Malware Devil

Monday, February 22, 2021

Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

In episode 161: Apple will start to proxy Safe Browsing requests to hide IP addresses from Google, the rise of Business Email Compromise attacks, and changes to the free version of LastPass. ** Links mentioned on the show ** Apple will proxy Safe Browsing requests to hide iOS users’ IP from Google https://thehackernews.com/2021/02/apple-will-proxy-safe-browsing-requests.html This cybersecurity […]

The post Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates appeared first on The Shared Security Show.

The post Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates appeared first on Security Boulevard.

Read More

The post Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/apples-safe-browsing-request-proxy-bec-attacks-lastpass-updates/?utm_source=rss&utm_medium=rss&utm_campaign=apples-safe-browsing-request-proxy-bec-attacks-lastpass-updates

CipherCloud Chronicles 9: Docs Journey-Reassuring Data Classification with CipherCloud

Every document’s journey into the cloud world is different. Files containing corporate sensitive data have to be treated with extreme caution because loss of data from a well-orchestrated data breach can incur heavy penalties for the targeted organization, while resulting in loss of credibility.             Previous Next Document’s Journey into […]

The post CipherCloud Chronicles 9: Docs Journey-Reassuring Data Classification with CipherCloud appeared first on CipherCloud.

The post CipherCloud Chronicles 9: Docs Journey-Reassuring Data Classification with CipherCloud appeared first on Security Boulevard.

Read More

The post CipherCloud Chronicles 9: Docs Journey-Reassuring Data Classification with CipherCloud appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/ciphercloud-chronicles-9-docs-journey-reassuring-data-classification-with-ciphercloud/?utm_source=rss&utm_medium=rss&utm_campaign=ciphercloud-chronicles-9-docs-journey-reassuring-data-classification-with-ciphercloud

Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021?

It’s an unfortunate fact that cybersecurity is rarely the foremost of concerns among small- to medium-sized businesses. However, investing in cybersecurity is becoming even more important as these organizations undergo digital transformation. It may seem like there are more important priorities on which a small business could focus, but putting your company and your customers […]… Read More

The post Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021? appeared first on The State of Security.

The post Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021? appeared first on Security Boulevard.

Read More

The post Are Your IT Infrastructures Up to Date with the Cybersecurity Compliance Laws in 2021? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/are-your-it-infrastructures-up-to-date-with-the-cybersecurity-compliance-laws-in-2021/?utm_source=rss&utm_medium=rss&utm_campaign=are-your-it-infrastructures-up-to-date-with-the-cybersecurity-compliance-laws-in-2021

ISC Stormcast For Monday, February 22nd, 2021 https://isc.sans.edu/podcastdetail.html?id=7382, (Mon, Feb 22nd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, February 22nd, 2021 https://isc.sans.edu/podcastdetail.html?id=7382, (Mon, Feb 22nd) appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/isc-stormcast-for-monday-february-22nd-2021-https-isc-sans-edu-podcastdetail-htmlid7382-mon-feb-22nd/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-february-22nd-2021-https-isc-sans-edu-podcastdetail-htmlid7382-mon-feb-22nd

ESB-2021.0657 – [UNIX/Linux][Debian] libzstd: Access Confidential Data – Existing Account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0657
                          libzstd security update
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libzstd
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4859

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running libzstd check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4859-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 20, 2021                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libzstd
Debian Bug     : 982519

It was discovered that zstd, a compression utility, was vulnerable to
a race condition: it temporarily exposed, during a very short
timeframe, a world-readable version of its input even if the original
file had restrictive permissions.

For the stable distribution (buster), this problem has been fixed in
version 1.3.8+dfsg-3+deb10u2.

We recommend that you upgrade your libzstd packages.

For the detailed security status of libzstd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libzstd

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAwxgIACgkQEL6Jg/PV
nWRqcgf+OvA7eeLqYuHuwtSD8e5xD5NIGGrOwcKkIRm/FtQx/ezBFwPwHzLT6MIx
snzDop6ANxRg5X6b1/6ARioYH6YdHQorcENZ7laO9wXujEThhPnkVNG8UK7HGK76
hWqgLbnr/LF3jc6aiFeX5zKMw8mbMzhCzouQnp5P4hVKchUuyuwyPx41XGFfUvXR
GeWKl9jlFuFdS8WDjhbGltheqjQUjQ25LnXkGOsc/XrjCvO+q3n7qP+0HLbkDnhe
Dqe9n7iQwvRLGNf6MXUL05zAzV8sAf5pbJGt00fS3O7zu9k/x5W5bJ8HsXMKUvVx
eRQUIpAJXVDe/1dmIZiUDccC6H1bhw==
=p1vr
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Xpj8
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0657 – [UNIX/Linux][Debian] libzstd: Access Confidential Data – Existing Account appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0657-unix-linuxdebian-libzstd-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0657-unix-linuxdebian-libzstd-access-confidential-data-existing-account

ESB-2021.0656 – [Win][UNIX/Linux] Jenkins Core: Increased privileges – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0656
                   Jenkins Security Advisory 2021-02-19
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Jenkins Core
Publisher:         Jenkins
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-22112  

Original Bulletin: 
   https://www.jenkins.io/security/advisory/2021-02-19/

- --------------------------BEGIN INCLUDED TEXT--------------------

Jenkins Security Advisory 2021-02-19  

This advisory announces vulnerabilities in the following Jenkins deliverables:

  o Jenkins (core)

Descriptions  

Privilege escalation vulnerability in bundled Spring Security library  

SECURITY-2195 / CVE-2021-22112

Spring Security 5.4.3 and earlier has a vulnerability that unintentionally
persisted temporarily elevated privileges in some circumstances in a user's
session. This issue, CVE-2021-22112, is resolved in Spring Security 5.4.4.

Jenkins 2.266 through 2.279 (inclusive) included releases of Spring Security
with this vulnerability.

We are aware of a sequence of operations in Jenkins 2.275 through 2.278
(inclusive) that allows attackers with Job/Workspace permission to exploit this
to switch their identity to SYSTEM, an internal user with all permissions.

Jenkins 2.280 integrates Spring Security 5.4.4, which includes a fix for
CVE-2021-22112.

We recommend that all Jenkins instances running Jenkins releases 2.266 through
2.279 (inclusive) are upgraded to 2.280. Administrators of instances running
Jenkins releases 2.275 through 2.278 (inclusive) who cannot upgrade to a fixed
version are advised to apply the short-term workaround of removing Job/
Workspace permission from all non-admin users.

Severity  

  o SECURITY-2195: High

Affected Versions  

  o Jenkins weekly up to and including 2.279

Fix  

  o Jenkins weekly should be updated to version 2.280

These versions include fixes to the vulnerabilities described above. All prior
versions are considered to be affected by these vulnerabilities unless
otherwise indicated.

Credit  

The Jenkins project would like to thank the reporters for discovering and
reporting these vulnerabilities:

  o Daniel Beck, CloudBees, Inc. and Wadeck Follonier, CloudBees, Inc. for
    SECURITY-2195

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ieId
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0656 – [Win][UNIX/Linux] Jenkins Core: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0656-winunix-linux-jenkins-core-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0656-winunix-linux-jenkins-core-increased-privileges-existing-account

ESB-2021.0655 – [Debian] wpa: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0655
                            wpa security update
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wpa
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-0326  

Reference:         ESB-2021.0575
                   ESB-2021.0560

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2572

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2572-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Thorsten Alteholz
February 20, 2021                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : wpa
Version        : 2:2.4-1+deb9u8
CVE ID         : CVE-2021-0326


An issue has been found in wpa, a set of tools to support WPA and WPA2 
(IEEE 802.11i).
Missing validation of data can result in a buffer over-write, which might 
lead to a DoS of the wpa_supplicant process or potentially arbitrary code 
execution.

On request, together with this upload support for WPA-EAP-SUITE-B(-192) 
has been enabled.


For Debian 9 stretch, this problem has been fixed in version
2:2.4-1+deb9u8.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpa

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=1Owv
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=i+Ro
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0655 – [Debian] wpa: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0655-debian-wpa-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0655-debian-wpa-multiple-vulnerabilities

ESB-2021.0329.4 – UPDATE [Cisco] Cisco Products: Root compromise – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2021.0329.4
          Sudo Privilege Escalation Vulnerability Affecting Cisco
                          Products: January 2021
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Products
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Root Compromise -- Existing Account
Resolution:        None
CVE Names:         CVE-2021-3156  

Reference:         ASB-2021.0036
                   ESB-2021.0313
                   ESB-2021.0307
                   ESB-2021.0306
                   ESB-2021.0295

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM

Revision History:  February 22 2021: Updated the lists of products under investigation, vulnerable products,
                                     and products confirmed not vulnerable
                   February  9 2021: Vendor updated vulnerable product list and fix details
                   February  2 2021: Vendor added multiple vulnerable products to advisory
                   February  1 2021: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021

Priority:        High
Advisory ID:     cisco-sa-sudo-privesc-jan2021-qnYQfcM
First Published: 2021 January 29 21:30 GMT
Last Updated:    2021 February 19 20:40 GMT
Version 1.10:    Interim
Workarounds:     No workarounds available
CVE Names:       CVE-2021-3156
CWEs:            CWE-122

Summary

  o A vulnerability in the command line parameter parsing code of Sudo could
    allow an authenticated, local attacker to execute commands or binaries with
    root privileges.

    The vulnerability is due to improper parsing of command line parameters
    that may result in a heap-based buffer overflow. An attacker could exploit
    this vulnerability by accessing a Unix shell on an affected device and then
    invoking the sudoedit command with crafted parameters or by executing a
    binary exploit. A successful exploit could allow the attacker to execute
    commands or binaries with root privileges.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM

Affected Products

  o Cisco is investigating its product line to determine which products may be
    affected by this vulnerability. As the investigation progresses, Cisco will
    update this advisory with information about affected products.

    The Vulnerable Products section includes Cisco bug IDs for each affected
    product. The bugs are accessible through the Cisco Bug Search Tool and
    contain additional platform-specific information, including workarounds (if
    available) and fixed software releases.

    Products Under Investigation

    The following products are under active investigation to determine whether
    they are affected by the vulnerability that is described in this advisory:

    Network Management and Provisioning

       Cisco Connected Mobile Experiences

    Unified Computing

       Cisco UCS Director
   
    Vulnerable Products

    The following table lists Cisco products that are affected by the
    vulnerability that is described in this advisory. If a future release date
    is indicated for software, the date provided represents an estimate based
    on all information known to Cisco as of the Last Updated date at the top of
    the advisory. Availability dates are subject to change based on a number of
    factors, including satisfactory testing results and delivery of other
    priority features and fixes. If no version or date is listed for an
    affected component (indicated by a blank field and/or an advisory
    designation of Interim), Cisco is continuing to evaluate the fix and will
    update the advisory as additional information becomes available. After the
    advisory is marked Final, customers should refer to the associated Cisco
    bug(s) for further details. Unless otherwise documented, all software
    releases prior to the first fixed release are to be considered affected by
    this vulnerability.

        Product                                                 Cisco Bug ID    Fixed Release Availability
Network Management and Provisioning
Cisco Application Policy Infrastructure Controller (APIC)       CSCvx18707      3.2.10 (Feb 2021)
                                                                                4.2.7 (Mar 2021)
                                                                                5.1.4 (Mar 2021)
Cisco Elastic Services Controller (ESC)                         CSCvx18712      ESC-5.4.0.86 (Available)
Cisco Prime Collaboration Provisioning                          CSCvx18714      12.6.SU3 (Apr 2021)
Cisco Prime Service Catalog Virtual Appliance                   CSCvx18724      See the bug for update information.
Cisco Smart Net Total Care - On-Premises                        CSCvx18702      2.1.0.1 (Mar 2021)
Cisco Smart Software Manager On-Prem                            CSCvx22363      8-202102 (Mar 2021)
Routing and Switching - Enterprise and Service Provider
Cisco Nexus 3000 Series Switches                                CSCvx18710      9.3.7 (Feb 2021) 10.1.1 (Available)
Cisco Nexus 7000 Series Switches                                CSCvx18709      8.4.4 (Feb 21)
Cisco Nexus 9000 Series Switches in standalone NX-OS mode       CSCvx18710      9.3.7 (Feb 2021) 10.1.1 (Available)
Voice and Unified Communications Devices
Cisco Paging Server (InformaCast)                               CSCvx18737      12.22.1 (Mar 2021) 14.0.1 (Mar 2021)
Cisco Cloud Hosted Services
Cisco Common Services Platform Collector                        CSCvx20991      2.9.0.2 (Feb 2021) See the bug for 2.8 update information.
Cisco Ultra Cloud                                               CSCvx21182      2020.02.1.i33 (Mar 2021)



    Products Confirmed Not Vulnerable

    Only products and services listed in the Vulnerable Products section of
    this advisory are known to be affected by this vulnerability.

    Products that do not offer the capability for users to access an
    interactive terminal or to execute custom binaries in the context of the
    underlying Unix operating system or of a guest Unix operating system do not
    present an attack vector for the exploitation of this vulnerability and
    therefore are not considered vulnerable.

    Cisco has confirmed that this vulnerability does not affect the following
    products and services:

    Collaboration and Social Media

       Cisco Webex Meetings Server

    Endpoint Clients and Client Software

       Cisco Jabber Guest

    Network and Content Security Devices

       Cisco Adaptive Security Appliance (ASA) Software
       Cisco FXOS Software
       Cisco Firepower Threat Defense (FTD)
       Cisco Identity Services Engine (ISE)

    Network Management and Provisioning

       Cisco Data Center Network Manager (DCNM)
       Cisco Evolved Programmable Network Manager
       Cisco Policy Suite
       Cisco Prime Access Registrar
       Cisco Prime Infrastructure
       Cisco Prime Network Change and Configuration Management
       Cisco Virtual Topology System (formerly Cisco Virtual Systems
        Operations Center) - VTSR VM
       Cisco Virtualized Infrastructure Manager (VIM)

    Routing and Switching - Enterprise and Service Provider

       Cisco 8000 Series Routers
       Cisco ASR 5000 Series
       Cisco ASR 9000 Aggregation Services Routers Series
       Cisco Carrier Routing System (CRS)
       Cisco Connected Grid Routers
       Cisco DNA Center
       Cisco IOS XRv 9000 Router
       Cisco IOS and IOS XE Software
       Cisco MDS 9000 Series Multilayer Switches
       Cisco Network Convergence System (NCS) 540 Series Routers
       Cisco Network Convergence System (NCS) 560 Series Routers
       Cisco Network Convergence System (NCS) 1000 Series
       Cisco Network Convergence System (NCS) 4000 Series
       Cisco Network Convergence System (NCS) 5000 Series
       Cisco Network Convergence System (NCS) 5500 Series
       Cisco Network Convergence System (NCS) 6000 Series Routers
       Cisco Nexus 9000 Series Fabric Switches in Application Centric
        Infrastructure (ACI) mode
       Cisco ONS 15454 Series Multiservice Provisioning Platforms
       Cisco SD-WAN vManage
       Cisco Stealthwatch Endpoint Concentrator
       Cisco Stealthwatch Flow Collector NetFlow
       Cisco Stealthwatch Flow Collector sFlow
       Cisco Stealthwatch Flow Sensor
       Cisco Stealthwatch Management Console (SMC)
       Cisco Stealthwatch UDP Director
       Cisco Virtual Packet Core

    Voice and Unified Communications Devices

       Cisco ATA 190 Analog Telephone Adapter
       Cisco SPA112 2-Port Phone Adapter
       Cisco SPA122 Analog Telephone Adapter (ATA) with Router
       Cisco SPA232D Multi-Line DECT Analog Telephone Adapter (ATA)

    Video, Streaming, TelePresence, and Transcoding Devices

       Cisco Expressway Series
       Cisco TelePresence Video Communication Server (VCS)
       Cisco Video Surveillance Media Server

    Wireless

       Cisco Mobility Services Engine

    Cisco Cloud Hosted Services

       Cisco Jasper Control Center

Workarounds

  o Any workarounds will be documented in the product-specific Cisco bugs,
    which are identified in the Vulnerable Products section of this advisory.

Fixed Software

  o For information about fixed software releases , consult the Cisco bugs
    identified in the Vulnerable Products section of this advisory.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any malicious use of the vulnerability that is described in this advisory.

Source

  o On January 26th, the Qualys Research Team disclosed the vulnerability in a
    public advisory.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM

Revision History

  o +---------+--------------------------+------------+---------+-------------+
    | Version |       Description        |  Section   | Status  |    Date     |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.10    | investigation,           | Products,  | Interim | 2021-FEB-19 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.9     | investigation,           | Products,  | Interim | 2021-FEB-16 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.8     | investigation,           | Products,  | Interim | 2021-FEB-11 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the lists of     |            |         |             |
    |         | products under           |            |         |             |
    |         | investigation,           |            |         |             |
    |         | vulnerable products, and | Affected   |         |             |
    |         | products confirmed not   | Products,  |         |             |
    |         | vulnerable. Note that    | Vulnerable |         |             |
    | 1.7     | Cisco has confirmed that | Products,  | Interim | 2021-FEB-10 |
    |         | Cisco Firepower Threat   | Products   |         |             |
    |         | Defense (FTD) is not     | Confirmed  |         |             |
    |         | affected by this         | Not        |         |             |
    |         | vulnerability. It was    | Vulnerable |         |             |
    |         | incorrectly listed as    |            |         |             |
    |         | vulnerable in a previous |            |         |             |
    |         | version of the advisory. |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the lists of     | Affected   |         |             |
    | 1.6     | products under           | Products,  | Interim | 2021-FEB-08 |
    |         | investigation and        | Vulnerable |         |             |
    |         | vulnerable products.     | Products   |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.5     | investigation,           | Products,  | Interim | 2021-FEB-05 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the lists of     |            |         |             |
    |         | products under           |            |         |             |
    |         | investigation,           |            |         |             |
    |         | vulnerable products, and |            |         |             |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable. Note that    | Affected   |         |             |
    |         | Cisco Virtual Topology   | Products,  |         |             |
    |         | System (formerly Cisco   | Vulnerable |         |             |
    |         | Virtual Systems          | Products,  |         |             |
    | 1.4     | Operations Center) -     | Products   | Interim | 2021-FEB-04 |
    |         | VTSR VM was incorrectly  | Confirmed  |         |             |
    |         | listed as vulnerable in  | Not        |         |             |
    |         | a previous version of    | Vulnerable |         |             |
    |         | the advisory; this has   |            |         |             |
    |         | been corrected because   |            |         |             |
    |         | Cisco has determined     |            |         |             |
    |         | that this product is not |            |         |             |
    |         | affected by this         |            |         |             |
    |         | vulnerability.           |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.3     | investigation,           | Products,  | Interim | 2021-FEB-03 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the lists of     |            |         |             |
    |         | products under           |            |         |             |
    |         | investigation,           |            |         |             |
    |         | vulnerable products, and | Affected   |         |             |
    |         | products confirmed not   | Products,  |         |             |
    |         | vulnerable. Note that    | Vulnerable |         |             |
    |         | Cisco FXOS Software was  | Products,  |         |             |
    | 1.2     | incorrectly listed as    | Products   | Interim | 2021-FEB-02 |
    |         | vulnerable in a previous | Confirmed  |         |             |
    |         | version of the advisory; | Not        |         |             |
    |         | this has been corrected  | Vulnerable |         |             |
    |         | because Cisco has        |            |         |             |
    |         | determined that this     |            |         |             |
    |         | product is not affected  |            |         |             |
    |         | by this vulnerability.   |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         |                          | Affected   |         |             |
    |         | Updated the lists of     | Products,  |         |             |
    |         | products under           | Vulnerable |         |             |
    | 1.1     | investigation,           | Products,  | Interim | 2021-FEB-02 |
    |         | vulnerable products, and | Products   |         |             |
    |         | products confirmed not   | Confirmed  |         |             |
    |         | vulnerable.              | Not        |         |             |
    |         |                          | Vulnerable |         |             |
    +---------+--------------------------+------------+---------+-------------+
    | 1.0     | Initial public release.  | -          | Interim | 2021-JAN-29 |
    +---------+--------------------------+------------+---------+-------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+YOU
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0329.4 – UPDATE [Cisco] Cisco Products: Root compromise – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0329-4-update-cisco-cisco-products-root-compromise-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0329-4-update-cisco-cisco-products-root-compromise-existing-account

ESB-2021.0653 – [SUSE] java-1_7_1-ibm: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0653
                    Security update for java-1_7_1-ibm
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           java-1_7_1-ibm
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Unauthorised Access             -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-27221 CVE-2020-14803 

Reference:         ESB-2021.0618
                   ESB-2020.4526
                   ESB-2020.3930

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-202114634-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for java-1_7_1-ibm

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:14634-1
Rating:            important
References:        #1181239 #1182186
Cross-References:  CVE-2020-14803 CVE-2020-27221
Affected Products:
                   SUSE Linux Enterprise Server 11-SP4-LTSS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for java-1_7_1-ibm fixes the following issues:

  o Update to Java 7.1 Service Refresh 4 Fix Pack 80 [bsc#1182186, bsc#1181239,
    CVE-2020-27221, CVE-2020-14803] * CVE-2020-27221: Potential for a
    stack-based buffer overflow when the virtual machine or JNI natives are
    converting from UTF-8 characters to platform encoding. * CVE-2020-14803:
    Unauthenticated attacker with network access via multiple protocols allows
    to compromise Java SE.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 11-SP4-LTSS:
    zypper in -t patch slessp4-java-1_7_1-ibm-14634=1

Package List:

  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 ppc64 s390x x86_64):
       java-1_7_1-ibm-1.7.1_sr4.80-26.65.1
       java-1_7_1-ibm-devel-1.7.1_sr4.80-26.65.1
       java-1_7_1-ibm-jdbc-1.7.1_sr4.80-26.65.1
  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):
       java-1_7_1-ibm-alsa-1.7.1_sr4.80-26.65.1
       java-1_7_1-ibm-plugin-1.7.1_sr4.80-26.65.1


References:

  o https://www.suse.com/security/cve/CVE-2020-14803.html
  o https://www.suse.com/security/cve/CVE-2020-27221.html
  o https://bugzilla.suse.com/1181239
  o https://bugzilla.suse.com/1182186

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYDMt0eNLKJtyKPYoAQjljxAAgGc5KSz+PJA+5XqAUy1moNpyea8JU40t
mrYe8SDn3o1dV7sbRlBDeqQChPeJJW/oj2avx4OnMmCC9jKiELI0gzNTHbSPckhO
GyWep3z2QEHLcuCBHEe+eG54mljrGOAKyNeMoHI4SpurQ4nAfszOKaT7kTPBBcNO
KLo/M97O4VnFIXH0vTXvmXGcDhE9p7Gx93qTpke3dQzB9RkUOCEkPRDnb08kCTkR
r/adpyevE1d6JBAOGXgX4hV8YQrbVLsPYW77SpjiEEP5mUCisHEpfx1+J2s1sE5l
5RSLmO63WefYbz6zTpMYsmzGnqX7Lz2bnXNxJfqkUkLoyqiciFTU1z8owzgdtMVY
D4CXFfaRNQlk/JkeRYLPuGW+cx6MXNSLO+gsgaZxA17rnl9tj3rDZeo5pcpP7sqk
YNNTWsu4ry1Sd0GoVJOxuxPtTwAalmknPgcvHz4QorJn4dthLUnO57JQNT3SpfPC
tbjzoIZ7JrwrqouY6zVnV2AH8OktwfnhRylj+7tRa1HSoAS+ZfR5dRkHV6AvT6DK
eRefWsGeDNvHggTBr1x5BQd8fJNhgfMU02NHq6wSL7TZC6sJHELuXlGSEom85tEc
Pu8eVN19t4Yga/OIkZw+3CE+wPWr8MC7OGEdaE8MjEJpOiTVOSgxYkTLPfHtJPnC
GlygQ4hZo/U=
=LH9v
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0653 – [SUSE] java-1_7_1-ibm: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0653-suse-java-1_7_1-ibm-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0653-suse-java-1_7_1-ibm-multiple-vulnerabilities

ESB-2021.0654 – [Debian] screen: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0654
                          screen security update
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           screen
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-26937  

Reference:         ESB-2021.0646
                   ESB-2021.0593

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4861

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4861-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 21, 2021                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : screen
CVE ID         : CVE-2021-26937
Debian Bug     : 982435

Felix Weinmann reported a flaw in the handling of combining characters
in screen, a terminal multiplexer with VT100/ANSI terminal emulation,
which can result in denial of service, or potentially the execution of
arbitrary code via a specially crafted UTF-8 character sequence.

For the stable distribution (buster), this problem has been fixed in
version 4.6.2-3+deb10u1.

We recommend that you upgrade your screen packages.

For the detailed security status of screen please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/screen

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=6/ko
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dhZD
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0654 – [Debian] screen: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0654-debian-screen-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0654-debian-screen-multiple-vulnerabilities

ESB-2021.0652 – [SUSE] qemu: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0652
                         Security update for qemu
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           qemu
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Increased Privileges     -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-20221 CVE-2021-20203 CVE-2021-20181
                   CVE-2020-11947  

Reference:         ESB-2021.0614
                   ESB-2021.0430

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210521-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for qemu

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0521-1
Rating:            important
References:        #1178049 #1178565 #1179717 #1179719 #1180523 #1181639
                   #1181933 #1182137
Cross-References:  CVE-2020-11947 CVE-2021-20181 CVE-2021-20203 CVE-2021-20221
Affected Products:
                   SUSE Linux Enterprise Module for Server Applications 15-SP2
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that solves four vulnerabilities and has four fixes is now available.

Description:

This update for qemu fixes the following issues:

  o Fixed potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
  o Fixed out-of-bound access in iscsi (CVE-2020-11947 bsc#1180523)
  o Fixed out-of-bound access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
  o Fixed out-of-bound access in ARM interrupt handling (CVE-2021-20221 bsc#
    1181933)
  o Fixed vfio-pci device on s390 enters error state (bsc#1179717 bsc#1179719)
  o Fixed "Failed to try-restart qemu-ga@.service" error while updating the
    qemu-guest-agent. (bsc#1178565)
  o Apply fixes to qemu scsi passthrough with respect to timeout and error
    conditions, including using more correct status codes. Add more qemu
    tracing which helped track down these issues (bsc#1178049)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Server Applications 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-521=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-521=1

Package List:

  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64
    ppc64le s390x x86_64):
       qemu-4.2.1-11.13.1
       qemu-block-curl-4.2.1-11.13.1
       qemu-block-curl-debuginfo-4.2.1-11.13.1
       qemu-block-iscsi-4.2.1-11.13.1
       qemu-block-iscsi-debuginfo-4.2.1-11.13.1
       qemu-block-rbd-4.2.1-11.13.1
       qemu-block-rbd-debuginfo-4.2.1-11.13.1
       qemu-block-ssh-4.2.1-11.13.1
       qemu-block-ssh-debuginfo-4.2.1-11.13.1
       qemu-debuginfo-4.2.1-11.13.1
       qemu-debugsource-4.2.1-11.13.1
       qemu-guest-agent-4.2.1-11.13.1
       qemu-guest-agent-debuginfo-4.2.1-11.13.1
       qemu-lang-4.2.1-11.13.1
       qemu-ui-spice-app-4.2.1-11.13.1
       qemu-ui-spice-app-debuginfo-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (s390x x86_64):
       qemu-kvm-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (ppc64le):
       qemu-ppc-4.2.1-11.13.1
       qemu-ppc-debuginfo-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64):
       qemu-arm-4.2.1-11.13.1
       qemu-arm-debuginfo-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):
       qemu-ipxe-1.0.0+-11.13.1
       qemu-microvm-4.2.1-11.13.1
       qemu-seabios-1.12.1+-11.13.1
       qemu-sgabios-8-11.13.1
       qemu-vgabios-1.12.1+-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (x86_64):
       qemu-audio-alsa-4.2.1-11.13.1
       qemu-audio-alsa-debuginfo-4.2.1-11.13.1
       qemu-audio-pa-4.2.1-11.13.1
       qemu-audio-pa-debuginfo-4.2.1-11.13.1
       qemu-ui-curses-4.2.1-11.13.1
       qemu-ui-curses-debuginfo-4.2.1-11.13.1
       qemu-ui-gtk-4.2.1-11.13.1
       qemu-ui-gtk-debuginfo-4.2.1-11.13.1
       qemu-x86-4.2.1-11.13.1
       qemu-x86-debuginfo-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP2 (s390x):
       qemu-s390-4.2.1-11.13.1
       qemu-s390-debuginfo-4.2.1-11.13.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       qemu-debuginfo-4.2.1-11.13.1
       qemu-debugsource-4.2.1-11.13.1
       qemu-tools-4.2.1-11.13.1
       qemu-tools-debuginfo-4.2.1-11.13.1


References:

  o https://www.suse.com/security/cve/CVE-2020-11947.html
  o https://www.suse.com/security/cve/CVE-2021-20181.html
  o https://www.suse.com/security/cve/CVE-2021-20203.html
  o https://www.suse.com/security/cve/CVE-2021-20221.html
  o https://bugzilla.suse.com/1178049
  o https://bugzilla.suse.com/1178565
  o https://bugzilla.suse.com/1179717
  o https://bugzilla.suse.com/1179719
  o https://bugzilla.suse.com/1180523
  o https://bugzilla.suse.com/1181639
  o https://bugzilla.suse.com/1181933
  o https://bugzilla.suse.com/1182137

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=W5d/
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0652 – [SUSE] qemu: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0652-suse-qemu-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0652-suse-qemu-multiple-vulnerabilities

ESB-2021.0651 – [SUSE] php74: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0651
                         Security update for php74
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           php74
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21702  

Reference:         ESB-2021.0619
                   ESB-2021.0608
                   ESB-2021.0606

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210522-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for php74

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0522-1
Rating:            important
References:        #1182049
Cross-References:  CVE-2021-21702
Affected Products:
                   SUSE Linux Enterprise Software Development Kit 12-SP5
                   SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for php74 fixes the following issues:

  o CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-522=1
  o SUSE Linux Enterprise Module for Web Scripting 12:
    zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2021-522=1

Package List:

  o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
    s390x x86_64):
       php74-debuginfo-7.4.6-1.19.1
       php74-debugsource-7.4.6-1.19.1
       php74-devel-7.4.6-1.19.1
  o SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x
    x86_64):
       apache2-mod_php74-7.4.6-1.19.1
       apache2-mod_php74-debuginfo-7.4.6-1.19.1
       php74-7.4.6-1.19.1
       php74-bcmath-7.4.6-1.19.1
       php74-bcmath-debuginfo-7.4.6-1.19.1
       php74-bz2-7.4.6-1.19.1
       php74-bz2-debuginfo-7.4.6-1.19.1
       php74-calendar-7.4.6-1.19.1
       php74-calendar-debuginfo-7.4.6-1.19.1
       php74-ctype-7.4.6-1.19.1
       php74-ctype-debuginfo-7.4.6-1.19.1
       php74-curl-7.4.6-1.19.1
       php74-curl-debuginfo-7.4.6-1.19.1
       php74-dba-7.4.6-1.19.1
       php74-dba-debuginfo-7.4.6-1.19.1
       php74-debuginfo-7.4.6-1.19.1
       php74-debugsource-7.4.6-1.19.1
       php74-dom-7.4.6-1.19.1
       php74-dom-debuginfo-7.4.6-1.19.1
       php74-enchant-7.4.6-1.19.1
       php74-enchant-debuginfo-7.4.6-1.19.1
       php74-exif-7.4.6-1.19.1
       php74-exif-debuginfo-7.4.6-1.19.1
       php74-fastcgi-7.4.6-1.19.1
       php74-fastcgi-debuginfo-7.4.6-1.19.1
       php74-fileinfo-7.4.6-1.19.1
       php74-fileinfo-debuginfo-7.4.6-1.19.1
       php74-fpm-7.4.6-1.19.1
       php74-fpm-debuginfo-7.4.6-1.19.1
       php74-ftp-7.4.6-1.19.1
       php74-ftp-debuginfo-7.4.6-1.19.1
       php74-gd-7.4.6-1.19.1
       php74-gd-debuginfo-7.4.6-1.19.1
       php74-gettext-7.4.6-1.19.1
       php74-gettext-debuginfo-7.4.6-1.19.1
       php74-gmp-7.4.6-1.19.1
       php74-gmp-debuginfo-7.4.6-1.19.1
       php74-iconv-7.4.6-1.19.1
       php74-iconv-debuginfo-7.4.6-1.19.1
       php74-intl-7.4.6-1.19.1
       php74-intl-debuginfo-7.4.6-1.19.1
       php74-json-7.4.6-1.19.1
       php74-json-debuginfo-7.4.6-1.19.1
       php74-ldap-7.4.6-1.19.1
       php74-ldap-debuginfo-7.4.6-1.19.1
       php74-mbstring-7.4.6-1.19.1
       php74-mbstring-debuginfo-7.4.6-1.19.1
       php74-mysql-7.4.6-1.19.1
       php74-mysql-debuginfo-7.4.6-1.19.1
       php74-odbc-7.4.6-1.19.1
       php74-odbc-debuginfo-7.4.6-1.19.1
       php74-opcache-7.4.6-1.19.1
       php74-opcache-debuginfo-7.4.6-1.19.1
       php74-openssl-7.4.6-1.19.1
       php74-openssl-debuginfo-7.4.6-1.19.1
       php74-pcntl-7.4.6-1.19.1
       php74-pcntl-debuginfo-7.4.6-1.19.1
       php74-pdo-7.4.6-1.19.1
       php74-pdo-debuginfo-7.4.6-1.19.1
       php74-pgsql-7.4.6-1.19.1
       php74-pgsql-debuginfo-7.4.6-1.19.1
       php74-phar-7.4.6-1.19.1
       php74-phar-debuginfo-7.4.6-1.19.1
       php74-posix-7.4.6-1.19.1
       php74-posix-debuginfo-7.4.6-1.19.1
       php74-readline-7.4.6-1.19.1
       php74-readline-debuginfo-7.4.6-1.19.1
       php74-shmop-7.4.6-1.19.1
       php74-shmop-debuginfo-7.4.6-1.19.1
       php74-snmp-7.4.6-1.19.1
       php74-snmp-debuginfo-7.4.6-1.19.1
       php74-soap-7.4.6-1.19.1
       php74-soap-debuginfo-7.4.6-1.19.1
       php74-sockets-7.4.6-1.19.1
       php74-sockets-debuginfo-7.4.6-1.19.1
       php74-sodium-7.4.6-1.19.1
       php74-sodium-debuginfo-7.4.6-1.19.1
       php74-sqlite-7.4.6-1.19.1
       php74-sqlite-debuginfo-7.4.6-1.19.1
       php74-sysvmsg-7.4.6-1.19.1
       php74-sysvmsg-debuginfo-7.4.6-1.19.1
       php74-sysvsem-7.4.6-1.19.1
       php74-sysvsem-debuginfo-7.4.6-1.19.1
       php74-sysvshm-7.4.6-1.19.1
       php74-sysvshm-debuginfo-7.4.6-1.19.1
       php74-tidy-7.4.6-1.19.1
       php74-tidy-debuginfo-7.4.6-1.19.1
       php74-tokenizer-7.4.6-1.19.1
       php74-tokenizer-debuginfo-7.4.6-1.19.1
       php74-xmlreader-7.4.6-1.19.1
       php74-xmlreader-debuginfo-7.4.6-1.19.1
       php74-xmlrpc-7.4.6-1.19.1
       php74-xmlrpc-debuginfo-7.4.6-1.19.1
       php74-xmlwriter-7.4.6-1.19.1
       php74-xmlwriter-debuginfo-7.4.6-1.19.1
       php74-xsl-7.4.6-1.19.1
       php74-xsl-debuginfo-7.4.6-1.19.1
       php74-zip-7.4.6-1.19.1
       php74-zip-debuginfo-7.4.6-1.19.1
       php74-zlib-7.4.6-1.19.1
       php74-zlib-debuginfo-7.4.6-1.19.1


References:

  o https://www.suse.com/security/cve/CVE-2021-21702.html
  o https://bugzilla.suse.com/1182049

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RIbI
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0651 – [SUSE] php74: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0651-suse-php74-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0651-suse-php74-denial-of-service-remote-unauthenticated

ESB-2021.0650 – [Win][UNIX/Linux] python-django: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0650
                       python-django security update
                             22 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           python-django
Publisher:         Debian
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Provide Misleading Information -- Remote with User Interaction
                   Reduced Security               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23336  

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2569

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running python-django check for an updated version of the software 
         for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2569-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
February 19, 2021                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : python-django
Version        : 1:1.10.7-2+deb9u11
CVE ID         : CVE-2021-23336
Debian Bug     : #983090

It was discovered that there was a web cache poisoning attack in
Django, a popular Python-based web development framework.

This was caused by the unsafe handling of ";" characters in Python's
urllib.parse.parse_qsl method which had been backported to Django's
codebase to fix some other security issues in the past.

For Debian 9 "Stretch", this problem has been fixed in version
1:1.10.7-2+deb9u11.

We recommend that you upgrade your python-django packages.

For the detailed security status of python-django please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/python-django

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=5MRy
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DbvH
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0650 – [Win][UNIX/Linux] python-django: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/esb-2021-0650-winunix-linux-python-django-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0650-winunix-linux-python-django-multiple-vulnerabilities

Nvidia announces official “anti-cryptomining” software drivers

“It’s a DoS, Jim, but not as we know it.”
Read More

The post Nvidia announces official “anti-cryptomining” software drivers appeared first on Malware Devil.



https://malwaredevil.com/2021/02/22/nvidia-announces-official-anti-cryptomining-software-drivers/?utm_source=rss&utm_medium=rss&utm_campaign=nvidia-announces-official-anti-cryptomining-software-drivers

Sunday, February 21, 2021

Network Security News Summary for Monday February 22nd, 2021

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

The post Network Security News Summary for Monday February 22nd, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/21/network-security-news-summary-for-monday-february-22nd-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-february-22nd-2021

DDE and oledump, (Sun, Feb 21st)

I was asked if the DDE YARA rules I created work with oledump.py on the sample that Xavier wrote about in his diary entry “Dynamic Data Exchange (DDE) is Back in the Wild?“.

These rules can be used with YARA directly:

And you can use YARA’s option -s to view the string. It will contain the DDE command:

But these rule do not work with oledump.py (I designed them to work with YARA):

oledump.py supports YARA rules through option -y: when you use that option, the provided YARA rules are applied to each individual stream in the ole file (not the complete ole file, like YARA itself does).

But the rules for ole files that I created, contain a test to check if the file is an ole file: uint32be(0) == 0xD0CF11E0

If you suppress this test, you can use these rules with oledump:

In stead of suppressing this test, I created 2 new rules without this test:

rule Office_OLE_DDEAUTO_sa {
  strings:
    $a = /x13s*DDEAUTOb[^x14]+/ nocase
  condition:
    $a
}

rule Office_OLE_DDE_sa {
  strings:
    $a = /x13s*DDEb[^x14]+/ nocase
  condition:
    $a
}

And now one of these new rules triggers on the WordDocument stream:

You can use option –yarastrings to display the matched strings:

And I also made a video:

 

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post DDE and oledump, (Sun, Feb 21st) appeared first on Malware Devil.



https://malwaredevil.com/2021/02/21/dde-and-oledump-sun-feb-21st/?utm_source=rss&utm_medium=rss&utm_campaign=dde-and-oledump-sun-feb-21st

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...