Tuesday, June 1, 2021

Cobalt Strike, a penetration testing tool abused by criminals

If you were to compose a list of tools and software developed by security and privacy defenders that ended up being abused by the bad guys, then Cobalt Strike would unfortunately be near the top of the list. Maybe only Metasploit could give it a run for the first place ranking.

Metasploit—probably the best known project for penetration testing—is an exploit framework, designed to make it easy for someone to launch an exploit against a particular vulnerable target. Metasploit is notorious for being abused, yet modules are still being developed for it so that it continues to evolve. Cobalt Strike is in the same basket. Cobalt Strike offers a post-exploitation agent and covert channels, intended to emulate a quiet long-term embedded actor in the target’s network.

What is Cobalt Strike?

Cobalt Strike is a collection of threat emulation tools provided by HelpSystems to work in conjunction with the Metasploit Framework. Cobalt Strike, and other penetration testing tools, were originally created for network defenders to train them to understand vulnerabilities and possible avenues of infection by cyber criminals. These tools are meant to simulate intrusions by motivated actors, and they have proven to be very good at this. So, while “white hat” hackers were developing tools to more easily emulate “black hat” activities, few considered how these tools might be turned against someone. (The terms “white hat” and “black hat” are also falling out of favor, as cybersecurity professionals adopt “red team” and “blue team” descriptors to describe offensive and defensive security teams.)

Establishing a foothold

Lately, we have seen targeted attacks by both state-sponsored threat actors and ransomware peddlers. What we mainly see in the ransomware field is an increasing amount of manual infections. For example, by using brute force methods and exploiting vulnerabilities to break into networks. We have seen a significant uptick in these methods in 2020 and beyond. As a follow-up to these more manual types of attacks, as opposed to spray-and-pray phishing attacks, we are seeing threat actors who have compromised a server, loading tools like Cobalt Strike Beacon onto the system. Cobalt Strike Beacon provides encrypted communication with the C&C server to send information and receive commands. Those commands can include instructions to download malware. After doing this, they can use Cobalt Strike to map out the network and identify any vulnerabilities as well as deploy implants, backdoors, and other tools to accomplish lateral movement eventually leading to complete network infection.

Building out grip on the compromised network

So how this usually goes, is an infection occurs, be it phishing, manual breaches by brute forcing a port, or even an exploit. Once an endpoint has been compromised, the actor looks to compromise a server on the network. There are numerous ways to accomplish this, in fact last year we saw the ZeroLogon vulnerability used against domain admin servers, which essentially gave full admin rights to a criminal within seconds! Once the server is infected, Cobalt Strike is installed and it’s at this point, that more advanced network monitoring, vulnerability identification and a bunch of other advanced features, become available to the criminal. Now armed with more capabilities, the attacker can more quickly and completely compromise endpoints across the network, eventually launching ransomware, sometimes after all the juicy data saved on the network has been collected and exfiltrated.

Cobalt Strike is pricey

New Cobalt Strike licenses cost $3,500 per user for a one year license. License renewals cost $2,585 per user, per year. But why would a cybercriminal worry about such costs? Criminals who are using these tools do not just buy them from the vendors anyway. In many cases, leaked and older versions of Cobalt Strike are being used and in some cases, sophisticated threat actors, e.g. the group behind Trickbot, are building their own versions of Cobalt Strike, modified for their special needs and purposes.

The dilemma

This whole situation creates a strange moral grey area when you consider that tools developed by the good guys as a method of defense against the bad guys, are now being used by the bad guys to infect the customers of the good guys. There is a fair amount of discussion among security professionals whether or not it is a good idea to continue the free and unregulated development and release of these penetration testing tools. Especially when some of them are almost indistinguishable from actual black hat tools. As well as a lot of finger pointing about whose responsibility it is to make sure these tools aren’t used for crime. But also how could we do that, or is it already too late?

The need for pen-testing

While we can see why major corporations deploy red teams to perform penetration testing, we also wonder whether it is right to develop the malware for the threat actors. One could argue that using the latest and newest actual forms of malware should be adequate to test whether your defenses are up to par.

As it stands now, we have ended up with a situation where there are paid, dedicated researchers who spend all day working on new tools for penetration testing and intrusion. Which may very well end up being used by the criminals themselves. There are likely far less, if any, full time malware tool developers who have the resources, time, and experience to create something of the same magnitude. So at the end of the day, the weapons created by the white and grey hats, may be causing more harm than good in the long run because of a lack of control.

The problem it causes

Pen-testing is limited to the companies that can afford it and feel the need to do it. By using it they are not only adding to their own protection, which is their prerogative, but as a side-effect they are enabling the development of more advanced penetration software.

Combine that with an industry where some penetration testers prefer the situation where organizations are unable to defend themselves against these tools because it creates more business for penetration testing companies if they can’t defend themselves effectively. If you pass the test every time with flying colors, you will start to doubt the effectiveness of said test.

This is the problem we currently have with penetration tools being hijacked by criminals. The organizations that employ penetration testers are involuntary enablers, who are protected from this threat while also being the main drivers of development and providers of resources. On the other side of the spectrum there are those who aren’t aware of the threat, and will be the biggest victims once these tools fall into the hands of criminals.

As long as the consultants build new, more powerful tools, and don’t pay attention where the outdated and discarded tools end up, your neighbor can end up under attack by the tools you paid to develop. You are probably safe from the attack, but dozens of others, many in industries who can’t afford a consultant to test their security, are not safe, and in fact, are at a greater risk than before you brought in your consultant.

The post Cobalt Strike, a penetration testing tool abused by criminals appeared first on Malwarebytes Labs.

The post Cobalt Strike, a penetration testing tool abused by criminals appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/cobalt-strike-a-penetration-testing-tool-abused-by-criminals/?utm_source=rss&utm_medium=rss&utm_campaign=cobalt-strike-a-penetration-testing-tool-abused-by-criminals

2021-05-26 – Pcap only: Trickbot infection with Cobalt Strike

The post 2021-05-26 – Pcap only: Trickbot infection with Cobalt Strike appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/2021-05-26-pcap-only-trickbot-infection-with-cobalt-strike/?utm_source=rss&utm_medium=rss&utm_campaign=2021-05-26-pcap-only-trickbot-infection-with-cobalt-strike

2021-05-27 – IcedID (Bokbot) from Stolen Images Evidence.zip

The post 2021-05-27 – IcedID (Bokbot) from Stolen Images Evidence.zip appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/2021-05-27-icedid-bokbot-from-stolen-images-evidence-zip/?utm_source=rss&utm_medium=rss&utm_campaign=2021-05-27-icedid-bokbot-from-stolen-images-evidence-zip

2021-06-01 – Hancitor infection with Cobalt Strike and netping tool activity

The post 2021-06-01 – Hancitor infection with Cobalt Strike and netping tool activity appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/2021-06-01-hancitor-infection-with-cobalt-strike-and-netping-tool-activity/?utm_source=rss&utm_medium=rss&utm_campaign=2021-06-01-hancitor-infection-with-cobalt-strike-and-netping-tool-activity

QueryNet: An Efficient Attack Framework with Surrogates Carrying Multiple Identities

Read More

The post QueryNet: An Efficient Attack Framework with Surrogates Carrying Multiple Identities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/querynet-an-efficient-attack-framework-with-surrogates-carrying-multiple-identities-2/?utm_source=rss&utm_medium=rss&utm_campaign=querynet-an-efficient-attack-framework-with-surrogates-carrying-multiple-identities-2

ESB-2021.1866 – [RedHat] OpenShift Container Platform 4.7.13: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1866
OpenShift Container Platform 4.7.13 bug fix and security update
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: OpenShift Container Platform 4.7.13
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Increased Privileges — Existing Account
Denial of Service — Remote/Unauthenticated
Access Confidential Data — Remote/Unauthenticated
Provide Misleading Information — Existing Account
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-30465 CVE-2021-25215 CVE-2021-23336
CVE-2021-21645 CVE-2021-21644 CVE-2021-21643
CVE-2021-21642 CVE-2021-3326 CVE-2021-3177
CVE-2021-3121 CVE-2021-0342 CVE-2020-36322
CVE-2020-36242 CVE-2020-35508 CVE-2020-29363
CVE-2020-29362 CVE-2020-29361 CVE-2020-28974
CVE-2020-28935 CVE-2020-28196 CVE-2020-27835
CVE-2020-27786 CVE-2020-27783 CVE-2020-27619
CVE-2020-27618 CVE-2020-26137 CVE-2020-26116
CVE-2020-25712 CVE-2020-25704 CVE-2020-25659
CVE-2020-25643 CVE-2020-25285 CVE-2020-25284
CVE-2020-25212 CVE-2020-24977 CVE-2020-24394
CVE-2020-24332 CVE-2020-24331 CVE-2020-24330
CVE-2020-16845 CVE-2020-15586 CVE-2020-15437
CVE-2020-15358 CVE-2020-14363 CVE-2020-14362
CVE-2020-14361 CVE-2020-14360 CVE-2020-14356
CVE-2020-14347 CVE-2020-14346 CVE-2020-14345
CVE-2020-14344 CVE-2020-14314 CVE-2020-13776
CVE-2020-13584 CVE-2020-13543 CVE-2020-13434
CVE-2020-12464 CVE-2020-12362 CVE-2020-12114
CVE-2020-11608 CVE-2020-10878 CVE-2020-10543
CVE-2020-9983 CVE-2020-9951 CVE-2020-9948
CVE-2020-8927 CVE-2020-8286 CVE-2020-8285
CVE-2020-8284 CVE-2020-8231 CVE-2020-0431
CVE-2019-25042 CVE-2019-25041 CVE-2019-25040
CVE-2019-25039 CVE-2019-25038 CVE-2019-25037
CVE-2019-25036 CVE-2019-25035 CVE-2019-25034
CVE-2019-25032 CVE-2019-25013 CVE-2019-19528
CVE-2019-19523 CVE-2019-18811 CVE-2019-14866
CVE-2019-13012 CVE-2019-9169 CVE-2019-3842
CVE-2019-2708 CVE-2016-10228

Reference: ASB-2020.0179
ESB-2021.1863
ESB-2021.1862
ESB-2021.1857
ESB-2021.1842
ESB-2021.1841
ESB-2021.1827
ESB-2021.1823
ESB-2021.1820
ESB-2021.1799

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2121

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.7.13 bug fix and security update
Advisory ID: RHSA-2021:2121-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2121
Issue date: 2021-06-01
CVE Names: CVE-2016-10228 CVE-2019-2708 CVE-2019-3842
CVE-2019-9169 CVE-2019-13012 CVE-2019-14866
CVE-2019-18811 CVE-2019-19523 CVE-2019-19528
CVE-2019-25013 CVE-2019-25032 CVE-2019-25034
CVE-2019-25035 CVE-2019-25036 CVE-2019-25037
CVE-2019-25038 CVE-2019-25039 CVE-2019-25040
CVE-2019-25041 CVE-2019-25042 CVE-2020-0431
CVE-2020-8231 CVE-2020-8284 CVE-2020-8285
CVE-2020-8286 CVE-2020-8927 CVE-2020-9948
CVE-2020-9951 CVE-2020-9983 CVE-2020-10543
CVE-2020-10878 CVE-2020-11608 CVE-2020-12114
CVE-2020-12362 CVE-2020-12464 CVE-2020-13434
CVE-2020-13543 CVE-2020-13584 CVE-2020-13776
CVE-2020-14314 CVE-2020-14344 CVE-2020-14345
CVE-2020-14346 CVE-2020-14347 CVE-2020-14356
CVE-2020-14360 CVE-2020-14361 CVE-2020-14362
CVE-2020-14363 CVE-2020-15358 CVE-2020-15437
CVE-2020-15586 CVE-2020-16845 CVE-2020-24330
CVE-2020-24331 CVE-2020-24332 CVE-2020-24394
CVE-2020-24977 CVE-2020-25212 CVE-2020-25284
CVE-2020-25285 CVE-2020-25643 CVE-2020-25659
CVE-2020-25704 CVE-2020-25712 CVE-2020-26116
CVE-2020-26137 CVE-2020-27618 CVE-2020-27619
CVE-2020-27783 CVE-2020-27786 CVE-2020-27835
CVE-2020-28196 CVE-2020-28935 CVE-2020-28974
CVE-2020-29361 CVE-2020-29362 CVE-2020-29363
CVE-2020-35508 CVE-2020-36242 CVE-2020-36322
CVE-2021-0342 CVE-2021-3121 CVE-2021-3177
CVE-2021-3326 CVE-2021-21642 CVE-2021-21643
CVE-2021-21644 CVE-2021-21645 CVE-2021-23336
CVE-2021-25215 CVE-2021-30465
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.7.13 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Red Hat OpenShift Container
Platform 4.7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.13. See the following advisory for the RPM packages for this
release:

https://access.redhat.com/errata/RHSA-2021:2122

Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

This update fixes the following bug among others:

* Previously, resources for the ClusterOperator were being created early in
the update process, which led to update failures when the ClusterOperator
had no status condition while Operators were updating. This bug fix changes
the timing of when these resources are created. As a result, updates can
take place without errors. (BZ#1959238)

Security Fix(es):

* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64

The image digest is
sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4

(For s390x architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.13-s390x

The image digest is
sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd

(For ppc64le architecture)

$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le

The image digest is
sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36

All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
– – -between-minor.html#understanding-upgrade-channels_updating-cluster-between
– – -minor

3. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
– – -cli.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1921650 – CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1923268 – [Assisted-4.7] [Staging] Using two both spelling “canceled” “cancelled”
1947216 – [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go
1953963 – Enable/Disable host operations returns cluster resource with incomplete hosts list
1957749 – ovn-kubernetes pod should have CPU and memory requests set but not limits
1959238 – CVO creating cloud-controller-manager too early causing upgrade failures
1960103 – SR-IOV obliviously reboot the node
1961941 – Local Storage Operator using LocalVolume CR fails to create PV’s when backend storage failure is simulated
1962302 – packageserver clusteroperator does not set reason or message for Available condition
1962312 – Deployment considered unhealthy despite being available and at latest generation
1962435 – Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone
1963115 – Test verify /run filesystem contents failing

5. References:

https://access.redhat.com/security/cve/CVE-2016-10228
https://access.redhat.com/security/cve/CVE-2019-2708
https://access.redhat.com/security/cve/CVE-2019-3842
https://access.redhat.com/security/cve/CVE-2019-9169
https://access.redhat.com/security/cve/CVE-2019-13012
https://access.redhat.com/security/cve/CVE-2019-14866
https://access.redhat.com/security/cve/CVE-2019-18811
https://access.redhat.com/security/cve/CVE-2019-19523
https://access.redhat.com/security/cve/CVE-2019-19528
https://access.redhat.com/security/cve/CVE-2019-25013
https://access.redhat.com/security/cve/CVE-2019-25032
https://access.redhat.com/security/cve/CVE-2019-25034
https://access.redhat.com/security/cve/CVE-2019-25035
https://access.redhat.com/security/cve/CVE-2019-25036
https://access.redhat.com/security/cve/CVE-2019-25037
https://access.redhat.com/security/cve/CVE-2019-25038
https://access.redhat.com/security/cve/CVE-2019-25039
https://access.redhat.com/security/cve/CVE-2019-25040
https://access.redhat.com/security/cve/CVE-2019-25041
https://access.redhat.com/security/cve/CVE-2019-25042
https://access.redhat.com/security/cve/CVE-2020-0431
https://access.redhat.com/security/cve/CVE-2020-8231
https://access.redhat.com/security/cve/CVE-2020-8284
https://access.redhat.com/security/cve/CVE-2020-8285
https://access.redhat.com/security/cve/CVE-2020-8286
https://access.redhat.com/security/cve/CVE-2020-8927
https://access.redhat.com/security/cve/CVE-2020-9948
https://access.redhat.com/security/cve/CVE-2020-9951
https://access.redhat.com/security/cve/CVE-2020-9983
https://access.redhat.com/security/cve/CVE-2020-10543
https://access.redhat.com/security/cve/CVE-2020-10878
https://access.redhat.com/security/cve/CVE-2020-11608
https://access.redhat.com/security/cve/CVE-2020-12114
https://access.redhat.com/security/cve/CVE-2020-12362
https://access.redhat.com/security/cve/CVE-2020-12464
https://access.redhat.com/security/cve/CVE-2020-13434
https://access.redhat.com/security/cve/CVE-2020-13543
https://access.redhat.com/security/cve/CVE-2020-13584
https://access.redhat.com/security/cve/CVE-2020-13776
https://access.redhat.com/security/cve/CVE-2020-14314
https://access.redhat.com/security/cve/CVE-2020-14344
https://access.redhat.com/security/cve/CVE-2020-14345
https://access.redhat.com/security/cve/CVE-2020-14346
https://access.redhat.com/security/cve/CVE-2020-14347
https://access.redhat.com/security/cve/CVE-2020-14356
https://access.redhat.com/security/cve/CVE-2020-14360
https://access.redhat.com/security/cve/CVE-2020-14361
https://access.redhat.com/security/cve/CVE-2020-14362
https://access.redhat.com/security/cve/CVE-2020-14363
https://access.redhat.com/security/cve/CVE-2020-15358
https://access.redhat.com/security/cve/CVE-2020-15437
https://access.redhat.com/security/cve/CVE-2020-15586
https://access.redhat.com/security/cve/CVE-2020-16845
https://access.redhat.com/security/cve/CVE-2020-24330
https://access.redhat.com/security/cve/CVE-2020-24331
https://access.redhat.com/security/cve/CVE-2020-24332
https://access.redhat.com/security/cve/CVE-2020-24394
https://access.redhat.com/security/cve/CVE-2020-24977
https://access.redhat.com/security/cve/CVE-2020-25212
https://access.redhat.com/security/cve/CVE-2020-25284
https://access.redhat.com/security/cve/CVE-2020-25285
https://access.redhat.com/security/cve/CVE-2020-25643
https://access.redhat.com/security/cve/CVE-2020-25659
https://access.redhat.com/security/cve/CVE-2020-25704
https://access.redhat.com/security/cve/CVE-2020-25712
https://access.redhat.com/security/cve/CVE-2020-26116
https://access.redhat.com/security/cve/CVE-2020-26137
https://access.redhat.com/security/cve/CVE-2020-27618
https://access.redhat.com/security/cve/CVE-2020-27619
https://access.redhat.com/security/cve/CVE-2020-27783
https://access.redhat.com/security/cve/CVE-2020-27786
https://access.redhat.com/security/cve/CVE-2020-27835
https://access.redhat.com/security/cve/CVE-2020-28196
https://access.redhat.com/security/cve/CVE-2020-28935
https://access.redhat.com/security/cve/CVE-2020-28974
https://access.redhat.com/security/cve/CVE-2020-29361
https://access.redhat.com/security/cve/CVE-2020-29362
https://access.redhat.com/security/cve/CVE-2020-29363
https://access.redhat.com/security/cve/CVE-2020-35508
https://access.redhat.com/security/cve/CVE-2020-36242
https://access.redhat.com/security/cve/CVE-2020-36322
https://access.redhat.com/security/cve/CVE-2021-0342
https://access.redhat.com/security/cve/CVE-2021-3121
https://access.redhat.com/security/cve/CVE-2021-3177
https://access.redhat.com/security/cve/CVE-2021-3326
https://access.redhat.com/security/cve/CVE-2021-21642
https://access.redhat.com/security/cve/CVE-2021-21643
https://access.redhat.com/security/cve/CVE-2021-21644
https://access.redhat.com/security/cve/CVE-2021-21645
https://access.redhat.com/security/cve/CVE-2021-23336
https://access.redhat.com/security/cve/CVE-2021-25215
https://access.redhat.com/security/cve/CVE-2021-30465
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBYLXBgdzjgjWX9erEAQiYKw/+MeUvVzbi9kHuo6vE8J9xEQCvgpJtLfRM
yj4VFCt8lkWmfGmuAMd5LkvD5suav1Gu9yA6E60VvKrorV6+PDOZ8jiUyzRR+di6
TZZ7Ji6taqaQUuf451KF39zuxYAh29pKT6mZMhmqK65jEg7uj66R8+P2p7tahaai
Kkqe6LKxNCXyVzWmc5HHkc3AJJ6vSVIuMeA6KOHpXy0vy57jZKeyb3dau0BVl/ir
ZbnbOHdTJ+7hEVV3yGwARcVgUhHDcHiSYAS+RUj7Hqx0RIFilb9RbOdoEdbauaWx
CGIdSYmj1F4apCZuYWmhZxtQ5/Lsj7EPi+7UleyTzqgMQsqSr8kvxGe/yzfY+yAQ
++QCSnleeKu/+HjN72d73h8yWGGzMrc/rYwDJWcFwjIL6/pj4Tgm4OK30vJlQUz5
3gHuEDz+j42s270cv6dRDd9v5xpexxIOXyHzruFRLk4xVCnS17PGeJ4I9mJmkYxL
5GuCiMnixToobWtmrh9MX2Qjkhj81o4E+rLMvG/4yUk2kGejo/nLwgZNsSz8gN5Z
gMZOYSDys2zJu6/jmxY/8MXzS3yNIJj3FxXe7w5XA0mHUuuZ/EaJsMLnlCCSRARV
GpMwj1/Aj1ZSNeYplr2YwQz7lB7hp+J/vn567zBPeYQus5EAyzqzudTbSLdm8ZyL
PEh85hYKLe4=
=Xe05
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=K0hp
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1866 – [RedHat] OpenShift Container Platform 4.7.13: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1866-redhat-openshift-container-platform-4-7-13-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1866-redhat-openshift-container-platform-4-7-13-multiple-vulnerabilities

ESB-2021.1863 – [RedHat] OpenShift Container Platform 4.7.13: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1863
OpenShift Container Platform 4.7.13 packages and security update
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: OpenShift Container Platform 4.7.13
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Denial of Service — Remote/Unauthenticated
Access Privileged Data — Existing Account
Cross-site Request Forgery — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21645 CVE-2021-21644 CVE-2021-21643
CVE-2021-21642 CVE-2020-16845 CVE-2020-15586

Reference: ESB-2021.1754
ESB-2021.1516
ESB-2021.1368

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2122

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.7.13 packages and security update
Advisory ID: RHSA-2021:2122-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2122
Issue date: 2021-06-01
CVE Names: CVE-2020-15586 CVE-2020-16845 CVE-2021-21642
CVE-2021-21643 CVE-2021-21644 CVE-2021-21645
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.7.13 is now available with
updates to packages and images that fix several bugs.

This release includes a security update for Red Hat OpenShift Container
Platform 4.7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift Container Platform 4.7 – noarch, ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.7.13. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2021:2121

Security Fix(es):

* jenkins-2-plugins/config-file-provider: Does not configure its XML parser
to prevent XML external entity (XXE) attacks. (CVE-2021-21642)

* golang: data race in certain net/http servers including ReverseProxy can
lead to DoS (CVE-2020-15586)

* golang: ReadUvarint and ReadVarint can read an unlimited number of bytes
from invalid inputs (CVE-2020-16845)

* jenkins-2-plugins/config-file-provider: Does not correctly perform
permission checks in several HTTP endpoints. (CVE-2021-21643)

* jenkins-2-plugins/config-file-provider: does not require POST requests
for an HTTP endpoint, resulting in a cross-site request forgery (CSRF)
vulnerability. (CVE-2021-21644)

* jenkins-2-plugins/config-file-provider: Does not perform permission
checks in several HTTP endpoints. (CVE-2021-21645)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.7 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
– – -between-minor.html#understanding-upgrade-channels_updating-cluster-between
– – -minor

4. Solution:

For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html

Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
– – -cli.html

5. Bugs fixed (https://bugzilla.redhat.com/):

1856953 – CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS
1867099 – CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
1952146 – CVE-2021-21642 jenkins-2-plugins/config-file-provider: Does not configure its XML parser to prevent XML external entity (XXE) attacks.
1952148 – CVE-2021-21643 jenkins-2-plugins/config-file-provider: Does not correctly perform permission checks in several HTTP endpoints.
1952151 – CVE-2021-21644 jenkins-2-plugins/config-file-provider: does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
1952152 – CVE-2021-21645 jenkins-2-plugins/config-file-provider: Does not perform permission checks in several HTTP endpoints.
1964770 – Placeholder bug for OCP 4.7.0 rpm release

6. Package List:

Red Hat OpenShift Container Platform 4.7:

Source:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el7.src.rpm
cri-tools-1.20.0-3.el7.src.rpm

x86_64:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64.rpm
cri-o-debuginfo-1.20.2-12.rhaos4.7.git9f7be76.el7.x86_64.rpm
cri-tools-1.20.0-3.el7.x86_64.rpm
cri-tools-debuginfo-1.20.0-3.el7.x86_64.rpm

Red Hat OpenShift Container Platform 4.7:

Source:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el8.src.rpm
jenkins-2-plugins-4.7.1621361158-1.el8.src.rpm
redhat-release-coreos-47.83-2.el8.src.rpm

noarch:
jenkins-2-plugins-4.7.1621361158-1.el8.noarch.rpm

ppc64le:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le.rpm
cri-o-debuginfo-1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le.rpm
cri-o-debugsource-1.20.2-12.rhaos4.7.git9f7be76.el8.ppc64le.rpm
redhat-release-coreos-47.83-2.el8.ppc64le.rpm

s390x:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el8.s390x.rpm
cri-o-debuginfo-1.20.2-12.rhaos4.7.git9f7be76.el8.s390x.rpm
cri-o-debugsource-1.20.2-12.rhaos4.7.git9f7be76.el8.s390x.rpm
redhat-release-coreos-47.83-2.el8.s390x.rpm

x86_64:
cri-o-1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64.rpm
cri-o-debuginfo-1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64.rpm
cri-o-debugsource-1.20.2-12.rhaos4.7.git9f7be76.el8.x86_64.rpm
redhat-release-coreos-47.83-2.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-15586
https://access.redhat.com/security/cve/CVE-2020-16845
https://access.redhat.com/security/cve/CVE-2021-21642
https://access.redhat.com/security/cve/CVE-2021-21643
https://access.redhat.com/security/cve/CVE-2021-21644
https://access.redhat.com/security/cve/CVE-2021-21645
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBYLWzZtzjgjWX9erEAQi4qw//cXkmYeuY61O0BZNBi234IsuqpeNuqXpG
dOUDhzXWu0f7U9SsZDWqiZpRAg2dEL46pOOwpF0e3f9es+gtFnZeLEf0V1AQc+jF
JM+tvX6j786+NTvxFuZdAIpxw1PbvqlpeIEWjA7oCzRKXHcqd2k6NKMGxDnizDTP
LNE8pgqPZAFnDQpsi8SpL8E3CivgY6qM3HfagF/JeosSsDUFHwWhl1Pb8AM0Mth+
7fEhp7PQ9T4yLwBU9xbw3uO80IGaLU/W4AV2OPmsEA6JQRNd541c3UDQn6V+CMV8
7i64io7WGqdMIEkQ1wl+nnNB/o6degDOMBsmef9jc4a7t9fujtYUTSvFPCUfM9a3
orNE3r+VRe3p+Col+KZlkgsZ4eEh8pdOHd2qpfeNrUP+uWbdBiRhJf4jKSe5Ve0Z
Oz7CqRqGq5vSAb9lPPxSkjx9rc8znwV74jotStjIFJZeOclbm4coJNU3f0tsZjMH
yG9kNzxatDeVquENRggA0bEnC9glU7CSSRW1OlYHYSWaLuUGmPncTd2gwOmQPG9+
4+eQ/mNZRvgomISBuCQx11kO6Q3y2h8iLeVkQXeH6CR6lwnMZrm1KGdiEukXyNYd
geQdVJnWM/JeEe4fu1hBNL0cptRq1keTgMdkxy6GeYJ+mmy2GZrzm1NbUtFMrKTO
ST04yfswt/Y=
=lrlD
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=wOY4
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1863 – [RedHat] OpenShift Container Platform 4.7.13: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1863-redhat-openshift-container-platform-4-7-13-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1863-redhat-openshift-container-platform-4-7-13-multiple-vulnerabilities

ESB-2021.1864 – [Ubuntu] LZ4: Multiple Vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1864
USN-4968-2: LZ4 vulnerability
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: LZ4
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3520

Reference: ESB-2021.1818
ESB-2021.1791

Original Bulletin:
https://ubuntu.com/security/notices/USN-4968-2

– ————————–BEGIN INCLUDED TEXT——————–

USN-4968-2: LZ4 vulnerability
31 May 2021

LZ4 could be made to crash or run programs if it opened a specially crafted
file.
Releases

o Ubuntu 16.04 ESM
o Ubuntu 14.04 ESM

Packages

o lz4 – Extremely fast compression algorithm

Details

USN-4968-1 fixed a vulnerability in LZ4. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

It was discovered that LZ4 incorrectly handled certain memory operations.
If a user or automated system were tricked into uncompressing a specially-
crafted LZ4 file, a remote attacker could use this issue to cause LZ4 to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 16.04

o liblz4-1 – 0.0~r131-2ubuntu2+esm1
Available with UA Infra or UA Desktop

Ubuntu 14.04

o liblz4-1 – 0.0~r114-2ubuntu1+esm2
Available with UA Infra or UA Desktop

In general, a standard system update will make all the necessary changes.

References

o CVE-2021-3520

Related notices

o USN-4968-1 : lz4, liblz4-tool, liblz4-dev, liblz4-1

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=Bs8F
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1864 – [Ubuntu] LZ4: Multiple Vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1864-ubuntu-lz4-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1864-ubuntu-lz4-multiple-vulnerabilities

ESB-2021.1865 – [SUSE] djvulibre: Denial of service – Remote with user interaction

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1865
Security update for djvulibre
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: djvulibre
Publisher: SUSE
Operating System: SUSE
Impact/Access: Denial of Service — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3500

Reference: ESB-2021.1860
ESB-2021.1822

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211813-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for djvulibre

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1813-1
Rating: important
References: #1186253
Cross-References: CVE-2021-3500
Affected Products:
SUSE OpenStack Cloud Crowbar 9
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud 8
SUSE Linux Enterprise Software Development Kit 12-SP5
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP2-BCL
HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for djvulibre fixes the following issues:

o CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file()
via crafted djvu file (bsc#1186253)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE OpenStack Cloud Crowbar 9:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-1813=1
o SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-1813=1
o SUSE OpenStack Cloud 9:
zypper in -t patch SUSE-OpenStack-Cloud-9-2021-1813=1
o SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2021-1813=1
o SUSE Linux Enterprise Software Development Kit 12-SP5:
zypper in -t patch SUSE-SLE-SDK-12-SP5-2021-1813=1
o SUSE Linux Enterprise Server for SAP 12-SP4:
zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-1813=1
o SUSE Linux Enterprise Server for SAP 12-SP3:
zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-1813=1
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-1813=1
o SUSE Linux Enterprise Server 12-SP4-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-1813=1
o SUSE Linux Enterprise Server 12-SP3-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-1813=1
o SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-1813=1
o SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-1813=1
o HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2021-1813=1

Package List:

o SUSE OpenStack Cloud Crowbar 9 (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE OpenStack Cloud Crowbar 8 (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE OpenStack Cloud 9 (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE OpenStack Cloud 8 (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le
s390x x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre-devel-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1
o HPE Helion Openstack 8 (x86_64):
djvulibre-debuginfo-3.5.25.3-5.12.1
djvulibre-debugsource-3.5.25.3-5.12.1
libdjvulibre21-3.5.25.3-5.12.1
libdjvulibre21-debuginfo-3.5.25.3-5.12.1

References:

o https://www.suse.com/security/cve/CVE-2021-3500.html
o https://bugzilla.suse.com/1186253

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=/dbr
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1865 – [SUSE] djvulibre: Denial of service – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1865-suse-djvulibre-denial-of-service-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1865-suse-djvulibre-denial-of-service-remote-with-user-interaction

ISC Stormcast For Tuesday, June 1st, 2021 https://isc.sans.edu/podcastdetail.html?id=7522, (Tue, Jun 1st)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Tuesday, June 1st, 2021 https://isc.sans.edu/podcastdetail.html?id=7522, (Tue, Jun 1st) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/isc-stormcast-for-tuesday-june-1st-2021-https-isc-sans-edu-podcastdetail-htmlid7522-tue-jun-1st/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-tuesday-june-1st-2021-https-isc-sans-edu-podcastdetail-htmlid7522-tue-jun-1st

ESB-2021.1857 – [RedHat] runc: Increased privileges – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1857
runc security update
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: runc
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Increased Privileges — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-30465

Reference: ESB-2021.1823

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2145

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: runc security update
Advisory ID: RHSA-2021:2145-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2145
Issue date: 2021-05-31
CVE Names: CVE-2021-30465
=====================================================================

1. Summary:

An update for runc is now available for Red Hat Enterprise Linux 7 Extras.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux 7 Extras – ppc64le, s390x, x86_64

3. Description:

The runC tool is a lightweight, portable implementation of the Open
Container Format (OCF) that provides container runtime.

Security Fix(es):

* runc: vulnerable to symlink exchange attack (CVE-2021-30465)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1954736 – CVE-2021-30465 runc: vulnerable to symlink exchange attack

6. Package List:

Red Hat Enterprise Linux 7 Extras:

Source:
runc-1.0.0-69.rc10.el7_9.src.rpm

ppc64le:
runc-1.0.0-69.rc10.el7_9.ppc64le.rpm
runc-debuginfo-1.0.0-69.rc10.el7_9.ppc64le.rpm

s390x:
runc-1.0.0-69.rc10.el7_9.s390x.rpm
runc-debuginfo-1.0.0-69.rc10.el7_9.s390x.rpm

x86_64:
runc-1.0.0-69.rc10.el7_9.x86_64.rpm
runc-debuginfo-1.0.0-69.rc10.el7_9.x86_64.rpm

Red Hat Enterprise Linux 7 Extras:

Source:
runc-1.0.0-69.rc10.el7_9.src.rpm

x86_64:
runc-1.0.0-69.rc10.el7_9.x86_64.rpm
runc-debuginfo-1.0.0-69.rc10.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-30465
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/RHSB-2021-004

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=C56E
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=bOAs
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1857 – [RedHat] runc: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1857-redhat-runc-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1857-redhat-runc-increased-privileges-existing-account

ESB-2021.1858 – [SUSE] python-httplib2: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1858
Security update for python-httplib2
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: python-httplib2
Publisher: SUSE
Operating System: SUSE
Impact/Access: Denial of Service — Remote/Unauthenticated
Provide Misleading Information — Remote/Unauthenticated
Reduced Security — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21240 CVE-2020-11078

Reference: ESB-2021.1832
ESB-2021.1825

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211808-1
https://www.suse.com/support/update/announcement/2021/suse-su-20211807-1
https://www.suse.com/support/update/announcement/2021/suse-su-20211806-1

Comment: This bulletin contains three (3) SUSE security advisories.

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for python-httplib2

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1806-1
Rating: moderate
References: #1171998 #1182053
Cross-References: CVE-2020-11078 CVE-2021-21240
Affected Products:
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for python-httplib2 fixes the following issues:

o Update to version 0.19.0 (bsc#1182053).
o CVE-2021-21240: Fixed regular expression denial of service via malicious
header (bsc#1182053).
o CVE-2020-11078: Fixed unescaped part of uri where an attacker could change
request headers and body (bsc#1182053).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP3-2021-1806=
1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-1806=
1
o SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-1806=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-1806=1

Package List:

o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (noarch):
python2-httplib2-0.19.0-3.3.1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (noarch):
python2-httplib2-0.19.0-3.3.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):
python3-httplib2-0.19.0-3.3.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
python3-httplib2-0.19.0-3.3.1

References:

o https://www.suse.com/security/cve/CVE-2020-11078.html
o https://www.suse.com/security/cve/CVE-2021-21240.html
o https://bugzilla.suse.com/1171998
o https://bugzilla.suse.com/1182053

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1807-1
Rating: moderate
References: #1171998 #1182053
Cross-References: CVE-2020-11078 CVE-2021-21240
Affected Products:
SUSE OpenStack Cloud 7
SUSE Linux Enterprise Module for Public Cloud 12
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for python-httplib2 contains the following fixes:
Security fixes included in this update:

o CVE-2021-21240: Fixed a regular expression denial of service via malicious
header (bsc#1182053).
o CVE-2020-11078: Fixed an issue where an attacker could change request
headers and body (bsc#1171998).

Non-security fixes included in this update:

o Update in SLE to 0.19.0 (bsc#1182053, CVE-2021-21240)

o update to 0.19.0: * auth: parse headers using pyparsing instead of regexp *
auth: WSSE token needs to be string not bytes

o update to 0.18.1: (bsc#1171998, CVE-2020-11078) * explicit build-backend
workaround for pip build isolation bug * IMPORTANT security vulnerability
CWE-93 CRLF injection Force %xx quote of space, CR, LF characters in uri. *
Ship test suite in source dist

o update to 0.17.3: * bugfixes

o Update to 0.17.1 * python3: no_proxy was not checked with https * feature:
Http().redirect_codes set, works after follow(_all)_redirects check This
allows one line workaround for old gcloud library that uses 308 response
without redirect semantics. * IMPORTANT cache invalidation change, fix 307
keep method, add 308 Redirects * proxy: username/password as str compatible
with pysocks * python2: regression in connect() error handling * add
support for password protected certificate files * feature: Http.close() to
clean persistent connections and sensitive data

o Update to 0.14.0: * Python3: PROXY_TYPE_SOCKS5 with str user/pass raised
TypeError

o version update to 0.13.1 0.13.1 * Python3: Use no_proxy https://github.com/
httplib2/httplib2/pull/140 0.13.0 * Allow setting TLS max/min versions
https://github.com/httplib2/httplib2/pull/138 0.12.3 * No changes to
library. Distribute py3 wheels. 0.12.1 * Catch socket timeouts and clear
dead connection https://github.com/httplib2/httplib2/issues/18 https://
github.com/httplib2/httplib2/pull/111 * Officially support Python 3.7
(package metadata) https://github.com/httplib2/httplib2/issues/123 0.12.0 *
Drop support for Python 3.3 * ca_certs from environment HTTPLIB2_CA_CERTS
or certifi https://github.com/httplib2/httplib2/pull/117 * PROXY_TYPE_HTTP
with non-empty user/pass raised TypeError: bytes required https://
github.com/httplib2/httplib2/pull/115 * Revert http:443->https workaround
https://github.com/httplib2/httplib2/issues/112 * eliminate connection pool
read race https://github.com/httplib2/httplib2/pull/110 * cache: stronger
safename https://github.com/httplib2/httplib2/pull/101 0.11.3 * No changes,
just reupload of 0.11.2 after fixing automatic release conditions in
Travis. 0.11.2 * proxy: py3 NameError basestring https://github.com/
httplib2/httplib2/pull/100 0.11.1 * Fix HTTP(S)ConnectionWithTimeout
AttributeError proxy_info https://github.com/httplib2/httplib2/pull/97
0.11.0 * Add DigiCert Global Root G2 serial
033af1e6a711a9a0bb2864b11d09fae5 https://github.com/httplib2/httplib2/pull/
91 * python3 proxy support https://github.com/httplib2/httplib2/pull/90 *
If no_proxy environment value ends with comma then proxy is not used https:
//github.com/httplib2/httplib2/issues/11 * fix UnicodeDecodeError using
socks5 proxy https://github.com/httplib2/httplib2/pull/64 * Respect
NO_PROXY env var in proxy_info_from_url https://github.com/httplib2/
httplib2/pull/58 * NO_PROXY=bar was matching foobar (suffix without dot
delimiter) New behavior matches curl/wget:
– no_proxy=foo.bar will only skip proxy for exact hostname match – no_proxy
=.wild.card will skip proxy for any.subdomains.wild.card

https://github.com/httplib2/httplib2/issues/94 * Bugfix for Content-Encoding:
deflate https://stackoverflow.com/a/22311297
deleted patches httplib2 started to use certifi and this is already bent to use
system certificate bundle.

o handle the case when validation is disabled correctly. The ‘check_hostname’
context attribute has to be set first, othewise a “ValueError: Cannot set
verify_mode to CERT_NONE when check_hostname is enabled.” exception is
raised.

o handle the case with ssl_version being None correctly

o Use ssl.create_default_context in the python2 case so that the system wide
certificates are loaded as trusted again.

o Source url must be https.

o Spec file cleanups

o Update to 0.10.3 * Fix certificate validation on Pythonhttps workaround
https://github.com/httplib2/httplib2/issues/112 * eliminate connection pool
read race https://github.com/httplib2/httplib2/pull/110 * cache: stronger
safename https://github.com/httplib2/httplib2/pull/101 0.11.3 * No changes,
just reupload of 0.11.2 after fixing automatic release conditions in
Travis. 0.11.2 * proxy: py3 NameError basestring https://github.com/
httplib2/httplib2/pull/100 0.11.1 * Fix HTTP(S)ConnectionWithTimeout
AttributeError proxy_info https://github.com/httplib2/httplib2/pull/97
0.11.0 * Add DigiCert Global Root G2 serial
033af1e6a711a9a0bb2864b11d09fae5 https://github.com/httplib2/httplib2/pull/
91 * python3 proxy support https://github.com/httplib2/httplib2/pull/90 *
If no_proxy environment value ends with comma then proxy is not used https:
//github.com/httplib2/httplib2/issues/11 * fix UnicodeDecodeError using
socks5 proxy https://github.com/httplib2/httplib2/pull/64 * Respect
NO_PROXY env var in proxy_info_from_url https://github.com/httplib2/
httplib2/pull/58 * NO_PROXY=bar was matching foobar (suffix without dot
delimiter) New behavior matches curl/wget:
– no_proxy=foo.bar will only skip proxy for exact hostname match – no_proxy
=.wild.card will skip proxy for any.subdomains.wild.card

https://github.com/httplib2/httplib2/issues/94 * Bugfix for Content-Encoding:
deflate https://stackoverflow.com/a/22311297
deleted patches – httplib2 started to use certifi and this is already bent to
use system certificate bundle

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-1808=1
o SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2021-1808=1
o HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2021-1808=1

Package List:

o SUSE OpenStack Cloud Crowbar 8 (noarch):
python-httplib2-0.19.0-7.3.1
o SUSE OpenStack Cloud 8 (noarch):
python-httplib2-0.19.0-7.3.1
o HPE Helion Openstack 8 (noarch):
python-httplib2-0.19.0-7.3.1

References:

o https://www.suse.com/security/cve/CVE-2020-11078.html
o https://www.suse.com/security/cve/CVE-2021-21240.html
o https://bugzilla.suse.com/1171998
o https://bugzilla.suse.com/1182053

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=i4/p
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1858 – [SUSE] python-httplib2: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1858-suse-python-httplib2-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1858-suse-python-httplib2-multiple-vulnerabilities

ESB-2021.1859 – [SUSE] curl: Access confidential data – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1859
Security update for curl
1 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: curl
Publisher: SUSE
Operating System: SUSE
Impact/Access: Access Confidential Data — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-22898 CVE-2021-22876

Reference: ESB-2021.1841
ESB-2021.1827

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211809-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for curl

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1809-1
Rating: moderate
References: #1177976 #1183933 #1186114
Cross-References: CVE-2021-22876 CVE-2021-22898
Affected Products:
SUSE Manager Server 4.0
SUSE Manager Retail Branch Server 4.0
SUSE Manager Proxy 4.0
SUSE Linux Enterprise Server for SAP 15-SP1
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server 15-SP1-LTSS
SUSE Linux Enterprise Server 15-SP1-BCL
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Enterprise Storage 6
SUSE CaaS Platform 4.0
______________________________________________________________________________

An update that solves two vulnerabilities, contains one feature and has one
errata is now available.

Description:

This update for curl fixes the following issues:

o CVE-2021-22876: Fixed an issue where the automatic referer was leaking
credentials (bsc#1183933).
o CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
o Fix for SFTP uploads when it results in empty uploaded files (bsc#1177976).
o Allow partial chain verification (jsc#SLE-17956).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Manager Server 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.0-2021-1809=1
o SUSE Manager Retail Branch Server 4.0:
zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.0-2021-1809=1
o SUSE Manager Proxy 4.0:
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.0-2021-1809=1
o SUSE Linux Enterprise Server for SAP 15-SP1:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2021-1809=1
o SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-1809=1
o SUSE Linux Enterprise Server 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2021-1809=1
o SUSE Linux Enterprise Server 15-SP1-BCL:
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2021-1809=1
o SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2021-1809=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2021-1809=1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2021-1809=1
o SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1809=1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1809=1
o SUSE Enterprise Storage 6:
zypper in -t patch SUSE-Storage-6-2021-1809=1
o SUSE CaaS Platform 4.0:
To install this update, use the SUSE CaaS Platform ‘skuba’ tool. I will
inform you if it detects new updates and let you then trigger updating of
the complete cluster in a controlled way.

Package List:

o SUSE Manager Server 4.0 (ppc64le s390x x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Manager Server 4.0 (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Manager Retail Branch Server 4.0 (x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Manager Proxy 4.0 (x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server for SAP 15-SP1 (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server for SAP 15 (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server 15-SP1-LTSS (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64
x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64
x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE Enterprise Storage 6 (aarch64 x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1
o SUSE Enterprise Storage 6 (x86_64):
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
o SUSE CaaS Platform 4.0 (x86_64):
curl-7.60.0-3.42.1
curl-debuginfo-7.60.0-3.42.1
curl-debugsource-7.60.0-3.42.1
libcurl-devel-7.60.0-3.42.1
libcurl4-32bit-7.60.0-3.42.1
libcurl4-32bit-debuginfo-7.60.0-3.42.1
libcurl4-7.60.0-3.42.1
libcurl4-debuginfo-7.60.0-3.42.1

References:

o https://www.suse.com/security/cve/CVE-2021-22876.html
o https://www.suse.com/security/cve/CVE-2021-22898.html
o https://bugzilla.suse.com/1177976
o https://bugzilla.suse.com/1183933
o https://bugzilla.suse.com/1186114

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=uTbF
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1859 – [SUSE] curl: Access confidential data – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/06/01/esb-2021-1859-suse-curl-access-confidential-data-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1859-suse-curl-access-confidential-data-remote-unauthenticated

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...