Malware Devil

Monday, March 29, 2021

ESB-2021.1073 – [Win] McAfee ePolicy Orchestrator: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1073
        ePolicy Orchestrator update addresses three vulnerabilities
             (CVE-2021-23888, CVE-2021-23889, CVE-2021-23890)
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           McAfee ePolicy Orchestrator
Publisher:         McAfee
Operating System:  Windows
Impact/Access:     Cross-site Scripting           -- Remote with User Interaction
                   Provide Misleading Information -- Remote with User Interaction
                   Access Confidential Data       -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23890 CVE-2021-23889 CVE-2021-23888

Original Bulletin: 
   https://kc.mcafee.com/corporate/index?page=content&id=SB10352

- --------------------------BEGIN INCLUDED TEXT--------------------

McAfee Security Bulletin - ePolicy Orchestrator update addresses three
vulnerabilities (CVE-2021-23888, CVE-2021-23889, CVE-2021-23890)

Security Bulletins ID   : SB10352

Last Modified           : 3/25/2021

Summary

First Published: March 25, 2021
+----------------+----------+--------------+----------------+--------+--------+
|                |          |              |                |        |CVSS    |
|                |Impacted  |              |Impact of       |Severity|v3.1    |
|Product:        |Versions: |CVE ID:       |Vulnerabilities:|Ratings:|Base/   |
|                |          |              |                |        |Temporal|
|                |          |              |                |        |Scores: |
+----------------+----------+--------------+----------------+--------+--------+
|                |          |              |CWE-938:        |        |        |
|                |          |CVE-2021-23888|Unvalidated     |Medium  |6.3 /   |
|                |5.10 prior|              |Redirects and   |        |5.7     |
|                |to Update |              |Forwards        |        |        |
|ePolicy         |10        +--------------+----------------+--------+--------+
|Orchestrator    |5.9.1     |              |CWE 79:         |        |3.5 /   |
|(ePO)           |prior to  |CVE-2021-23889|Cross-Site      |Low     |3.2     |
|                |HF        |              |Scripting (XSS) |        |        |
|                |EPO-937000+--------------+----------------+--------+--------+
|                |          |              |CWE-717:        |        |6.5 /   |
|                |          |CVE-2021-23890|Information Leak|Medium  |5.9     |
|                |          |              |/Disclosure     |        |        |
+----------------+----------+--------------+----------------+--------+--------+
|                |Install or update to the versions listed below:             |
|Recommendations:|                                                            |
|                |  o ePO 5.10.0 Update 10                                    |
|                |  o ePO 5.9.1 HF EPO-937000                                 |
+----------------+------------------------------------------------------------+
|Security        |                                                            |
|Bulletin        |None                                                        |
|Replacement:    |                                                            |
+----------------+------------------------------------------------------------+
|Location of     |                                                            |
|updated         |http://www.mcafee.com/us/downloads/downloads.aspx           |
|software:       |                                                            |
+----------------+------------------------------------------------------------+

To receive email notification when this Security Bulletin is updated, click
Subscribe on the right side of the page. You must be logged on to subscribe.

Article contents:

  o Vulnerability Description
  o Remediation
  o Additional steps required to address CVE-2021-23890
  o Acknowledgments
  o Frequently Asked Questions (FAQs)
  o Resources
  o Disclaimer

Vulnerability Description

 1. CVE-2021-23888
    Unvalidated client-side URL redirect vulnerability in McAfee ePolicy
    Orchestrator (ePO) prior to 5.10 Update 10 could cause an authenticated ePO
    user to load an untrusted site in an ePO iframe which could steal
    information from the authenticated user.

    This would require the attacker to convince the ePO user to click a
    malicious link whilst logged into the ePO server through the same browser
    they clicked on the malicious link in. The results of this attack are not
    stored in ePO.
    https://web.nvd.nist.gov/view/vuln/detailvulnId=CVE-2021-23888
    https://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2021-23888
 2. CVE-2021-23889
    Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO)
    prior to 5.10 Update 10 allows ePO administrators to inject arbitrary web
    script or HTML via multiple parameters where the administrator's entries
    were not correctly sanitized.

    To exploit this the attacker would either:
       Need to know an existing registered command in the ePO system which
        they can pass parameters to, triggering the Cross-site scripting
        vulnerability
       Add a new registered command to the ePO system which does not sanitize
        parameters. Adding a new command to the ePO system requires
        administrator privileges and they must be logged onto the local ePO
        system, not through the User Interface. This could then be exploited by
        a another ePO user. Execution of these commands is not granted by
        default to non-administrator ePO users.
    https://web.nvd.nist.gov/view/vuln/detailvulnId=CVE-2021-23889
    https://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2021-23889
 3. CVE-2021-23890
    Information leak vulnerability in the Agent Handler of McAfee ePolicy
    Orchestrator (ePO) prior to 5.10 Update 10 allows an unauthenticated user
    to download McAfee product packages (specifically McAfee Agent) available
    in ePO repository and install them on their own machines to have it managed
    and then in turn get policy details from the ePO server. This can only
    happen when the ePO Agent Handler is installed in a Demilitarized Zone
    (DMZ) to service machines not connected to the network through a VPN.

    Once the software fix has been applied, further configuration changes are
    required. See the Additional steps required to address CVE-2021-23890 
    section below.
    https://web.nvd.nist.gov/view/vuln/detailvulnId=CVE-2021-23890
    https://cve.mitre.org/cgi-bin/cvename.cginame=CVE-2021-23890

Remediation
To remediate this issue:

  o Customers using ePO 5.10 should update to ePO 5.10.0 Update 10.
  o Customers using ePO 5.9.x and earlier should upgrade to ePO 5.10.0 Update
    10.
  o Customers using ePO 5.9.x and earlier could apply ePO 5.9.1 HF EPO-937000
    to resolve only CVE-2021-23890. McAfee strongly recommends upgrading ePO to
    version 5.10 as the End of Life for ePO 5.9.1 has been announced as August
    31, 2021. For more information, see: KB93286 - End of Life for ePolicy
    Orchestrator 5.9.x .

Go to the Product Downloads site , and download the applicable product update/
hotfix file:
+-------+-------+------+--------------------+--------------+
|Product|Version|Type  |File Name           |Release Date  |
+-------+-------+------+--------------------+--------------+
|ePO    |5.9.1  |Hotfix|EPO-937000          |March 25, 2021|
+-------+-------+------+--------------------+--------------+
|ePO    |5.10.0 |Update|ePO 5.10.0 Update 10|March 25, 2021|
+-------+-------+------+--------------------+--------------+

Download and Installation Instructions
For instructions to download McAfee product updates and hotfixes, see: KB56057
- - How to download Enterprise product updates and documentation . Review the
Release Notes and the Installation Guide for instructions on how to install
these updates. All documentation is available at https://docs.mcafee.com .
Additional steps required to address CVE-2021-23890
Apply these two settings changes after applying ePO 5.10.0 Update 10 or ePO
5.9.1 HF EPO-937000:

Setting 1: Stop auto-install of the agent into the ePO System Tree coming
through the DMZ.

 1. On the remote ePO Agent Handler that is installed in a DMZ, navigate to the
    Agent HandlerDB folder.
 2. Edit the server.ini configuration file.
 3. Add the setting DMZ=1 under the [Server] section and save the file.

Setting 2: Block download of McAfee Agent packages from DMZ installed ePO Agent
Handlers.

NOTE: The following instructions also prevent off-network/off-VPN McAfee Agents
from upgrading their McAfee Agent client software.

 1. On the remote ePO Agent Handler that is installed in a DMZ, navigate to the
    apache2conf folder.
 2. Open the httpd.conf file.
 3. Search for this line:  require all denied 
 4. Add the following contents to below the location found in the previous step
    3.

    # Block agent package requests from being served by this agent handler
    
    SetHandler none
    Require all denied
    
 5. Save the httpd.conf file.
 6. Open Service Control Manager and restart the ePO 5.10 Server service.

Acknowledgments
McAfee credits the following for responsibly reporting these flaws:
CVE-2021-23888 - Ricardo Almeida (vibrio)
CVE-2021-23889 - Michal Skowron from ING Tech Poland
CVE-2021-23890 - Saulius Pranckevicius from Danske Bank Red Team
Frequently Asked Questions (FAQs)
How do I know if my McAfee product is vulnerable or not
For ePO/server products:
Use the following instructions for server-based products:

  o Check the version and build of ePO that is installed. For instructions, see
    KB52634 - How to determine what update is installed for ePO .
  o Create a query in ePO for the product version of the product installed
    within your organization.

What is CVSS
CVSS, or Common Vulnerability Scoring System, is the result of the National
Infrastructure Advisory Council's effort to standardize a system of assessing
the criticality of a vulnerability. This system offers an unbiased criticality
score between 0 and 10 that customers can use to judge how critical a
vulnerability is and plan accordingly. For more information, visit the CVSS
website at: https://www.first.org/cvss/ .

When calculating CVSS scores, McAfee has adopted a philosophy that fosters
consistency and repeatability. Our guiding principle for CVSS scoring is to
score the exploit under consideration by itself. We consider only the immediate
and direct impact of the exploit under consideration. We do not factor into a
score any potential follow-on exploits that might be made possible by the
successful exploitation of the issue being scored.

What are the CVSS scoring metrics

 1. CVE-2021-23888: ePO unvalidated URL redirect vulnerability
    +------------------------+--------------------+
    |Base Score              |6.3                 |
    +------------------------+--------------------+
    |Attack Vector (AV)      |Network (N)         |
    +------------------------+--------------------+
    |Attack Complexity (AC)  |Low (L)             |
    +------------------------+--------------------+
    |Privileges Required (PR)|Low (L)             |
    +------------------------+--------------------+
    |User Interaction (UI)   |Required (R)        |
    +------------------------+--------------------+
    |Scope (S)               |Unchanged (U)       |
    +------------------------+--------------------+
    |Confidentiality (C)     |High (H)            |
    +------------------------+--------------------+
    |Integrity (I)           |Low (L)             |
    +------------------------+--------------------+
    |Availability (A)        |None (N)            |
    +------------------------+--------------------+
    |Temporal Score (Overall)|5.7                 |
    +------------------------+--------------------+
    |Exploitability (E)      |Proof of Concept (P)|
    +------------------------+--------------------+
    |Remediation Level (RL)  |Official Fix (O)    |
    +------------------------+--------------------+
    |Report Confidence (RC)  |Confirmed (C)       |
    +------------------------+--------------------+

    NOTE: The below CVSS version 3.1 vector was used to generate this score.
    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculatorvector=AV:N/AC:L/PR:L/
    UI:R/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C&version=3.1
 2. CVE-2021-23889: ePO Cross-site Scripting vulnerability
    +------------------------+--------------------+
    |Base Score              |3.5                 |
    +------------------------+--------------------+
    |Attack Vector (AV)      |Network (N)         |
    +------------------------+--------------------+
    |Attack Complexity (AC)  |Low (L)             |
    +------------------------+--------------------+
    |Privileges Required (PR)|High (H)            |
    +------------------------+--------------------+
    |User Interaction (UI)   |Required (R)        |
    +------------------------+--------------------+
    |Scope (S)               |Unchanged (U)       |
    +------------------------+--------------------+
    |Confidentiality (C)     |Low (L)             |
    +------------------------+--------------------+
    |Integrity (I)           |Low (L)             |
    +------------------------+--------------------+
    |Availability (A)        |None (N)            |
    +------------------------+--------------------+
    |Temporal Score (Overall)|3.2                 |
    +------------------------+--------------------+
    |Exploitability (E)      |Proof of Concept (P)|
    +------------------------+--------------------+
    |Remediation Level (RL)  |Official Fix (O)    |
    +------------------------+--------------------+
    |Report Confidence (RC)  |Confirmed (C)       |
    +------------------------+--------------------+

    NOTE: The below CVSS version 3.1 vector was used to generate this score.
    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculatorvector=AV:N/AC:L/PR:H/
    UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C&version=3.1
 3. CVE-2021-23890: ePO Information Leak vulnerability
    +------------------------+--------------------+
    |Base Score              |6.5                 |
    +------------------------+--------------------+
    |Attack Vector (AV)      |Network (N)         |
    +------------------------+--------------------+
    |Attack Complexity (AC)  |Low (L)             |
    +------------------------+--------------------+
    |Privileges Required (PR)|None (N)            |
    +------------------------+--------------------+
    |User Interaction (UI)   |None (N)            |
    +------------------------+--------------------+
    |Scope (S)               |Unchanged (U)       |
    +------------------------+--------------------+
    |Confidentiality (C)     |Low (L)             |
    +------------------------+--------------------+
    |Integrity (I)           |Low (L)             |
    +------------------------+--------------------+
    |Availability (A)        |None (N)            |
    +------------------------+--------------------+
    |Temporal Score (Overall)|5.9                 |
    +------------------------+--------------------+
    |Exploitability (E)      |Proof of Concept (P)|
    +------------------------+--------------------+
    |Remediation Level (RL)  |Official Fix (O)    |
    +------------------------+--------------------+
    |Report Confidence (RC)  |Confirmed (C)       |
    +------------------------+--------------------+

    NOTE: The below CVSS version 3.1 vector was used to generate this score.
    https://nvd.nist.gov/vuln-metrics/cvss/v3-calculatorvector=AV:N/AC:L/PR:N/
    UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C&version=3.1

Where can I find a list of all Security Bulletins
All Security Bulletins are published on our external PSIRT website at https://
www.mcafee.com/us/threat-center/product-security-bulletins.aspx . To see
Security Bulletins for McAfee Enterprise products on this website click
Enterprise Security Bulletins . Security Bulletins are retired (removed) once a
product is both End of Sale and End of Support (End of Life).

How do I report a product vulnerability to McAfee
If you have information about a security issue or vulnerability with a McAfee
product, visit the McAfee PSIRT website for instructions at https://
www.mcafee.com/us/threat-center/product-security-bulletins.aspx . To report an
issue, click Report a Security Vulnerability .

How does McAfee respond to this and any other reported security flaws
Our key priority is the security of our customers. If a vulnerability is found
within any McAfee software or services, we work closely with the relevant
security software development team to ensure the rapid and effective
development of a fix and communication plan.

McAfee only publishes Security Bulletins if they include something actionable
such as a workaround, mitigation, version update, or hotfix. Otherwise, we
would simply be informing the hacker community that our products are a target,
putting our customers at greater risk. For products that are updated
automatically, a non-actionable Security Bulletin might be published to
acknowledge the discoverer.

View our PSIRT policy on the McAfee PSIRT website at https://www.mcafee.com/us/
threat-center/product-security-bulletins.aspx by clicking About PSIRT .
Resources
To contact Technical Support, log on to the ServicePortal and go to the Create
a Service Request page at https://support.mcafee.com/ServicePortal/faces/
serviceRequests/createSR :

  o If you are a registered user, type your User ID and Password, and then
    click Log In .
  o If you are not a registered user, click Register and complete the required
    fields. Your password and logon instructions will be emailed to you.

Disclaimer
The information provided in this Security Bulletin is provided as is without
warranty of any kind. McAfee disclaims all warranties, either express or
implied, including the warranties of merchantability and fitness for a
particular purpose. In no event shall McAfee or its suppliers be liable for any
damages whatsoever including direct, indirect, incidental, consequential, loss
of business profits or special damages, even if McAfee or its suppliers have
been advised of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental damages so
the preceding limitation may not apply.

Any future product release dates mentioned in this Security Bulletin are
intended to outline our general product direction, and they should not be
relied on in making a purchasing decision. The product release dates are for
information purposes only, and may not be incorporated into any contract. The
product release dates are not a commitment, promise, or legal obligation to
deliver any material, code, or functionality. The development, release, and
timing of any features or functionality described for our products remains at
our sole discretion and may be changed or canceled at any time

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=cuCK
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1073 – [Win] McAfee ePolicy Orchestrator: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1073-win-mcafee-epolicy-orchestrator-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1073-win-mcafee-epolicy-orchestrator-multiple-vulnerabilities

ESB-2021.1072 – [Debian] thunderbird: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1072
                        thunderbird security update
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           thunderbird
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-23987 CVE-2021-23984 CVE-2021-23982
                   CVE-2021-23981  

Reference:         ESB-2021.1064
                   ESB-2021.1062

Original Bulletin: 
   http://www.debian.org/lts/security/2021/dla-2609

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2609-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/               Emilio Pozuelo Monfort
March 26, 2021                                https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : thunderbird
Version        : 1:78.9.0-1~deb9u1
CVE ID         : CVE-2021-23981 CVE-2021-23982 CVE-2021-23984 CVE-2021-23987

Multiple security issues were discovered in Thunderbird, which could
result in the execution of arbitrary code or information disclosure.

For Debian 9 stretch, these problems have been fixed in version
1:78.9.0-1~deb9u1.

We recommend that you upgrade your thunderbird packages.

For the detailed security status of thunderbird please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/thunderbird

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEcJymx+vmJZxd92Q+nUbEiOQ2gwIFAmBd/q0ACgkQnUbEiOQ2
gwJ69RAAgQf/5fg2KjMVWjyWoaZiZeUmL0FYCcA0NlleZnTWniemILeGfHVhPDf6
gjoBQzvE2vIPzvs2fUzJgZ/vWQUxiQQ00W/lzIslWPq40vppdUQeHQkMdgb6V3n9
AMGUPKYzfUqrCUaupWc9kheoGtRZJabtp/oIZnov2FMa5st9E6pJLHmFm5GynVgA
kV59CFBidBJG6UvODkkP8CMb/lpnGPsLB3rcBSuqpgI7Pa6xPjRSg+l5IDZXHxxf
o5sTJ5oHmTe+zwr9c+ru5Q6tlSlsMC7Zg+9l9WNG5LIMh2/TyNq3Bz52t8lneXWJ
oFTnCtWQpPl0/d6v6CgOi67xytJS43CKuy8rx7ERu8Zx6B0LomObw+UAXPM62a6X
OlNQJB+y4wYdtr6pHMS2Mut2VZqahiF5HcBrsUEre8g6XflxF9+F0kAwlApLzzO5
xajsLmZHi8f2ZagClc/o+dYTi879V+uKZRiBW4p77wM8sVvkAB3mIyiEc0BIy73U
ebPaSEOdJZqVLKVwburMcGILAoQJlFhPXfnHVsXFq9CgF/k/LfgP2FkpDtuqxoeZ
cjDyq1jAWDl3qzaOTeq+eJ9URy2f27b1Vmm7/0oJmvPUPkSozp3UmAYmRsR1Ub6o
VDXWJEI9eMb1+qBvktcwK7oW6mOXxQyvCJtHc+xTn44VQMegOrY=
=Psxo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ktGm
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1072 – [Debian] thunderbird: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1072-debian-thunderbird-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1072-debian-thunderbird-multiple-vulnerabilities

ESB-2021.1067 – ALERT [Apple iOS] Apple Products: Cross-site scripting – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1067
                           Apple security update
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           iOS
                   iPadOS
                   watchOS
Publisher:         Apple
Operating System:  Apple iOS
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1879  

Original Bulletin: 
   https://support.apple.com/en-us/HT212256
   https://support.apple.com/en-us/HT212257
   https://support.apple.com/en-us/HT212258

Comment: Apple is aware of a report that this issue may have been actively exploited.
         
         This bulletin contains three (3) Apple security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-03-26-1 iOS 14.4.2 and iPadOS 14.4.2

iOS 14.4.2 and iPadOS 14.4.2 addresses the following issue. 
Information about the security content is also available at
https://support.apple.com/HT212256.

WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting. Apple is aware of a report that this
issue may have been actively exploited.
Description: This issue was addressed by improved management of
object lifetimes.
CVE-2021-1879: Clement Lecigne of Google Threat Analysis Group and
Billy Leonard of Google Threat Analysis Group

Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 14.4.2 and iPadOS 14.4.2".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
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=0iO5
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-03-26-2 iOS 12.5.2

iOS 12.5.2 addresses the following issue. Information about 
the security content is also available at
https://support.apple.com/HT212257.

WebKit
Available for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad
mini 2, iPad mini 3, and iPod touch (6th generation)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting. Apple is aware of a report that this
issue may have been actively exploited.
Description: This issue was addressed by improved management of
object lifetimes.
CVE-2021-1879: Clement Lecigne of Google Threat Analysis Group and
Billy Leonard of Google Threat Analysis Group

Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 12.5.2".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
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=CcoR
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-03-26-3 watchOS 7.3.3

watchOS 7.3.3 addresses the following issue. 
Information about the security content is also available at 
https://support.apple.com/HT212258.

WebKit
Available for: Apple Watch Series 3 and later
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting. Apple is aware of a report that this
issue may have been actively exploited.
Description: This issue was addressed by improved management of
object lifetimes.
CVE-2021-1879: Clement Lecigne of Google Threat Analysis Group and
Billy Leonard of Google Threat Analysis Group

Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAmBeORsACgkQZcsbuWJ6
jjCWHA/+KnQMVogMNMceQlBIBQ03J2Mthnjx2m1ahTGVoSXWwMdYfUMszcepADDR
nzY32BOdtJy55bHqrrELsEw7ZgsBYkMlCEZ15/LGfhqC7B8dywIKw3qE5SehAn8r
GXe78O0xb97Xe0TxX1r7m73QlLnW7QPKHw8bh2wEFLlOnyir2oqn4dmDur5ZR807
uM69qlOiHAISs/FyHWKJ1TnPAn+PEkQTo7MRErUy+ths4k3xLKF2Ds3PayqaUSsk
nzbK2hicNexjUFQhfX6Apvu79wEoGM4vYy+saIyBX/+/PRvFqL9ZUAWEjrCKeCb+
2ql8hh/OFJJIf77NSyBa4p2xPp+f1Jch2kcoT9zIlNeVd1aqc8XkSuUvOoGmZ5w4
beDv4dONvv6A+bmh4lHANWdguwUbN8vVdTefdhj4O0UpzHbmU5tT/4Xgln0k8jE3
8Nl4fUwfwa/S8VtHDtiWEGMY8fsMYJJS/cm5QdSoJispcLJpWmPYiFsa0H99+cj6
bloP8A4Xlna97BhnjLuvo1J7W+obUcBDZjgxJ2t3qgSak4JauTCnCHP70yJ3Z/bj
Sbv7y6nH1M6pWwh++fZrS2aG+2p0BuW/4IzOkev5Hl7gnOO3LQyhnV0nP/j04VHT
vumM7i9syYtKR6C1h/akXpA6TxHyfXVrSnNV1TwSEsUdKPMd2kg=
=5SNf
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=7cC8
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1067 – ALERT [Apple iOS] Apple Products: Cross-site scripting – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1067-alert-apple-ios-apple-products-cross-site-scripting-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1067-alert-apple-ios-apple-products-cross-site-scripting-remote-with-user-interaction

ESB-2021.1071 – [Debian] webkit2gtk: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1071
                        webkit2gtk security update
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           webkit2gtk
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Unauthorised Access             -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1870 CVE-2021-1801 CVE-2021-1799
                   CVE-2021-1789 CVE-2021-1765 CVE-2020-29623
                   CVE-2020-27918  

Reference:         ESB-2021.0349
                   ESB-2020.4060.2

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4877

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4877-1                   security@debian.org
https://www.debian.org/security/                           Alberto Garcia
March 27, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : webkit2gtk
CVE ID         : CVE-2020-27918 CVE-2020-29623 CVE-2021-1765 CVE-2021-1789
                 CVE-2021-1799 CVE-2021-1801 CVE-2021-1870

The following vulnerabilities have been discovered in the webkit2gtk
web engine:

CVE-2020-27918

    Liu Long discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

CVE-2020-29623

    Simon Hunt discovered that users may be unable to fully delete
    their browsing history under some circumstances.

CVE-2021-1765

    Eliya Stein discovered that maliciously crafted web content may
    violate iframe sandboxing policy.

CVE-2021-1789

    @S0rryMybad discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

CVE-2021-1799

    Gregory Vishnepolsky, Ben Seri and Samy Kamkar discovered that a
    malicious website may be able to access restricted ports on
    arbitrary servers.

CVE-2021-1801

    Eliya Stein discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

CVE-2021-1870

    An anonymous researcher discovered that processing maliciously
    crafted web content may lead to arbitrary code execution.

For the stable distribution (buster), these problems have been fixed in
version 2.30.6-1~deb10u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=IQ2D
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Dysg
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1071 – [Debian] webkit2gtk: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1071-debian-webkit2gtk-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1071-debian-webkit2gtk-multiple-vulnerabilities

ESB-2021.1070 – [Debian] pygments: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1070
                         pygments security update
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           pygments
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-27291  

Reference:         ESB-2021.0984

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4878

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4878-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 27, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : pygments
CVE ID         : CVE-2021-27291
Debian Bug     : 985574

Ben Caller discovered that Pygments, a syntax highlighting package
written in Python 3, used regular expressions which could result in
denial of service.

For the stable distribution (buster), this problem has been fixed in
version 2.3.1+dfsg-1+deb10u2.

We recommend that you upgrade your pygments packages.

For the detailed security status of pygments please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pygments

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=AVWk
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ypRq
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1070 – [Debian] pygments: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1070-debian-pygments-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1070-debian-pygments-denial-of-service-remote-unauthenticated

ESB-2021.1069 – [Debian] spamassassin: Execute arbitrary code/commands – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1069
                       spamassassin security update
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           spamassassin
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-1946  

Reference:         ESB-2021.1051

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4879

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4879-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 27, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : spamassassin
CVE ID         : CVE-2020-1946
Debian Bug     : 985962

Damian Lukowski discovered a flaw in spamassassin, a Perl-based spam
filter using text analysis. Malicious rule configuration files, possibly
downloaded from an updates server, could execute arbitrary commands
under multiple scenarios.

For the stable distribution (buster), this problem has been fixed in
version 3.4.2-1+deb10u3.

We recommend that you upgrade your spamassassin packages.

For the detailed security status of spamassassin please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/spamassassin

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=FNjo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=R5En
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1069 – [Debian] spamassassin: Execute arbitrary code/commands – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1069-debian-spamassassin-execute-arbitrary-code-commands-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1069-debian-spamassassin-execute-arbitrary-code-commands-remote-unauthenticated

ESB-2021.1068 – [SUSE] openssl-1_1: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1068
                      Security update for openssl-1_1
                               29 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           openssl-1_1
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3449  

Reference:         ESB-2021.1065
                   ESB-2021.1063
                   ESB-2021.1061

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20210954-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20210955-1

Comment: This bulletin contains two (2) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for openssl-1_1

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0954-1
Rating:            important
References:        #1183852
Cross-References:  CVE-2021-3449
Affected Products:
                   SUSE OpenStack Cloud Crowbar 9
                   SUSE OpenStack Cloud 9
                   SUSE Linux Enterprise Software Development Kit 12-SP5
                   SUSE Linux Enterprise Server for SAP 12-SP4
                   SUSE Linux Enterprise Server 12-SP5
                   SUSE Linux Enterprise Server 12-SP4-LTSS
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for openssl-1_1 fixes the following security issue:

  o CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously
    crafted renegotiation ClientHello message from a client. If a TLSv1.2
    renegotiation ClientHello omits the signature_algorithms extension but
    includes a signature_algorithms_cert extension, then a NULL pointer
    dereference will result, leading to a crash and a denial of service attack.
    OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 9:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-954=1
  o SUSE OpenStack Cloud 9:
    zypper in -t patch SUSE-OpenStack-Cloud-9-2021-954=1
  o SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-954=1
  o SUSE Linux Enterprise Server for SAP 12-SP4:
    zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-954=1
  o SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-954=1
  o SUSE Linux Enterprise Server 12-SP4-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-954=1

Package List:

  o SUSE OpenStack Cloud Crowbar 9 (x86_64):
       libopenssl1_1-1.1.1d-2.33.1
       libopenssl1_1-32bit-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-32bit-1.1.1d-2.33.1
       openssl-1_1-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE OpenStack Cloud 9 (x86_64):
       libopenssl1_1-1.1.1d-2.33.1
       libopenssl1_1-32bit-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-32bit-1.1.1d-2.33.1
       openssl-1_1-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
    s390x x86_64):
       libopenssl-1_1-devel-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE Linux Enterprise Software Development Kit 12-SP5 (s390x x86_64):
       libopenssl-1_1-devel-32bit-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
       libopenssl1_1-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64):
       libopenssl1_1-32bit-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-32bit-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
       libopenssl1_1-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server 12-SP5 (s390x x86_64):
       libopenssl1_1-32bit-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-32bit-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
       libopenssl1_1-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-1.1.1d-2.33.1
       openssl-1_1-debuginfo-1.1.1d-2.33.1
       openssl-1_1-debugsource-1.1.1d-2.33.1
  o SUSE Linux Enterprise Server 12-SP4-LTSS (s390x x86_64):
       libopenssl1_1-32bit-1.1.1d-2.33.1
       libopenssl1_1-debuginfo-32bit-1.1.1d-2.33.1


References:

  o https://www.suse.com/security/cve/CVE-2021-3449.html
  o https://bugzilla.suse.com/1183852

- --------------------------------------------------------------------------------


SUSE Security Update: Security update for openssl-1_1

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:0955-1
Rating:            important
References:        #1183852
Cross-References:  CVE-2021-3449
Affected Products:
                   SUSE MicroOS 5.0
                   SUSE Linux Enterprise Module for Basesystem 15-SP3
                   SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for openssl-1_1 fixes the security issue:

  o CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously
    crafted renegotiation ClientHello message from a client. If a TLSv1.2
    renegotiation ClientHello omits the signature_algorithms extension but
    includes a signature_algorithms_cert extension, then a NULL pointer
    dereference will result, leading to a crash and a denial of service attack.
    OpenSSL TLS clients are not impacted by this issue. [bsc#1183852]

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE MicroOS 5.0:
    zypper in -t patch SUSE-SUSE-MicroOS-5.0-2021-955=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-955=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-955=1

Package List:

  o SUSE MicroOS 5.0 (aarch64 x86_64):
       libopenssl1_1-1.1.1d-11.20.1
       libopenssl1_1-debuginfo-1.1.1d-11.20.1
       openssl-1_1-1.1.1d-11.20.1
       openssl-1_1-debuginfo-1.1.1d-11.20.1
       openssl-1_1-debugsource-1.1.1d-11.20.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
    x86_64):
       libopenssl-1_1-devel-1.1.1d-11.20.1
       libopenssl1_1-1.1.1d-11.20.1
       libopenssl1_1-debuginfo-1.1.1d-11.20.1
       libopenssl1_1-hmac-1.1.1d-11.20.1
       openssl-1_1-1.1.1d-11.20.1
       openssl-1_1-debuginfo-1.1.1d-11.20.1
       openssl-1_1-debugsource-1.1.1d-11.20.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
       libopenssl1_1-32bit-1.1.1d-11.20.1
       libopenssl1_1-32bit-debuginfo-1.1.1d-11.20.1
       libopenssl1_1-hmac-32bit-1.1.1d-11.20.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
    x86_64):
       libopenssl-1_1-devel-1.1.1d-11.20.1
       libopenssl1_1-1.1.1d-11.20.1
       libopenssl1_1-debuginfo-1.1.1d-11.20.1
       libopenssl1_1-hmac-1.1.1d-11.20.1
       openssl-1_1-1.1.1d-11.20.1
       openssl-1_1-debuginfo-1.1.1d-11.20.1
       openssl-1_1-debugsource-1.1.1d-11.20.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):
       libopenssl1_1-32bit-1.1.1d-11.20.1
       libopenssl1_1-32bit-debuginfo-1.1.1d-11.20.1
       libopenssl1_1-hmac-32bit-1.1.1d-11.20.1


References:

  o https://www.suse.com/security/cve/CVE-2021-3449.html
  o https://bugzilla.suse.com/1183852

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=6tmC
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1068 – [SUSE] openssl-1_1: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/03/29/esb-2021-1068-suse-openssl-1_1-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1068-suse-openssl-1_1-denial-of-service-remote-unauthenticated

Sunday, March 28, 2021

Zero Trust for Data

Encryption has been around for a long time. It is the holy grail in data security because data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Zero trust is a security model based on the […]

The post Zero Trust for Data appeared first on TechSpective.

The post Zero Trust for Data appeared first on Security Boulevard.

Read More

The post Zero Trust for Data appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/zero-trust-for-data/?utm_source=rss&utm_medium=rss&utm_campaign=zero-trust-for-data

TCPView v4.0 Released, (Sun, Mar 28th)

TCPView is a Sysinternals’ tool that displays information about the TCP and UDP endpoints on a system. It’s like netstat, but with a GUI.

This new version brings some major new features: service identification, creation time and searching:

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post TCPView v4.0 Released, (Sun, Mar 28th) appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/tcpview-v4-0-released-sun-mar-28th/?utm_source=rss&utm_medium=rss&utm_campaign=tcpview-v4-0-released-sun-mar-28th

Network Security News Summary for Monday March 29th, 2021

A brief daily summary of what is important in cybersecurity. The podcast is published every weekday and designed to get you ready for the day with a brief, usually about 5 minutes long, summary of current network security-related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .

The post Network Security News Summary for Monday March 29th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/network-security-news-summary-for-monday-march-29th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-march-29th-2021

The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’

Permalink

The post The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’ appeared first on Security Boulevard.

Read More

The post The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’ appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/the-university-of-queenslands-webinar-cyber-security-is-a-secure-future-possible/?utm_source=rss&utm_medium=rss&utm_campaign=the-university-of-queenslands-webinar-cyber-security-is-a-secure-future-possible

No, I Did Not Hack Your MS Exchange Server

New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware that invokes both KrebsOnSecurity and Yours Truly by name.

Let’s just get this out of the way right now: It wasn’t me.

The Shadowserver Foundation, a nonprofit that helps network owners identify and fix security threats, says it has found 21,248 different Exchange servers which appear to be compromised by a backdoor and communicating with brian[.]krebsonsecurity[.]top (NOT a safe domain, hence the hobbling).

Shadowserver has been tracking wave after wave of attacks targeting flaws in Exchange that Microsoft addressed earlier this month in an emergency patch release. The group looks for attacks on Exchange systems using a combination of active Internet scans and “honeypots” — systems left vulnerable to attack so that defenders can study what attackers are doing to the devices and how.

David Watson, a longtime member and director of the Shadowserver Foundation Europe, says his group has been keeping a close eye on hundreds of unique variants of backdoors (a.k.a. “web shells”) that various cybercrime groups worldwide have been using to commandeer any unpatched Exchange servers. These backdoors give an attacker complete, remote control over the Exchange server (including any of the server’s emails).

On Mar. 26, Shadowserver saw an attempt to install a new type of backdoor in compromised Exchange Servers, and with each hacked host it installed the backdoor in the same place: “/owa/auth/babydraco.aspx.

“The web shell path that was dropped was new to us,” said Watson said. “We have been testing 367 known web shell paths via scanning of Exchange servers.”

OWA refers to Outlook Web Access, the Web-facing portion of on-premises Exchange servers. Shadowserver’s honeypots saw multiple hosts with the Babydraco backdoor doing the same thing: Running a Microsoft Powershell script that fetches the file “krebsonsecurity.exe” from the Internet address 159.65.136[.]128. Oddly, none of the several dozen antivirus tools available to scan the file at Virustotal.com currently detect it as malicious.

The Krebsonsecurity file also installs a root certificate, modifies the system registry, and tells Windows Defender not to scan the file. Watson said the Krebsonsecurity file will attempt to open up an encrypted connection between the Exchange server and the above-mentioned IP address, and send a small amount of traffic to it each minute.

Shadowserver found more than 21,000 Exchange Server systems that had the Babydraco backdoor installed. But Watson said they don’t know how many of those systems also ran the secondary download from the rogue Krebsonsecurity domain.

“Despite the abuse, this is potentially a good opportunity to highlight how vulnerable/compromised MS Exchange servers are being exploited in the wild right now, and hopefully help get the message out to victims that they need to sign up our free daily network reports,” Watson said.

There are hundreds of thousands of Exchange Server systems worldwide that were vulnerable to attack (Microsoft suggests the number is about 400,000), and most of those have been patched over the last few weeks. However, there are still tens of thousands of vulnerable Exchange servers exposed online. On Mar. 25, Shadowserver tweeted that it was tracking 73,927 unique active webshell paths across 13,803 IP addresses.

Image: Shadowserver.org

Exchange Server users that haven’t yet patched against the four flaws Microsoft fixed earlier this month can get immediate protection by deploying Microsoft’s “One-Click On-Premises Mitigation Tool.”

The motivations of the cybercriminals behind the Krebonsecurity dot top domain are unclear, but the domain itself has a recent association with other cybercrime activity — and with harassing this author. I first heard about the domain in December 2020, when a reader told me how his entire network had been hijacked by a cryptocurrency mining botnet that called home to it.

“This morning, I noticed a fan making excessive noise on a server in my homelab,” the reader said. “I didn’t think much of it at the time, but after a thorough cleaning and test, it still was noisy. After I was done with some work-related things, I checked up on it – and found that a cryptominer had been dropped on my box, pointing to XXX-XX-XXX.krebsonsecurity.top’. In all, this has infected all three linux boxes on my network.”

What was the subdomain I X’d out of his message? Just my Social Security number. I’d been doxed via DNS.

This is hardly the first time malware or malcontents have abused my name, likeness and website trademarks as a cybercrime meme, for harassment, or just to besmirch my reputation. Here are a few of the more notable examples, although all of those events are almost a decade old. That same list today would be pages long.

Further reading:

A Basic Timeline of the Exchange Mass-Hack

Warning the World of a Ticking Timebomb

At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software

Microsoft: Chinese Cyberspies Used 4 Exchange Server Flaws to Plunder Emails

Read More

The post No, I Did Not Hack Your MS Exchange Server appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/no-i-did-not-hack-your-ms-exchange-server-2/?utm_source=rss&utm_medium=rss&utm_campaign=no-i-did-not-hack-your-ms-exchange-server-2

No, I Did Not Hack Your MS Exchange Server

New data suggests someone has compromised more than 21,000 Microsoft Exchange Server email systems worldwide and infected them with malware that invokes both KrebsOnSecurity and Yours Truly by name.

Let’s just get this out of the way right now: It wasn’t me.

The post No, I Did Not Hack Your MS Exchange Server appeared first on Security Boulevard.

Read More

The post No, I Did Not Hack Your MS Exchange Server appeared first on Malware Devil.



https://malwaredevil.com/2021/03/28/no-i-did-not-hack-your-ms-exchange-server/?utm_source=rss&utm_medium=rss&utm_campaign=no-i-did-not-hack-your-ms-exchange-server

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...