Malware Devil

Tuesday, April 20, 2021

ISC Stormcast For Tuesday, April 20th, 2021 https://isc.sans.edu/podcastdetail.html?id=7464, (Tue, Apr 20th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Tuesday, April 20th, 2021 https://isc.sans.edu/podcastdetail.html?id=7464, (Tue, Apr 20th) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/isc-stormcast-for-tuesday-april-20th-2021-https-isc-sans-edu-podcastdetail-htmlid7464-tue-apr-20th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-tuesday-april-20th-2021-https-isc-sans-edu-podcastdetail-htmlid7464-tue-apr-20th

ESB-2021.1316 – [Debian] xorg-server: Increased privileges – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1316
                        xorg-server security update
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xorg-server
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-3472  

Reference:         ESB-2021.1295
                   ESB-2021.1283
                   ESB-2021.1227

Original Bulletin: 
   http://www.debian.org/security/2021/dsa-4893

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4893-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
April 19, 2021                        https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : xorg-server
CVE ID         : CVE-2021-3472

Jan-Niklas Sohn discovered that missing input sanitising in the XInput
extension of the X.org X server may result in privilege escalation if
the X server is running privileged.

For the stable distribution (buster), this problem has been fixed in
version 2:1.20.4-1+deb10u3.

We recommend that you upgrade your xorg-server packages.

For the detailed security status of xorg-server please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/xorg-server

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=N0Mn
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=UBNk
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1316 – [Debian] xorg-server: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/esb-2021-1316-debian-xorg-server-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1316-debian-xorg-server-increased-privileges-existing-account

ESB-2021.1315 – [Win][UNIX/Linux][Virtual] NSX-T: Increased privileges – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1315
            VMware NSX-T updates address a privilege escalation
                      vulnerability (CVE-2021-21981)
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           NSX-T
Publisher:         VMWare
Operating System:  Virtualisation
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21981  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2021-0006.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory ID: VMSA-2021-0006
CVSSv3 Range: 7.5
Issue Date: 2021-04-19
Updated On: 2021-04-19 (Initial Advisory)
CVE(s): CVE-2021-21981
Synopsis: VMware NSX-T updates address a privilege escalation vulnerability
(CVE-2021-21981)


1. Impacted Products

  o VMware NSX-T

2. Introduction

A privilege escalation vulnerability in VMware NSX-T was privately reported to
VMware. Updates are available to remediate this vulnerability in affected
VMware product.

3. Privilege escalation vulnerability (CVE-2021-21981)

Description

VMware NSX-T contains a privilege escalation vulnerability due to an issue with
RBAC (Role based access control) role assignment. VMware has evaluated this
issue to be 'Important' severity with a maximum CVSSv3 base score of 7.5.

Known Attack Vectors

Successful exploitation of this issue may allow attackers with local guest user
account to assign privileges higher than their own permission level. 

Resolution

To remediate CVE-2021-21981 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds

Workarounds for CVE-2021-21981 have been listed in the 'Workarounds' column of
the 'Response Matrix' below.

Additional Documentation

None.

Notes

[1] To exploit this issue, NSX Enterprise administrator must activate the local
guest user account. It is not activated by default.
[2] This issue affects only version 3.1.1. Other versions are not affected.

Acknowledgements

None.

Response Matrix

Product Version  Running  CVE Identifier CVSSv3 Severity  Fixed   Workarounds Additional
                 On                                      Version             Documentation

NSX-T   3.1.1    Any      CVE-2021-21981 7.5    important 3.1.2   KB83047     None
[1]     [2]

4. References

VMware NSX-T 3.1.2
Downloads and Documentation:
https://my.vmware.com/en/web/vmware/downloads/details?downloadGroup=NSX-T-312&
productId=982&rPId=64728
https://docs.vmware.com/en/VMware-NSX-T-Data-Center/index.html

 

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21981

 

FIRST CVSSv3 Calculator:
CVE-2021-21981: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/
PR:L/UI:N/S:U/C:H/I:H/A:H

5. Change Log

2021-04-19 VMSA-2021-0006
Initial security advisory.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9/TA
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1315 – [Win][UNIX/Linux][Virtual] NSX-T: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/esb-2021-1315-winunix-linuxvirtual-nsx-t-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1315-winunix-linuxvirtual-nsx-t-increased-privileges-existing-account

ESB-2021.1314 – [SUSE] xen: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1314
                          Security update for xen
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           xen
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Increased Privileges   -- Existing Account
                   Modify Arbitrary Files -- Existing Account
                   Denial of Service      -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-27379 CVE-2021-20257 CVE-2021-3419

Reference:         ESB-2021.1210
                   ESB-2021.1205
                   ESB-2021.1181

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2021/suse-su-20211252-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20211251-1
   https://www.suse.com/support/update/announcement/2021/suse-su-20211250-1
   https://www.suse.com/support/update/announcement/2021/suse-su-202114702-1

Comment: This bulletin contains four (4) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for xen

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:1252-1
Rating:            important
References:        #1182431 #1182846
Cross-References:  CVE-2021-20257 CVE-2021-27379
Affected Products:
                   SUSE OpenStack Cloud Crowbar 8
                   SUSE OpenStack Cloud 8
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP3-BCL
                   HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for xen fixes the following issues:

  o CVE-2021-20257: xen: infinite loop issue in the e1000 NIC emulator (bsc#
    1182846).
  o CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being
    updated under certain circumstances due to improper backport of XSA-321
    (XSA-366, bsc#1182431).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 8:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-1252=1
  o SUSE OpenStack Cloud 8:
    zypper in -t patch SUSE-OpenStack-Cloud-8-2021-1252=1
  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-1252=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-1252=1
  o SUSE Linux Enterprise Server 12-SP3-BCL:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-1252=1
  o HPE Helion Openstack 8:
    zypper in -t patch HPE-Helion-OpenStack-8-2021-1252=1

Package List:

  o SUSE OpenStack Cloud Crowbar 8 (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1
  o SUSE OpenStack Cloud 8 (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1
  o SUSE Linux Enterprise Server for SAP 12-SP3 (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1
  o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1
  o HPE Helion Openstack 8 (x86_64):
       xen-4.9.4_16-3.83.1
       xen-debugsource-4.9.4_16-3.83.1
       xen-doc-html-4.9.4_16-3.83.1
       xen-libs-32bit-4.9.4_16-3.83.1
       xen-libs-4.9.4_16-3.83.1
       xen-libs-debuginfo-32bit-4.9.4_16-3.83.1
       xen-libs-debuginfo-4.9.4_16-3.83.1
       xen-tools-4.9.4_16-3.83.1
       xen-tools-debuginfo-4.9.4_16-3.83.1
       xen-tools-domU-4.9.4_16-3.83.1
       xen-tools-domU-debuginfo-4.9.4_16-3.83.1


References:

  o https://www.suse.com/security/cve/CVE-2021-20257.html
  o https://www.suse.com/security/cve/CVE-2021-27379.html
  o https://bugzilla.suse.com/1182431
  o https://bugzilla.suse.com/1182846


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for xen

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:1251-1
Rating:            important
References:        #1178591 #1182431 #1182846
Cross-References:  CVE-2021-20257 CVE-2021-27379
Affected Products:
                   SUSE OpenStack Cloud Crowbar 9
                   SUSE OpenStack Cloud 9
                   SUSE Linux Enterprise Server for SAP 12-SP4
                   SUSE Linux Enterprise Server 12-SP4-LTSS
______________________________________________________________________________

An update that solves two vulnerabilities and has one errata is now available.

Description:

This update for xen fixes the following issues:

  o CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being
    updated under certain circumstances due to improper backport of XSA-321
    (XSA-366, bsc#1182431)
  o CVE-2021-20257: Fixed an infinite loop in the e1000 NIC emulator (bsc#
    1182846)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud Crowbar 9:
    zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-1251=1
  o SUSE OpenStack Cloud 9:
    zypper in -t patch SUSE-OpenStack-Cloud-9-2021-1251=1
  o SUSE Linux Enterprise Server for SAP 12-SP4:
    zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-1251=1
  o SUSE Linux Enterprise Server 12-SP4-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-1251=1

Package List:

  o SUSE OpenStack Cloud Crowbar 9 (x86_64):
       xen-4.11.4_16-2.51.1
       xen-debugsource-4.11.4_16-2.51.1
       xen-doc-html-4.11.4_16-2.51.1
       xen-libs-32bit-4.11.4_16-2.51.1
       xen-libs-4.11.4_16-2.51.1
       xen-libs-debuginfo-32bit-4.11.4_16-2.51.1
       xen-libs-debuginfo-4.11.4_16-2.51.1
       xen-tools-4.11.4_16-2.51.1
       xen-tools-debuginfo-4.11.4_16-2.51.1
       xen-tools-domU-4.11.4_16-2.51.1
       xen-tools-domU-debuginfo-4.11.4_16-2.51.1
  o SUSE OpenStack Cloud 9 (x86_64):
       xen-4.11.4_16-2.51.1
       xen-debugsource-4.11.4_16-2.51.1
       xen-doc-html-4.11.4_16-2.51.1
       xen-libs-32bit-4.11.4_16-2.51.1
       xen-libs-4.11.4_16-2.51.1
       xen-libs-debuginfo-32bit-4.11.4_16-2.51.1
       xen-libs-debuginfo-4.11.4_16-2.51.1
       xen-tools-4.11.4_16-2.51.1
       xen-tools-debuginfo-4.11.4_16-2.51.1
       xen-tools-domU-4.11.4_16-2.51.1
       xen-tools-domU-debuginfo-4.11.4_16-2.51.1
  o SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64):
       xen-4.11.4_16-2.51.1
       xen-debugsource-4.11.4_16-2.51.1
       xen-doc-html-4.11.4_16-2.51.1
       xen-libs-32bit-4.11.4_16-2.51.1
       xen-libs-4.11.4_16-2.51.1
       xen-libs-debuginfo-32bit-4.11.4_16-2.51.1
       xen-libs-debuginfo-4.11.4_16-2.51.1
       xen-tools-4.11.4_16-2.51.1
       xen-tools-debuginfo-4.11.4_16-2.51.1
       xen-tools-domU-4.11.4_16-2.51.1
       xen-tools-domU-debuginfo-4.11.4_16-2.51.1
  o SUSE Linux Enterprise Server 12-SP4-LTSS (x86_64):
       xen-4.11.4_16-2.51.1
       xen-debugsource-4.11.4_16-2.51.1
       xen-doc-html-4.11.4_16-2.51.1
       xen-libs-32bit-4.11.4_16-2.51.1
       xen-libs-4.11.4_16-2.51.1
       xen-libs-debuginfo-32bit-4.11.4_16-2.51.1
       xen-libs-debuginfo-4.11.4_16-2.51.1
       xen-tools-4.11.4_16-2.51.1
       xen-tools-debuginfo-4.11.4_16-2.51.1
       xen-tools-domU-4.11.4_16-2.51.1
       xen-tools-domU-debuginfo-4.11.4_16-2.51.1


References:

  o https://www.suse.com/security/cve/CVE-2021-20257.html
  o https://www.suse.com/security/cve/CVE-2021-27379.html
  o https://bugzilla.suse.com/1178591
  o https://bugzilla.suse.com/1182431
  o https://bugzilla.suse.com/1182846


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for xen

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:1250-1
Rating:            important
References:        #1178591 #1182431
Cross-References:  CVE-2021-27379
Affected Products:
                   SUSE Linux Enterprise Server for SAP 15
                   SUSE Linux Enterprise High Performance Computing 15-LTSS
                   SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________

An update that solves one vulnerability and has one errata is now available.

Description:

This update for xen fixes the following issues:

  o CVE-2021-27379: Fixed an issue where entries in the IOMMU were not being
    updated under certain circumstances due to improper backport of XSA-321
    (XSA-366, bsc#1182431)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 15:
    zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-1250=1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1250=1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
    zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1250=1

Package List:

  o SUSE Linux Enterprise Server for SAP 15 (x86_64):
       xen-4.10.4_24-3.56.1
       xen-debugsource-4.10.4_24-3.56.1
       xen-devel-4.10.4_24-3.56.1
       xen-libs-4.10.4_24-3.56.1
       xen-libs-debuginfo-4.10.4_24-3.56.1
       xen-tools-4.10.4_24-3.56.1
       xen-tools-debuginfo-4.10.4_24-3.56.1
       xen-tools-domU-4.10.4_24-3.56.1
       xen-tools-domU-debuginfo-4.10.4_24-3.56.1
  o SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
       xen-4.10.4_24-3.56.1
       xen-debugsource-4.10.4_24-3.56.1
       xen-devel-4.10.4_24-3.56.1
       xen-libs-4.10.4_24-3.56.1
       xen-libs-debuginfo-4.10.4_24-3.56.1
       xen-tools-4.10.4_24-3.56.1
       xen-tools-debuginfo-4.10.4_24-3.56.1
       xen-tools-domU-4.10.4_24-3.56.1
       xen-tools-domU-debuginfo-4.10.4_24-3.56.1
  o SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
       xen-4.10.4_24-3.56.1
       xen-debugsource-4.10.4_24-3.56.1
       xen-devel-4.10.4_24-3.56.1
       xen-libs-4.10.4_24-3.56.1
       xen-libs-debuginfo-4.10.4_24-3.56.1
       xen-tools-4.10.4_24-3.56.1
       xen-tools-debuginfo-4.10.4_24-3.56.1
       xen-tools-domU-4.10.4_24-3.56.1
       xen-tools-domU-debuginfo-4.10.4_24-3.56.1


References:

  o https://www.suse.com/security/cve/CVE-2021-27379.html
  o https://bugzilla.suse.com/1178591
  o https://bugzilla.suse.com/1182431


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for xen

______________________________________________________________________________

Announcement ID:   SUSE-SU-2021:14702-1
Rating:            important
References:        #1182155 #1182846 #1182975
Cross-References:  CVE-2021-20257 CVE-2021-3419
Affected Products:
                   SUSE Linux Enterprise Server 11-SP4-LTSS
                   SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________

An update that solves two vulnerabilities and has one errata is now available.

Description:

This update for xen fixes the following issues:

  o CVE-2021-3419: Fixed a stack overflow induced by infinite recursion issue
    (bsc#1182975).
  o CVE-2021-20257: Fixed an infinite loop in the e1000 NIC emulator (bsc#
    1182846)
  o xenstored crashing with segfault (bsc#1182155).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server 11-SP4-LTSS:
    zypper in -t patch slessp4-xen-14702=1
  o SUSE Linux Enterprise Debuginfo 11-SP4:
    zypper in -t patch dbgsp4-xen-14702=1

Package List:

  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586 x86_64):
       xen-kmp-default-4.4.4_48_3.0.101_108.123-61.64.1
       xen-libs-4.4.4_48-61.64.1
       xen-tools-domU-4.4.4_48-61.64.1
  o SUSE Linux Enterprise Server 11-SP4-LTSS (x86_64):
       xen-4.4.4_48-61.64.1
       xen-doc-html-4.4.4_48-61.64.1
       xen-libs-32bit-4.4.4_48-61.64.1
       xen-tools-4.4.4_48-61.64.1
  o SUSE Linux Enterprise Server 11-SP4-LTSS (i586):
       xen-kmp-pae-4.4.4_48_3.0.101_108.123-61.64.1
  o SUSE Linux Enterprise Debuginfo 11-SP4 (i586 x86_64):
       xen-debuginfo-4.4.4_48-61.64.1
       xen-debugsource-4.4.4_48-61.64.1


References:

  o https://www.suse.com/security/cve/CVE-2021-20257.html
  o https://www.suse.com/security/cve/CVE-2021-3419.html
  o https://bugzilla.suse.com/1182155
  o https://bugzilla.suse.com/1182846
  o https://bugzilla.suse.com/1182975

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=JLJN
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1314 – [SUSE] xen: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/esb-2021-1314-suse-xen-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1314-suse-xen-multiple-vulnerabilities

ESB-2021.1313 – [Win][UNIX/Linux] Thunderbird: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1313
     MFSA 2021-14 Security Vulnerabilities fixed in Thunderbird 78.10
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Thunderbird
Publisher:         Mozilla
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Increased Privileges            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-29948 CVE-2021-29946 CVE-2021-29945
                   CVE-2021-24002 CVE-2021-23999 CVE-2021-23998
                   CVE-2021-23995 CVE-2021-23994 CVE-2021-23961

Reference:         ESB-2021.0350
                   ESB-2021.0291

Original Bulletin: 
   https://www.mozilla.org/en-US/security/advisories/mfsa2021-14/

- --------------------------BEGIN INCLUDED TEXT--------------------

Mozilla Foundation Security Advisory 2021-14

Security Vulnerabilities fixed in Thunderbird 78.10

Announced: April 19, 2021
Impact:    high
Products:  Thunderbird
Fixed in:  Thunderbird 78.10

In general, these flaws cannot be exploited through email in the Thunderbird
product because scripting is disabled when reading mail, but are potentially
risks in browser or browser-like contexts.

# CVE-2021-23994: Out of bound write due to lazy initialization

Reporter: Abraruddin Khan and Omair
Impact:   high

Description

A WebGL framebuffer was not initialized early enough, resulting in memory
corruption and an out of bound write.

References

  o Bug 1699077

# CVE-2021-23995: Use-after-free in Responsive Design Mode

Reporter: Irvan Kurniawan
Impact:   high

Description

When Responsive Design Mode was enabled, it used references to objects that
were previously freed. We presume that with enough effort this could have been
exploited to run arbitrary code.

References

  o Bug 1699835

# CVE-2021-23998: Secure Lock icon could have been spoofed

Reporter: Jordi Chancel
Impact:   moderate

Description

Through complicated navigations with new windows, an HTTP page could have
inherited a secure lock icon from an HTTPS page.

References

  o Bug 1667456

# CVE-2021-23961: More internal network hosts could have been probed by a
malicious webpage

Reporter: Samy Kamkar, Ben Seri, and Gregory Vishnepolsky
Impact:   moderate

Description

Further techniques that built on the slipstream research combined with a
malicious webpage could have exposed both an internal network's hosts as well
as services running on the user's local machine.

References

  o Bug 1677940

# CVE-2021-23999: Blob URLs may have been granted additional privileges

Reporter: Nika Layzell
Impact:   moderate

Description

If a Blob URL was loaded through some unusual user interaction, it could have
been loaded by the System Principal and granted additional privileges that
should not be granted to web content.

References

  o Bug 1691153

# CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an
encoded URL

Reporter: Daniel Santos
Impact:   moderate

Description

When a user clicked on an FTP URL containing encoded newline characters (%0A
and %0D), the newlines would have been interpreted as such and allowed
arbitrary commands to be sent to the FTP server.

References

  o Bug 1702374

# CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to
null-reads

Reporter: Christian Holler
Impact:   moderate

Description

The WebAssembly JIT could miscalculate the size of a return type, which could
lead to a null read and result in a crash.
Note: This issue only affected x86-32 platforms. Other platforms are
unaffected.

References

  o Bug 1700690

# CVE-2021-29946: Port blocking could be bypassed

Reporter: Frederik Braun
Impact:   low

Description

Ports that were written as an integer overflow above the bounds of a 16-bit
integer could have bypassed port blocking restrictions when used in the Alt-Svc
header.

References

  o Bug 1698503

# CVE-2021-29948: Race condition when reading from disk while verifying
signatures

Reporter: Cure53
Impact:   low

Description

Signatures are written to disk before and read during verification, which might
be subject to a race condition when a malicious local process or user is
replacing the file.

References

  o Bug 1692899

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=NgB5
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1313 – [Win][UNIX/Linux] Thunderbird: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/esb-2021-1313-winunix-linux-thunderbird-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1313-winunix-linux-thunderbird-multiple-vulnerabilities

ESB-2021.1312 – [Win][UNIX/Linux] Firefox: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1312
         MFSA 2021-16 Security Vulnerabilities fixed in Firefox 88
                               20 April 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Firefox
Publisher:         Mozilla
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Increased Privileges            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
                   Provide Misleading Information  -- Remote with User Interaction
                   Access Confidential Data        -- Remote with User Interaction
                   Reduced Security                -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-29947 CVE-2021-29946 CVE-2021-29945
                   CVE-2021-29944 CVE-2021-24002 CVE-2021-24001
                   CVE-2021-24000 CVE-2021-23999 CVE-2021-23998
                   CVE-2021-23997 CVE-2021-23996 CVE-2021-23995
                   CVE-2021-23994  

Original Bulletin: 
   https://www.mozilla.org/en-US/security/advisories/mfsa2021-16/

Comment: This advisory references vulnerabilities in products which run on 
         different platforms. It is recommended that administrators
         running Firefox check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

Mozilla Foundation Security Advisory 2021-16

Security Vulnerabilities fixed in Firefox 88

Announced: April 19, 2021
Impact:    high
Products:  Firefox
Fixed in:  Firefox 88

# CVE-2021-23994: Out of bound write due to lazy initialization

Reporter: Abraruddin Khan and Omair
Impact:   high

Description

A WebGL framebuffer was not initialized early enough, resulting in memory
corruption and an out of bound write.

References

  o Bug 1699077

# CVE-2021-23995: Use-after-free in Responsive Design Mode

Reporter: Irvan Kurniawan
Impact:   high

Description

When Responsive Design Mode was enabled, it used references to objects that
were previously freed. We presume that with enough effort this could have been
exploited to run arbitrary code.

References

  o Bug 1699835

# CVE-2021-23996: Content rendered outside of webpage viewport

Reporter: Colin D. Munro
Impact:   high

Description

By utilizing 3D CSS in conjunction with Javascript, content could have been
rendered outside the webpage's viewport, resulting in a spoofing attack that
could have been used for phishing or other attacks on a user.

References

  o Bug 1701834

# CVE-2021-23997: Use-after-free when freeing fonts from cache

Reporter: Irvan Kurniawan
Impact:   high

Description

Due to unexpected data type conversions, a use-after-free could have occurred
when interacting with the font cache. We presume that with enough effort this
could have been exploited to run arbitrary code.

References

  o Bug 1701942

# CVE-2021-23998: Secure Lock icon could have been spoofed

Reporter: Jordi Chancel
Impact:   moderate

Description

Through complicated navigations with new windows, an HTTP page could have
inherited a secure lock icon from an HTTPS page.

References

  o Bug 1667456

# CVE-2021-23999: Blob URLs may have been granted additional privileges

Reporter: Nika Layzell
Impact:   moderate

Description

If a Blob URL was loaded through some unusual user interaction, it could have
been loaded by the System Principal and granted additional privileges that
should not be granted to web content.

References

  o Bug 1691153

# CVE-2021-24000: requestPointerLock() could be applied to a tab different from
the visible tab

Reporter: Irvan Kurniawan
Impact:   moderate

Description

A race condition with requestPointerLock() and setTimeout() could have resulted
in a user interacting with one tab when they believed they were on a separate
tab. In conjunction with certain elements (such as ) this
could have led to an attack where a user was confused about the origin of the
webpage and potentially disclosed information they did not intend to.

References

  o Bug 1694698

# CVE-2021-24001: Testing code could have enabled session history manipulations
by a compromised content process

Reporter: Andrew McCreight
Impact:   moderate

Description

A compromised content process could have performed session history
manipulations it should not have been able to due to testing infrastructure
that was not restricted to testing-only configurations.

References

  o Bug 1694727

# CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an
encoded URL

Reporter: Daniel Santos
Impact:   moderate

Description

When a user clicked on an FTP URL containing encoded newline characters (%0A
and %0D), the newlines would have been interpreted as such and allowed
arbitrary commands to be sent to the FTP server.

References

  o Bug 1702374

# CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to
null-reads

Reporter: Christian Holler
Impact:   moderate

Description

The WebAssembly JIT could miscalculate the size of a return type, which could
lead to a null read and result in a crash.
Note: This issue only affected x86-32 platforms. Other platforms are
unaffected.

References

  o Bug 1700690

# CVE-2021-29944: HTML injection vulnerability in Firefox for Android's Reader
View

Reporter: Wladimir Palant working with Include Security
Impact:   low

Description

Lack of escaping allowed HTML injection when a webpage was viewed in Reader
View. While a Content Security Policy prevents direct code execution, HTML
injection is still possible.
Note: This issue only affected Firefox for Android. Other operating systems are
unaffected.

References

  o Bug 1697604

# CVE-2021-29946: Port blocking could be bypassed

Reporter: Frederik Braun
Impact:   low

Description

Ports that were written as an integer overflow above the bounds of a 16-bit
integer could have bypassed port blocking restrictions when used in the Alt-Svc
header.

References

  o Bug 1698503

# CVE-2021-29947: Memory safety bugs fixed in Firefox 88

Reporter: Mozilla developers and community
Impact:   high

Description

Mozilla developers and community members Ryan VanderMeulen, Sean Feng, Tyson
Smith, Julian Seward, Christian Holler reported memory safety bugs present in
Firefox 87. Some of these bugs showed evidence of memory corruption and we
presume that with enough effort some of these could have been exploited to run
arbitrary code.

References

  o Memory safety bugs fixed in Firefox 88

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYH4oJeNLKJtyKPYoAQjOLBAAoQ+oS/gzf96FyEGeNE6XXxycCKsFMu2L
oR6jBsyZBmGNj1SXUDJj14WEORFneu1lL8NKGIJQPS2hb1WTY4zyqjnChxYAAn6s
NpT4gig1J4Ax4vDkqHWPo5T10w2l1YnJpaLXOxESTEWMgPMhlYi8JJEBxcuDZZ3s
Dv6ks0tOPRJiGR34dIdElblYbMLU7+2owEE9IVVX4FHUg4kSgt7eK894NQvZ9Kg0
tJhKJE0jcYBaV6xaBO6KZSq2YmHUu9gV5dUUVSUI90ttPwWZpdQKbgGok9jOdl92
/PHwebzGoDHByIQpct5diSL8P4KolbQ5bKPoxqW26zec1JxHsb9nj9waTcaCbPWW
1PuL5RKqUgrOrJSxJwFTtQzMvBKCbZSvOA7o6cM/ubSV0yIGhS1NCFlbTBYCd3OL
OslfLFTOzef7bO7LKmna7c4fuRDh+3Gqje1IcoHxWA4Izq2QCaV6x++1Uy5grlXj
shrl2HZkZoBmTNq5LsMEfyrhayowI3elw59MHMRN7/dpGfNqRd00xD3eojGcCM2a
DbeoHDhdB7Ic/jEEjLrwU7rWAYpilmLKVWZ4bFZju4R1t3o12iR6U9ApUy27pxJ/
mqYAJdoMxUrrLhjbY9GIeSWDjb9zXpZuRe3r9IdAfGOfiRxokoXV9JSgkT2tsXlw
X/7EdrF4q4w=
=Tpxl
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.1312 – [Win][UNIX/Linux] Firefox: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/esb-2021-1312-winunix-linux-firefox-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1312-winunix-linux-firefox-multiple-vulnerabilities

Network Security News Summary for Tuesday April 20th, 2021

Finding Phishing Sites; Nagios XI Exploit; XCSSET Malware and M1; qnap/junos patches;

Hunting Phishing Websites with Favicon Hashes
https://isc.sans.edu/forums/diary/Hunting+phishing+websites+with+favicon+hashes/27326/

Nagios XI Vulnerability Exploited by Cryptominers
https://unit42.paloaltonetworks.com/nagios-xi-vulnerability-cryptomining/

XCSSET Malware Adapting to MacOS 11 and M1
https://www.trendmicro.com/en_us/research/21/d/xcsset-quickly-adapts-to-macos-11-and-m1-based-macs.html

QNAP Patches
https://www.qnap.com/de-de/security-advisories?ref=security_advisory_details

Juniper Updates
https://kb.juniper.net/InfoCenter/index?page=content&channel=SECURITY_ADVISORIES

keywords: juniper; qnap; bazar; xcsset; macos; m1; nagios; cryptointer; favicon; phishing

The post Network Security News Summary for Tuesday April 20th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/20/network-security-news-summary-for-tuesday-april-20th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-tuesday-april-20th-2021

Monday, April 19, 2021

¿Qué tan esencial es monitorear sus servicios de AWS?

Ilustración gestión AWS

Las organizaciones de todo el mundo confían cada vez más en la nube para aprovechar su velocidad, facilidad de gestión y escalabilidad, así como el valor empresarial que ofrece para transformar y hacer crecer su negocio.

Se trata de un …

The post ¿Qué tan esencial es monitorear sus servicios de AWS? appeared first on ManageEngine Blog.

The post ¿Qué tan esencial es monitorear sus servicios de AWS? appeared first on Security Boulevard.

Read More

The post ¿Qué tan esencial es monitorear sus servicios de AWS? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/que-tan-esencial-es-monitorear-sus-servicios-de-aws/?utm_source=rss&utm_medium=rss&utm_campaign=que-tan-esencial-es-monitorear-sus-servicios-de-aws

White House Scales Back Response to SolarWinds & Exchange Server Attacks

Lessons learned from the Unified Coordination Groups will be used to inform future response efforts, a government official says.

The post White House Scales Back Response to SolarWinds & Exchange Server Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/white-house-scales-back-response-to-solarwinds-exchange-server-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=white-house-scales-back-response-to-solarwinds-exchange-server-attacks

Abusing Cache Line Dirty States to Leak Information in Commercial Processors

Read More

The post Abusing Cache Line Dirty States to Leak Information in Commercial Processors appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/abusing-cache-line-dirty-states-to-leak-information-in-commercial-processors/?utm_source=rss&utm_medium=rss&utm_campaign=abusing-cache-line-dirty-states-to-leak-information-in-commercial-processors

Towards Fortifying the Multi-Factor-Based Online Account Ecosystem

Read More

The post Towards Fortifying the Multi-Factor-Based Online Account Ecosystem appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/towards-fortifying-the-multi-factor-based-online-account-ecosystem/?utm_source=rss&utm_medium=rss&utm_campaign=towards-fortifying-the-multi-factor-based-online-account-ecosystem

Attackers Test Weak Passwords in Purple Fox Malware Attacks

Researchers share a list of passwords that Purple Fox attackers commonly brute force when targeting the SMB protocol.

The post Attackers Test Weak Passwords in Purple Fox Malware Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/attackers-test-weak-passwords-in-purple-fox-malware-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=attackers-test-weak-passwords-in-purple-fox-malware-attacks

Cyber-Risk Threat, 4 Steps to Better Security Hygiene, & 10 Rules for Work-Life – BSW #213

In the Leadership and Communications section, Federal Reserve Chairman Says Cyber-Risk a Top Threat to National Economy, What Good Leaders Do When Replacing Bad Leaders, My Ten Rules for Work-Life Balance, and more!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw213

The post Cyber-Risk Threat, 4 Steps to Better Security Hygiene, & 10 Rules for Work-Life – BSW #213 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/cyber-risk-threat-4-steps-to-better-security-hygiene-10-rules-for-work-life-bsw-213/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-risk-threat-4-steps-to-better-security-hygiene-10-rules-for-work-life-bsw-213

Lazarus Group Uses New Tactic to Evade Detection

Attackers conceal malicious code within a BMP file to slip past security tools designed to detect embedded objects within images.

The post Lazarus Group Uses New Tactic to Evade Detection appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/lazarus-group-uses-new-tactic-to-evade-detection/?utm_source=rss&utm_medium=rss&utm_campaign=lazarus-group-uses-new-tactic-to-evade-detection

The Hybrid Workforce: Addressing the Challenges of Work from Anywhere – Fleming Shi – BSW #213

When the world went fully remote a year ago, many systems had to migrate from on-premise to the cloud. Now that we’re starting to re-open offices, do we move these system back to on-premise or is cloud the new normal? Fleming Shi, CTO from Barracuda Networks, joins us to discuss the ongoing challenges of the hybrid workforce.

This segment is sponsored by Barracuda Networks.

Visit https://securityweekly.com/barracuda to learn more about them!

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw213

The post The Hybrid Workforce: Addressing the Challenges of Work from Anywhere – Fleming Shi – BSW #213 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/the-hybrid-workforce-addressing-the-challenges-of-work-from-anywhere-fleming-shi-bsw-213/?utm_source=rss&utm_medium=rss&utm_campaign=the-hybrid-workforce-addressing-the-challenges-of-work-from-anywhere-fleming-shi-bsw-213

NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens

The malware seems like a silly coding lark at first, but further exploration shows it can wreak serious damage in follow-on attacks.
Read More

The post NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/nitroransomware-asks-for-9-99-discord-gift-codes-steals-access-tokens/?utm_source=rss&utm_medium=rss&utm_campaign=nitroransomware-asks-for-9-99-discord-gift-codes-steals-access-tokens

Rust in Android, Vuln Disclosure, Postmortems, & BootHole Follow-Up – ASW #147

This week in the AppSec News, Mike and John discuss Rust in Android and the Linux kernel, vuln disclosure policy changes from Project Zero, security and DevOps collaboration, XSS with NULL, & a BootHole follow-up!

Visit https://www.securityweekly.com/asw for all the latest episodes!

Show Notes: https://securityweekly.com/asw147

The post Rust in Android, Vuln Disclosure, Postmortems, & BootHole Follow-Up – ASW #147 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/rust-in-android-vuln-disclosure-postmortems-boothole-follow-up-asw-147/?utm_source=rss&utm_medium=rss&utm_campaign=rust-in-android-vuln-disclosure-postmortems-boothole-follow-up-asw-147

Supply Chain Management – Doug Barbin – ASW #147

Supply chain security isn’t new, despite the renewed attention from the Solar Winds attack. It has old challenges, like having an accurate asset or app inventory, and new opportunities, like Software Bill of Materials. From consequences to code integrity, DevOps teams need to understand how to protect their own code from others’ components.

Additional resources:
– National Supply Chain Integrity Month, https://www.cisa.gov/supply-chain-integrity-month
– SCRM vendor template, https://www.cisa.gov/publication/ict-scrm-task-force-vendor-template
– CWE VIEW: Hardware Design, https://cwe.mitre.org/data/definitions/1194.html
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw147

The post Supply Chain Management – Doug Barbin – ASW #147 appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/supply-chain-management-doug-barbin-asw-147/?utm_source=rss&utm_medium=rss&utm_campaign=supply-chain-management-doug-barbin-asw-147

This Day in History 1943: Operation Mincemeat

A while ago I wrote about a 1917 saddle bag with bogus British battle plans that “fell” off a horse near the Turkish front lines, which had a decisive influence. Apparently that wasn’t inspiration for a similar mission that had an important impact in WWII. On September 25, 1942 a British plane crashed on the … Continue reading This Day in History 1943: Operation Mincemeat

The post This Day in History 1943: Operation Mincemeat appeared first on Security Boulevard.

Read More

The post This Day in History 1943: Operation Mincemeat appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/this-day-in-history-1943-operation-mincemeat/?utm_source=rss&utm_medium=rss&utm_campaign=this-day-in-history-1943-operation-mincemeat

LiveQL Episode II: The Rhino in the room

Read More

The post LiveQL Episode II: The Rhino in the room appeared first on Malware Devil.



https://malwaredevil.com/2021/04/19/liveql-episode-ii-the-rhino-in-the-room-2/?utm_source=rss&utm_medium=rss&utm_campaign=liveql-episode-ii-the-rhino-in-the-room-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...