge.net”,
      “type”: 28,
      “TTL”: 17,
      “data”: “2600:1408:5c00:3bc::b33”
    }
  ]
}

now with just the data values parsed out:

curl -s -H ‘accept: application/dns-json’ ‘https://1.1.1.1/dns-query?name=www.cisco.com&type=AAAA’ | jq | grep data | tr -s ” ” | cut -d ” ” -f 3 | tr -d “

www.cisco.com.akadns.net.
wwwds.cisco.com.edgekey.net.
wwwds.cisco.com.edgekey.net.globalredir.akadns.net.
e2867.dsca.akamaiedge.net.
2600:1408:5c00:3bc::b33
2600:1408:5c00:388::b33

This is all well and good for a shell script, but if you need to test more servers, what other tools can you use?  With the emphasis on script and multiple, I wrote a short NSE script for NMAP that will make arbitrary DOH requests:

First of all, the syntax is:

nmap -p433 <target> –script=dns-doh <DNS server> –script-args query=<query type>,target=<DNS lookup value>

>nmap -p 443 –script=dns-doh 1.1.1.1 –script-args query=A,target=isc.sans.edu

Starting Nmap 7.80 ( https://nmap.org ) at 2021-01-25 12:04 Eastern Standard Time

Nmap scan report for one.one.one.one (1.1.1.1)

Host is up (0.027s latency).

 

PORT    STATE SERVICE

443/tcp open  https

| dns-doh:

|   Answer:

|

|       type: 1

|       name: isc.sans.edu

|       TTL: 7

|       data: 45.60.103.34

|

|       type: 1

|       name: isc.sans.edu

|       TTL: 7

|       data: 45.60.31.34

|   AD: false

|   Status: 0

|   RA: true

|   Question:

|

|       type: 1

|       name: isc.sans.edu
|   CD: false
|   RD: true
|_  TC: false

Nmap done: 1 IP address (1 host up) scanned in 9.08 seconds

Looking at the code (comments are in-line), after all the setup and syntax checking, this is essentially a 3 line script:

local nmap = require “nmap”

local shortport = require “shortport”

local http = require “http”

local stdnse = require “stdnse”

local string = require “string”

local table = require “table”

local json = require “json”

local strbuf = require “strbuf”

 

description = [[

Performs a DOH lookup against the target site

variables: t = <target of dns query>

           q = <dns query type>

]]

— @usage

— nmap <target> –script=doh <DNS server> –script-args query=<query type>,target=<DNS lookup value>

— @output

— 443/tcp open   https

— | results of query

author = {“Rob VandenBrink”,”rob@coherentsecurity.com”}

license = “Creative Commons https://creativecommons.org/licenses/by-nc-sa/4.0/”

categories = { “discovery” }

portrule = shortport.http

action = function(host,port)

     — collect the command line arguments

     local query = stdnse.get_script_args(‘query’)

     local target = stdnse.get_script_args(‘target’)

     — input checking – check that both arg values are present and non-zero

     if(query==nil or query == ”) then

         return “DNS query operation is not defined (A,AAAA,MX,PTR,TXT etc)”

     end

     if(target==nil or target==”) then

         return “DNS target is not defined (host, domain, IP address etc)”

     end

     — construct the query string, the path in the DOH HTTPS GET

     local qstring = ‘/dns-query?name=’..target..’&type=’..query

     — define the header value (which defines the output type)

     local options = {header={}}

     options[‘header’][‘accept’] = ‘application/dns-json’

     — Get some DOH answers!

     local response = http.get(host.ip, port.number, qstring, options)

     — convert results to JSON for more legible output

     local stat, resp =json.parse(response.body)

     return resp

end

 

The dns-doh.nse script is available and is maintained at: https://github.com/robvandenbrink/dns-doh.nse

If you find any issues with this code, by all means use our comment section to report them, or ping me via git

===============
Rob VandenBrink
rob@coherentsecurity.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Fun with NMAP NSE Scripts and DOH (DNS over HTTPS), (Mon, Jan 25th) appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/fun-with-nmap-nse-scripts-and-doh-dns-over-https-mon-jan-25th/?utm_source=rss&utm_medium=rss&utm_campaign=fun-with-nmap-nse-scripts-and-doh-dns-over-https-mon-jan-25th

Hotel Antifa 1943

Anti-fascism made history at the Hotel Antifa. Roosevelt proposed in a 1943 meeting here of Allied leaders that they adopt Grant’s unconditional surrender approach to fascism and drive the Axis threat into total defeat. I jest (sort of), but seriously why doesn’t anyone say Anfa when they mean anti-fascism?

The post Hotel Antifa 1943 appeared first on Security Boulevard.

Read More

The post Hotel Antifa 1943 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/hotel-antifa-1943/?utm_source=rss&utm_medium=rss&utm_campaign=hotel-antifa-1943

Pen Testing By Numbers: Tracking Pen Testing Trends and Challenges

Over the years, penetration testing has had to change and adapt alongside the IT environments and technology that need to be assessed.
Broad cybersecurity issues often influence the strategy and growth of pen-testing. In such a fast-paced field, organizations get real value from learning about others’ penetration testing experiences, identifying trends, and the role they play in today’s threat
Read More

The post Pen Testing By Numbers: Tracking Pen Testing Trends and Challenges appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/pen-testing-by-numbers-tracking-pen-testing-trends-and-challenges/?utm_source=rss&utm_medium=rss&utm_campaign=pen-testing-by-numbers-tracking-pen-testing-trends-and-challenges

Remote Work Needs a More Secure Cloud

cloud security

Cloud computing was vital to the success of remote work initiatives during the pandemic. However, the cloud is having a bit of a security crisis right now, caused in part because of the swift transition to remote work. According to a new cloud security study from Netwrix, 54% of organizations that store data in the..

The post Remote Work Needs a More Secure Cloud appeared first on Security Boulevard.

Read More

The post Remote Work Needs a More Secure Cloud appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/remote-work-needs-a-more-secure-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=remote-work-needs-a-more-secure-cloud

Insider Risk Threatens Digital Enterprise

insider risk

Insider risk is not a new attack vector—but it’s perhaps the fastest-growing vulnerability organizations face today. Before the COVID-19 pandemic, digital transformation, powered by collaboration technologies and SaaS platforms, expanded threat surfaces outside the network perimeter—making it much easier for employees to exfiltrate data without getting caught. Then, the workforce shifted to a remote model—literally..

The post Insider Risk Threatens Digital Enterprise appeared first on Security Boulevard.

Read More

The post Insider Risk Threatens Digital Enterprise appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/insider-risk-threatens-digital-enterprise/?utm_source=rss&utm_medium=rss&utm_campaign=insider-risk-threatens-digital-enterprise

Building Cognitive Resilience for Crisis Response

crisis response

Despite the rapidly growing threat landscape and increasingly sophisticated cyberattacks, organizations are still using traditional tabletop exercises for crisis response prep. Companies across all industries are being dragged onto the front lines by intensifying cyberattacks, and the truth of the matter is that the sporadic, outdated methods of tabletopping is simply not enough to prepare..

The post Building Cognitive Resilience for Crisis Response appeared first on Security Boulevard.

Read More

The post Building Cognitive Resilience for Crisis Response appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/building-cognitive-resilience-for-crisis-response/?utm_source=rss&utm_medium=rss&utm_campaign=building-cognitive-resilience-for-crisis-response

Parler’s Return, Pelosi’s Stolen Laptop, Vaccination Passports

Is the world really ready for COVID-19 vaccination passport apps? Also, the return of Parler, details on Nancy Pelosi’s stolen laptop, the Ubiquiti data breach, Ring end-to-end encryption for video, and other important cybersecurity and privacy news from the week. ** Links mentioned on the show ** Parler Partially Reappears With Support From Russian Technology Firm […]

The post Parler’s Return, Pelosi’s Stolen Laptop, Vaccination Passports appeared first on The Shared Security Show.

The post Parler’s Return, Pelosi’s Stolen Laptop, Vaccination Passports appeared first on Security Boulevard.

Read More

The post Parler’s Return, Pelosi’s Stolen Laptop, Vaccination Passports appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/parlers-return-pelosis-stolen-laptop-vaccination-passports/?utm_source=rss&utm_medium=rss&utm_campaign=parlers-return-pelosis-stolen-laptop-vaccination-passports

4 Steps for Assessing Your NERC CIP Compliance Program

The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) Standards are a cybersecurity compliance framework designed to protect utility organizations. Adhering to these guidelines is essential—falling short will leave your environment vulnerable to malicious actors and can result in some hefty fines. NERC CIP is a burdensome set of standards, so when it […]… Read More

The post 4 Steps for Assessing Your NERC CIP Compliance Program appeared first on The State of Security.

The post 4 Steps for Assessing Your NERC CIP Compliance Program appeared first on Security Boulevard.

Read More

The post 4 Steps for Assessing Your NERC CIP Compliance Program appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/4-steps-for-assessing-your-nerc-cip-compliance-program/?utm_source=rss&utm_medium=rss&utm_campaign=4-steps-for-assessing-your-nerc-cip-compliance-program

NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency

In the digital age, organizations and the missions and business processes they support rely on information technology and information systems to achieve their mission and business objectives. Not only is technology used to efficiently enable businesses to carry out operational activities, but it is also the backbone for the United States’ critical infrastructure. Although technology […]… Read More

The post NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency appeared first on The State of Security.

The post NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency appeared first on Security Boulevard.

Read More

The post NIST Cybersecurity Framework – The Key to Critical Infrastructure Cyber Resiliency appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/nist-cybersecurity-framework-the-key-to-critical-infrastructure-cyber-resiliency/?utm_source=rss&utm_medium=rss&utm_campaign=nist-cybersecurity-framework-the-key-to-critical-infrastructure-cyber-resiliency

ISC Stormcast For Monday, January 25th, 2021 https://isc.sans.edu/podcastdetail.html?id=7342, (Mon, Jan 25th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, January 25th, 2021 https://isc.sans.edu/podcastdetail.html?id=7342, (Mon, Jan 25th) appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/isc-stormcast-for-monday-january-25th-2021-https-isc-sans-edu-podcastdetail-htmlid7342-mon-jan-25th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-january-25th-2021-https-isc-sans-edu-podcastdetail-htmlid7342-mon-jan-25th

Network Security News Summary for Monday January 25th, 2021

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

The post Network Security News Summary for Monday January 25th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/network-security-news-summary-for-monday-january-25th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-january-25th-2021

ESB-2021.0203.2 – UPDATE [Juniper] Junos OS: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0203.2
 JSA11107 - 2021-01 Security Bulletin: Junos OS: EX Series and QFX Series:
    Memory leak issue processing specific DHCP packets (CVE-2021-0217)
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Junos OS
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-0217  

Original Bulletin: 
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA11107

Revision History:  January 25 2021: Vendor added sample configuration
                   January 18 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

2021-01 Security Bulletin: Junos OS: EX Series and QFX Series: Memory leak issue 
processing specific DHCP packets (CVE-2021-0217)

Article ID  : JSA11107
Last Updated: 22 Jan 2021
Version     : 3.0

Product Affected:
This issue affects Junos OS 17.4R3, 18.1R3, 18.2R3, 18.3R3, 18.4R2, 18.4R3,
19.1, 19.2, 19.3, 19.4, 20.1, 20.2. Affected platforms: EX Series, QFX Series.

Problem:

A vulnerability in processing of certain DHCP packets from adjacent clients on
EX Series and QFX Series switches running Juniper Networks Junos OS with DHCP
local/relay server configured may lead to exhaustion of DMA memory causing a
Denial of Service (DoS). Over time, exploitation of this vulnerability may
cause traffic to stop being forwarded, or to crashing of the fxpc process.

When Packet DMA heap utilization reaches 99%, the system will become unstable.
Packet DMA heap utilization can be monitored through the following command:

user@junos# request pfe execute target fpc0 timeout 30 command "show heap"
ID Base Total(b) Free(b) Used(b) % Name
- -- ---------- ----------- ----------- ----------- --- -----------
0 213301a8 536870488 387228840 149641648 27 Kernel
1 91800000 8388608 3735120 4653488 55 DMA
2 92000000 75497472 74452192 1045280 1 PKT DMA DESC
3 d330000 335544320 257091400 78452920 23 Bcm_sdk
4 96800000 184549376 2408 184546968 99 Packet DMA
5 903fffe0 20971504 20971504 0 0 Blob

An indication of the issue occurring may be observed through the following log
messages:

Dec 10 08:07:00.124 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc)
failed allocating packet buffer
Dec 10 08:07:00.126 2020 hostname fpc0 (buf alloc) failed allocating packet
buffer
Dec 10 08:07:00.128 2020 hostname fpc0 brcm_pkt_buf_alloc:523 (buf alloc)
failed allocating packet buffer
Dec 10 08:07:00.130 2020 hostnameC fpc0 (buf alloc) failed allocating packet
buffer

This issue affects Juniper Networks Junos OS on EX Series and QFX Series:

  o 17.4R3 versions prior to 17.4R3-S3;
  o 18.1R3 versions between 18.1R3-S6 and 18.1R3-S11;
  o 18.2R3 versions prior to 18.2R3-S6;
  o 18.3R3 versions prior to 18.3R3-S4;
  o 18.4R2 versions prior to 18.4R2-S5;
  o 18.4R3 versions prior to 18.4R3-S6;
  o 19.1 versions between 19.1R2 and 19.1R3-S3;
  o 19.2 versions prior to 19.2R3-S1;
  o 19.3 versions prior to 19.3R2-S5, 19.3R3;
  o 19.4 versions prior to 19.4R2-S2, 19.4R3;
  o 20.1 versions prior to 20.1R2;
  o 20.2 versions prior to 20.2R1-S2, 20.2R2.

Junos OS versions prior to 17.4R3 are unaffected by this vulnerability.

The following configuration snippet enables the DHCP relay forwarding option:

[forwarding-options dhcp-relay]

The following configuration provides an example of enabling DHCP local server:

[system services dhcp]

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2021-0217 .

Solution:

The following software releases have been updated to resolve this specific
issue: Junos OS 17.4R3-S3, 18.1R3-S11, 18.2R3-S6, 18.3R3-S4, 18.4R2-S5,
18.4R3-S6, 19.1R1-S6, 19.1R3-S3, 19.2R3-S1, 19.3R2-S5, 19.3R3, 19.4R2-S2,
19.4R3, 20.1R2, 20.2R1-S2, 20.2R2, 20.3R1, and all subsequent releases.

This issue is being tracked as 1514145 .

Workaround:
There are no available workarounds for this issue.
Implementation:
Software releases or updates are available for download at https://
www.juniper.net/support/downloads/ .
Modification History:

2021-01-13: Initial Publication.
2021-01-15: Removed redundant 18.4R2-S7 fixed release from SOLUTION field.
2021-01-22: Added sample configuration for DHCP local server.

CVSS Score:
7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
Severity Level:
High
Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common
Vulnerability Scoring System (CVSS) and Juniper's Security Advisories."

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYA49kONLKJtyKPYoAQikxw/+LGYLyhfIpkBAdj47NmP6apeEu/JT2Yha
IhxhgAJiAXqFdkPG2GmUzouPARArcbELMi7epqFpj3ehKRU+h1TWh3TSctCmnaxz
WQI85ACVLH+yo50k3RB2S9t9i8t1Tz/WfOyyg6H9inw5J3WjaScryfG6HYfG+BP4
QYrJcXCP8YIIWptMfJY2Is1XjZtVeLrb5bO6FYmgILNyHciWniNyaRiZWge6xeBd
+yWWGlk/k9T88Zr19v0gj7+0F3EzfJeaH+H2oNdOx1bIv9j1D4iifRegdHQzSkrz
YwT+WEJ54TgKCVju36r/CBP1p1D+v+7u+l49maMmvM/hYlU/Ljr3aJVrUAgeoajt
MhHnskKkz5Lz48oDosXq1xHBkM6DZ71v3/xLpYx9/x+7yjcfvbWRoZ/ikw+92BWz
ylCsG9LrU8Y4NcRO7NS1fue/QvkHrbyL9YiJq9sl7p/21nrt9Iif4ZQGAs9tL4cz
OQhQFf0tBRHLxDmLkfX8sdX0U77TaqfCxQlQAIqW6Id9HUpUXVFKAVPMXIopckpI
hhX08DZmj59nqLHNGry1g65qNcUwoKeOPxQO9rmZse4lAgDlEHQJrqVywxoJqOGL
yLLdUy98Ixx+XeMteXXQVZHwb2M8xhUK87OjTH5J80vr0vYCvyenHRwW/PWsNb1u
cuby9MF91lQ=
=jHvX
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0203.2 – UPDATE [Juniper] Junos OS: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2021-0203-2-update-juniper-junos-os-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0203-2-update-juniper-junos-os-denial-of-service-remote-unauthenticated

ESB-2021.0213.2 – UPDATE [Debian] gst-plugins-bad1.0: Execute arbitrary code/commands – Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0213.2
                    gst-plugins-bad1.0 security update
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           gst-plugins-bad1.0
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00018.html
   https://lists.debian.org/debian-lts-announce/2021/01/msg00016.html

Comment: This bulletin contains two (2) Debian security advisories.

Revision History:  January 25 2021: DSA-4833-2: Vendor updated bulletin
                   January 19 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4833-2                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 24, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : gst-plugins-bad1.0

The update for gst-plugins-bad1.0 released as DSA 4833-1 choosed a
package version incompatible with binNMUs and prevented upgrades to the
fixed packages. Updated gst-plugins-bad1.0 packages are now available to
correct this issue.

For the stable distribution (buster), this problem has been fixed in
version 1.14.4-1+deb10u1.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmANmohfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QzrhAAj+O2mTt7aZ3mw7xzl8j480a7XvPQKFnwfyFoBOE7iLCJFD4GQThZZ1Or
l2Xcg/HStYr2fPv1zma+RjdgWYLZeSq6uOEZ9VRDhr12WB+8GNP/Yq7Qn618nS9r
vKRgmtb9Iz4bcWKbnnmXYgT7rLKIlXmGvwltvZUKr2OySfSdfqU5SAQZo7X/jexs
lJAyMPIG5RbUuQ+wwBVk7HntliRIRURakoneZ1om1RnhC2hidiLQJgyClA59Tyfb
3UjKUVVGqdgW2DQKR/Zv3lEasCDQ+tYvrDvEh0OU7i+9LkQM3BtQr+q1uXBNdMTq
5Y0rNknUeOdiSEKPUPr8fuW28sDcpdoD/xL0V+LE10iBhemCXL24HNzh1FkueXgp
RFvMLVdoUVlrGsHMMu4Zq90XVaNoeEaRAizrrxpPR67rToLRLxkOMc8371orsZSB
ggX+lPLa4BVnQkJH9K9a5BpAccGjPek9d8VY3c1LX8RyO1Y/oPiZ7o+ImnSn1SfI
uujUko5aAEyuluNh3vtbmlR9G94gHb4AR2hOCJqozYb67WrjEMGc57PEP3jis+aD
ylQ5vuKtxcwQ3/3JYWywa0e7K//RXWo6E6F/JgJGpfX7jXWR4pIJXnw6w7BEi65X
GeBNKdYtEr1dfHYkGLabBPZwWW80ITqo396iWYz8hQKEUSHFCIY=
=UH+w
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2528-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
January 19, 2021                            https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : gst-plugins-bad1.0
Version        : 1.10.4-1+deb9u1
CVE ID         : not yet available

Andrew Wesie discovered a buffer overflow in the H264 support of the
GStreamer multimedia framework, which could potentially result in the
execution of arbitrary code.

For Debian 9 stretch, this problem has been fixed in version
1.10.4-1+deb9u1.

We recommend that you upgrade your gst-plugins-bad1.0 packages.

For the detailed security status of gst-plugins-bad1.0 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gst-plugins-bad1.0

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=q/Gd
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=an8l
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0213.2 – UPDATE [Debian] gst-plugins-bad1.0: Execute arbitrary code/commands – Unknown/unspecified appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2021-0213-2-update-debian-gst-plugins-bad1-0-execute-arbitrary-code-commands-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0213-2-update-debian-gst-plugins-bad1-0-execute-arbitrary-code-commands-unknown-unspecified

ESB-2021.0173.2 – UPDATE [Linux][Debian] flatpak: Execute arbitrary code/commands – Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0173.2
                          flatpak security update
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           flatpak
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
Resolution:        Patch/Upgrade

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2021/msg00016.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running flatpak check for an updated version of the software for 
         their operating system.

Revision History:  January 25 2021: Vendor updated advisory
                   January 15 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4830-2                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 22, 2021                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : flatpak
Debian Bug     : 980323

The update for flatpak released as DSA 4830-1 introduced regressions
with flatpak build and in the extra-data mechanism. Updated flatpak
packages are now available to correct this issue.

For the stable distribution (buster), this problem has been fixed in
version 1.2.5-0+deb10u3.

We recommend that you upgrade your flatpak packages.

For the detailed security status of flatpak please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/flatpak

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmALTDRfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QwrBAAnYcqLoo2A4rJNYlU/+RIE5j8IzYThqTmvwzKwdt41YK9P/Niy22zmKRI
o+1yo4xeNIXIeuOdbzOYEFBsUO/BQMIR+A6U6LDnpeAiwyUwzdU1nFFzLgowtVyI
srrOzF37DKa51zvnFyxUirl6UiaGa89W7D4ibJlCV/KGw4m/0YwXihjvd71m5moU
yVlrVuG36u3VHtOSvY2CMqDK2gtmWEMWPHBbXlKD8V5nVeqbq79xQMvxg8hBcn7J
syAwkxnG6nrs2kozMK4ZYSMhlLMUvwDng5c8AdJtONlA/w5628chyZTsvGRpRe1k
PXraX0ateS1o0xaFYwHDKxGgKi3HNjaAyqB44vpCCRPSmMMh5P8FMCy4j1Cmlj/Z
/ARa3C2pODF5EBLPNz1vWtg1ZaJ5cQ3c8YINFgHqAWh4rr9aFhaEyA9kyaYPnA93
AvWeCEv2/PNv60nciVQ6LDtEpJLHYcabv+k9MV5Q5GxG/017psBmTf04umY3L00F
wYvLPNPmNfY5ccMrI9BA79/2HuITxHsyUxZ69CBWo6Bcbyay9HJ+rz7c0beDMaHS
0opkUDQagh8nNHHkXi8z+EgfW+7SedJzKw+gKac65M7IdRH9qvTpc+BKzmZqFngi
sEv8Fk1hjXQnMTH2Z/kW5g7B3WaiEjXe38Y1zoXVHnGshlLnWsU=
=KFAl
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIUAwUBYA49o+NLKJtyKPYoAQi6hA/3cl1hSf0cKASq5UGn0LZoLVCytZMdgyXz
k9NUH2fKUUyfq55Fy8dmaBj7vgbw66LTCsIdHFgnmYjLcTioff3acche7UQ6tXga
tDMPdi+VfNhICrOXCeTn0qA32RdSZ3qVU8M4mvL73EU0WYqX95DKaYueJXVqm4MY
0lFbTw0KnmE5AkcYMO6/H9eHBro6zDT8Rh2Q5YsMUn++E06O1SlhrNHwcOMd1dMH
718jES25FF8LI1oBkFAlVJKDa4P6NqWtvDigPC5f2AiH9GFA9cl0EYbXQth/djND
wc+rZFb9DBt6Upbu1QoQMXuleP704xO+0TKEds+14dsKAh1rJUnIYDAYtJWtZsR/
Ae02TUQA6z0RZHy7WrEJbC62xTrKx8UKt1UYglXbRl/b4p3K1JlZqD0EWG2zQxsy
aapfTVdb7y0Yag/nebsszvaMkVcaNtI7qpgx65vQOV773rh2oJlB6YYAJY7oHSCK
Ef+ipnFVEmwjpwXrAC2dZtg4JecRyctW31oakCEpgssLaJ/BIxqmrdFuTin1/zOa
PpVQ3nns0YT4WSM1dGXHEGSqFdmjqe3wm0nCz4o568NuRlUwRtsmHuAspf0U9FhW
WodR1sAa6/eB3ny0VyYLfWzW/5wcspWY9RCYe9m1K57+FqAePOcx95WB8oEWfnxA
ffmO7yvBEg==
=AWlK
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0173.2 – UPDATE [Linux][Debian] flatpak: Execute arbitrary code/commands – Unknown/unspecified appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2021-0173-2-update-linuxdebian-flatpak-execute-arbitrary-code-commands-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0173-2-update-linuxdebian-flatpak-execute-arbitrary-code-commands-unknown-unspecified

ESB-2021.0280 – [SUSE] mutt: Denial of service – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0280
                         Security update for mutt
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           mutt
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Denial of Service -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3181  

Reference:         ESB-2021.0237

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210196-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20210195-1

Comment: This bulletin contains two (2) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for mutt

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0196-1
Rating:            moderate
References:        #1181221
Cross-References:  CVE-2021-3181
Affected Products:
                   SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for mutt fixes the following issue:

  o CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-196=1

Package List:

  o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
       mutt-1.10.1-55.24.1
       mutt-debuginfo-1.10.1-55.24.1
       mutt-debugsource-1.10.1-55.24.1


References:

  o https://www.suse.com/security/cve/CVE-2021-3181.html
  o https://bugzilla.suse.com/1181221

- --------------------------------------------------------------------------------

SUSE Security Update: Security update for mutt

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0195-1
Rating:            moderate
References:        #1181221
Cross-References:  CVE-2021-3181
Affected Products:
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for mutt fixes the following issue:

  o CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-195=1

Package List:

  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       mutt-1.10.1-3.20.1
       mutt-debuginfo-1.10.1-3.20.1
       mutt-debugsource-1.10.1-3.20.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
       mutt-doc-1.10.1-3.20.1
       mutt-lang-1.10.1-3.20.1


References:

  o https://www.suse.com/security/cve/CVE-2021-3181.html
  o https://bugzilla.suse.com/1181221

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYA4fGONLKJtyKPYoAQjRaxAAlKW7Jf7rtrwgX8WF8P64XUQBiLFRFKqb
+ge+5QBCMAFLhxEghRm9z6R6n7Di9dYtr6sGiCRMdpwvd0cdoTbeVmRzNIzjgL4H
jTqPTDdbIK2ls3dcZDXLDgbt2TLaEO/OU/6VajLmqCQh+nX8AZrljF/2Rc65C2eP
GU+bqtyGwOg/UN5hHqEwqHgkIZOVXtuqXH0UqtCGQ45IMA0jPxBZ2sgM6cCOCIdR
P/ktBCb4S3fYzVWFaWLFBJuKoDZbrKIRed0Z/Bjpkfl4jyh2mjKWuNbFOYOpKgij
4INo9NMKir1+47U54Ip5buvRipw5kw5hYaWKVx8ltjYGc+qlhV1rZl0cGxQ46k0w
xMcUxMYw4aPh5hTm+DAUhWKSLEVIOGsZqdfIrvGkm4U7cADyK5Iu3KQS9z8Wxvbv
VanxYP7xBFmG38HHHaUw1R4TSr6jdrdMWMRCbgm3His9Z9AVCpbm+Z4cSpyB4uqx
vLDYRerkpMDj7FWoNgcIN7P+Qq2vxnXxd8JD9nlpC77AByKeaSIaisaOQHKtFRMk
iDpLW7jc/r3QSNrbH+QhQJeWUaSeXs+gYl8Hp/TvjdZQ0Iu8m+YTH9q6jeVd0y0V
9ydH2380L479W1kRH3DzZrO6OVgzOdBValGY106K1+/SqNOLbO0kZR/kS7B+rX4x
PaZJzhZPoLs=
=RIrX
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0280 – [SUSE] mutt: Denial of service – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2021-0280-suse-mutt-denial-of-service-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0280-suse-mutt-denial-of-service-remote-with-user-interaction

ESB-2020.3092.3 – UPDATE [Appliance] F5 Products: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.3092.3
                    NTP vulnerabilities CVE-2020-13187
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           F5 Products
Publisher:         F5 Networks
Operating System:  Network Appliance
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-13187  

Original Bulletin: 
   https://support.f5.com/csp/article/K55376430

Revision History:  January   25 2021: Vendor updated fixes introduced 
                   September 14 2020: Vendor updated advisory
                   September  9 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

K55376430: NTP vulnerabilities CVE-2020-13817

Original Publication Date: 09 Sep, 2020
Latest   Publication Date: 22 Jan, 2021

Security Advisory Description

The ntpd in the network time protocol (NTP) before 4.2.8p14, and in 4.3.x
before 4.3.100, allows remote attackers to cause a denial-of-service (DoS),
either daemon exit or system time change, by predicting transmit timestamps for
use in spoofed packets. The victim must be relying on unauthenticated IPv4 time
sources. There must be an off-path attacker who can query time from the
victim's ntpd instance. (CVE-2020-13817)

Impact

An attacker who can send a large number of packets with the spoofed IPv4
address of the upstream server can use this flaw to modify the victim's clock
by a limited amount or cause ntpd to exit.

BIG-IP

Your BIG-IP system is affected only when you configure it as an NTP server, and
sources for the BIG-IP system's time are unreliable, unauthenticated, upstream
NTP servers.

BIG-IQ

The BIG-IQ system is not directly affected by this vulnerability, but it
inherits the vulnerability from the BIG-IP system.

Security Advisory Status

F5 Product Development has assigned ID 931837 (BIG-IP), ID 934609 (BIG-IQ), and
CPF-25203 and CPF-25204 (Traffix) to this vulnerability.

To determine if your product and version have been evaluated for this
vulnerability, refer to the Applies to (see versions) box. To determine if your
release is known to be vulnerable, the components or features that are affected
by the vulnerability, and for information about releases, point releases, or
hotfixes that address the vulnerability, refer to the following table. For more
information about security advisory versioning, refer to K51812227:
Understanding security advisory versioning.

+---------------------+------+----------+----------+--------+------+----------+
|                     |      |Versions  |Fixes     |        |CVSSv3|Vulnerable|
|Product              |Branch|known to  |introduced|Severity|score^|component |
|                     |      |be        |in        |        |1     |or feature|
|                     |      |vulnerable|          |        |      |          |
+---------------------+------+----------+----------+--------+------+----------+
|                     |16.x  |16.0.0    |None      |        |      |          |
|                     +------+----------+----------+        |      |          |
|                     |15.x  |15.1.0    |15.1.2.1  |        |      |          |
|                     +------+----------+----------+        |      |          |
|BIG-IP (LTM, AAM,    |14.x  |14.1.0 -  |None      |        |      |          |
|Advanced WAF, AFM,   |      |14.1.2    |          |        |      |          |
|Analytics, APM, ASM, +------+----------+----------+        |      |          |
|DDHD, DNS, FPS, GTM, |13.x  |13.1.0 -  |None      |Medium  |6.5   |ntpd      |
|Link Controller, PEM,|      |13.1.3    |          |        |      |          |
|SSLO)                +------+----------+----------+        |      |          |
|                     |12.x  |12.1.0 -  |None      |        |      |          |
|                     |      |12.1.5    |          |        |      |          |
|                     +------+----------+----------+        |      |          |
|                     |11.x  |11.6.1 -  |None      |        |      |          |
|                     |      |11.6.5    |          |        |      |          |
+---------------------+------+----------+----------+--------+------+----------+
|                     |7.x   |7.0.0 -   |None      |        |      |          |
|                     |      |7.1.0     |          |        |      |          |
|BIG-IQ Centralized   +------+----------+----------+        |      |          |
|Management           |6.x   |6.0.0 -   |None      |Medium  |6.5   |ntpd      |
|                     |      |6.1.0     |          |        |      |          |
|                     +------+----------+----------+        |      |          |
|                     |5.x   |5.4.0     |None      |        |      |          |
+---------------------+------+----------+----------+--------+------+----------+
|Traffix SDC          |5.x   |5.1.0     |None      |High    |7.4   |ntpd      |
+---------------------+------+----------+----------+--------+------+----------+

^1The CVSSv3 score link takes you to a resource outside of AskF5, and it is
possible that the document may be removed without our knowledge.

Security Advisory Recommended Actions

If you are running a version listed in the Versions known to be vulnerable
column, you can eliminate this vulnerability by upgrading to a version listed
in the Fixes introduced in column. If the table lists only an older version
than what you are currently running, or does not list a non-vulnerable version,
then no upgrade candidate currently exists.

Mitigation

To mitigate this vulnerability, you should perform the following recommended
modifications to the NTP service on your BIG-IP system:

 1. Configure the BIG-IP system to use only authenticated time sources.
 2. Configure NTP packet authentication with symmetric keys.
 3. Configure the NTP service to use multiple time sources to reduce the risk
    of the vulnerability.
 4. If your NTP client must get unauthenticated time over IPv4 on a hostile
    network, configure the BIG-IP system as an NTP server to use restrict
    no-serve-packets to block time service to the specified network to prevent
    this attack (note that this is a heavy-handed protection).
 5. Monitor log messages in /var/log/ltm and /var/log/daemon from the ntpd 
    daemon.

Procedures

  o Configuring the BIG-IP system to use only authenticated time sources
  o Configuring NTP packet authentication with symmetric keys
  o Configuring the NTP service to use multiple time sources
  o Configuring the BIG-IP system as an NTP server to use restrict
    no-serve-packets

Configuring the BIG-IP system to use only authenticated time sources

To configure the BIG-IP system to use only authenticated time sources, refer to
the Configuring the BIG-IP system to synchronize with an NTP server only if
authentication is successful section in K14120: Defining advanced NTP
configurations on the BIG-IP system (11.x - 15.x).

Configuring NTP packet authentication with symmetric keys

To configure NTP packet authentication on the BIG-IP system, refer to the 
Symmetric key authentication section in K14120: Defining advanced NTP
configurations on the BIG-IP system (11.x - 15.x).

Configuring the NTP service to use multiple time sources

To mitigate the risk of the vulnerability, you can add multiple time sources
for the NTP service.

To add multiple time sources on the BIG-IP system, do the following:

Impact of action: Performing the following procedure should not have a negative
impact on your system.

 1. Log in to the Configuration utility.
 2. Navigate to System > Configuration > Device > NTP.
 3. In Address, enter the IP address of the NTP server you want, and then click
    Add.

    The IP address displays in the Time Server List.

 4. Repeat step 3 for each NTP server you want.
 5. Select Update.

Configuring the BIG-IP system as an NTP server to use restrict no-serve-packets

To configure the BIG-IP system as an NTP server that does not serve time to a
subnet/host, use the restrict no-serve-packets option.

To use the restrict no-serve-packets option, do the following:

Impact of procedure: Performing the following procedure should not have a
negative impact on your system.

 1. Ensure that the self IP on which you want to listen for NTP requests is
    configured to accept User Datagram Protocol (UDP) traffic on port 123.

    If you need to adjust the Port Lockdown setting of the self IP, do the
    following:

     1. Go to Network > Self IPs
     2. Select the IP you want.
     3. In the Port Lockdown list, select the setting you want.
     4. Select Update.

    Note: For more information, refer to K13250: Overview of port lockdown
    behavior (10.x - 11.x) or K17333: Overview of port lockdown behavior (12.x
    - 16.x).

 2. Log in to tmsh by entering the following command:

    tmsh

 3. To configure an access restriction to not serve time to a subnet/host, use
    the following command syntax:

    modify sys ntp restrict add {  { address  mask 
    no-serve-packets enabled } }

    For example, to configure an access restriction named ntp_restriction for
    the 192.168.1.0/24 subnet with no-trap, no-serve-packets, and no-modify
    enabled, enter the following command:

    modify sys ntp restrict add { ntp_restriction { address 192.168.1.0 mask
    255.255.255.0 no-trap enabled no-serve-packets enabled no-modify enabled }
    }

 4. Save the configuration to memory by entering the following command:

    save sys config

Supplemental Information

o K41942608: Overview of security advisory articles
  o K4602: Overview of the F5 security vulnerability response policy
  o K4918: Overview of the F5 critical issue hotfix policy
  o K9502: BIG-IP hotfix and point release matrix
  o K13123: Managing BIG-IP product hotfixes (11.x - 16.x)
  o K15106: Managing BIG-IQ product hotfixes
  o K15113: BIG-IQ hotfix and point release matrix
  o K167: Downloading software and firmware from F5
  o K9970: Subscribing to email notifications regarding F5 products
  o K9957: Creating a custom RSS feed to view new and updated documents

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cfsC
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3092.3 – UPDATE [Appliance] F5 Products: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2020-3092-3-update-appliance-f5-products-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3092-3-update-appliance-f5-products-denial-of-service-remote-unauthenticated

ESB-2020.3094.3 – UPDATE [Appliance] Intel Active Management Technology: Increased privileges – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2020.3094.3
                      Intel AMT and Intel ISMAdvisory
                              25 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Intel Active Management Technology
Publisher:         Intel
Operating System:  Network Appliance
Impact/Access:     Increased Privileges -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-8758  

Original Bulletin: 
   https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00404.html

Revision History:  January   25 2021: Vendor added ICSA-20-353-01 reference
                   October   30 2020: Vendor released minor update
                   September  9 2020: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Intel ID:                 INTEL-SA-00404
Advisory Category:        Firmware
Impact of vulnerability : Escalation of Privilege
Severity rating :         CRITICAL
Original release:         09/08/2020
Last revised:             01/22/2021

Summary:

Potential security vulnerability in Intel Active Management Technology (AMT),
and Intel Standard Manageability (ISM) may allow escalation of privilege. Intel
is releasing firmware updates to mitigate this potential vulnerability.

Vulnerability Details:

CVEID: CVE-2020-8758

Description: Improper buffer restrictions in network subsystem in provisioned
Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79,
12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable
escalation of privilege via network access. On un-provisioned systems, an
authenticated user may potentially enable escalation of privilege via local
access.

CVSS Vector (Provisioned, unauthenticated, network):

CVSS Base Score: 9.8 Critical

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Vector (Un-provisioned, authenticated, local):

CVSS Base Score: 7.8

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

Intel AMT and Intel ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68
and 14.0.39.

The following CVE assigned by Intel, corresponds to a CVE disclosed on 12/18/
2020 as part of ICSA-20-353-01 :

+--------------------------------------------+--------------------------------------------+
|Disclosed in INTEL-SA-00404                 |Disclosed in ICSA-20-353-01                 |
+--------------------------------------------+--------------------------------------------+
|CVE-2020-8758                               |CVE-2020-25066                              |
+--------------------------------------------+--------------------------------------------+

Note: Firmware versions of Intel ME 3.x thru 10.x, Intel TXE 1.x thru 2.x, and
Intel Server Platform Services 1.x thru 2.X are no longer supported versions.
There is no new general release planned for these versions.

Recommendations:

Intel recommends that users of Intel AMT and Intel ISM update to the latest
version provided by the system manufacturer that addresses these issues.

Acknowledgements:

This issue was found internally by Intel employees. Intel would like to thank
Yaakov Cohen, Yocheved Butterman and Yossef Kuszer.

Intel, and nearly the entire technology industry, follows a disclosure practice
called Coordinated Disclosure, under which a cybersecurity vulnerability is
generally publicly disclosed only after mitigations are available.

Revision History

Revision    Date             Description
1.0      09/08/2020 Initial Release
1.1      10/29/2020 Updated affected products
1.2      01/22/2021 Added ICSA-20-353-01 reference

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=GO8G
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3094.3 – UPDATE [Appliance] Intel Active Management Technology: Increased privileges – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/01/25/esb-2020-3094-3-update-appliance-intel-active-management-technology-increased-privileges-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3094-3-update-appliance-intel-active-management-technology-increased-privileges-remote-unauthenticated

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...