Malware Devil

Monday, May 17, 2021

Bizarro banking Trojan expands its attacks to Europe

Bizarro is yet another banking Trojan family originating from Brazil that is now found in other regions of the world. We have seen users being targeted in Spain, Portugal, France and Italy. Attempts have now been made to steal credentials from customers of 70 banks from different European and South American countries. Following in the footsteps of Tetrade, Bizarro is using affiliates or recruiting money mules to operationalize their attacks, cashing out or simply to helping with transfers. In this article we analyse the technical features of the Trojan’s components, giving a detailed overview of obfuscation techniques, the infection process and subsequent functions, as well as the social engineering tactics used by the cybercriminals to convince their victims to give away their personal online banking details.

Bizarro has x64 modules and is able to trick users into entering two-factor authentication codes in fake pop-ups. It may also use social engineering to convince victims to download a smartphone app. The group behind Bizzaro uses servers hosted on Azure and Amazon (AWS) and compromised WordPress servers to store the malware and collect telemetry.

Bizarreland

Bizarro is distributed via MSI packages downloaded by victims from links in spam emails. Once launched, Bizarro downloads a ZIP archive from a compromised website. While writing this article, we saw hacked WordPress, Amazon and Azure servers used for storing archives. The MSI installer has two embedded links – which one is chosen depends on the victim’s processor architecture.

Typical malicious message sent by Bizarro operators

The downloaded ZIP archive contains the following files:

A malicious DLL written in Delphi;
A legitimate executable that is an AutoHotkey script runner (in some samples AutoIt is used instead of AutoHotkey);
A small script that calls an exported function from the malicious DLL.

The DLL exports a function that contains the malicious code. The malware developers have used obfuscation to complicate code analysis. The code of the exported functions have been removed by the protector. The bytes that belong to the exported functions are restored by the DLL entry point function at runtime. This entry point function is heavily obfuscated. The tricks used to complicate analysis consist of constant unfolding and junk code insertion. As for the malware developers, they are constantly improving the protection of the binaries. In earlier versions of Bizarro, only the entry point function was protected, while in more recent samples the protector is also used to obscure calls of the imported API functions.

When Bizarro starts, it first kills all the browser processes to terminate any existing sessions with online banking websites. When a user restarts the browsers, they will be forced to re-enter the bank account credentials, which will be captured by the malware. Another step Bizarro takes in order to get as many credentials as possible is to disable autocomplete in a browser.

Bizarro gathers the following information about the system on which it is running:

Computer name;
Operating system version;
Default browser name;
Installed antivirus software name.

Bizarro uses the ‘Mozilla/4.0 (compatible;MSIE 6.0; Windows NT 5.0′ user agent while sending the POST request. This user agent has typos: there should be a space symbol after the compatible; substring and the closing bracket is missing. Our research shows that this mistake has not been fixed in the latest versions. After that, Bizarro creates an empty file in the %userprofile% directory, thus marking the system as infected. The name of the file is the name of the script runner (AutoIt or AutoHotKey) with the .jkl extension appended to it.

Having sent the data to the telemetry server, Bizarro initializes the screen capturing module. It loads the magnification.dll library and gets the address of the deprecated MagSetImageScalingCallback API function. With its help, the Trojan can capture the screen of a user and also constantly monitor the system clipboard, looking for a Bitcoin wallet address. If it finds one, it is replaced with a wallet belonging to the malware developers.

The backdoor is the core component of Bizarro: it contains more than 100 commands and allows the attackers to steal online banking account credentials. Most of the commands are used to display fake pop-up messages to users. The core component of the backdoor doesn’t start until Bizarro detects a connection to one of the hardcoded online banking systems. The malware does this by enumerating all the windows, collecting their names. Whitespace characters, letters with accents (such as ñ or á) and non-letter symbols such as dashes are removed from the window name strings. If a window name matches one of the hardcoded strings, the backdoor continues starting up.

The first thing the backdoor does is remove the DNS cache by executing the ipconfig /flushdns command. This is done in order to prevent connecting to a blocked IP. After that, the malware resolves the domain name to an IP address, creates a socket and binds it to the resolved address. If the connection was successful, it creates the %userprofile%bizarro.txt file.

The Backdoor and its C2

The commands that Bizarro receives from its C2 can be divided into the following categories:

Commands that allow the C2 operators to get data about the victim and manage the connection status

The <|PT|> command sends the environment information to the C2: Bizarro’s version, OS name, computer name, Bizarro’s unique identifier, installed antivirus software and the codename used for the bank that has been accessed. The codenames are bank names written in leetspeak.

Commands that allow attackers to control the files located on the victim’s hard drive

The <|DownloadFile|> command downloads files to the victim’s computer, while the <|UploadFile|> command allows attackers to fetch files from the client machine. The <|Folder|> and <|File|> commands allow the attackers to search for folders and files which have a given mask.

Commands that allow attackers to control the user’s mouse and keyboard

The <|SuaykRJ|> command performs a left mouse button click at the designated location. The <|SuaykJI|> command performs a double click at the given location, while the <|IXjzwtR|> command performs a right mouse button click. The <|ztUjzwtR|> command moves the mouse to a designated location. The syntax of these three commands is <|command name|>x coordinate<|>y coordinate<<|.

Bizarro can also manipulate the user’s keyboard (what the user actually types) with the help of the carmena command.

Commands that allow the attackers to control the backdoor operation, shut down, restart or destroy the operating system and limit the functionality of Windows

The LkingWajuGhkzwu command shuts the backdoor down, while the vkbAlcvtlY command drops a BAT file in the working directory. The batch script is responsible for deleting the malware from disk.

Commands that log keystrokes

Bizarro supports two commands that are responsible for keylogging. The COZUMEL command starts the logging process, while the COZUMARIA command stops it.

Commands that perform social engineering attacks

These commands display various messages that trick users into giving attackers access to the bank account. The type of messages displayed vary from simple message boxes to well-designed windows with bank logs on them.

We will first describe commands that show Windows message boxes. The dkxqdpdv command displays an error message with the text: “Los datos ingresados son incorrectos, por favor intente nuevamente.” (English: “The data entered is incorrect, please try again.”)

Bizarro shows a message telling the user to enter the requested data again

The vanessa command displays an error message which tells the user to enter confirmation information. To further convince the user that all operations are legitimate, the malware displays the RUT (Rol Único Tributario, a Chilean ID number) and the value that was supplied earlier. The message has the following text:

Error message asking the user to enter a confirmation code

The LMAimwc command displays another error message. This time it tells the user that their computer needs to be restarted in order to finish a security-related operation. Bizarro displays the following text:

Error message telling the user that the operating system will be restarted

The most interesting messages that Bizarro displays are those that try to mimic online banking systems. To display such messages, Bizarro needs to download a JPEG image that contains the bank logo and instructions the victim needs to follow. These images are stored in the user profile directory in an encrypted form. Before an image is used in a message, it is decrypted with a multi-byte XOR algorithm. As the messages are downloaded from the C2 server, they can be found only on the victims’ machines.

The first type of custom messages that Bizarro may show are messages that freeze the victim’s machine, thus allowing the attackers to gain some time. When a command to display a message like this is received, the taskbar is hidden, the screen is greyed out and the message itself is displayed. While the message is shown, the user is unable to close it or open Task Manager. The message itself tells the user either that the system is compromised and thus needs to be updated or that security and browser performance components are being installed. This type of message also contains a progress bar that changes over time.

The images below show what these messages look like on the screens of victims, with messages written in Spanish:

Bizarro blocking a bank login page and telling the user that security updates are being installed

The following two messages try to convince the victim that their system is compromised. In most of them, Bizarro tells the user not to worry about any transactions that occur during the “security update” as they are only confirming the identity of the client. This makes clients feel more confident about approving all the transactions requested by the attackers.


Messages telling the user that their system is compromised

Bizarro also tries to lure victims into sending two-factor authentication codes to the attackers. Another interesting feature we have seen entails an attempt to convince the victim to install a malicious app on their smartphone. It uses the following windows to determine the type of mobile operating system:


Bizarro asks the user to choose the operating system of their smartphone

If the victim chooses Android, the C2 server will send a link with a malicious application to the client. The client will make a QR code out of it with the help of the Google Charts API. It sends a request with the following arguments:

http://chart.apis.google.com/chart?chs=<QR code width>x<QR code height>&cht=qr&chld=<error correction level>&chl=<link to the application>

The obtained QR code is then shown in a window with the following text:


Bizarro asking the user to scan the QR code

Attack scenario

With the help of the commands that the Bizarro developers have included in the Trojan, adversaries may stage an attack with the following scenario:

Infection scheme used by Bizarro

According to the list of supported banks, the threat actor behind Bizarro is targeting clients of various banks from Europe and South America. Based on our telemetry, we’ve seen victims of Bizarro in different countries, including Brazil, Argentina, Chile, Germany, Spain, Portugal, France and Italy. These statistics again prove the fact that Bizarro’s operators have expanded their interest from Brazil to other countries in South America and Europe.

Distribution of Bizarro detections in the last 12 months

Conclusion

We’ve recently seen several banking Trojans from South America (such as Guildma, Javali, Melcoz, Grandoreiro and Amavaldo) expanding their operations to other regions, mainly Europe. Bizarro is yet another example of this. The threat actors behind this campaign are adopting various technical methods to complicate malware analysis and detection, as well as social engineering tricks that can help convince victims to provide personal data related to their online banking accounts.

Kaspersky products detect this family as Trojan-Banker.Win32.Bizarro or Trojan-Banker.Win64.Bizarro. All the details, IoCs, MITRE ATT&CK Framework data, Yara rules and hashes relating to this threat are available to users of our Financial Threat Intel services. To learn more about threat hunting and malware analysis from Kaspersky’s GReAT experts, check out http://xtraining.kaspersky.com

Indicators of compromise

Reference MD5 hashes

e6c337d504b2d7d80d706899d964ab45
daf028ddae0edbd3d7946bb26cf05fbf
5184776f72962859b704f7cc370460ea
73472698fe41df730682977c8e751a3e
7a1ce2f8f714367f92a31da1519a3de3
0403d605e6418cbdf8e946736d1497ad
d6e4236aaade8c90366966d59e735568
a083d5ff976347f1cd5ba1d9e3a7a4b3
b0d0990beefa11c9a78c701e2aa46f87
38003677bfaa1c6729f7fa00da5c9109

The post Bizarro banking Trojan expands its attacks to Europe appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/bizarro-banking-trojan-expands-its-attacks-to-europe/?utm_source=rss&utm_medium=rss&utm_campaign=bizarro-banking-trojan-expands-its-attacks-to-europe

2021 Verizon Data Breach Investigations Report Is Out

The Verizon Data Breach Investigations report is probably one of the most widely read reports in cyber security.  Verizon released their 2021 edition of the report on May 13, 2021.

The post 2021 Verizon Data Breach Investigations Report Is Out appeared first on K2io.

The post 2021 Verizon Data Breach Investigations Report Is Out appeared first on Security Boulevard.

Read More

The post 2021 Verizon Data Breach Investigations Report Is Out appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/2021-verizon-data-breach-investigations-report-is-out/?utm_source=rss&utm_medium=rss&utm_campaign=2021-verizon-data-breach-investigations-report-is-out

Simplicity is the Necessary Killer Security Feature

Pre-COVID-19, IT and security teams were being challenged by too many projects, a lack of resources and teams that lacked enough people. After a year like no other, there is much self-congratulation going on about compressing five years of digital transformation plans into five months. That is certainly good for the business and the bottom..

The post Simplicity is the Necessary Killer Security Feature appeared first on Security Boulevard.

Read More

The post Simplicity is the Necessary Killer Security Feature appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/simplicity-is-the-necessary-killer-security-feature/?utm_source=rss&utm_medium=rss&utm_campaign=simplicity-is-the-necessary-killer-security-feature

U.S. Pipeline Ransomware Attackers Go Dark After Servers and Bitcoin Are Seized

Just as Colonial Pipeline restored all of its systems to operational status in the wake of a crippling ransomware incident a week ago, DarkSide, the cybercrime syndicate behind the attack, claimed it lost control of its infrastructure, citing a law enforcement seizure.
All the dark websites operated by the gang, including its DarkSide Leaks blog, ransom collection site, and breach data content
Read More

The post U.S. Pipeline Ransomware Attackers Go Dark After Servers and Bitcoin Are Seized appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/u-s-pipeline-ransomware-attackers-go-dark-after-servers-and-bitcoin-are-seized/?utm_source=rss&utm_medium=rss&utm_campaign=u-s-pipeline-ransomware-attackers-go-dark-after-servers-and-bitcoin-are-seized

Why You Should Start Caring About Oversharing

Today’s website owners are focused on building a great online experience for their users. Digital transformation is all about shifting how we do business and offer services – and today’s rich web experience is part of that revolution. But all that usability comes with a hefty risk price tag. Think about it: modern websites are..

The post Why You Should Start Caring About Oversharing appeared first on Security Boulevard.

Read More

The post Why You Should Start Caring About Oversharing appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/why-you-should-start-caring-about-oversharing/?utm_source=rss&utm_medium=rss&utm_campaign=why-you-should-start-caring-about-oversharing

The Colonial Pipeline Ransomware Attack

This week Tom and Kevin discuss the Colonial Pipeline ransomware attack, RaaS (Ransomware as a Service), and why ransomware attacks are not going away anytime soon. ** Links mentioned on the show ** Colonial Pipeline Hackers, DarkSide, Apologize, Say Goal ‘Is to Make Money’ https://www.msn.com/en-us/news/world/colonial-pipeline-hackers-darkside-apologize-say-goal-is-to-make-money/ar-BB1gBzhB Colonial Pipeline attack: Everything you need to know https://www.zdnet.com/article/everything-you-need-to-know-about-the-colonial-pipeline-ransomware-attack/ Ransomware […]

The post The Colonial Pipeline Ransomware Attack appeared first on The Shared Security Show.

The post The Colonial Pipeline Ransomware Attack appeared first on Security Boulevard.

Read More

The post The Colonial Pipeline Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/the-colonial-pipeline-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=the-colonial-pipeline-ransomware-attack

Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls

Given that attacks are only increasing and there needs to be greater efficacy in how companies protect themselves, let us reference how the financial industry has created and relies on a body of standards to address issues in financial accounting as a defined comparison for Information Security. To support this argument, there is a defined […]… Read More

The post Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls appeared first on The State of Security.

The post Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls appeared first on Security Boulevard.

Read More

The post Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/mind-the-gaap-a-lens-for-understanding-the-importance-of-the-cis-controls/?utm_source=rss&utm_medium=rss&utm_campaign=mind-the-gaap-a-lens-for-understanding-the-importance-of-the-cis-controls

ISC Stormcast For Monday, May 17th, 2021 https://isc.sans.edu/podcastdetail.html?id=7502, (Mon, May 17th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, May 17th, 2021 https://isc.sans.edu/podcastdetail.html?id=7502, (Mon, May 17th) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/isc-stormcast-for-monday-may-17th-2021-https-isc-sans-edu-podcastdetail-htmlid7502-mon-may-17th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-may-17th-2021-https-isc-sans-edu-podcastdetail-htmlid7502-mon-may-17th

ASB-2021.0035.2 – UPDATE [Win] Microsoft Edge (Chromium-based): Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT Security Bulletin

ASB-2021.0035.2
Microsoft Security Update Release for Microsoft Edge (Chromium-based)
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Microsoft Edge (Chromium-based)
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Access Confidential Data — Remote with User Interaction
Unauthorised Access — Remote with User Interaction
Reduced Security — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21141 CVE-2021-21140 CVE-2021-21139
CVE-2021-21137 CVE-2021-21136 CVE-2021-21135
CVE-2021-21134 CVE-2021-21133 CVE-2021-21132
CVE-2021-21131 CVE-2021-21130 CVE-2021-21129
CVE-2021-21128 CVE-2021-21127 CVE-2021-21126
CVE-2021-21125 CVE-2021-21124 CVE-2021-21123
CVE-2021-21122 CVE-2021-21121 CVE-2021-21120
CVE-2021-21119 CVE-2021-21118 CVE-2020-16044
Reference: ESB-2021.0247
ESB-2021.0242
ESB-2021.0209

Revision History: May 17 2021: Corrected typo in product name
January 22 2021: Initial Release

OVERVIEW

The following Chrome CVEs have been released on January 21, 2021.

These CVE were assigned by Chrome. Microsoft Edge (Chromium-based) ingests
Chromium, which addresses these vulnerabilities. Please see Google
Chrome Releases for more information [1].

IMPACT

The following vulnerabilities have been addressed:

* CVE-2020-16044
* CVE-2021-21118
* CVE-2021-21119
* CVE-2021-21120
* CVE-2021-21121
* CVE-2021-21122
* CVE-2021-21123
* CVE-2021-21124
* CVE-2021-21125
* CVE-2021-21126
* CVE-2021-21127
* CVE-2021-21128
* CVE-2021-21129
* CVE-2021-21130
* CVE-2021-21131
* CVE-2021-21132
* CVE-2021-21133
* CVE-2021-21134
* CVE-2021-21135
* CVE-2021-21136
* CVE-2021-21137
* CVE-2021-21139
* CVE-2021-21140
* CVE-2021-21141

See Security Update Guide Supports CVEs Assigned by Industry Partners [2]
for more information about third-party CVEs in the Security Update Guide.

MITIGATION

It is advised to update Edge to the latest release. [3]

REFERENCES

[1] Google Chrome Releases
https://chromereleases.googleblog.com/2021

[2] Security Update Guide Supports CVEs Assigned by Industry Partners
https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/

[3] Security Update Guide
https://msrc.microsoft.com/update-guide/en-us

AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation’s site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYKIIx+NLKJtyKPYoAQgH+Q/+K1P13YR9kJ3qg8Lxs79dfT8sp5ZjEBJE
6yldZX/KX+2BczeDsdFUEsgm5CVrwV9yNxmLCcWaoCnWmSEG36b30UQo4jj8cO+i
YAQcvzRDjkbg9adWbxRLMWeKEcXzt/RnER6Pffm3z0bKNos3s5wvq8fMB4nz32Vd
fXi3kTZo/Rq1XE31W0TjJSfIfM+iuThAyuVTkEyTTkOvz4St+jP5PicpkbVtyFmu
+o8L2sTOhmvSz0rLi8MLYWC55qdtGzssmxDXq5iQwElLMK4NxWDeBExou1tC6PES
7WUVS8fFI41ArMG7CixBYnJUprQwt3ivGpCfi1wLl5Us8xd2E2LAphdWc/TI/nkj
iPkMP2m9YFcnBC4vF2sni3QQvAxfkNzFZB3qA+3yeLZXZtFVK8or3p8UjTc+xU7+
i98YDiAmaLr9zrTne41jSzzCEfzUehHQ1HnKnJ9Al3rhi2IaywavdcHWPjhH38VI
AHfAX71A93HqBDtwy2QmTDXEP53fcT9rO8ls9YncIkJhsaFqOmQi9LAjo11cXgkS
BdT6YV131wCWXD1fYm3+7JfnBoe18jGoF64EipyWnoDO7cOZrz7Vqywfzy7tA5HR
X+wp/r8uSRoukq9CCQkpWqYBiF13kFkgAUstQt7FZp24V0LGiGVcrEi2sdVOucPE
SuOYJ6gDWmw=
=AIWs
—–END PGP SIGNATURE—–

Read More

The post ASB-2021.0035.2 – UPDATE [Win] Microsoft Edge (Chromium-based): Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/asb-2021-0035-2-update-win-microsoft-edge-chromium-based-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=asb-2021-0035-2-update-win-microsoft-edge-chromium-based-multiple-vulnerabilities

ASB-2021.0049.2 – UPDATE [Win] Microsoft Edge (Chromium-based): Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT Security Bulletin

ASB-2021.0049.2
Microsoft Security Update Release for Microsoft Edge (Chromium-based)
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Microsoft Edge (Chromium-based)
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Access Confidential Data — Remote with User Interaction
Unauthorised Access — Remote with User Interaction
Reduced Security — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-27844 CVE-2021-21190 CVE-2021-21189
CVE-2021-21188 CVE-2021-21187 CVE-2021-21186
CVE-2021-21185 CVE-2021-21184 CVE-2021-21183
CVE-2021-21182 CVE-2021-21180 CVE-2021-21179
CVE-2021-21178 CVE-2021-21177 CVE-2021-21176
CVE-2021-21175 CVE-2021-21174 CVE-2021-21173
CVE-2021-21172 CVE-2021-21171 CVE-2021-21170
CVE-2021-21169 CVE-2021-21168 CVE-2021-21167
CVE-2021-21166 CVE-2021-21165 CVE-2021-21164
CVE-2021-21163 CVE-2021-21162 CVE-2021-21161
CVE-2021-21160 CVE-2021-21159 CVE-2020-21181
Reference: ESB-2021.0803

Revision History: May 17 2021: Fixed typo in product name
March 9 2021: Initial Release

OVERVIEW

The following Chrome CVEs have been released on March 4, 2021.

These CVE were assigned by Chrome. Microsoft Edge (Chromium-based)
ingests Chromium, which addresses these vulnerabilities.
Please see Google Chrome Releases for more information. [1]

Edge version: 89.0.774.45
Chromium version: 89.0.4389.72 [2]

IMPACT

The following vulnerabilities have been addressed:

*CVE-2021-21159
*CVE-2021-21160
*CVE-2021-21161
*CVE-2021-21162
*CVE-2021-21163
*CVE-2021-21164
*CVE-2021-21165
*CVE-2021-21166
*CVE-2021-21167
*CVE-2021-21168
*CVE-2021-21169
*CVE-2021-21170
*CVE-2021-21171
*CVE-2021-21172
*CVE-2021-21173
*CVE-2021-21174
*CVE-2021-21175
*CVE-2021-21176
*CVE-2021-21177
*CVE-2021-21178
*CVE-2021-21179
*CVE-2021-21180
*CVE-2021-27844
*CVE-2020-21181
*CVE-2021-21182
*CVE-2021-21183
*CVE-2021-21184
*CVE-2021-21185
*CVE-2021-21186
*CVE-2021-21187
*CVE-2021-21188
*CVE-2021-21189
*CVE-2021-21190

See Security Update Guide Supports CVEs Assigned by Industry Partners [3]
for more information about third-party CVEs in the Security Update Guide.

MITIGATION

It is advised to update Edge to the latest release.

REFERENCES

[1] Google Chrome Releases
https://chromereleases.googleblog.com/2021

[2] Security Update Guide
https://msrc.microsoft.com/update-guide/en-us

[3] Security Update Guide Supports CVEs Assigned by Industry Partners
https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/

AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation’s site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=mPPb
—–END PGP SIGNATURE—–

Read More

The post ASB-2021.0049.2 – UPDATE [Win] Microsoft Edge (Chromium-based): Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/asb-2021-0049-2-update-win-microsoft-edge-chromium-based-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=asb-2021-0049-2-update-win-microsoft-edge-chromium-based-multiple-vulnerabilities

ASB-2021.0111 – [Win] Microsoft Edge (based on Chromium): Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT Security Bulletin

ASB-2021.0111
Microsoft Security Update Release for Microsoft Edge (Chromium-based)
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Microsoft Edge (based on Chromium)
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Provide Misleading Information — Remote with User Interaction
Access Confidential Data — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-30520 CVE-2021-30519 CVE-2021-30518
CVE-2021-30517 CVE-2021-30516 CVE-2021-30515
CVE-2021-30514 CVE-2021-30513 CVE-2021-30512
CVE-2021-30511 CVE-2021-30510 CVE-2021-30509
CVE-2021-30508 CVE-2021-30507 CVE-2021-30506
Reference: ESB-2021.1629

OVERVIEW

The following Chrome CVEs have been released on May 10, 2021.

These CVEs were assigned by Chrome. Microsoft Edge (Chromium-based)
ingests Chromium, which addresses these vulnerabilities.
Please see Google Chrome Releases for more information. [1]

Edge version: 90.0.818.62
Chromium version: 90.0.4430.212 [2]

IMPACT

The following vulnerabilities have been addressed:

* CVE-2021-30506
* CVE-2021-30507
* CVE-2021-30508
* CVE-2021-30509
* CVE-2021-30510
* CVE-2021-30511
* CVE-2021-30512
* CVE-2021-30513
* CVE-2021-30514
* CVE-2021-30515
* CVE-2021-30516
* CVE-2021-30517
* CVE-2021-30518
* CVE-2021-30519
* CVE-2021-30520

MITIGATION

It is advised to update Edge to the latest release.

REFERENCES

[1] Google Chrome Releases
https://chromereleases.googleblog.com/2021

[2] Security Update Guide
https://msrc.microsoft.com/update-guide/en-us

[3] Security Update Guide Supports CVEs Assigned by Industry Partners
https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/

AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation’s site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYKHv4eNLKJtyKPYoAQiJ4w/9Fs5U6AjBKWM7jjy4DTu5PgxObNPIO7Nd
wWCh/TVzlAkRzXNB0lmkhyG+eG+Y6ZA1tnkJWkm9kL3B/49+oo76NOH9eZ93n6IY
Xm6FpRmTCDiypBBX57OowDvb8IygOe5bC07kwU6gWPowRV7MpIp/HvwLwxYVY7DR
/Uj/5m5D96u4PiyM1C+Prq0M10Ao13SsiHebCr3nf6UxyzZnq8b5JGsySY9vqplx
YjVr7Sx+lItp6icWr0uZI+elcnN6eSRbEMDUeUP9BqQHS2zccxTY5YEx8Fqyk4Cz
ezs75ohB1le+I3AII2/L7k/PUJtBlCfVtDtHr/ivr0KbDPK37WM0vuwGWdsy/baG
/e1Wgf6f33Mk49Cwh8SbT543NjikMLbfxEcPyKs+o2gJTjsytDF+/XmJ0bexbDdv
OEnQ6JMAWf5NxsfGZjFwXyRf1E9J9d2n5YNn0ic6r5JoiWFxKgqCNTmsOhuKd9P4
HoaAio8vZZy9ojyxTlmGDeHTtol1RjaCVgdOgzdpuhdCg87AbotiUBTgHfGYbhGC
+Gc0VPTHuu0Fe9kFXPbYpvO7g/MEOtiW6GaGh6/YFxcgFVmJhYpIQIbH4B17nqiq
QWKn9yLC0r/2lsNAV+KR6OxQD52hHy+Ke3Uak2P9N1a9EZ8XgA8O/0s286y0F51f
7WtssC7frWg=
=2J28
—–END PGP SIGNATURE—–

Read More

The post ASB-2021.0111 – [Win] Microsoft Edge (based on Chromium): Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/asb-2021-0111-win-microsoft-edge-based-on-chromium-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=asb-2021-0111-win-microsoft-edge-based-on-chromium-multiple-vulnerabilities

ESB-2021.1627.2 – UPDATE [Cisco] Cisco Products: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1627.2
Multiple Vulnerabilities in Frame Aggregation and Fragmentation
Implementations of 802.11 Specification Affecting Cisco Products: May 2021
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Access Points
IP Phones
Webex series products
Operating System: Cisco
Impact/Access: Reduced Security — Remote/Unauthenticated
Unauthorised Access — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2020-26147 CVE-2020-26146 CVE-2020-26145
CVE-2020-26144 CVE-2020-26143 CVE-2020-26142
CVE-2020-26141 CVE-2020-26140 CVE-2020-26139
CVE-2020-24588 CVE-2020-24587 CVE-2020-24586

Reference: ASB-2021.0102
ESB-2021.1587

Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu

Revision History: May 17 2021: Vendor updated affected product details
May 12 2021: Initial Release

– ————————–BEGIN INCLUDED TEXT——————–

Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations
of 802.11 Specification Affecting Cisco Products: May 2021

Priority: Medium
Advisory ID: cisco-sa-wifi-faf-22epcEWu
First Published: 2021 May 11 18:00 GMT
Last Updated: 2021 May 14 20:43 GMT
Version 1.2: Interim
Workarounds: No workarounds available
Cisco Bug IDs: CSCvx24420 CSCvx24423 CSCvx24425 CSCvx24428 CSCvx24439
CSCvx24440 CSCvx24441 CSCvx24449 CSCvx24452 CSCvx24456
CSCvx60997 CSCvx61001 CSCvx61005 CSCvx61012 CSCvx61020
CSCvx62876 CSCvx62884 CSCvx62886 CSCvx89821 CSCvy32680
CSCvy32690 CSCvy32694
CVE Names: CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139
CVE-2020-26140 CVE-2020-26141 CVE-2020-26142 CVE-2020-26143
CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147
CWEs: CWE-345 CWE-772 CWE-99

Summary

o On May 11, 2021, the research paper Fragment and Forge: Breaking Wi-Fi
Through Frame Aggregation and Fragmentation was made public. This paper
discusses 12 vulnerabilities in the 802.11 standard. One vulnerability is
in the frame aggregation functionality, two vulnerabilities are in the
frame fragmentation functionality, and the other nine are implementation
vulnerabilities. These vulnerabilities could allow an attacker to forge
encrypted frames, which could in turn enable the exfiltration of sensitive
data from a targeted device.

This advisory will be updated as additional information becomes available.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu

Affected Products

o Cisco is investigating its product line to determine which products may be
affected by these vulnerabilities. As the investigation progresses, Cisco
will update this advisory with information about affected products.

Vulnerable Products

The following table lists Cisco products that are affected by the
vulnerabilities that are described in this advisory. If a future release
date is indicated for software, the date provided represents an estimate
based on all information known to Cisco as of the Last Updated date at the
top of the advisory. Availability dates are subject to change based on a
number of factors, including satisfactory testing results and delivery of
other priority features and fixes. If no version or date is listed for an
affected component (indicated by a blank field and/or an advisory
designation of Interim), Cisco is continuing to evaluate the fix and will
update the advisory as additional information becomes available. After the
advisory is marked Final, customers should refer to the associated Cisco
bug(s) for further details.

CVE ID Cisco Bug ID Fixed Release Availability
Aironet 1532 APs
CVE-2020-24586 Under evaluation N/A
CVE-2020-24587 Under evaluation N/A
CVE-2020-24588 Under evaluation N/A
CVE-2020-26139 Under evaluation N/A
CVE-2020-26140 Under evaluation N/A
CVE-2020-26141 Under evaluation N/A
CVE-2020-26142 Under evaluation N/A
CVE-2020-26143 Under evaluation N/A
CVE-2020-26144 Under evaluation N/A
CVE-2020-26145 Under evaluation N/A
CVE-2020-26146 Under evaluation N/A
CVE-2020-26147 Under evaluation N/A
Aironet 1542 APs, Aironet 1810 APs, Aironet 1815 APs, Aironet 1832 APs,
Aironet 1842 APs, Aironet 1852 APs, Aironet 1800i APs
8.5MR8 (TBD)
CVE-2020-24586 CSCvx24420 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-24587 Not affected N/A
8.5MR8 (TBD)
CVE-2020-24588 CSCvx24420 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
8.5MR8 (TBD)
CVE-2020-26146 CSCvx24420 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26147 Not affected N/A
Aironet 1552 APs, Aironet 1572 APs, Aironet 1702 APs, Aironet 2702 APs,
Aironet 3702 APs, IW 3702 APs
8.5MR8 (TBD)
CVE-2020-24586 CSCvy32680 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
CVE-2020-24587 Not affected N/A
8.5MR8 (TBD)
CVE-2020-24588 CSCvy32680 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
CVE-2020-26146 Not affected N/A
CVE-2020-26147 Not affected N/A
Aironet 1560 Series APs, Aironet 2800 Series APs, Aironet Series 3800 APs,
Aironet Series 4800 APs, Catalyst IW 6300 APs, 6300 Series Embedded
Services APs (ESW6300)
8.5MR8 (TBD)
CVE-2020-24586 CSCvx24449 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
8.5MR8 (TBD)
CVE-2020-24587 CSCvx24449 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-24588 Not affected N/A
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
8.5MR8 (TBD)
CVE-2020-26146 CSCvx24449 8.10MR6 (Jun 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26147 Not affected N/A
Catalyst 9105 APs, Catalyst 9115 APs, Catalyst 9120 APs, Integrated AP on
1100 Integrated Services Routers
8.10MR6 (Jun 2021)
CVE-2020-24586 CSCvx24425 16.12.6 (Aug 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-24587 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-24588 CSCvx24425 16.12.6 (Aug 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-26146 CSCvx24425 16.12.6 (Aug 2021)
17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26147 Not affected N/A
Catalyst 9117 APs
8.10MR6 (Jun 2021)
CVE-2020-24586 CSCvx24439 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-24587 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-24588 CSCvx24439 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-26146 CSCvx24439 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26147 Not affected N/A
Catalyst 9124 APs ^1 , Catalyst 9130 APs
8.10MR6 (Jun 2021)
CVE-2020-24586 CSCvx24428 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-24587 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-24588 CSCvx24428 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26139 Not affected N/A
CVE-2020-26140 Not affected N/A
CVE-2020-26141 Not affected N/A
CVE-2020-26142 Not affected N/A
CVE-2020-26143 Not affected N/A
CVE-2020-26144 Not affected N/A
CVE-2020-26145 Not affected N/A
8.10MR6 (Jun 2021)
CVE-2020-26146 CSCvx24428 17.3.4 (Jun 2021)
17.6.1 (Jul 2021)
CVE-2020-26147 Not affected N/A
1. Catalyst 9124 APs were not supported until Release 17.5, and the fix
will be available in Release 17.6.1
Meraki GR10, GR60, MR20, MR30H, MR33, MR36, MR42, MR42E, MR44, MR45, MR46,
MR46E, MR52, MR53, MR53E, MR55, MR56, MR70, MR74, MR76, MR84, MR86 ^1
CVE-2020-24586 No bug ID MR 27.7 (Jun 2021)
CVE-2020-24587 No bug ID MR 27.7 (Jun 2021)
CVE-2020-24588 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26139 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26140 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26141 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26142 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26143 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26144 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26145 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26146 No bug ID MR 27.7 (Jun 2021)
CVE-2020-26147 No bug ID MR 27.7 (Jun 2021)
1. Cisco will not fix these vulnerabilities in the following Cisco Meraki
products: MR11, MR12, MR14, MR16, MR18, MR26, MR32, MR34, MR62, MR66, and
MR72
Meraki MX67W, MX67CW, MX68W, MX68CW, Z3, Z3C ^1
CVE-2020-24586 No bug ID MX 17.0 (Oct 2021)
CVE-2020-24587 No bug ID MX 17.0 (Oct 2021)
CVE-2020-24588 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26139 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26140 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26141 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26142 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26143 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26144 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26145 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26146 No bug ID MX 17.0 (Oct 2021)
CVE-2020-26147 No bug ID MX 17.0 (Oct 2021)
1. Cisco will not fix these vulnerabilities in the following Cisco Meraki
products: MX60W, MX64W, MX65W, and Z1
IP Conference Phone 8832
CVE-2020-24586 CSCvx62876 Release no. TBD
CVE-2020-24587 CSCvx62876 Release no. TBD
CVE-2020-24588 CSCvx62876 Release no. TBD
CVE-2020-26139 CSCvx62876 Release no. TBD
CVE-2020-26140 CSCvx62876 Release no. TBD
CVE-2020-26141 CSCvx62876 Release no. TBD
CVE-2020-26142 CSCvx62876 Release no. TBD
CVE-2020-26143 CSCvx62876 Release no. TBD
CVE-2020-26144 CSCvx62876 Release no. TBD
CVE-2020-26145 CSCvx62876 Release no. TBD
CVE-2020-26146 CSCvx62876 Release no. TBD
CVE-2020-26147 CSCvx62876 Release no. TBD
IP Phone 6861
CVE-2020-24586 CSCvx62884 Release no. TBD
CVE-2020-24587 CSCvx62884 Release no. TBD
CVE-2020-24588 CSCvx62884 Release no. TBD
CVE-2020-26139 CSCvx62884 Release no. TBD
CVE-2020-26140 CSCvx62884 Release no. TBD
CVE-2020-26141 CSCvx62884 Release no. TBD
CVE-2020-26142 CSCvx62884 Release no. TBD
CVE-2020-26143 CSCvx62884 Release no. TBD
CVE-2020-26144 CSCvx62884 Release no. TBD
CVE-2020-26145 CSCvx62884 Release no. TBD
CVE-2020-26146 CSCvx62884 Release no. TBD
CVE-2020-26147 CSCvx62884 Release no. TBD
IP Phone 8861 and 8865
CVE-2020-24586 CSCvx60997 Release no. TBD
CVE-2020-24587 CSCvx60997 Release no. TBD
CVE-2020-24588 CSCvx60997 Release no. TBD
CVE-2020-26139 CSCvx60997 Release no. TBD
CVE-2020-26140 CSCvx60997 Release no. TBD
CVE-2020-26141 CSCvx60997 Release no. TBD
CVE-2020-26142 CSCvx60997 Release no. TBD
CVE-2020-26143 CSCvx60997 Release no. TBD
CVE-2020-26144 CSCvx60997 Release no. TBD
CVE-2020-26145 CSCvx60997 Release no. TBD
CVE-2020-26146 CSCvx60997 Release no. TBD
CVE-2020-26147 CSCvx60997 Release no. TBD
IP Phone 8861 Running Third-Party Call Control (3PCC) Software
CVE-2020-24586 CSCvx61001 Release no. TBD
CVE-2020-24587 CSCvx61001 Release no. TBD
CVE-2020-24588 CSCvx61001 Release no. TBD
CVE-2020-26139 CSCvx61001 Release no. TBD
CVE-2020-26140 CSCvx61001 Release no. TBD
CVE-2020-26141 CSCvx61001 Release no. TBD
CVE-2020-26142 CSCvx61001 Release no. TBD
CVE-2020-26143 CSCvx61001 Release no. TBD
CVE-2020-26144 CSCvx61001 Release no. TBD
CVE-2020-26145 CSCvx61001 Release no. TBD
CVE-2020-26146 CSCvx61001 Release no. TBD
CVE-2020-26147 CSCvx61001 Release no. TBD
Wireless IP Phone 8821
CVE-2020-24586 CSCvx61012 Release no. TBD
CVE-2020-24587 CSCvx61012 Release no. TBD
CVE-2020-24588 CSCvx61012 Release no. TBD
CVE-2020-26139 CSCvx61012 Release no. TBD
CVE-2020-26140 CSCvx61012 Release no. TBD
CVE-2020-26141 CSCvx61012 Release no. TBD
CVE-2020-26142 CSCvx61012 Release no. TBD
CVE-2020-26143 CSCvx61012 Release no. TBD
CVE-2020-26144 CSCvx61012 Release no. TBD
CVE-2020-26145 CSCvx61012 Release no. TBD
CVE-2020-26146 CSCvx61012 Release no. TBD
CVE-2020-26147 CSCvx61012 Release no. TBD
Webex Desk Series and Webex Room Series
CVE-2020-24586 CSCvx61005 Release no. TBD
CVE-2020-24587 CSCvx61005 Release no. TBD
CVE-2020-24588 CSCvx61005 Release no. TBD
CVE-2020-26139 CSCvx61005 Release no. TBD
CVE-2020-26140 CSCvx61005 Release no. TBD
CVE-2020-26141 CSCvx61005 Release no. TBD
CVE-2020-26142 CSCvx61005 Release no. TBD
CVE-2020-26143 CSCvx61005 Release no. TBD
CVE-2020-26144 CSCvx61005 Release no. TBD
CVE-2020-26145 CSCvx61005 Release no. TBD
CVE-2020-26146 CSCvx61005 Release no. TBD
CVE-2020-26147 CSCvx61005 Release no. TBD
Webex Board Series
CVE-2020-24586 CSCvx61020 Release no. TBD
CVE-2020-24587 CSCvx61020 Release no. TBD
CVE-2020-24588 CSCvx61020 Release no. TBD
CVE-2020-26139 CSCvx61020 Release no. TBD
CVE-2020-26140 CSCvx61020 Release no. TBD
CVE-2020-26141 CSCvx61020 Release no. TBD
CVE-2020-26142 CSCvx61020 Release no. TBD
CVE-2020-26143 CSCvx61020 Release no. TBD
CVE-2020-26144 CSCvx61020 Release no. TBD
CVE-2020-26145 CSCvx61020 Release no. TBD
CVE-2020-26146 CSCvx61020 Release no. TBD
CVE-2020-26147 CSCvx61020 Release no. TBD
Webex Wireless Phone 840 and 860
CVE-2020-24586 CSCvx62886 Release no. TBD
CVE-2020-24587 CSCvx62886 Release no. TBD
CVE-2020-24588 CSCvx62886 Release no. TBD
CVE-2020-26139 CSCvx62886 Release no. TBD
CVE-2020-26140 CSCvx62886 Release no. TBD
CVE-2020-26141 CSCvx62886 Release no. TBD
CVE-2020-26142 CSCvx62886 Release no. TBD
CVE-2020-26143 CSCvx62886 Release no. TBD
CVE-2020-26144 CSCvx62886 Release no. TBD
CVE-2020-26145 CSCvx62886 Release no. TBD
CVE-2020-26146 CSCvx62886 Release no. TBD
CVE-2020-26147 CSCvx62886 Release no. TBD

Products Confirmed Not Vulnerable

Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.

Details

o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit another vulnerability. In
addition, a software release that is affected by one of the vulnerabilities
may not be affected by the other vulnerabilities.

For a description of the following vulnerabilities, see Fragment and Forge:
Breaking Wi-Fi Through Frame Aggregation and Fragmentation .

For additional information, see FragAttacks .

CVE-2020-26140: Accepting plaintext data frames in a protected network

Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2020-26143: Accepting fragmented plaintext data frames in a protected
network

Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2020-26144: Accepting plaintext A-MSDU frames that start with an
RFC1042 header with EtherType EAPOL (in an encrypted network)

Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2020-26145: Accepting plaintext broadcast fragments as full frames (in
an encrypted network)

Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2020-24586: Not clearing fragments from memory when (re)connecting to a
network

Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-24588: Accepting non-SPP A-MSDU frames

Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-26139: Forwarding EAPOL frames even though the sender is not yet
authenticated

Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVE-2020-26141: Not verifying the TKIP MIC of fragmented frames

Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-26142: Processing fragmented frames as full frames

Security Impact Rating (SIR): Medium
CVSS Base Score: 5.7
CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-24587: Reassembling fragments encrypted under different keys

Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-26146: Reassembling encrypted fragments with non-consecutive
packet numbers

Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2020-26147: Reassembling mixed encrypted/plaintext fragments

Security Impact Rating (SIR): Medium
CVSS Base Score: 4.8
CVSS Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Workarounds

o There are no workarounds that address these vulnerabilities.

Fixed Software

o For information about fixed software releases , consult the Cisco bugs
identified in the Vulnerable Products section of this advisory.

When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.

In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.

Exploitation and Public Announcements

o The Cisco Product Security Incident Response Team (PSIRT) is aware that
proof-of-concept exploit code is available for the vulnerabilities that are
described in this advisory.

The Cisco PSIRT is not aware of any malicious use of the vulnerabilities
that are described in this advisory.

Source

o These vulnerabilities were reported to Cisco by Dr. Mathy Vanhoef of New
York University Abu Dhabi. Cisco would like to thank Dr. Vanhoef for his
continued help and support during the handling of these vulnerabilities.

Cisco Security Vulnerability Policy

o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.

URL

o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu

Revision History

o +———+————————+————–+———+————-+
| Version | Description | Section | Status | Date |
+———+————————+————–+———+————-+
| 1.2 | Added additional | Vulnerable | Interim | 2021-MAY-14 |
| | affected products. | Products | | |
+———+————————+————–+———+————-+
| 1.1 | Updated affected | Vulnerable | Interim | 2021-MAY-11 |
| | Meraki MR products. | Products | | |
+———+————————+————–+———+————-+
| 1.0 | Initial public | – | Interim | 2021-MAY-11 |
| | release. | | | |
+———+————————+————–+———+————-+

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=YQyj
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1627.2 – UPDATE [Cisco] Cisco Products: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1627-2-update-cisco-cisco-products-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1627-2-update-cisco-cisco-products-multiple-vulnerabilities

ESB-2021.1658 – [Debian] postgresql-9.6: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1658
postgresql-9.6 security update
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: postgresql-9.6
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-32028 CVE-2021-32027

Reference: ESB-2021.1643

Original Bulletin:
https://www.debian.org/lts/security/2021/dla-2662

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ———————————————————————–
Debian LTS Advisory DLA-2662-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
May 15, 2021 https://wiki.debian.org/LTS
– – ———————————————————————–

Package : postgresql-9.6
Version : 9.6.22-0+deb9u1
CVE ID : CVE-2021-32027 CVE-2021-32028

Multiple security issues have been discovered in the PostgreSQL
database system, which could result in the execution of arbitrary
code or disclosure of memory content.

For Debian 9 stretch, these problems have been fixed in version
9.6.22-0+deb9u1.

We recommend that you upgrade your postgresql-9.6 packages.

For the detailed security status of postgresql-9.6 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/postgresql-9.6

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=jmF3
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=xzj5
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1658 – [Debian] postgresql-9.6: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1658-debian-postgresql-9-6-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1658-debian-postgresql-9-6-multiple-vulnerabilities

ESB-2021.1659 – [Debian] libimage-exiftool-perl: Execute arbitrary code/commands – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1659
libimage-exiftool-perl security update
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: libimage-exiftool-perl
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-22204

Reference: ESB-2021.1495

Original Bulletin:
https://www.debian.org/lts/security/2021/dla-2663

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ———————————————————————–
Debian LTS Advisory DLA-2663-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Utkarsh Gupta
May 16, 2021 https://wiki.debian.org/LTS
– – ———————————————————————–

Package : libimage-exiftool-perl
Version : 10.40-1+deb9u1
CVE ID : CVE-2021-22204
Debian Bug : 987505

A vulnerability was discovered in libimage-exiftool-perl, a library
and program to read and write meta information in multimedia files,
which may result in execution of arbitrary code if a malformed DjVu
file is processed.

For Debian 9 stretch, this problem has been fixed in version
10.40-1+deb9u1.

We recommend that you upgrade your libimage-exiftool-perl packages.

For the detailed security status of libimage-exiftool-perl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libimage-exiftool-perl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=zCiR
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=xfoS
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1659 – [Debian] libimage-exiftool-perl: Execute arbitrary code/commands – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1659-debian-libimage-exiftool-perl-execute-arbitrary-code-commands-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1659-debian-libimage-exiftool-perl-execute-arbitrary-code-commands-existing-account

ESB-2021.1660 – [Debian] jetty9: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1660
jetty9 security update
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: jetty9
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Increased Privileges — Existing Account
Cross-site Scripting — Remote with User Interaction
Access Confidential Data — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-27216 CVE-2019-10247 CVE-2019-10241
CVE-2018-12536 CVE-2017-9735

Reference: ASB-2021.0020
ASB-2021.0014
ESB-2021.0376
ESB-2020.4269

Original Bulletin:
https://www.debian.org/lts/security/2021/dla-2661

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– – ————————————————————————-
Debian LTS Advisory DLA-2661-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sylvain Beucler
May 14, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : jetty9
Version : 9.2.30-0+deb9u1
CVE ID : CVE-2017-9735 CVE-2018-12536 CVE-2019-10241 CVE-2019-10247
CVE-2020-27216
Debian Bug : 864898 902774 928444

Several vulnerabilities were discovered in jetty, a Java servlet
engine and webserver. An attacker may reveal cryptographic credentials
such as passwords to a local user, disclose installation paths, hijack
user sessions or tamper with collocated webapps.

CVE-2017-9735

Jetty is prone to a timing channel in util/security/Password.java,
which makes it easier for remote attackers to obtain access by
observing elapsed times before rejection of incorrect passwords.

CVE-2018-12536

On webapps deployed using default Error Handling, when an
intentionally bad query arrives that doesn’t match a dynamic
url-pattern, and is eventually handled by the DefaultServlet’s
static file serving, the bad characters can trigger a
java.nio.file.InvalidPathException which includes the full path to
the base resource directory that the DefaultServlet and/or webapp
is using. If this InvalidPathException is then handled by the
default Error Handler, the InvalidPathException message is
included in the error response, revealing the full server path to
the requesting system.

CVE-2019-10241

The server is vulnerable to XSS conditions if a remote client USES
a specially formatted URL against the DefaultServlet or
ResourceHandler that is configured for showing a Listing of
directory contents.

CVE-2019-10247

The server running on any OS and Jetty version combination will
reveal the configured fully qualified directory base resource
location on the output of the 404 error for not finding a Context
that matches the requested path. The default server behavior on
jetty-distribution and jetty-home will include at the end of the
Handler tree a DefaultHandler, which is responsible for reporting
this 404 error, it presents the various configured contexts as
HTML for users to click through to. This produced HTML includes
output that contains the configured fully qualified directory base
resource location for each context.

CVE-2020-27216

On Unix like systems, the system’s temporary directory is shared
between all users on that system. A collocated user can observe
the process of creating a temporary sub directory in the shared
temporary directory and race to complete the creation of the
temporary subdirectory. If the attacker wins the race then they
will have read and write permission to the subdirectory used to
unpack web applications, including their WEB-INF/lib jar files and
JSP files. If any code is ever executed out of this temporary
directory, this can lead to a local privilege escalation
vulnerability.

This update also includes several other bug fixes and
improvements. For more information please refer to the upstream
changelog file.

For Debian 9 stretch, these problems have been fixed in version
9.2.30-0+deb9u1.

We recommend that you upgrade your jetty9 packages.

For the detailed security status of jetty9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/jetty9

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=EFdP
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=NoKD
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1660 – [Debian] jetty9: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1660-debian-jetty9-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1660-debian-jetty9-multiple-vulnerabilities

ESB-2021.1661 – [SUSE] lz4: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1661
Security update for lz4
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: lz4
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3520 CVE-2019-17543

Reference: ESB-2021.1637

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211613-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for lz4

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1613-1
Rating: important
References: #1153936 #1185438
Cross-References: CVE-2019-17543 CVE-2021-3520
Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for lz4 fixes the following issues:

o CVE-2021-3520: Fixed memory corruption due to an integer overflow bug
caused by memmove argument (bsc#1185438).
o CVE-2019-17543: Fixed heap-based buffer overflow in LZ4_write32 (bsc#
1153936).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-1613=1

Package List:

o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
liblz4-1-1.8.0-3.3.1
liblz4-1-debuginfo-1.8.0-3.3.1
lz4-debuginfo-1.8.0-3.3.1
lz4-debugsource-1.8.0-3.3.1

References:

o https://www.suse.com/security/cve/CVE-2019-17543.html
o https://www.suse.com/security/cve/CVE-2021-3520.html
o https://bugzilla.suse.com/1153936
o https://bugzilla.suse.com/1185438

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=AZJT
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1661 – [SUSE] lz4: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1661-suse-lz4-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1661-suse-lz4-multiple-vulnerabilities

ESB-2021.1662 – [SUSE] ibsim: Reduced security – Unknown/unspecified

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1662
Security update for ibsim
17 May 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: ibsim
Publisher: SUSE
Operating System: SUSE
Impact/Access: Reduced Security — Unknown/Unspecified
Resolution: Patch/Upgrade

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211606-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for ibsim

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1606-1
Rating: low
References: #1184123
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP2
______________________________________________________________________________

An update that contains security fixes can now be installed.

Description:

This update for ibsim fixes the following issues:

o Hardening: link as position independent executable (bsc#1184123).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Module for Server Applications 15-SP2:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-1606=1

Package List:

o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64
ppc64le s390x x86_64):
ibsim-0.8-3.3.1
ibsim-debuginfo-0.8-3.3.1
ibsim-debugsource-0.8-3.3.1

References:

o https://bugzilla.suse.com/1184123

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=xw2V
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1662 – [SUSE] ibsim: Reduced security – Unknown/unspecified appeared first on Malware Devil.



https://malwaredevil.com/2021/05/17/esb-2021-1662-suse-ibsim-reduced-security-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1662-suse-ibsim-reduced-security-unknown-unspecified

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...