Malware Devil

Monday, March 22, 2021

CSA & ISACA Team Up on Cloud Auditing Certificate

The Certificate of Cloud Auditing Knowledge aims to fill a gap in the market for cloud IT auditing as more organizations work in cloud environments.

The post CSA & ISACA Team Up on Cloud Auditing Certificate appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/csa-isaca-team-up-on-cloud-auditing-certificate-2/?utm_source=rss&utm_medium=rss&utm_campaign=csa-isaca-team-up-on-cloud-auditing-certificate-2

CSA & ISACA Team Up on Cloud Auditing Certificate

The Certificate of Cloud Auditing Knowledge aims to fill a gap in the market for cloud IT auditing as more organizations work in cloud environments.

The Cloud Security Alliance (CSA) and ISACA today launched the Certificate of Cloud Auditing Knowledge (CCAK), a new technical credential for professionals who want to demonstrate their expertise in auditing cloud environments.

Both the CSA and ISACA communities had been requesting this type of program for years – at least six to seven for the CSA, says CTO Daniele Catteddu. Security practitioners, especially those who are cloud customers or part of the software-as-a-service community, want training on how to audit cloud services. Cloud providers also want to ensure customers are educated.

“They have – especially the most mature cloud service providers – all the interest in having their prospective customers better educated in the evaluation of the services,” Catteddu says. CSA contacted ISACA to propose a partnership, which brought more expertise in information systems auditing and more feedback on the content and curriculum that had been developed.

The end result of their collaboration is a study guide, instructor-led training (both virtual and in-person), an online course, and a practice bank for exam questions. The CCAK consists of a two-hour online exam with 76 multiple-choice questions and a required score of 70% to pass.

The CCAK reviews the difference in auditing cloud environments versus traditional IT services and infrastructure, as well as how to evaluate cloud services before and during their provision. Practitioners learn how introducing the cloud into an environment affects existing governance policies and frameworks, as well as how the shared responsibility model affects compliance.

Practitioners studying for the CCAK also review how to use a cloud-specific security controls framework and configure it in a way that lets them measure the effectiveness of different controls. Cloud environments don’t have the same admin access as legacy IT systems, CSA notes, and the security controls are different from what traditional IT auditors are used to.

In developing the curriculum and exam, CSA and ISACA discussed the gaps in cloud security auditing at many organizations. IT auditors are well-trained in general IT controls, but cloud environments bring new technologies, new controls, and a new partner hosting the software and infrastructure, explains Shannon Donahue, ISACA’s vice president of content development and services. There are several nuances and processes auditors will need to be aware of.

“When you start looking at types of deployment models, or the types of clouds, they need to understand that if I’m in a public/private/hybrid cloud, what are all the threats and risks that are new to my organization, and how do those controls need to be designed and tested so we can ensure effectiveness and be confident our data is secure?” Donahue says. Auditors also need to consider different regulations, standards, and models outside the usual IT auditing process.

Compounding the cloud auditing challenge is the complexity of the cloud supply chain, which Catteddu notes has been a factor in several recent security breaches and is a distinctive part of cloud security auditing.

“The number of cloud services that each company is consuming is huge, and we wanted to make sure whoever is evaluating that complex portfolio of services is in the position to scale that expertise and expand and automate their evaluation as needed,” he adds.

The CCAK is intended for practitioners including external and internal assessors and auditors, CISOs, chief privacy officers, data protection officers, security and privacy consultants, compliance managers, and vendor program managers. Catteddu and Donahue emphasize that this is not a foundational certificate. Unlike the Certificate of Cloud Security Knowledge (CCSK) or Certified Cloud Security Professional (CCSP), students are expected to have a background.

“The CCAK assumes that any student or professional that is approaching the certificate … has those foundational basics of cloud and cloud security already well-consolidated,” Catteddu says, noting that “we do not cover that in detail in the program.” CCAK is considered an extra layer on top of the CCSK, Certified Information Systems Auditor (CISA), FedRAMP 3PAO Assessor, PCI/DSS Qualified Security Assessor, and/or the ISO 27001 Lead Auditor Credentials.

It would also be helpful for candidates to have a background in the audit space, Donahue adds.

“Not having any audit background would be problematic in … having to audit not just your internal controls but now all of your trusted service provider controls as well,” she explains.

CSA and ISACA plan to monitor the market and adjust the training and exam as the cloud and cloud security space continue to evolve.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post CSA & ISACA Team Up on Cloud Auditing Certificate appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/csa-isaca-team-up-on-cloud-auditing-certificate/?utm_source=rss&utm_medium=rss&utm_campaign=csa-isaca-team-up-on-cloud-auditing-certificate

Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability

On March 10th F5 published a security advisory containing twenty one CVEs, the most critical one (CVE-2021-22986) can be exploited for unauthenticated remote code execution attacks. In the past week, several security researchers have reverse engineered the Java software patch published by BIG-IP and posted tweets and blogs with detailed POCs. As a result, we […]

The post Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability appeared first on Blog.

The post Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability appeared first on Security Boulevard.

Read More

The post Attacks Spike Following The Disclosure Of CVE-2021-22986: F5 Networks BIG-IP iControl Remote Command Execution Vulnerability appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/attacks-spike-following-the-disclosure-of-cve-2021-22986-f5-networks-big-ip-icontrol-remote-command-execution-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=attacks-spike-following-the-disclosure-of-cve-2021-22986-f5-networks-big-ip-icontrol-remote-command-execution-vulnerability

Security Catalyst Office Hours Recap for March 19, 2021

We welcomed some fresh faces and old friends to another brilliant discussion this week. During the “tell me something good” opening, we landed on how the power of reflecting on value set off a remarkable journey… and we dove right in.  Here are the ideas and insights we explored this weekReflecting on ValueSimple prompts to reflect […]

The post Security Catalyst Office Hours Recap for March 19, 2021 appeared first on Security Boulevard.

Read More

The post Security Catalyst Office Hours Recap for March 19, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/security-catalyst-office-hours-recap-for-march-19-2021/?utm_source=rss&utm_medium=rss&utm_campaign=security-catalyst-office-hours-recap-for-march-19-2021

Supply Chains in Azure SDK/Xcode, GitHub Sessions, & GCP VRP – ASW #144

In the AppSec News: Supply chain security in Azure SDK and macOS Xcode, GitHub’s postmortem on a session handling flaw, six GCP vulns from 2020, & information resources for hacking the cloud!

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw144

The post Supply Chains in Azure SDK/Xcode, GitHub Sessions, & GCP VRP – ASW #144 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/supply-chains-in-azure-sdk-xcode-github-sessions-gcp-vrp-asw-144/?utm_source=rss&utm_medium=rss&utm_campaign=supply-chains-in-azure-sdk-xcode-github-sessions-gcp-vrp-asw-144

Critical Security Bugs Fixed in Virtual Learning Software

Remote ed software bugs give attackers wide access student computers, data.
Read More

The post Critical Security Bugs Fixed in Virtual Learning Software appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/critical-security-bugs-fixed-in-virtual-learning-software/?utm_source=rss&utm_medium=rss&utm_campaign=critical-security-bugs-fixed-in-virtual-learning-software

A week in security (March 15 – 21)

Last week on Malwarebytes Labs, our podcast featured Adam Kujawa, who talked us through our 2021 State of Malware report.

We cover our own research on:

Other Cybersecurity news

Stay safe, everyone!

The post A week in security (March 15 – 21) appeared first on Malwarebytes Labs.

The post A week in security (March 15 – 21) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/a-week-in-security-march-15-21-2/?utm_source=rss&utm_medium=rss&utm_campaign=a-week-in-security-march-15-21-2

Fortinet and Linksys Team Up to Deliver Enterprise-Grade Performance and Security for Work From Home Networks

Fortinet and Linksys have announced a new strategic alliance to deliver enterprise-grade performance and security for work from home networks. Learn more.

The post Fortinet and Linksys Team Up to Deliver Enterprise-Grade Performance and Security for Work From Home Networks appeared first on Security Boulevard.

Read More

The post Fortinet and Linksys Team Up to Deliver Enterprise-Grade Performance and Security for Work From Home Networks appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/fortinet-and-linksys-team-up-to-deliver-enterprise-grade-performance-and-security-for-work-from-home-networks/?utm_source=rss&utm_medium=rss&utm_campaign=fortinet-and-linksys-team-up-to-deliver-enterprise-grade-performance-and-security-for-work-from-home-networks

A week in security (March 15 – 21)

Last week on Malwarebytes Labs, our podcast featured Adam Kujawa, who talked us through our 2021 State of Malware report.

We cover our own research on:

Other Cybersecurity news

Stay safe, everyone!

The post A week in security (March 15 – 21) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/a-week-in-security-march-15-21/?utm_source=rss&utm_medium=rss&utm_campaign=a-week-in-security-march-15-21

CISO Soup: Data Breaches, Strategy and Cybersecurity Culture

For the longest time, those of us who occupy the role of the CISO have fought for our seat at the ‘big table.’ Although it appears some of us are being invited into the C-suite, there is still a long way for us to go.This is highlighted in a 2021 report provided BT, which places […]… Read More

The post CISO Soup: Data Breaches, Strategy and Cybersecurity Culture appeared first on The State of Security.

The post CISO Soup: Data Breaches, Strategy and Cybersecurity Culture appeared first on Security Boulevard.

Read More

The post CISO Soup: Data Breaches, Strategy and Cybersecurity Culture appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/ciso-soup-data-breaches-strategy-and-cybersecurity-culture/?utm_source=rss&utm_medium=rss&utm_campaign=ciso-soup-data-breaches-strategy-and-cybersecurity-culture

Critical RCE Vulnerability Found in Apache OFBiz ERP Software–Patch Now

The Apache Software Foundation on Friday addressed a high severity vulnerability in Apache OFBiz that could have allowed an unauthenticated adversary to remotely seize control of the open-source enterprise resource planning (ERP) system.

Tracked as CVE-2021-26295, the flaw affects all versions of the software prior to 17.12.06 and employs an “unsafe deserialization” as an attack vector to permit unauthorized remote attackers to execute arbitrary code on a server directly.

OFBiz is a Java-based web framework for automating enterprise processes and offers a wide range of functionality, including accounting, customer relationship management, manufacturing operations management, order management, supply chain fulfillment, and warehouse management system, among others.

Specifically, by exploiting this flaw, a malicious party can tamper with serialized data to insert arbitrary code that, when deserialized, can potentially result in remote code execution.

“An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz,” OFBiz developer Jacques Le Roux noted.

Unsafe deserialization has been a source of data integrity and other security issues, with the Open Web Application Security Project (OWASP) noting that “data which is untrusted cannot be trusted to be well formed, [and that] malformed data or unexpected data could be used to abuse application logic, deny service, or execute arbitrary code, when deserialized.”

r00t4dm at Cloud-Penetrating Arrow Lab, MagicZero from SGLAB of Legendsec at Qi’anxin Group, and Longofo at Knownsec 404 Team have been credited with reporting the vulnerability.

It’s recommended to upgrade Apache OFBiz to the latest version (17.12.06) to mitigate the risk associated with the flaw.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post Critical RCE Vulnerability Found in Apache OFBiz ERP Software–Patch Now appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/critical-rce-vulnerability-found-in-apache-ofbiz-erp-software-patch-now/?utm_source=rss&utm_medium=rss&utm_campaign=critical-rce-vulnerability-found-in-apache-ofbiz-erp-software-patch-now

Leveraging Managed Threat Hunting

threat Linux security XDR open source security

The cybersecurity landscape changed drastically on two fronts in 2020: volume and supply chain complexities. Attack surfaces expanded and softened as employees migrated off well-protected corporate networks and logged on from home. As a result, the number of incidents and the money cybercriminals made from exploits like ransomware skyrocketed, growing 311% to $350M. Last year..

The post Leveraging Managed Threat Hunting appeared first on Security Boulevard.

Read More

The post Leveraging Managed Threat Hunting appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/leveraging-managed-threat-hunting/?utm_source=rss&utm_medium=rss&utm_campaign=leveraging-managed-threat-hunting

Six Months Left For NIST SP800-53 Compliance

Six months ago, NIST (National Institute of Standards and Technology) released a new version of their security and privacy framework, which had its last update seven years ago.  The new framework included requirements for RASP and IAST.

The post Six Months Left For NIST SP800-53 Compliance appeared first on K2io.

The post Six Months Left For NIST SP800-53 Compliance appeared first on Security Boulevard.

Read More

The post Six Months Left For NIST SP800-53 Compliance appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/six-months-left-for-nist-sp800-53-compliance/?utm_source=rss&utm_medium=rss&utm_campaign=six-months-left-for-nist-sp800-53-compliance

Security Alert: Alert Regarding Vulnerability (CVE-2021-22986) in Multiple BIG-IP Products

Read More

The post Security Alert: Alert Regarding Vulnerability (CVE-2021-22986) in Multiple BIG-IP Products appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/security-alert-alert-regarding-vulnerability-cve-2021-22986-in-multiple-big-ip-products-2/?utm_source=rss&utm_medium=rss&utm_campaign=security-alert-alert-regarding-vulnerability-cve-2021-22986-in-multiple-big-ip-products-2

Microsoft Office 365 Attacks on the Rise

attacks remote work

It’s not surprising the COVID-19 pandemic that pushed workers home also accelerated cloud migration and digital transformation, but new research from Vectra.ai unearthed a troubling trend – 71% of Microsoft Office 365 deployments in medium to large companies suffered, on average, seven legitimate account takeovers at a time when remote workforces were more dependent than..

The post Microsoft Office 365 Attacks on the Rise appeared first on Security Boulevard.

Read More

The post Microsoft Office 365 Attacks on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/microsoft-office-365-attacks-on-the-rise/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-office-365-attacks-on-the-rise

FCC Boots Chinese Telecom Companies, Citing Security

FCC Thousand Talents Program

The Federal Communications Commission’s (FCC) Public Safety and Homeland Security Bureau on March 12 identified five Chinese companies they said posed a threat to U.S. national security. These companies are: Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. The declaration, according to the FCC, is in..

The post FCC Boots Chinese Telecom Companies, Citing Security appeared first on Security Boulevard.

Read More

The post FCC Boots Chinese Telecom Companies, Citing Security appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/fcc-boots-chinese-telecom-companies-citing-security/?utm_source=rss&utm_medium=rss&utm_campaign=fcc-boots-chinese-telecom-companies-citing-security

Security Alert: Alert Regarding Vulnerability (CVE-2021-22986) in Multiple BIG-IP Products

JPCERT-AT-2021-0014
JPCERT/CC
2021-03-22

I. Overview

On March 10, 2021 (Local Time), F5 Networks has released information regarding multiple vulnerabilities in BIG-IP products. An unauthenticated remote attacker leveraging these vulnerabilities may execute arbitrary code.

F5 Networks
K02566623: Overview of F5 vulnerabilities (March 2021)
https://support.f5.com/csp/article/K02566623

As for the remote command execution vulnerability in iControl REST interface (CVE-2021-22986) among these vulnerabilities, JPCERT/CC confirmed the Proof-of-Concept codes had already been made public, and also observed the information of scanning activities targeting the vulnerability and traffic which appeared to exploit this vulnerability.Users of affected products are recommended to take measures as soon as possible. For more information on the vulnerability, please refer to the information provided by F5 Networks.

F5 Networks
K03009991: iControl REST unauthenticated remote command execution vulnerability CVE-2021-22986
https://support.f5.com/csp/article/K03009991

II. Affected Products

The following products and versions are affected by the vulnerability(CVE-2021-22986):

BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
– 16.x versions from 16.0.0 to 16.0.1
– 15.x versions from 15.1.0 to 15.1.2
– 14.x versions from 14.1.0 to 14.1.3
– 13.x versions from 13.1.0 to 13.1.3
– 12.x versions from 12.1.0 to 12.1.5

BIG-IQ Centralized Management
– 7.x versions 7.1.0, 7.0.0
– 6.x versions 6.0.0 to 6.1.0

III. Solution

F5 Networks released versions of the products addressing the vulnerability (CVE-2021-22986). Please consider updating to the versions after thorough testing.

BIG-IP (LTM, AAM, Advanced WAF, AFM, Analytics, APM, ASM, DDHD, DNS, FPS, GTM, Link Controller, PEM, SSLO)
– 16.0.1.1
– 15.1.2.1
– 14.1.4
– 13.1.3.6
– 12.1.5.3

BIG-IQ Centralized Management
– 8.0.0
– 7.1.0.3, 7.0.0.2

Also, F5 Networks has provided workarounds such as access restrictions as a way to mitigate the impact caused by the vulnerability. If it is difficult to apply update, please consider applying the workarounds.

IV. Related Information

Information has been released by the NCC Group on how to investigate whether the system has already been impacted by the exploit of the vulnerability.

NCC Group
RIFT: Detection capabilities for recent F5 BIG-IP/BIG-IQ iControl REST API vulnerabilities CVE-2021-22986
https://research.nccgroup.com/2021/03/18/rift-detection-capabilities-for-recent-f5-big-ip-big-iq-icontrol-rest-api-vulnerabilities-cve-2021-22986/

V. References

F5 Networks
K04532512: Frequently asked questions for CVE-2021-22986, CVE-2021-22987, CVE-2021-22988, CVE-2021-22989, and CVE-2021-22990
https://support.f5.com/csp/article/K04532512

If you have any information regarding this alert, please contact JPCERT/CC.

JPCERT Coordination Center (Early Warning Group)
MAIL: ew-info@jpcert.or.jp
https://www.jpcert.or.jp/english/

Read More

The post Security Alert: Alert Regarding Vulnerability (CVE-2021-22986) in Multiple BIG-IP Products appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/security-alert-alert-regarding-vulnerability-cve-2021-22986-in-multiple-big-ip-products/?utm_source=rss&utm_medium=rss&utm_campaign=security-alert-alert-regarding-vulnerability-cve-2021-22986-in-multiple-big-ip-products

ISC Stormcast For Monday, March 22nd, 2021 https://isc.sans.edu/podcastdetail.html?id=7422, (Mon, Mar 22nd)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, March 22nd, 2021 https://isc.sans.edu/podcastdetail.html?id=7422, (Mon, Mar 22nd) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/isc-stormcast-for-monday-march-22nd-2021-https-isc-sans-edu-podcastdetail-htmlid7422-mon-mar-22nd/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-march-22nd-2021-https-isc-sans-edu-podcastdetail-htmlid7422-mon-mar-22nd

ESB-2021.0984 – [Win][UNIX/Linux][Debian] pygments: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0984
                         pygments security update
                               22 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pygments
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-27291  

Original Bulletin: 
   http://www.debian.org/lts/security/2021/dla-2600

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running pygments check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2600-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
March 19, 2021                                https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : pygments
Version        : 2.2.0+dfsg-1+deb9u2
CVE ID         : CVE-2021-27291

It was discovered that there was a series of denial of service
vulnerabilities in Pygments, a popular syntax highlighting library
for Python.

A number of regular expressions had exponential or cubic worst-case
complexity which could cause a remote denial of service (DoS) when
provided with malicious input.

For Debian 9 "Stretch", this problem has been fixed in version
2.2.0+dfsg-1+deb9u2.

We recommend that you upgrade your pygments packages.

For the detailed security status of pygments please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pygments

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=xveQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4CJF
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0984 – [Win][UNIX/Linux][Debian] pygments: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/esb-2021-0984-winunix-linuxdebian-pygments-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0984-winunix-linuxdebian-pygments-denial-of-service-remote-unauthenticated

ESB-2021.0983 – [Linux][Debian] cloud-init: Access confidential data – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0983
                        cloud-init security update
                               22 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cloud-init
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3429  

Original Bulletin: 
   https://www.debian.org/lts/security/2021/dla-2601

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running cloud-init check for an updated version of the software for
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2601-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
March 20, 2021                              https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : cloud-init
Version        : 0.7.9-2+deb9u1
CVE ID         : CVE-2021-3429
Debian Bug     : 985540

cloud-init has the ability to generate and set a randomized password
for system users.  This functionality is enabled at runtime by
passing cloud-config data such as:

   chpasswd:
       list: |
           user1:RANDOM

When used this way, cloud-init logs the raw, unhashed password to a
world-readable local file.

For Debian 9 stretch, this problem has been fixed in version
0.7.9-2+deb9u1.

We recommend that you upgrade your cloud-init packages.

For the detailed security status of cloud-init please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cloud-init

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=4F6a
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYFgFzeNLKJtyKPYoAQgckw/+M9X20l/jdY4euw/VyEhmczkSdazr870t
iJxkoDt0T9jcS4+Ipyg8UutTUIcSFX+eIS1fJU01WudBR0xUZS7rdxAHQAh6Gwy7
Q8SY2dRWNShV7S6isBpg8hDCkHPZzQnI3tvZ4ClyCvVAVBD9PePrhrZ5F/1MeGm2
f/mndp5E0jDGgdc0L772YeN+yVbD+OQoigAcAOBchk0jfTqhua/f9vwIosZsBkJC
lkoeX0BNHr1yi8DCxhZ1iVrMSbERUs+v+lYRmBGb3KbGiBkkOajnpm9pXomhzU23
aXAB3U+j9B38RFPLvKW0qcRkJfXAY/Pgp8BXgH3bcJGPs6VI4JTTEEv2J+5CjJJq
+qthnPQcIZ/0drOKX88fmVUgBOD8/doCZjowY9tWS+ewAOI9zrxfeyDu1awHFtqm
8RZP/TBA18/uw5xIHEDKKPgx2qZFsbT/Aj65G7qLwFJtVxGe49f+TdCdEEROF5ja
QSxw/azimOlOL5hXWzYLJGolRhBFpVheDZyuKdbYXDtpzmG0XrkJq5c83OJmJUAC
qb/Ox/V2ebuKiGnb9ry93k3p2G1q3R0DCO/xOql8mDeafNw3Bhp15SVJvEhfPHy2
YKhmYUCWXbNUgSASSzDd4OiDnuSyzDzsXg4vcv8UkVenIqTgYp//aJdkXU7KbfZ0
B9fl9TncEGc=
=95U0
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0983 – [Linux][Debian] cloud-init: Access confidential data – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/03/22/esb-2021-0983-linuxdebian-cloud-init-access-confidential-data-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0983-linuxdebian-cloud-init-access-confidential-data-existing-account

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...