Malware Devil

Tuesday, June 8, 2021

What is a Prototype Pollution vulnerability and how does page-fetch help?

Prototype Pollution is a problem that can affect JavaScript applications. That means both applications running in web browsers, and under Node.js on the server-side, but today we’re going to focus on the web side of things.

We’ll also take a look at page-fetch: a new open source tool released (jump to tool) by the Detectify Security Research team that can, amongst other things, help you hunt for prototype pollution issues in the wild!

Prototypes

Before we can talk about Prototype Pollution, we should probably start with what a Prototype is. JavaScript, like many languages, has objects: a set of keys and values grouped together:

var myObject = {
name: “My super awesome object”,
isAwesome: true
rating: 10,
}

Those values can be basic types like numbers or strings, but also functions, arrays, or other objects. It’s pretty common in the world of Object Oriented Programming to want one object to be a “descendant” of another; the descendant inheriting the properties of its parent. Let’s look at an example:

var webPage = {
title: “Detectify Labs”,
navigation: [“/home”, “/search”, “/contact”],
content: “Welcome to Detectify Labs!”
}

var blogPost = {
title: “Detectify Labs”,
navigation: [“/home”, “/search”, “/contact”],
content: “This is a super interesting blog post…”,
comments: [“Nice work”, “Best thing I ever read!”]
}

These two objects, webPage and blogPost, have a lot in common. The title and navigation properties are both identical! Wouldn’t it be nice if that data didn’t have to be duplicated? The good news is that JavaScript lets us “connect” one object to another.

Let’s rewrite the code above and make it so that the webPage object is the prototype of the blogPost object:

var webPage = {
title: “Detectify Labs”,
navigation: [“/home”, “/search”, “/contact”],
content: “Welcome to Detectify Labs!”
}

var blogPost = {
content: “This is a super interesting blog post…”,
comments: [“Nice work”, “Best thing I ever read!”]
}

blogPost.__proto__ = webPage

Note that we didn’t include the title or navigation parts in the blogPost object this time, but we did do this extra bit:

blogPost.__proto__ = webPage

That __proto__ property is special! It’s a link to the “prototype” of an object, and by assigning the webPage object to it, the webPage object becomes the prototype of the blogPost object. That means if we try to access properties like title or navigation on the blogPost object, JavaScript realises that they don’t exist and so looks at the prototype object’s properties instead:

// This prints “Detectify Labs” to the console – the value came from
// the blogPost object’s prototype: the webPage object!
console.log(blogPost.title)

One thing that’s worth noting here: we “overrode” the “content” property. So if we look at the content property of the blogPost object, we’ll see:

// This prints “This is a super interesting blog post…” to the console
console.log(blogPost.content)

Now, if you happen to be a professional JavaScript developer you might be cringing a little, or perhaps even penning an email to let me know that this isn’t the right way to do things – and you’d be right!

MDN covers this better than I could hope to here, but this functionality is technically deprecated, and not really the right way to write modern JavaScript code. For our purposes though, knowing just this way of doing things is what we need in order to understand Prototype Pollution.

The Global Object

When JavaScript runs in a web browser, there’s always this thing lurking in the background called the Global Object, and its name is “window”.

When you make a new variable, like this one:

var myVariable = 123

It’s actually a property of the global object:

var myVariable = 123

// This prints “123” to the console
console.log(window.myVariable)

This is relevant to our interests because by default all objects share the same prototype, including the global object. The interesting part for us is: that means if we are able to set properties on the prototype of one object, we can affect the properties of all other objects, the window object included!

As an example, if we set a property on the prototype of an empty object, that property becomes available on the window object:

var emptyObject = {}
emptyObject.__proto__.myProperty = “my value”

// Prints “my value” to the console
console.log(window.myProperty)

// Also prints “my value” to the console
console.log(myProperty)

// Even this prints “my value” to the console too!
var newObject = {}
console.log(newObject.myProperty)

Having control over the properties of other objects, especially the window object, gives us a great deal of possibilities for vulnerabilities to occur – and we’ll look at some examples in a while – but first: how could this happen anyway?

Vulnerable Code

One of the most common places for Prototype Pollution to rear its ugly head is in processing the query string. You’re probably fairly used to seeing query strings like this one:

?id=456123&theme=dark&food=cheese

They’re used on just about every web application there is to provide user input. Often they are processed by something like PHP or Ruby on the server-side, but they can be just as easily processed by JavaScript running in the browser too.

A query string like the one above would often be turned into a JavaScript object like this one so the application can more easily refer to the values:

{
id: 456123,
theme: “dark”,
food: “cheese”
}

That’s all fine, but sometimes values are a little more complex than that. You might have seen a query string that looks more like this:

?user[id]=456123&user[food]=cheese&theme=dark

This notation lets us group values together; in this case the id and food parameters are “grouped” so that they pertain to a user. Ideally we’d like a query string like that to be turned into a JavaScript object like this:

{
user: {
id: 456123,
food: “cheese”
},
theme: “dark”
}

Here’s some code that performs that very transformation:

// This is the object we wish to create :)
const query = {}

const u = new URL(location)
for (const [key, value] of u.searchParams){

if (!key.includes(‘[‘)){
query[key] = value
continue
}

// We have a key/value pair like k1[k2]=value
const [k1, k2] = key.split(‘[‘).map(kn => kn.replace(‘]’, ”))

if (query[k1] == undefined){
query[k1] = {}
}

// This could be a problem!
query[k1][k2] = value
}

Don’t worry too much if you get a little lost in the code. The part we really need to pay attention to is this:

// This could be a problem!
query[k1][k2] = value

Given a query string key/value pair like user[id]=456123, k1 becomes user, k2 becomes id, and value becomes 456123, equivalent to this:

query[“user”][“id”] = “456123”

You may be able to see how this could be an issue. If we provided a query string that swapped user for __proto__, the id property would be set on the prototype of the query object – the same one shared by all other objects by default, including the global window object.

As for why that could be a problem: let’s add a little more code:

const messages = {
error: “Error: something went wrong”,
success: “Everything worked as expected :)”
}

if (query.message != undefined){
document.querySelector(‘#message’).innerHTML = messages[query.message]
}

This is a fairly normal looking bit of code: use a user supplied value to decide which of a predefined list of messages to display. Under normal circumstances it would be perfectly secure too, but that is not the case in the presence of Prototype Pollution.

Because the messages object shares a prototype with the query object, we can pollute it with any value we desire – say, an XSS payload perhaps.

If we were to provide a query string that looked like this for example, we would have the ability to run arbitrary JavaScript in the context of the webpage in question:

?__proto__[payload]=<img%20src%20onerror=alert(document.domain)>&message=payload

The payload parameter pollutes the prototype, making it available on the messages object, and the message parameter is used to choose our payload to be displayed and ultimately have our JavaScript executed.

This was just a small example, but there are quite a few JavaScript libraries in the wild that are vulnerable to Prototype Pollution. We’d like to give a big shout-out to Sergey Bobrov for collating a really great list of some of them here.

Detection

“Traditional” web vulnerability scanning (if there is such a thing) tends to work by sending requests to web servers, and analysing the response – be it HTML, JSON, XML, or something else entirely. This can work just fine for vulnerabilities such as reflected XSS, where a user-supplied parameter is reflected in the response without adequate output escaping, because the response changes when the user input changes. This is often not the case for client-side vulnerabilities like DOM XSS and Prototype Pollution.

To detect client-side vulnerabilities we need to use a browser to actually run the JavaScript in a page. It would be fairly time-consuming to do that manually, but thankfully it’s relatively easy to automate such things with a headless browser.

image: Detectify Deep Scan has security tests to find Prototype Pollution vulnerabilities in your web apps.

Tools for prototype pollution and client-side vulnerabilities

Of course, Detectify can already find these issues for you if you’re running the Deep Scan DAST scanner, and we’ve already found hundreds of prototype pollution issues for our customers!

If you’re a pentester, bug bounty hunter, or security researcher you’re in luck too. We’ve just released a tool called page-fetch that you can, amongst other things, use to help you look for prototype pollution and other client-side issues. This tool follows up the web scanner, Ugly Duckling, which Detectify released for the ethical hacker community.

Page-fetch is a fairly simple tool. It takes a list of URLs as its input, fetches them using a headless Chrome browser, and stores a copy of every response it saw – all the JavaScript files, CSS files, images, API requests etc.

Having a local copy of these resources makes it a great deal easier to search through them, use them to build custom word lists or whatever else you might want to do. There’s filters to exclude third-party requests, save only third party requests, and to include or exclude requests based on their content-type.

The bit that’s interesting to us here though, is that you can also provide a snippet of JavaScript that will be executed on every web page that is fetched. The return value of that JavaScript snippet will be displayed in the tool’s output.

Let’s look at how to install the tool and use it to detect a prototype pollution vulnerability.

How it works

Page-fetch is written in Go. The easiest way to install it is with go get:

? go get github.com/detectify/page-fetch

Provided you have Go set up properly, you shouldn’t have to do anything else other than making sure you have a Chrome or Chromium browser installed.

The most simple way to use the tool is to echo a single URL into it, like this:

? echo https://detectify.com | page-fetch
GET https://detectify.com/ 200 text/html; charset=utf-8
GET https://detectify.com/site/themes/detectify/css/detectify.css?v=1619009098 200 text/css
GET https://detectify.com/site/themes/detectify/img/detectify_logo_black.svg 200 image/svg+xml
GET https://fonts.googleapis.com/css?family=Merriweather:300i 200 text/css; charset=utf-8

The output shows every request that was made while rendering the input URL, and the response for each request is stored in a directory called out by default:

? tree out
out
+– detectify.com
| +– assets
| | +– images
| | +– customerlogos
| | | +– epi_logo_startpage.svg
| | | +– epi_logo_startpage.svg.meta
| | | +– grammarly_logo_startpage.svg
| | | +– grammarly_logo_startpage.svg.meta

For each file stored there’s also a .meta file that contains the request and response headers, the HTTP method that was used etc.

To run JavaScript on each page, we can use the -j or –javascript option. As an example, let’s use it to pull out the page title on detectify.com:

? echo https://detectify.com | page-fetch -j ‘document.querySelector(“title”).innerText’ | grep ^JS
JS (https://detectify.com): Website vulnerability scanner – scan web assets | Detectify

The return value is printed on a line starting with JS so that it’s easy to grep for.

To look for prototype pollution then, all we need to do is pick a payload to try in the query string of our input URL, and then test to see if the value was set as we expected:

? echo ‘http://poc-tools-storage.s3-website.eu-west-2.amazonaws.com/pp.html?__proto__[testparam]=testval’ | page-fetch -j ‘window.testparam == “testval”? “vulnerable” : “not vulnerable”‘ | grep ^JS
JS (http://poc-tools-storage.s3-website.eu-west-2.amazonaws.com/pp.html?__proto__[testparam]=testval): vulnerable

Our test code just checks to see if window.testparam is equal to testval, and if it is: returns the string vulnerable, and returns not vulnerable otherwise. Let’s check a known non-vulnerable page to make sure we aren’t seeing a false-positive:

? echo ‘https://example.com?__proto__[testparam]=testval’ | page-fetch -j ‘window.testparam == “testval”? “vulnerable” : “not vulnerable”‘ | grep ^JS
JS (https://example.com?__proto__[testparam]=testval): not vulnerable

All looks to be well! Example.com doesn’t load any JavaScript at all so we can be pretty confident that no prototype pollution vulnerabilities exist there!

Hopefully you’ve now got a pretty good idea of what prototype pollution is, why it matters, and how it can be detected. Until next time!

How can Detectify help?

image: Detectify UI. Detectify collaborates with Crowdsource ethical hackers to bring your more than a DAST.

Detectify is a crowd-based web vulnerability scanner that goes beyond version and signature-testing. The testbed is payload-based and checks for actively exploited web vulnerabilities like Prototype Pollution, the OWASP Top 10, undocumented vulns, CORS misconfigurations and more. Curious to see what Detectify will find in your web apps? Sign up for a 2-week free trial today.

Read More

The post What is a Prototype Pollution vulnerability and how does page-fetch help? appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/what-is-a-prototype-pollution-vulnerability-and-how-does-page-fetch-help-2/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-a-prototype-pollution-vulnerability-and-how-does-page-fetch-help-2

How to redirect traffic from an incoming TCP port using the Portbender utility

Overview

In a previous article titled “Active Directory Computer Account SMB Relaying Attack,” we discussed how an attacker could leverage computers assigned administrative rights to other computers to escalate privileges or move laterally using the printer spooler service. Colloquially we often refer to this as a “Computer AdminTo Computer” vulnerability.

Exploiting this issue in practice during a red team engagement has often historically been difficult. Often, we need to perform this attack from a compromised Windows system where the built-in SMB service is already listening on port 445/TCP. Furthermore, it is not uncommon for our team to perform name resolution poisoning during red team engagements to harvest credentials within an environment. Unfortunately, in previous scenarios, we have been primarily limited to passive credential collection and unable to perform relaying attacks when obtaining credentials through SMB.

To overcome this operational hurdle, we have developed a custom utility named “PortBender” [7] which allows us to redirect traffic from an incoming TCP port to an alternative TCP port. For example, a user may wish to modify traffic destined for the 445/TCP port to 8445/TCP. We have also included a feature in PortBender which allows an attacker to simulate the PortServ.sys persistence technique leveraged by the Duqu 2.0 threat actor.

Methods for Performing SMB Relaying on Windows

Our initial attempt at performing SMB relaying through Cobalt Strike attempted to use the “NetSh PortProxy” mechanism [2] to redirect traffic destined for port 445/TCP. However, in this case, it appears that this mechanism doesn’t work for redirecting traffic destined for the SMB service running on port 445/TCP. Francisco Dominguez also notes this limitation of the “NetSh PortProxy” interface in his article titled “Remote NTLM relaying through meterpreter on Windows port 445” [1].

Another option we considered was disabling SMB services on the host and rebooting. However, we typically try to avoid making any permanent system changes or modifications during red team operations (and avoid rebooting production systems). Therefore, this option, while viable, was not sufficient for our requirements.

We wanted a tool that we could run for a short period to redirect traffic without rebooting and then subsequently stop redirecting traffic after performing an attack. Furthermore, we wanted to execute the tool entirely in memory with a minimum on-disk footprint. We also needed to integrate the capability with multiple C2 frameworks, so any mechanism for implementing in-memory execution should be portable across various C2 frameworks.

PortBender Design Overview

To satisfy these requirements we have developed the PortBender utility. When designing PortBender, we based much of the initial design on the DivertTCPConn tool by Arno0x0x [5]. However, in this case, we decided to create a new and separate utility to satisfy some of our unique requirements. These requirements included factors such as the ability to execute the tool in memory as a reflective DLL, integration with Cobalt Strike, support for Duqu 2.0 style backdoor persistence, leveraging static linking for all dependencies, and the use of an object-oriented design using C++ to promote modularity and code reuse.

When designing PortBender, we decided to leverage the existing WinDivert driver by Basil00 [4] for performing network traffic interception and modification. We considered several alternative designs, including writing a custom device driver, but these introduced operational hurdles for deployment. For example, a custom driver would require obtaining a code signing certificate to load the driver. Alternatively, we could bypass driver signing protections by loading an existing vulnerable signed driver and exploiting it to get ring0 code execution. However, both scenarios had a distinct disadvantage to leveraging an established tool for performing this interception and inspection.

Design Decision #1: Intercepting Network Traffic

The first option of developing a custom driver and signing it with a code signing certificate was non-ideal, primarily due to cost (time) concerns. Furthermore, suppose a defender ever discovered the driver. In that case, defenders would have a high-fidelity IOC they could leverage across multiple systems as the code signing certificate for the driver would only ever be used for malicious purposes.

One advantage of WinDivert is that it leverages a signed device driver that is legitimately used by several enterprise software applications. For example, Cloudflare’s Warp VPN agent (part of the Cloudflare Teams/Zero Trust product lineup) for Windows leverages the WinDivert framework for intercepting and modifying network traffic. Therefore, the usage of WinDivert is probably not a sufficient indicator to differentiate between normal and abnormal activity.

The second option (loading a driver by exploiting a signed vulnerable driver) was undesirable mainly due to system stability concerns. Because we have an extremely low tolerance for any activities that may disrupt or crash a system, we decided to avoid this approach.

Design Decision #2: Integrating with Cobalt Strike

To integrate PortBender with Cobalt Strike, we leverage the “Reflective DLL Injection” project developed by Stephen Fewer [6]. We included the source code for the reflective loader in the PortBender project. It exports a function named “ReflectiveLoader,” which functions as a bundled PE loader for injecting the module into a remote process. We can then leverage aggressor scripting in Cobalt Strike with the “bdllspawn” functionality to register the PortBender utility as a new post-exploitation job. Additionally, this functionality supports passing an argument string to the reflective loader which is then passed to the DLLMain function within the PortBender application. By building the PortBender utility as a reflective DLL, it can more easily be integrated into any C2 framework that supports loading a reflective DLL as an external plugin.

TCP Port Redirection Using the PortBender Utility

PortBender leverages a connection manager subsystem to track redirected connections and their state. It accomplishes this by monitoring the flags set on incoming TCP packets to track connection states. When a new incoming TCP session is detected, it adds that session to the list of established connections within the connection manager subsystem. The session is removed from this list when the client sends a TCP packet with the RST flag set.

PortBender monitors both inbound and outbound connections. It modifies the destination port for inbound packets to point to the redirected port (e.g., changing a packet destined for port 445/TCP to 8445/TCP. For outbound connections, it modifies the source port of the message back to the original destination port (e.g., modifying the source port from 8445/TCP to 445/TCP).

Because the application leverages a modular object-oriented approach, it is relatively straightforward to add additional behavior to customize this mechanism. For example, one could implement support for conditional rules-based redirection without majorly refactoring the existing code-base.

Duqu 2.0 PortServ.sys Persistence: TCP Port Redirection

In an article titled “The Duqu 2.0 Persistence Module,” Kaspersky discusses a persistence method used whereby the attacker installs a malicious NDIS filter-driver (PortServ.sys) on a compromised internet-facing web server [3]. Kaspersky describes a scenario where if the attacker sends a specially crafted TCP packet with a given keyword in the data section of the TCP packet, in this case, the password was either “romanian.antihacker” or “ugly.gorilla” the backdoor activates. When activated, the backdoor then redirects traffic from an attacker IP address to an alternative service on the compromised host (e.g., RDP).

For example, an attacker may deploy this style of payload on a compromised internet-facing IIS server to redirect all traffic from port 443/TCP to port 3389/TCP. This mechanism allows the attacker to bypass any network-based firewalls as the traffic leverages a port permitted through the victim’s firewall. The diagram given below outlines this use-case.

In this scenario, the attacker has compromised an Internet-facing Microsoft Exchange server and deployed the PortBender backdoor on the compromised system. Here we assume the compromised Microsoft Exchange server is directly exposed on the Internet (i.e. not behind an F5 load balancer). The attacker has installed the PortBender backdoor on the compromised system (in the diagram this is shown as a separate component but in reality this is running on the compromised server).

Within PortBender, we have added the “backdoor” command, which allows a red team operator to simulate this technique leveraged by the Duqu 2.0 threat actor for persistence. In this scenario, PortBender will listen on a given port (e.g., 443/TCP), and when it sees a TCP packet with both the SYN and RST flags set, it inspects the data section of the payload for a given keyword. If that keyword matches, it adds the attacker IP to a list of backdoor client IP addresses and redirects all future traffic to the user-specified redirect port (e.g., 3389/TCP). The attacker can then disable the backdoor by sending another TCP packet with the SYN and RST flags set and the keyword included, which instructs PortBender that it should stop redirecting traffic from this IP.

Using PortBender to Perform an SMB Relay Attack

In this section, we walk through an SMB relaying attack through a compromised Windows 10 system using PortBender and NTLMRelayX in conjunction with Cobalt Strike’s remote port-forwarding feature. Administrative access to the underlying Windows 10 system is required in this case because the WinDivert driver requires administrative rights to load successfully.

We start by creating a socks proxy using the “socks” command. Next, we leverage the “rportfwd” command given below to forward all incoming traffic to 8445/TCP on the victim host to port 445/TCP on the TeamServer.

rportfwd 8445 127.0.0.1 445

Then we install both Impacket and proxychains and configure proxychains to leverage our socks proxy on the TeamServer. We then execute the following command to perform an SMB relaying attack targeting another internal system (192.168.109.9 in this example).

sudo proxychains python3 examples/ntlmrelayx.py -t smb://192.168.109.9 -smb2support

Next, we download [7] and import the “PortBender.cna” aggressor script into Cobalt Strike. This is shown in the image given below:

We must then upload the “WinDivert32.sys” or “WinDivert64.sys” device driver onto the target system depending on if the operating system architecture is 32-bit or 64-bit, respectively. In this case, we must upload the device driver file to the current working directory associated with the beacon process. Unfortunately, Windows does not appear to provide an API or mechanism to load a device driver without writing it to disk.

In most cases, this isn’t a significant concern. As previously mentioned, enterprise products, such as Cloudflare Warp, legitimately use this driver. Therefore, it is unlikely an antivirus or endpoint detection and response (EDR) solution will flag the presence of this file on a system. To upload the file we use the upload command in Cobalt Strike as shown below:

Next, we execute the PortBender utility using the command “PortBender redirect 445 8445” to redirect connections to 445/TCP to 8445/TCP (our remote port forwarded port). This is shown below:

Next, we simulate an SMB authentication from a domain administrator account for testing purposes. An SMB relaying attack is performed targeting another internal host for demonstration purposes. The expected output from a successful relaying attack is below:

To stop the PortBender service we then use the jobkill and kill commands to kill the job and the process. From our testing, killing the job is not a sufficient measure to exit the process completely. We accomplish this by leveraging the “jobkill” and “kill” commands within beacon. The expected output is shown in the image below.

Leveraging PortBender for Duqu 2.0 Style Persistence

The PortBender backdoor mode can be leveraged for Duqu 2.0 style persistence as described previously. In this instance, the command takes as input a fake destination port, redirect port, and a password/keyword to leverage to activate the backdoor.

We first execute the “PortBender backdoor 443 3389 praetorian.antihacker” command to deploy the persistence mechanism. This command instructs the backdoor to redirect traffic destined for 443/TCP to 3389/TCP when the backdoor is activated using the keyword “praetorian.antihacker”.

To activate the backdoor we must send a TCP packet with both the SYN and RST flags set and the keyword/password included in the data portion of the TCP packet and the src address set to the host we want to be able to access the RDP service over 443/TCP. We can accomplish this with Python using the scapy library with the script given below:

import argparsefrom scapy.all import *TCP_ACTIVATE=TCP(dport=445, flags=”SR”, seq=100)data = “praetorian.antihacker”a = IP(dst=”192.168.109.10″, src=”192.168.109.8”)/TCP_ACTIVATE/datasend(a)

We can then run the script as shown in the image below:

We then see the output given below within the Cobalt Strike console showing a new client connection was registered successfully:

Then we query the RDP configuration by querying the registry key used to configure the RDP service. In this case, the key is “HKLMSystemCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp”. We observe that the configured port is 3389/TCP (0xD3D in base 16). The image below shows the expected output for this configuration:

Next, we RDP from the attacker system to 443/TCP and authenticate using valid domain user account credentials as shown below:

After the attacker finishes accessing the system, they can re-run the “activate.py” script to disconnect. The expected output is shown below:

Future Work

Several opportunities exist for future work and extensions to the PortBender utility. First, we could improve the persistence module by adding additional security checks. Additionally, we could also improve the algorithms’ performance for performing lookups as they currently use linear-time searching algorithms. Finally, there may be an undocumented Windows API or another mechanism to load the WinDivert driver without writing it to disk.

Conclusion

This article discussed how red team operators could leverage our recently released PortBender tool to perform attacks, such as an SMB relay attack, that have historically been difficult to accomplish through a C2 framework such as Cobalt Strike. We also discussed how an attacker could leverage TCP port redirection with PortBender to establish covert persistence on an Internet-facing Windows server to better simulate certain threat actors such as the Duqu 2.0 APT.

References

[1] https://diablohorn.com/2018/08/25/remote-ntlm-relaying-through-meterpreter-on-windows-port-445/
[2] https://parsiya.net/blog/2016-06-07-windows-netsh-interface-portproxy/
[3] https://securelist.com/the-duqu-2-0-persistence-module/70641/
[4] https://github.com/basil00/Divert
[5] https://github.com/Arno0x/DivertTCPconn
[6] https://github.com/stephenfewer/ReflectiveDLLInjection
[7] https://github.com/praetorian-inc/PortBender

Read More

The post How to redirect traffic from an incoming TCP port using the Portbender utility appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/how-to-redirect-traffic-from-an-incoming-tcp-port-using-the-portbender-utility/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-redirect-traffic-from-an-incoming-tcp-port-using-the-portbender-utility

A Microservice Overdose: When Engineering Trends Meet the Startup Reality

Engineering in startups is different. With lower product maturity, fewer resources, and less certainty about the future, startups have a whole bunch of constraints that must be taken into account when designing the product’s architecture and engineering procedures. Simply sticking to the latest engineering trends – will not necessarily be ideal for startups, and might … Continued

The post A Microservice Overdose: When Engineering Trends Meet the Startup Reality appeared first on Hysolate.

The post A Microservice Overdose: When Engineering Trends Meet the Startup Reality appeared first on Security Boulevard.

Read More

The post A Microservice Overdose: When Engineering Trends Meet the Startup Reality appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/a-microservice-overdose-when-engineering-trends-meet-the-startup-reality/?utm_source=rss&utm_medium=rss&utm_campaign=a-microservice-overdose-when-engineering-trends-meet-the-startup-reality

Top 10 Privacy and Security Features Apple Announced at WWDC 2021

Apple on Monday announced a number of privacy and security-centric features to its upcoming versions of iOS and macOS at its all-online Worldwide Developers Conference.

Here is a quick look at some of the big-ticket changes that are expected to debut later this fall:

1 — Just Patches, Not Entire OS Update Every Time: As rumored before, users now have a choice between two software update versions in the Settings app. Users can either opt to update to the latest version of iOS 15 for all the latest features and most complete set of security updates or continue on iOS 14 and still get important security updates until they are ready to migrate to the next major version.

2Built-in 2-Factor Authenticator: The new versions of iOS and macOS come with new options that allow users to generate two-factor authentication codes for each of the online accounts saved to iCloud Keychain (Settings > Passwords) without the need for downloading additional apps like Google Authenticator or Authy.

3Private Relay – To come as part of Apple iCloud+ for existing iCloud subscribers at no extra cost, Private Relay is akin to a VPN in that it routes users’ internet traffic on Safari browser through two relays in order to mask who’s browsing and where that data is coming from.

Unlike traditional VPNs who are still privy to users’ real IP addresses and the websites they visit, iCloud Private Relay employs a dual-hop architecture that effectively shields IP address, location, and browsing activity that can be used to create a detailed profile.

The feature ensures that traffic leaving the device is encrypted before forwarding the requests through two internet relays, thus creating a simplified version of Tor, which employs at least a minimum of three relays to achieve anonymity.

“All the user’s requests are then sent through two separate internet relays,” Apple says. “The first assigns the user an anonymous IP address that maps to their region but not their actual location. The second decrypts the web address they want to visit and forwards them to their destination. This separation of information protects the user’s privacy because no single entity can identify both who a user is and which sites they visit.”

The feature, however, will not be available in China, Belarus, Colombia, Egypt, Kazakhstan, Saudi Arabia, South Africa, Turkmenistan, Uganda, and the Philippines due to regulatory reasons.

4Hide My Email – Also included as part of the iCloud+ bundle and built into Safari and Mail apps, the feature enables the ability to generate one-off burner emails when signing up for a service on the web without having to give away the actual email address. Apple already offers a similar feature through Sign In With Apple.

5Mail Privacy Protection – Apple is taking on the invisible tracking pixels embedded in emails with its new Mail Privacy Protection feature. A tracking pixel — typically a single-pixel image — is how marketers know whether an email gets opened. When an email containing an invisible pixel is opened, the image connects to the sender’s server, while also funneling back sensitive data like users’ IP address, device location, and the email client used.

Should users choose to turn the feature on, “it hides your IP address so senders can’t link it to your other online activity or determine your location. And it prevents senders from seeing if you’ve opened their email.”

6Improved Intelligent Tracking Prevention — Intelligent Tracking Prevention, which is Apple’s privacy feature aimed at reducing fingerprinting and cross-site tracking on Safari, is getting stronger protections by also hiding the user’s IP address from trackers, thereby curtailing their ability to utilize the user’s IP address as a unique identifier to connect their activity across websites and build a profile about them.

7App Privacy Report – Similar to the new Privacy dashboard Google introduced in Android 12, this new section in Settings lets users check how often apps have accessed sensitive data such as location, photos, camera, microphone, and contacts during the last seven days, in addition to highlighting “which apps have contacted other domains and how recently they have contacted them.” App Privacy Report is set to arrive as part of a future software update to iOS 15, iPadOS 15, and watchOS 8 later this year.

8On-Device Speech Processing – Not only is Siri now capable of handling offline requests, but the audio requests are also now fully processed on the device itself, with the virtual voice assistant putting “on-device personalization” to use in order to tailor content based on device usage patterns. “This addresses one of the biggest privacy concerns for voice assistants, which is unwanted audio recording,” Apple notes.

9Microphone indicator in macOS — Starting with macOS Monterey, users can also see which apps have access to their Mac’s microphone in the Control Center. A new orange-color recording indicator is displayed whenever an app has access to the microphone, mirroring similar changes Apple introduced in iOS 14.

10Find My – While Apple didn’t elaborate on the implementation specifics, Find My — the company’s Bluetooth-powered location tracking system — is gaining two new features that allows device owners to locate their iPhones, iPads, or Airtags even when the devices have been powered off or erased.

It’s no surprise that Apple has used privacy as a crucial weapon to differentiate itself from its data-hungry rivals, projecting itself as a privacy-sensitive company that treats privacy as a “fundamental human right.” The newly announced features make it clear that Apple is building a scaling a business model that revolves around privacy.

By once again taking aim at the digital advertising industry and baking privacy into its design, Apple’s privacy infrastructure allows it to expand into new markets as well as launch new services, while also strengthening its position as a gatekeeper, a move that could further put it at odds with Facebook.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post Top 10 Privacy and Security Features Apple Announced at WWDC 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/top-10-privacy-and-security-features-apple-announced-at-wwdc-2021/?utm_source=rss&utm_medium=rss&utm_campaign=top-10-privacy-and-security-features-apple-announced-at-wwdc-2021

DOJ recovers pipeline ransom, signals more aggressive approach to cybercrime

The US Department of Justice announced Monday that it recovered much of the ransomware payment that Colonial Pipeline paid to free itself from the attack that derailed the oil and gas supplier’s operations for several days last month.

The seizure of 63.7 of the initial 75 paid bitcoins represented the first success of the Justice Department’s Ransomware and Digital Extortion Task Force, a team formalized just months ago, according to reporting from The Wall Street Journal. The value of the recovered bitcoins stands at roughly $2.3 million.

Justice Department Seizes $2.3 Million in Cryptocurrency Paid to Ransomware Extortionists: @TheJusticeDept today announced that it has seized 63.7 bitcoins that allegedly represent the proceeds of a May 8 ransom payment to DarkSide cyber actors. https://t.co/qnCAN8oibW pic.twitter.com/brNopjSN3E

— FBI (@FBI) June 7, 2021

Some commentators have speculated that the discrepancy between what was paid and what was recovered may be accounted for by the fact that Darkside ransomware is sold under the Ransomware-as-a-Service (RaaS) model. The missing money (about 15% of the total) may be the fee the attackers paid the Darkside creators for using their malware.

In statements prepared Monday, US Deputy Attorney General Lisa Monaco characterized the operation as a victory and a representation of the Justice Department’s full powers.

“Following the money remains one of the most basic, yet powerful tools we have,” Monaco said. “Ransom payments are the fuel that propels the digital extortion engine, and today’s announcement demonstrates that the United States will use all available tools to make these attacks more costly and less profitable for criminal enterprises. We will continue to target the entire ransomware ecosystem to disrupt and deter these attacks.”

Monaco added that the Department of Justice’s actions showcased the “value of early notification to law enforcement”—a clear signal that the federal government is now operating in lockstep to curb the threat of ransomware. In mid-May, the White House emphasized the importance of cyberattack notification when President Joe Biden signed an Executive Order that requires such warnings from technology companies that sell their products to the federal government, and weeks later, the Transportation Security Administration (TSA) rolled out a new cybersecurity directive for all US pipeline companies that will require pipelines to notify the government of any cyberattacks.

According to a sworn affidavit in support of a “seizure warrant” that was revealed Monday, Monaco’s statement about “following the money” was surprisingly literal. According to the affidavit, law enforcement tracked Colonial Pipeline’s payment across the public Bitcoin ledger until much of the payment landed in one specific Bitcoin address, which the outlet The Record identified here. After the funds arrived at the Bitcoin address—which law enforcement referred to as the “Subject Address”—they were not touched for days.

Then, a bit of mystery happened.

According to the affidavit, the Justice Department was able to retrieve funds from the Subject Address because the FBI obtained that address’s related “private key.”

Private keys are somewhat like passwords, in that they not to be shared, but they are also more complex than that. Private keys are randomized strings of letters and numbers that are cryptographically related to the Bitcoin address that they access. Reverse engineering a private key is technically infeasible, which means that somehow, the FBI obtained an example of possibly the most closely guarded secret for any cryptocurrency user today.

Some users keep their private keys on exchanges (websites for trading bitcoins). If the Colonial Pipeline attackers kept their key on a US-based exchange it would be an easy matter for the FBI to seize it. However, security-conscious Bitcoin users tend to keep their keys where they can see and secure them, on computers they own.

How the FBI managed managed to get the key is unclear, but a week after the Colonial Pipeline attack, Darkside said it lost control of some of its servers. In the same announcement, the threat actors also said they lost some ransom payments.

Whether the US government removed Darkside’s server access is not known, but the FBI’s ability to obtain a Bitcoin address private key still reveals a new attitude in America’s fight against cybercrime—a fierce, antagonistic approach that potentially crosses ethical lines.

In April, the Department of Justice revealed that the FBI had obtained the somewhat extraordinary authority to access servers it did not own or control so that it could remove web shells placed by cybercriminals who exploited zero-day vulnerabilities in on-premises versions of Microsoft Exchange Server software. These web shell removals were performed with no notification to the servers’ owners.

Similarly, in January, after the international law enforcement agency Europol announced that it had taken control of the Emotet botnet, cybersecurity researchers spotted something hidden. The law enforcement agencies responsible for the takedown had already planned to deploy an update to remove Emotet from infected machines, and law enforcement agencies themselves wrote the code for the deployment.

In speaking on our podcast Lock and Code, Malwarebytes Security Evangelist Adam Kujawa said this was a new tactic from government authorities.

“I’ve seen people maybe misuse or abuse or modify how a particular malware Command & Control infrastructure would work, but I’ve never seen law enforcement deploy brand new code, and that’s kind of worrying a lot of folks,” Kujawa said. “A lot of people might consider it illegal.”

This video cannot be displayed because your Functional Cookies are currently disabled.

To enable them, please visit our privacy policy and search for the Cookies section. Select “Click Here” to open the Privacy Preference Center and select “Functional Cookies” in the menu. You can switch the tab back to “Active” or disable by moving the tab to “Inactive.” Click “Save Settings.”

The post DOJ recovers pipeline ransom, signals more aggressive approach to cybercrime appeared first on Malwarebytes Labs.

The post DOJ recovers pipeline ransom, signals more aggressive approach to cybercrime appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/doj-recovers-pipeline-ransom-signals-more-aggressive-approach-to-cybercrime/?utm_source=rss&utm_medium=rss&utm_campaign=doj-recovers-pipeline-ransom-signals-more-aggressive-approach-to-cybercrime

What is a Prototype Pollution vulnerability and how does page-fetch help?

Read More

The post What is a Prototype Pollution vulnerability and how does page-fetch help? appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/what-is-a-prototype-pollution-vulnerability-and-how-does-page-fetch-help/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-a-prototype-pollution-vulnerability-and-how-does-page-fetch-help

U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers

In a major blow, the U.S. Department of Justice on Monday said it has recovered 63.7 bitcoins (currently valued at $2.3 million) paid by Colonial Pipeline to the DarkSide ransomware extortionists on May 8, pursuant to a seizure warrant that was authorized by the Northern District of California.

The ransomware attack also hobbled the pipeline company’s fuel supply, prompting the government to issue an emergency declaration, even as the company shelled out a ransom amount of approximately 75 bitcoins ($4.4 million as of May 8) to regain access to its systems.

A week after the highly publicized incident, the ransomware-as-a-service syndicate disbanded with a May 14 farewell message to affiliates, stating that its internet servers and cryptocurrency stash were seized by unknown law enforcement entities. While DarkSide’s announcement was perceived as an exit scam, the latest move from DoJ confirms earlier speculations of law enforcement involvement.

Stating that “ransom payments are the fuel that propels the digital extortion engine,” the DoJ said it followed the money trails left by the DarkSide gang to a specific bitcoin address by reviewing the Bitcoin public ledger, to which the proceeds of the ransom payment were transferred, ultimately using the “private key” the FBI had in its possession to access crypto assets stored in the wallet in question.

“There is no place beyond the reach of the FBI to conceal illicit funds that will prevent us from imposing risk and consequences upon malicious cyber actors,” said FBI Deputy Director Paul Abbate. “We will continue to use all of our available resources and leverage our domestic and international partnerships to disrupt ransomware attacks and protect our private sector partners and the American public.”

It’s not immediately clear how the intelligence agency came to have the private key, but DarkSide had previously claimed to have lost access to one of their payment servers.

Blockchain analytics firm Elliptic, which had identified the bitcoin transaction representing the Colonial Pipeline ransom payment, said the seized bitcoins represent 85% of the total ransom amount which is typically reserved for affiliates, with the rest going to the DarkSide developers. The Bitcoin address was emptied at around 1:40 p.m. ET on Monday, Dr. Tom Robinson, Elliptic’s co-founder and chief scientist, said.

If anything, the seizure marks a first-of-its-kind orchestrated effort led by the DoJ’s newly formed Ransomware and Digital Extortion Task Force to confiscate a cybercriminal cartel’s illicit profits by breaking into its bitcoin wallet.

“Holding cyber criminals accountable and disrupting the ecosystem that allows them to operate is the best way to deter and defend against future attacks of this nature,” Colonial Pipeline CEO Joseph Blount said in the statement. “The private sector also has an equally important role to play and we must continue to take cyber threats seriously and invest accordingly to harden our defenses.”

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/u-s-recovers-2-3-million-ransom-paid-to-colonial-pipeline-hackers-2/?utm_source=rss&utm_medium=rss&utm_campaign=u-s-recovers-2-3-million-ransom-paid-to-colonial-pipeline-hackers-2

U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers

In a major blow, the U.S. Department of Justice on Monday said it has recovered 63.7 bitcoins (currently valued at $2.3 million) paid by Colonial Pipeline to the DarkSide ransomware extortionists on May 8, pursuant to a seizure warrant that was authorized by the Northern District of California.
The ransomware attack also hobbled the pipeline company’s fuel supply, prompting the government to
Read More

The post U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/u-s-recovers-2-3-million-ransom-paid-to-colonial-pipeline-hackers/?utm_source=rss&utm_medium=rss&utm_campaign=u-s-recovers-2-3-million-ransom-paid-to-colonial-pipeline-hackers

Introducing the Detection of Multi-Accounting

With multi-accounting detection, you are better able to protect against account takeovers involving a single device. Also, you can now catch users who are abusing marketing incentives, such as coupons, new-account rewards or new customer referral bonuses.

The post Introducing the Detection of Multi-Accounting appeared first on Security Boulevard.

Read More

The post Introducing the Detection of Multi-Accounting appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/introducing-the-detection-of-multi-accounting/?utm_source=rss&utm_medium=rss&utm_campaign=introducing-the-detection-of-multi-accounting

A Look into Chuck Brooks’s Alarming Cybersecurity Stats

2020 will be remembered most as the year the world was swept up in the COVID pandemic. Dig a little deeper and you’ll find another alarming news story: 2020 was a record breaking year on the Cybersecurity front. There was more data lost in breaches and a higher number of cyber attacks than ever before.

The post A Look into Chuck Brooks’s Alarming Cybersecurity Stats appeared first on Security Boulevard.

Read More

The post A Look into Chuck Brooks’s Alarming Cybersecurity Stats appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/a-look-into-chuck-brookss-alarming-cybersecurity-stats/?utm_source=rss&utm_medium=rss&utm_campaign=a-look-into-chuck-brookss-alarming-cybersecurity-stats

Best Practices for Ransomware Defense

Ransomware has the potential to destroy business data, cause millions of dollars in revenue loss, ruin your business’ reputation and sully your brand. Such an attack erodes trust, and customers will leave en masse. Investing in security may seem expensive, but the true cost of a successful ransomware attack hugely outweighs this expense. Security is..

The post Best Practices for Ransomware Defense appeared first on Security Boulevard.

Read More

The post Best Practices for Ransomware Defense appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/best-practices-for-ransomware-defense/?utm_source=rss&utm_medium=rss&utm_campaign=best-practices-for-ransomware-defense

Choosing the Right AI Components in Your Security Tools

AI is a hot buzzword in cybersecurity, but just because a security tool is labeled “AI-enabled” or “AI-powered” doesn’t mean the technology will translate easily to your cybersecurity system. There is still a lot to learn about AI, said Anne Townsend, department manager with MITRE, during the RSA session “AI-Powered Or Is It Just Hype?”..

The post Choosing the Right AI Components in Your Security Tools appeared first on Security Boulevard.

Read More

The post Choosing the Right AI Components in Your Security Tools appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/choosing-the-right-ai-components-in-your-security-tools/?utm_source=rss&utm_medium=rss&utm_campaign=choosing-the-right-ai-components-in-your-security-tools

ISC Stormcast For Tuesday, June 8th, 2021 https://isc.sans.edu/podcastdetail.html?id=7532, (Tue, Jun 8th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Tuesday, June 8th, 2021 https://isc.sans.edu/podcastdetail.html?id=7532, (Tue, Jun 8th) appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/isc-stormcast-for-tuesday-june-8th-2021-https-isc-sans-edu-podcastdetail-htmlid7532-tue-jun-8th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-tuesday-june-8th-2021-https-isc-sans-edu-podcastdetail-htmlid7532-tue-jun-8th

ESB-2021.1569.2 – UPDATE [Ubuntu] GNOME Autoar: Overwrite arbitrary files – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1569.2
USN-4937-1: GNOME Autoar vulnerability
8 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: GNOME Autoar
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Overwrite Arbitrary Files — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-28650

Reference: ESB-2021.0820
ESB-2021.0755

Original Bulletin:
https://ubuntu.com/security/notices/USN-4937-1
https://ubuntu.com/security/notices/USN-4937-2

Comment: This bulletin contains two (2) Ubuntu security advisories.

Revision History: June 8 2021: Vendor added regression update as a second advisory.
May 7 2021: Initial Release

– ————————–BEGIN INCLUDED TEXT——————–

USN-4937-1: GNOME Autoar vulnerability
06 May 2021

GNOME Autoar could be made to overwrite files.
Releases

o Ubuntu 20.10
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS

Packages

o gnome-autoar – Archive integration support for GNOME

Details

Ondrej Holy discovered that GNOME Autoar could extract files outside of the
intended directory. If a user were tricked into extracting a specially
crafted archive, a remote attacker could create files in arbitrary
locations, possibly leading to code execution.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 20.10

o libgnome-autoar-gtk-0-0 – 0.2.4-2ubuntu0.3
o libgnome-autoar-0-0 – 0.2.4-2ubuntu0.3

Ubuntu 20.04

o libgnome-autoar-gtk-0-0 – 0.2.3-2ubuntu0.3
o libgnome-autoar-0-0 – 0.2.3-2ubuntu0.3

Ubuntu 18.04

o libgnome-autoar-gtk-0-0 – 0.2.3-1ubuntu0.3
o libgnome-autoar-0-0 – 0.2.3-1ubuntu0.3

After a standard system update you need to restart your session to make all
the necessary changes.

References

o CVE-2021-28650

– ——————————————————————————–

USN-4937-2: GNOME Autoar regression
07 June 2021

USN-4937-1 introduced a regression in GNOME Autoar.
Releases

o Ubuntu 21.04
o Ubuntu 20.10
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS

Packages

o gnome-autoar – Archive integration support for GNOME

Details

USN-4937-1 fixed a vulnerability in GNOME Autoar. The update caused a
regression when extracting certain archives. This update fixes the problem.

Original advisory details:

Ondrej Holy discovered that GNOME Autoar could extract files outside of the
intended directory. If a user were tricked into extracting a specially
crafted archive, a remote attacker could create files in arbitrary
locations, possibly leading to code execution.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.04

o libgnome-autoar-gtk-0-0 – 0.3.1-1ubuntu0.1
o libgnome-autoar-0-0 – 0.3.1-1ubuntu0.1

Ubuntu 20.10

o libgnome-autoar-gtk-0-0 – 0.2.4-2ubuntu0.4
o libgnome-autoar-0-0 – 0.2.4-2ubuntu0.4

Ubuntu 20.04

o libgnome-autoar-gtk-0-0 – 0.2.3-2ubuntu0.4
o libgnome-autoar-0-0 – 0.2.3-2ubuntu0.4

Ubuntu 18.04

o libgnome-autoar-gtk-0-0 – 0.2.3-1ubuntu0.4
o libgnome-autoar-0-0 – 0.2.3-1ubuntu0.4

After a standard system update you need to restart your session to make all
the necessary changes.

References

o https://launchpad.net/bugs/1929304

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=xWAF
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1569.2 – UPDATE [Ubuntu] GNOME Autoar: Overwrite arbitrary files – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/esb-2021-1569-2-update-ubuntu-gnome-autoar-overwrite-arbitrary-files-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1569-2-update-ubuntu-gnome-autoar-overwrite-arbitrary-files-existing-account

ESB-2021.1834.2 – UPDATE [UNIX/Linux][Ubuntu] isc-dhcp: Denial of service – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1834.2
USN-4969-1: DHCP vulnerability
8 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: isc-dhcp
Publisher: Ubuntu
Operating System: Ubuntu
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-25217

Original Bulletin:
https://ubuntu.com/security/notices/USN-4969-1
https://ubuntu.com/security/notices/USN-4969-2
https://ubuntu.com/security/notices/USN-4969-3

Comment: This bulletin contains three (3) Ubuntu security advisories.

Revision History: June 8 2021: Regression fix detailed in USN-4969-3
May 28 2021: Initial Release

– ————————–BEGIN INCLUDED TEXT——————–

USN-4969-1: DHCP vulnerability
27 May 2021

DHCP could be made to crash if it received specially crafted network
traffic.
Releases

o Ubuntu 21.04
o Ubuntu 20.10
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS

Packages

o isc-dhcp – DHCP server and client

Details

Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.04

o isc-dhcp-server – 4.4.1-2.2ubuntu6.1
o isc-dhcp-client – 4.4.1-2.2ubuntu6.1

Ubuntu 20.10

o isc-dhcp-server – 4.4.1-2.1ubuntu10.1
o isc-dhcp-client – 4.4.1-2.1ubuntu10.1

Ubuntu 20.04

o isc-dhcp-server – 4.4.1-2.1ubuntu5.20.04.2
o isc-dhcp-client – 4.4.1-2.1ubuntu5.20.04.2

Ubuntu 18.04

o isc-dhcp-server – 4.3.5-3ubuntu7.3
o isc-dhcp-client – 4.3.5-3ubuntu7.3

In general, a standard system update will make all the necessary changes.

References

o CVE-2021-25217

Related notices

o USN-4969-2 : isc-dhcp-client, isc-dhcp-server, isc-dhcp

– ——————————————————————————

USN-4969-2: DHCP vulnerability
27 May 2021

DHCP could be made to crash if it received specially crafted network
traffic.
Releases

o Ubuntu 16.04 ESM
o Ubuntu 14.04 ESM

Packages

o isc-dhcp – DHCP server and client

Details

USN-4969-1 fixed a vulnerability in DHCP. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.

Original advisory details:

Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 16.04

o isc-dhcp-server – 4.3.3-5ubuntu12.10+esm1
Available with UA Infra or UA Desktop
o isc-dhcp-client – 4.3.3-5ubuntu12.10+esm1
Available with UA Infra or UA Desktop

Ubuntu 14.04

o isc-dhcp-server – 4.2.4-7ubuntu12.13+esm1
Available with UA Infra or UA Desktop
o isc-dhcp-client – 4.2.4-7ubuntu12.13+esm1
Available with UA Infra or UA Desktop

In general, a standard system update will make all the necessary changes.

References

o CVE-2021-25217

Related notices

o USN-4969-1 : isc-dhcp-client, isc-dhcp, isc-dhcp-server

– ——————————————————————————

USN-4969-3: DHCP regression
07 June 2021

USN-4969-1 introduced a regression in DHCP.
Releases

o Ubuntu 21.04

Packages

o isc-dhcp – DHCP server and client

Details

USN-4969-1 fixed a vulnerability in DHCP. The package for Ubuntu 21.04
introduced a regression causing it to reject certain valid configuration
files. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Jon Franklin and Pawel Wieczorkiewicz discovered that DHCP incorrectly
handled lease file parsing. A remote attacker could possibly use this issue
to cause DHCP to crash, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package
versions:

Ubuntu 21.04

o isc-dhcp-client – 4.4.1-2.2ubuntu6.2
o isc-dhcp-server – 4.4.1-2.2ubuntu6.2

In general, a standard system update will make all the necessary changes.

References

o https://launchpad.net/bugs/1930917

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=L1hJ
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1834.2 – UPDATE [UNIX/Linux][Ubuntu] isc-dhcp: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/esb-2021-1834-2-update-unix-linuxubuntu-isc-dhcp-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1834-2-update-unix-linuxubuntu-isc-dhcp-denial-of-service-remote-unauthenticated

ESB-2021.1971 – [RedHat] thunderbird: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.1971
thunderbird security update
8 June 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: thunderbird
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Access Confidential Data — Existing Account
Reduced Security — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-29967 CVE-2021-29957 CVE-2021-29956

Reference: ESB-2021.1968
ESB-2021.1896
ESB-2021.1674

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2261
https://access.redhat.com/errata/RHSA-2021:2262
https://access.redhat.com/errata/RHSA-2021:2263
https://access.redhat.com/errata/RHSA-2021:2264

Comment: This bulletin contains four (4) Red Hat security advisories.

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: thunderbird security update
Advisory ID: RHSA-2021:2261-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2261
Issue date: 2021-06-07
CVE Names: CVE-2021-29956 CVE-2021-29957 CVE-2021-29967
=====================================================================

1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 8.2
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.2) – aarch64, ppc64le, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.11.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
(CVE-2021-29967)

* Mozilla: Thunderbird stored OpenPGP secret keys without master password
protection (CVE-2021-29956)

* Mozilla: Partial protection of inline OpenPGP message not indicated
(CVE-2021-29957)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1961503 – CVE-2021-29957 Mozilla: Partial protection of inline OpenPGP message not indicated
1961504 – CVE-2021-29956 Mozilla: Thunderbird stored OpenPGP secret keys without master password protection
1966831 – CVE-2021-29967 Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.2):

Source:
thunderbird-78.11.0-1.el8_2.src.rpm

aarch64:
thunderbird-78.11.0-1.el8_2.aarch64.rpm
thunderbird-debuginfo-78.11.0-1.el8_2.aarch64.rpm
thunderbird-debugsource-78.11.0-1.el8_2.aarch64.rpm

ppc64le:
thunderbird-78.11.0-1.el8_2.ppc64le.rpm
thunderbird-debuginfo-78.11.0-1.el8_2.ppc64le.rpm
thunderbird-debugsource-78.11.0-1.el8_2.ppc64le.rpm

x86_64:
thunderbird-78.11.0-1.el8_2.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el8_2.x86_64.rpm
thunderbird-debugsource-78.11.0-1.el8_2.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29956
https://access.redhat.com/security/cve/CVE-2021-29957
https://access.redhat.com/security/cve/CVE-2021-29967
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBYL4B4tzjgjWX9erEAQgWvQ/9HTlFEooIgNg6A7K35EbCQ7Tre6s2PiEJ
L73GqypfoI+lw2qEm9l0L4kog15Ig9IY7UdJgxS/lQl7I0fhC4qAIuK4Ox8r4oBV
WcFz8cCgXh+OmuVfxyUXsVtD2apxSehJyaO6khi+EAgHwvBeSE0YQ+6BDcc5t0jU
KPbd/d8NNwmc+PTnK6NFHIJ7pTAYPCgcsjIYHw9bfY6nG/oVzQzJIxgg3e2OPxDk
xNm8GSj4wMEMsYF0RYmKPHR94O9BUC4owaHZxWXi4mGKIQ0xPl6C6AYzEKXzAMLC
QyETO5RKkIl/arwNwDWi8VTQVBLuwMmz7U+x5SOH4VrSx7swSE4UWiBmlJfLEyM9
4E/i6fLLQQPwszukOmokoQi4pLkoHVAnvIpS4BLpuIiaLHNzFetMSbOiynlgxO1j
cxWH0vgXOBauwzhDIhl8b2Nxq6IgqwQZNuyBT/sSrrDTTdUqqED+xub0fBcDPm/7
isY//NqoPUFirv6DApy8wcwR17Lo7et+2MXQ4PY6P3cYbVgyPvcfzveVQtDDCzuf
Zskcqq74ZhvXZ3g5+HrOkReDtClBfXOw1S6eg0WJc/DnLofPgKvPstHwxuT7uAyl
ljEoygWaMUcxB4FbNtsk6kmwPOy6hoiP7GNRk3IyGqHZkeSpGGKLudjxx1o6pRf0
WLR4muXgK9c=
=Oab9
– —–END PGP SIGNATURE—–

– ——————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: thunderbird security update
Advisory ID: RHSA-2021:2262-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2262
Issue date: 2021-06-07
CVE Names: CVE-2021-29956 CVE-2021-29957 CVE-2021-29967
=====================================================================

1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 8.1
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream EUS (v. 8.1) – ppc64le, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.11.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
(CVE-2021-29967)

* Mozilla: Thunderbird stored OpenPGP secret keys without master password
protection (CVE-2021-29956)

* Mozilla: Partial protection of inline OpenPGP message not indicated
(CVE-2021-29957)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1961503 – CVE-2021-29957 Mozilla: Partial protection of inline OpenPGP message not indicated
1961504 – CVE-2021-29956 Mozilla: Thunderbird stored OpenPGP secret keys without master password protection
1966831 – CVE-2021-29967 Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11

6. Package List:

Red Hat Enterprise Linux AppStream EUS (v. 8.1):

Source:
thunderbird-78.11.0-1.el8_1.src.rpm

ppc64le:
thunderbird-78.11.0-1.el8_1.ppc64le.rpm
thunderbird-debuginfo-78.11.0-1.el8_1.ppc64le.rpm
thunderbird-debugsource-78.11.0-1.el8_1.ppc64le.rpm

x86_64:
thunderbird-78.11.0-1.el8_1.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el8_1.x86_64.rpm
thunderbird-debugsource-78.11.0-1.el8_1.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29956
https://access.redhat.com/security/cve/CVE-2021-29957
https://access.redhat.com/security/cve/CVE-2021-29967
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=yrzW
– —–END PGP SIGNATURE—–

– ——————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: thunderbird security update
Advisory ID: RHSA-2021:2263-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2263
Issue date: 2021-06-07
CVE Names: CVE-2021-29956 CVE-2021-29957 CVE-2021-29967
=====================================================================

1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) – x86_64
Red Hat Enterprise Linux Server Optional (v. 7) – ppc64le, x86_64
Red Hat Enterprise Linux Workstation (v. 7) – x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.11.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
(CVE-2021-29967)

* Mozilla: Thunderbird stored OpenPGP secret keys without master password
protection (CVE-2021-29956)

* Mozilla: Partial protection of inline OpenPGP message not indicated
(CVE-2021-29957)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1961503 – CVE-2021-29957 Mozilla: Partial protection of inline OpenPGP message not indicated
1961504 – CVE-2021-29956 Mozilla: Thunderbird stored OpenPGP secret keys without master password protection
1966831 – CVE-2021-29967 Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11

6. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source:
thunderbird-78.11.0-1.el7_9.src.rpm

x86_64:
thunderbird-78.11.0-1.el7_9.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

Source:
thunderbird-78.11.0-1.el7_9.src.rpm

ppc64le:
thunderbird-78.11.0-1.el7_9.ppc64le.rpm
thunderbird-debuginfo-78.11.0-1.el7_9.ppc64le.rpm

x86_64:
thunderbird-78.11.0-1.el7_9.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
thunderbird-78.11.0-1.el7_9.src.rpm

x86_64:
thunderbird-78.11.0-1.el7_9.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29956
https://access.redhat.com/security/cve/CVE-2021-29957
https://access.redhat.com/security/cve/CVE-2021-29967
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=KYCi
– —–END PGP SIGNATURE—–

– ——————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: thunderbird security update
Advisory ID: RHSA-2021:2264-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2264
Issue date: 2021-06-07
CVE Names: CVE-2021-29956 CVE-2021-29957 CVE-2021-29967
=====================================================================

1. Summary:

An update for thunderbird is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) – aarch64, ppc64le, s390x, x86_64

3. Description:

Mozilla Thunderbird is a standalone mail and newsgroup client.

This update upgrades Thunderbird to version 78.11.0.

Security Fix(es):

* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11
(CVE-2021-29967)

* Mozilla: Thunderbird stored OpenPGP secret keys without master password
protection (CVE-2021-29956)

* Mozilla: Partial protection of inline OpenPGP message not indicated
(CVE-2021-29957)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of Thunderbird must be restarted for the update to
take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1961503 – CVE-2021-29957 Mozilla: Partial protection of inline OpenPGP message not indicated
1961504 – CVE-2021-29956 Mozilla: Thunderbird stored OpenPGP secret keys without master password protection
1966831 – CVE-2021-29967 Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
thunderbird-78.11.0-1.el8_4.src.rpm

aarch64:
thunderbird-78.11.0-1.el8_4.aarch64.rpm
thunderbird-debuginfo-78.11.0-1.el8_4.aarch64.rpm
thunderbird-debugsource-78.11.0-1.el8_4.aarch64.rpm

ppc64le:
thunderbird-78.11.0-1.el8_4.ppc64le.rpm
thunderbird-debuginfo-78.11.0-1.el8_4.ppc64le.rpm
thunderbird-debugsource-78.11.0-1.el8_4.ppc64le.rpm

s390x:
thunderbird-78.11.0-1.el8_4.s390x.rpm
thunderbird-debuginfo-78.11.0-1.el8_4.s390x.rpm
thunderbird-debugsource-78.11.0-1.el8_4.s390x.rpm

x86_64:
thunderbird-78.11.0-1.el8_4.x86_64.rpm
thunderbird-debuginfo-78.11.0-1.el8_4.x86_64.rpm
thunderbird-debugsource-78.11.0-1.el8_4.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-29956
https://access.redhat.com/security/cve/CVE-2021-29957
https://access.redhat.com/security/cve/CVE-2021-29967
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Pw1N
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=OhCQ
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.1971 – [RedHat] thunderbird: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/06/08/esb-2021-1971-redhat-thunderbird-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1971-redhat-thunderbird-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...