Malware Devil

Wednesday, July 14, 2021

ESB-2021.2377 – Firefox and Firefox ESR: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2377
Security Vulnerabilities fixed in Firefox 90 (MFSA 2021-28)
and Firefox ESR 78.12 (MFSA 2021-29)
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Firefox
Firefox ESR
Publisher: Mozilla
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands — Remote with User Interaction
Denial of Service — Remote with User Interaction
Provide Misleading Information — Remote with User Interaction
Access Confidential Data — Remote with User Interaction
Reduced Security — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-30547 CVE-2021-29977 CVE-2021-29976
CVE-2021-29975 CVE-2021-29974 CVE-2021-29973
CVE-2021-29972 CVE-2021-29971 CVE-2021-29970

Reference: ASB-2021.0120
ESB-2021.2376
ESB-2021.2119

Original Bulletin:
https://www.mozilla.org/en-US/security/advisories/mfsa2021-28/
https://www.mozilla.org/en-US/security/advisories/mfsa2021-29/

– ————————–BEGIN INCLUDED TEXT——————–

Mozilla Foundation Security Advisory 2021-28

Security Vulnerabilities fixed in Firefox 90

Announced: July 13, 2021
Impact: high
Products: Firefox
Fixed in: Firefox 90

# CVE-2021-29970: Use-after-free in accessibility features of a document

Reporter: Irvan Kurniawan
Impact: high

Description

A malicious webpage could have triggered a use-after-free, memory corruption,
and a potentially exploitable crash.
This bug only affected Firefox when accessibility was enabled.

References

o Bug 1709976

# CVE-2021-29971: Granted permissions only compared host; omitting scheme and
port on Android

Reporter: Arturo Mejia
Impact: high

Description

If a user had granted a permission to a webpage and saved that grant, any
webpage running on the same host – irrespective of scheme or port – would be
granted that permission.
This bug only affects Firefox for Android. Other operating systems are
unaffected.

References

o Bug 1713638

# CVE-2021-30547: Out of bounds write in ANGLE

Reporter: (Unknown)
Impact: high

Description

An out of bounds write in ANGLE could have allowed an attacker to corrupt
memory leading to a potentially exploitable crash.

References

o Bug 1715766

# CVE-2021-29972: Use of out-of-date library included use-after-free
vulnerability

Reporter: Irvan Kurniawan
Impact: moderate

Description

A user-after-free vulnerability was found via testing, and traced to an
out-of-date Cairo library. Updating the library resolved the issue, and may
have remediated other, unknown security vulnerabilities as well.

References

o Bug 1696816

# CVE-2021-29973: Password autofill on HTTP websites was enabled without user
interaction on Android

Reporter: Wladimir Palant working with Include Security
Impact: moderate

Description

Password autofill was enabled without user interaction on insecure websites on
Firefox for Android. This was corrected to require user interaction with the
page before a user’s password would be entered by the browser’s autofill
functionality.
This bug only affects Firefox for Android. Other operating systems are
unaffected.

References

o Bug 1701932

# CVE-2021-29974: HSTS errors could be overridden when network partitioning was
enabled

Reporter: Peter Gerber
Impact: moderate

Description

When network partitioning was enabled, e.g. as a result of Enhanced Tracking
Protection settings, a TLS error page would allow the user to override an error
on a domain which had specified HTTP Strict Transport Security (which implies
that the error should not be override-able.) This issue did not affect the
network connections, and they were correctly upgraded to HTTPS automatically.

References

o Bug 1704843

# CVE-2021-29975: Text message could be overlaid on top of another website

Reporter: Irvan Kurniawan
Impact: moderate

Description

Through a series of DOM manipulations, a message, over which the attacker had
control of the text but not HTML or formatting, could be overlaid on top of
another domain (with the new domain correctly shown in the address bar)
resulting in possible user confusion.

References

o Bug 1713259

# CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12

Reporter: Mozilla developers
Impact: high

Description

Mozilla developers Emil Ghitta, Tyson Smith, Valentin Gosu, Olli Pettay, and
Randell Jesup reported memory safety bugs present in Firefox 89 and Firefox ESR
78.11. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run
arbitrary code.

References

o Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12

# CVE-2021-29977: Memory safety bugs fixed in Firefox 90

Reporter: Mozilla developers
Impact: high

Description

Mozilla developers Andrew McCreight, Tyson Smith, Christian Holler, and
Gabriele Svelto reported memory safety bugs present in Firefox 89. Some of
these bugs showed evidence of memory corruption and we presume that with enough
effort some of these could have been exploited to run arbitrary code.

References

o Memory safety bugs fixed in Firefox 90

– ——————————————————————————-

Mozilla Foundation Security Advisory 2021-29

Security Vulnerabilities fixed in Firefox ESR 78.12

Announced: July 13, 2021
Impact: high
Products: Firefox ESR
Fixed in: Firefox ESR 78.12

# CVE-2021-29970: Use-after-free in accessibility features of a document

Reporter: Irvan Kurniawan
Impact: high

Description

A malicious webpage could have triggered a use-after-free, memory corruption,
and a potentially exploitable crash.
This bug only affected Firefox when accessibility was enabled.

References

o Bug 1709976

# CVE-2021-30547: Out of bounds write in ANGLE

Reporter: (Unknown)
Impact: high

Description

An out of bounds write in ANGLE could have allowed an attacker to corrupt
memory leading to a potentially exploitable crash.

References

o Bug 1715766

# CVE-2021-29976: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12

Reporter: Mozilla developers
Impact: high

Description

Mozilla developers Valentin Gosu, Randell Jesup, Emil Ghitta, Tyson Smith, and
Olli Pettay reported memory safety bugs present in Firefox 89 and Firefox ESR
78.11. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run
arbitrary code.

References

o Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYO47teNLKJtyKPYoAQjMMg//d3DjI7uUI6rrnjoblGK0m21vorUrZQ1v
f5UAz/CPQ65pDPj/ui7QOM6FctKPr3yoqQQBWomtBfaatTaYHNpXgPkF9lrnGSJU
uFe39ETI1nGRJNz2ExxJ/C8TN1gfHwsJNs9BsGyj/cskmsl+FiNEvVmaXWuFiLUB
8gmu3YU27cLY5kd3bWJKIuUuqyKesxfakjHu3PFhe6WPXSmPujDrSb4fknuxtvrt
OEfS9IX6UlOlKaojc3Q7bPpe1Tx4Z3fIHyBqgtPFee/s0HPu2PNpPf8kX4asTMFJ
1GlvqLAN64sn4Bgp2iobu8eFu0IlmjvvLLf5vJmSZGWzIcRpA1YXI+JeT6gZXt6b
azFNW0btcPIVS38lAtsVCkBqPOM0BDzHcEcS+2VDxvjmeJTYzLFav3Z/BUj3yQKt
nsy8/J2fexeGoy/ZBMDnAn9mXUHR4KmKBYngq6K220Iacaz+mvxKRLxPZFOSOJkU
BoTXuhfJIDtwW3sZDnSiUCLugsrbDmBZO0KkeCqQxtLf0/VMNlA5DiZsk0acPfu7
nzbJg3xBpZCbT45vE7YDnHG/VCrxCghBC6mFEG3A21wNVc0pNfFMEEUs8IUpRlcs
JHBlSVH+ySiFeujXkqmdaxr3E+BVoQXHOpYRaMwSOVlwADTqjee2gnt4HXxU8Cw7
tDuoeYhk/a8=
=5i/D
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2377 – Firefox and Firefox ESR: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2377-firefox-and-firefox-esr-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2377-firefox-and-firefox-esr-multiple-vulnerabilities

ESB-2021.2378 – [Mac] FortiClient: Execute arbitrary code/commands – Existing account

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2378
FortiClient for Max Execute Arbitrary Code/Commands Vulnerability
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: FortiClient
Publisher: FortiGuard
Operating System: Mac OS
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-26089

Original Bulletin:
https://fortiguard.com/psirt/FG-IR-21-022

– ————————–BEGIN INCLUDED TEXT——————–

FortiClientMac – Privilege escalation by abusing a Symlink following vulnerability

IR Number : FG-IR-21-022
Date : Jul 05, 2021
Risk : 3/5
CVSSv3 Score : 6.3
Impact : Arbitrary code execution
CVE ID : CVE-2021-26089
Affected Products: FortiClientMac

Summary

A UNIX symbolic link (Symlink) Following (CWE-61) vulnerability in FortiClient
for MacOS may allow a local and unprivileged user to overwrite privileged shell
scripts executed during the installation phase via escalating their privileges
to root.

Impact

Arbitrary code execution

Affected Products

FortiClient for MacOS versions 6.4.3 and below.

Solutions

Please upgrade to FortiClient for MacOS version 6.4.4 or above.
Please upgrade to FortiClient for MacOS version 7.0.0 or above.

Acknowledgement

Fortinet is pleased to thank Csaba Fitzl and Trend Micro Zero Day Initiative
for bringing this issue to our attention under responsible disclosure.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=Dlpq
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2378 – [Mac] FortiClient: Execute arbitrary code/commands – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2378-mac-forticlient-execute-arbitrary-code-commands-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2378-mac-forticlient-execute-arbitrary-code-commands-existing-account

ESB-2021.2379 – FortiMail: Access confidential data – Remote with user interaction

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2379
FortiMail Access Confidential Data – Remote With User Interaction
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: FortiMail
Publisher: Fortinet
Operating System: Appliance
Impact/Access: Access Confidential Data — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-24013

Original Bulletin:
https://fortiguard.com/psirt/FG-IR-21-014

– ————————–BEGIN INCLUDED TEXT——————–

FortiMail – path traversal vulnerabilities

IR Number : FG-IR-21-014
Date : Jun 21, 2021
Risk : 4/5
CVSSv3 Score : 8.3
Impact : Unauthorized access to files.
CVE ID : CVE-2021-24013
Affected Products: FortiMail: 6.4.4, 6.4.3, 6.4.2, 6.4.1, 6.4.0, 6.2.6, 6.2.5, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.0.11, 6.0.10, 6.0.9, 6.0.8, 6.0.7, 6.0.6, 6.0.5, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.4.12, 5.4.11, 5.4.10, 5.4.9, 5.4.8, 5.4.7, 5.4.6, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0, 5.3.13, 5.3.12, 5.3.10, 5.3.9, 5.3.8, 5.3.7, 5.3.6, 5.3.5, 5.3.4, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.10, 5.2.9, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.11, 5.0.10, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.1, 5.0.0

Summary

Multiple Path traversal vulnerabilities in FortiMail Webmail may allow a
regular user to obtain unauthorized access to files and data via specifically
crafted web requests.

Impact

Unauthorized access to files.

Affected Products

FortiMail 6.4.3 and below.
FortiMail 6.2.6 and below.
FortiMail 6.0.10 and below.
FortiMail 5.4.12 and below.

Solutions

Upgrade to FortiMail 7.0.0.

Upgrade to FortiMail 6.4.4.

Upgrade to FortiMail 6.2.7.

Upgrade to FortiMail 6.0.11.

Fix for version 5.4 to be confirmed.

Acknowledgement

This issue was discovered by Giuseppe Cocomazzi of the Fortinet PSIRT Team
during an internal security assessment.

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=bZf+
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2379 – FortiMail: Access confidential data – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2379-fortimail-access-confidential-data-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2379-fortimail-access-confidential-data-remote-with-user-interaction

ASB-2021.0125 – [Win][Android] Microsoft Bing Search for Android: Provide misleading information – Remote with user interaction

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT Security Bulletin

ASB-2021.0125
Microsoft Patch Tuesday update for Microsoft Apps for July 2021
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Microsoft Bing Search for Android
Operating System: Windows
Android
Impact/Access: Provide Misleading Information — Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-33753

OVERVIEW

Microsoft has released its monthly security patch update for the
month of July 2021.

This update resolves 1 vulnerability associated with the following product:
[1]

Microsoft Bing Search for Android

IMPACT

Microsoft has given the following details regarding these vulnerabilities.

Details Impact Severity
CVE-2021-33753 Spoofing Important

MITIGATION

Microsoft recommends updating the software to the latest available
version available on the Microsoft Update Catalog. [1].

REFERENCES

[1] Microsoft Security Update Guidance
https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation’s site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYO49PuNLKJtyKPYoAQiVmQ/6Au2Bw5aKtw851UVK0/LM0a8NMDbMHAHH
qbUFkj0PuxYGGehCnBtSGxU0yAZUs4lUPLaEx99vvBH4bjxLjp0cI1bRmknADP92
qjuVr4tRb7sYGzELwgU9jmnoTYyFvHd1ge8NPEthba1yD+HfeJ41y1IRd29W46Zv
Wal8cbEAWvtcI+wFzl8LXqN86m7Mg01Hr9+JCTx11VNSWysniiRSoWjIqgB6iicm
WlZsaJSNQN0yPOG28OFDOQ39zCXZGFT5tlWWDjPmd5TrSqlgiYHO5bF9I9FbkpwQ
5RxprV8hf/KtqNpNv3hNjq74KT+vbmEekdRJ8F5H4w6Vnrt+7l6vQP/gsXHSDI3f
e97FnQOwP4mxymi4CMrXxvndGgNXuvjCrgegBSfSZAk7Mt9NiUN1JZfzuJt/J3zc
A9wdSo6fSdlgpmNFes9MldoFfxf+TIg2sehMbsUQn36VahvHf870s1aemwROUx34
mXxe1fqfKyNdcE3NlOo4AU2/mHNF1YosTGWKWTH/oyg10yrYhSEeYz26+C7MfCJY
pITUIOEhCfg6AmbeCZhG/kPCTQo6+dJUFXxiM2PcJpuBkMYDr9DbH55bDiqGOKM0
HGZWKQiHYKyG9rhoCUPCZtLYRSVzfJgaAGe33NI34ZuB1PxMnEfkKASOHSUX4+to
DvZmLwK/Tm4=
=inyE
—–END PGP SIGNATURE—–

Read More

The post ASB-2021.0125 – [Win][Android] Microsoft Bing Search for Android: Provide misleading information – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/asb-2021-0125-winandroid-microsoft-bing-search-for-android-provide-misleading-information-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=asb-2021-0125-winandroid-microsoft-bing-search-for-android-provide-misleading-information-remote-with-user-interaction

ASB-2021.0126 – ALERT [Win][Linux] Solarwinds Serv-U: Administrator compromise – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT Security Bulletin

ASB-2021.0126
Serv-U Remote Memory Escape Vulnerability
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Solarwinds Serv-U
Operating System: Windows
Linux variants
Impact/Access: Administrator Compromise — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-35211

Comment: This vulnerability is being exploited in the wild.

OVERVIEW

Solarwinds Serv-U is vulnerable to remote memory escape that could
allow remote arbitrary code to be run with privileges. [1]

IMPACT

Solarwinds states the following about the vulnerability:

“The vulnerability exists in the latest Serv-U version 15.2.3 HF1
released May 5, 2021, and all prior versions. A threat actor who
successfully exploited this vulnerability could run arbitrary code
with privileges. An attacker could then install programs; view,
change, or delete data; or run programs on the affected system.”[1]

MITIGATION

Solarwinds urges customers to upgrade and will release further
information about the vulnerability after customers are given
sufficient time to protect their system.

Solarwinds recommends upgrade as per their table from their
advisory[1]:
+—————-+————————————————-+
|Software Version|Upgrade Paths |
+—————-+————————————————-+
|Serv-U 15.2.3 |Apply Serv-U 15.2.3 HF2, available in your |
|HF1 |Customer Portal |
+—————-+————————————————-+
|Serv-U 15.2.3 |Apply Serv-U 15.2.3 HF1, then apply Serv-U |
| |15.2.3 HF2, available in your Customer Portal |
+—————-+————————————————-+
|All Serv-U |Upgrade to Serv-U 15.2.3, then apply Serv-U |
|versions prior |15.2.3 HF1, then apply Serv-U 15.2.3 HF2, |
|to 15.2.3 |available in your Customer Portal |
+—————-+————————————————-+

Also it is recommended to read the FAQ section that includes
identifying if your server has been compromised as well as the Microsoft
blog post that carries similar information[2].

“How can I tell if my environment has been compromised?

The following steps are steps you can take to determine if your
environment has been compromised:

1. Is SSH enabled for your Serv-U installation? If SSH is not
enabled in the environment, the vulnerability does not exist.

2. Is your environment throwing exceptions? This attack is a Return
Oriented Programming (ROP) attack. When exploited, the vulnerability
causes the Serv-U product to throw an exception and then intercepts
the exception handling code to run commands. Please note, several
reasons exist for exceptions to be thrown, so an exception itself is
not necessarily an indicator of attack.

Please collect the DebugSocketlog.txt log file, which can be found
in the following locations:
C:ProgramDataRhinoSoftServ-UDebugSocketlog.txt
C:ProgramFilesRhinoSoftServ-UDebugSocketlog.txt

In the log file DebugSocketlog.txt you may see an exception, such
as:

07] Tue 01Jun21 02:42:58 – EXCEPTION: C0000005;
CSUSSHSocket::ProcessReceive(); Type: 30; puchPayLoad = 0x041ec066;
nPacketLength = 76; nBytesReceived = 80; nBytesUncompressed = 156;
uchPaddingLength = 5

Exceptions may be thrown for other reasons so please collect the
logs to assist with determining your situation.

3. Are you seeing potentially suspicious connections via SSH? Look
for connections via SSH from the following IP addresses, which have
been reported as a potential indicator of attack by the threat
actor:

98[.]176[.]196[.]89
68[.]235[.]178[.]32
208[.]113[.]35[.]58
144[.]34[.]179[.]162
97[.]77[.]97[.]58

Other indicators:

hxxp://144[.]34[.]179[.]162/a
C:WindowsTempServ-u.bat
C:WindowsTemptestcurrent.dmp

4. Are you seeing potentially suspicious activity by Serv-U? Review
your monitoring tools and/or EDR platforms for Serv-U.exe spawning
anomalous processes, such as:

o mshta.exe
o powershell.exe
o cmd.exe (or conhost.exe then spawning cmd.exe) with any of the
following in the command line:
? whoami
? dir
? ./Client/Common
? .ClientCommon
? type [a file path] > “C:ProgramDataRhinoSoftServ-UUsers
Global Users[file name].Archive”
o Any process with the following in the command line:
? C:WindowsTemp
o The addition of any unrecognized Global users to Serv-U. This
can be checked in the users tab of the Serv-U Management
Console, as shown below. It can also be checked by looking for
recently created files in C:ProgramDataRhinoSoftServ-UUsers
Global Users, which appears to store the Global users
information.

Serv-U Management Console

If you observe this activity, investigate these processes further,
and any traffic originating from the Serv-U box. Please contact
SolarWinds Customer Support with this information, and we will
escalate for investigation.”[1]

REFERENCES

[1] Serv-U Remote Memory Escape Vulnerability CVE-2021-35211
https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211

[2] Microsoft discovers threat actor targeting SolarWinds Serv-U
software with 0-day exploit
https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/

AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation’s site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=gJLQ
—–END PGP SIGNATURE—–

Read More

The post ASB-2021.0126 – ALERT [Win][Linux] Solarwinds Serv-U: Administrator compromise – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/asb-2021-0126-alert-winlinux-solarwinds-serv-u-administrator-compromise-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=asb-2021-0126-alert-winlinux-solarwinds-serv-u-administrator-compromise-remote-unauthenticated

ESB-2021.2362 – [RedHat] OpenShift Serverless Client: Denial of service – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2362
Release of OpenShift Serverless Client kn 1.16.0
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: OpenShift Serverless Client
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-33196 CVE-2021-31525 CVE-2021-27918

Reference: ESB-2021.2298

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2704

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Release of OpenShift Serverless Client kn 1.16.0
Advisory ID: RHSA-2021:2704-01
Product: Red Hat OpenShift Serverless
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2704
Issue date: 2021-07-13
CVE Names: CVE-2021-27918 CVE-2021-31525 CVE-2021-33196
=====================================================================

1. Summary:

Release of OpenShift Serverless Client kn 1.16.0

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Openshift Serverless 1 on RHEL 8Base – ppc64le, s390x, x86_64

3. Description:

Red Hat OpenShift Serverless Client kn 1.16.0 provides a CLI to interact
with Red Hat OpenShift Serverless 1.16.0. The kn CLI is delivered as an RPM
package for installation on RHEL platforms, and as binaries for non-Linux
platforms.

Security Fix(es):

* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a
custom TokenReader (CVE-2021-27918)

* golang: net/http: panic in ReadRequest and ReadResponse when reading a
very large header (CVE-2021-31525)

* golang: archive/zip: malformed archive may cause panic or memory
exhaustion (CVE-2021-33196)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

See the Red Hat OpenShift Container Platform 4.6 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/
4.6/html/serverless_applications/index

See the Red Hat OpenShift Container Platform 4.7 documentation at:
https://access.redhat.com/documentation/en-us/openshift_container_platform/
4.7/html/serverless/index

5. Bugs fixed (https://bugzilla.redhat.com/):

1937901 – CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader
1958341 – CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header
1965503 – CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion
1971449 – Release of Openshift Serverless Client 1.16.0

6. Package List:

Openshift Serverless 1 on RHEL 8Base:

Source:
openshift-serverless-clients-0.22.0-3.el8.src.rpm

ppc64le:
openshift-serverless-clients-0.22.0-3.el8.ppc64le.rpm

s390x:
openshift-serverless-clients-0.22.0-3.el8.s390x.rpm

x86_64:
openshift-serverless-clients-0.22.0-3.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-27918
https://access.redhat.com/security/cve/CVE-2021-31525
https://access.redhat.com/security/cve/CVE-2021-33196
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index
https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBYO3FdtzjgjWX9erEAQjjQw/+LxSwIt4AwBdpF3tFtWEU2PGlzF8oO8rc
/QAIc5NB/WPYyZ/73pCBKr7qjbBOnOKiHpvpH4dVnMJK7EuhEIyr5Zz+vJM38f3j
zX5pCeLdJl6hvjckL0/4YlUZvMnQrlgel5mHCtCDxnjzxhG16k0j8Ybgvn9hBDEu
JI3c9hgFSSP0JAJp4zPTfQrcVEoCg9/FD0wzcoyweuf8ayaeUIf055dIxYeX2jAy
SMuCHGf7clP8bk7UYVg8DCovaCjT3UKtt6UTu/AWD/6MQhl7X9XHop+tbJ/mrIk6
PRPYtA4cTAfitYtnKrB+pOJ5NrEFlLDzKgE5kqWi4jZjH6ZyW1MIkN0q90Nclclu
DiWNp3kRM1AZzzBVgrQgQ1Advd6ofW6GAFlGSKglNBJXHhHMtCAOv24zcvyFoaet
cujsurPWxkahku9uYDdfjW4Z0Xep9Nw0ZUuFX5QJQZK0fo6G30HguTswf86oGSRQ
u3yZGqTmuQ1FUqWn+sKuM3wTwoyieyOUuBlB4+uCQ+qQCTvchucOdVWNh4rK4VG7
cCgTZ99mglofSXZbCDBywXXiDN95d2zG/avQoXT8g2OGFQGIREfqaHR7dorg5HPT
8kc0CK6eQK42uFi0e+Fa/4g8ZLm0odDxlaKGr6UpFb9g8G2IdXOv56mC6BdDuP0M
rCrerE0quyo=
=O3dK
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=pFuU
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2362 – [RedHat] OpenShift Serverless Client: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2362-redhat-openshift-serverless-client-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2362-redhat-openshift-serverless-client-denial-of-service-remote-unauthenticated

ESB-2021.2363 – [RedHat] Red Hat JBoss Enterprise Application Platform: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2363
Red Hat JBoss Enterprise Application Platform security updates
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Red Hat JBoss Enterprise Application Platform
Publisher: Red Hat
Operating System: Red Hat
Impact/Access: Cross-site Scripting — Existing Account
Reduced Security — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21409 CVE-2021-3536

Reference: ESB-2021.2323
ESB-2021.1571

Original Bulletin:
https://access.redhat.com/errata/RHSA-2021:2692
https://access.redhat.com/errata/RHSA-2021:2693
https://access.redhat.com/errata/RHSA-2021:2694
https://access.redhat.com/errata/RHSA-2021:2696

Comment: This bulletin contains four (4) Red Hat security advisories.

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update
Advisory ID: RHSA-2021:2692-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2692
Issue date: 2021-07-13
CVE Names: CVE-2021-3536 CVE-2021-21409
=====================================================================

1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for RHEL 6 Server – noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.8 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.7,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.8 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* netty: Request smuggling via content-length header (CVE-2021-21409)

* wildfly: XSS via admin console when creating roles in domain mode
(CVE-2021-3536)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1944888 – CVE-2021-21409 netty: Request smuggling via content-length header
1948001 – CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-20264 – [GSS](7.3.z) ISPN-12787 – Non Transactional Cache needs to be invalidated after commit on JPQL update/delete operation
JBEAP-20503 – [GSS](7.3.z) WFCORE-5185 – Update ProviderDefinition to use optimised service loading API
JBEAP-20623 – [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.20.Final-redhat-00001 to 5.3.20.SP1-redhat-00001
JBEAP-21178 – Tracker bug for the EAP 7.3.8 release for RHEL-6
JBEAP-21406 – [GSS](7.3.z) Upgrade Ironjacamar from 1.4.30.Final-redhat-00001 to 1.4.33.Final-redhat-00001
JBEAP-21421 – (7.3.z) Upgrade Infinispan from 9.4.22.Final-redhat-00001 to 9.4.23.Final-redhat-00001
JBEAP-21434 – (7.3.z) Upgrade wildfly-http-client from 1.0.26.Final-redhat-00001 to 1.0.28.Final-redhat-00001
JBEAP-21435 – (7.3.z) Upgrade Elytron from 1.10.12.Final-redhat-00001 to 1.10.13.Final-redhat-00001
JBEAP-21437 – (7.3.z) Upgrade netty from 4.1.60.Final to 4.1.63
JBEAP-21441 – (7.3.z) Upgrade Undertow from 2.0.35.SP1-redhat-00001 to 2.0.38.SP1-redhat-00001
JBEAP-21443 – (7.3.z) Upgrade jberet from 1.3.7.Final-redhat-00001 to 1.3.8.Final-redhat-00001
JBEAP-21444 – (7.3.z) Upgrade wf-core from 10.1.20.Final-redhat-00001 to 10.1.21.Final-redhat-00001
JBEAP-21567 – [GSS](7.3.z) Upgrade HAL from 3.2.14.Final-redhat-00001 to 3.2.15.Final-redhat-00001
JBEAP-21582 – (7.3.z) Upgrade remoting from 5.0.20.SP1-redhat-00001 to 5.0.23.Final-redhat-00001
JBEAP-21739 – (7.3.z) Upgrade elytron-web from 1.6.2.Final-redhat-00001 to 1.6.3.Final-redhat-00001
JBEAP-21977 – [SET](7.3.z) Update product CP branch github template

7. Package List:

Red Hat JBoss EAP 7.3 for RHEL 6 Server:

Source:
eap7-elytron-web-1.6.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el6eap.src.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el6eap.src.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-http-client-1.0.28-1.Final_redhat_00001.1.el6eap.src.rpm

noarch:
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-core-5.3.20-3.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-3.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-envers-5.3.20-3.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-java8-5.3.20-3.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-client-hotrod-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-commons-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-core-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.4.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-validator-1.4.33-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jberet-core-1.3.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-7.Final_redhat_00008.1.el6eap.noarch.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-netty-all-4.1.63-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-undertow-server-1.6.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.28-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.28-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.28-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.28-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-javadocs-7.3.8-1.GA_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-modules-7.3.8-1.GA_redhat_00001.1.el6eap.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-3536
https://access.redhat.com/security/cve/CVE-2021-21409
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Xv5P
– —–END PGP SIGNATURE—–

– —————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 7 security update
Advisory ID: RHSA-2021:2693-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2693
Issue date: 2021-07-13
CVE Names: CVE-2021-3536 CVE-2021-21409
=====================================================================

1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for RHEL 7 Server – noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.8 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.7,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.8 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* netty: Request smuggling via content-length header (CVE-2021-21409)

* wildfly: XSS via admin console when creating roles in domain mode
(CVE-2021-3536)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1944888 – CVE-2021-21409 netty: Request smuggling via content-length header
1948001 – CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-20264 – [GSS](7.3.z) ISPN-12787 – Non Transactional Cache needs to be invalidated after commit on JPQL update/delete operation
JBEAP-20503 – [GSS](7.3.z) WFCORE-5185 – Update ProviderDefinition to use optimised service loading API
JBEAP-20623 – [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.20.Final-redhat-00001 to 5.3.20.SP1-redhat-00001
JBEAP-21179 – Tracker bug for the EAP 7.3.8 release for RHEL-7
JBEAP-21406 – [GSS](7.3.z) Upgrade Ironjacamar from 1.4.30.Final-redhat-00001 to 1.4.33.Final-redhat-00001
JBEAP-21421 – (7.3.z) Upgrade Infinispan from 9.4.22.Final-redhat-00001 to 9.4.23.Final-redhat-00001
JBEAP-21434 – (7.3.z) Upgrade wildfly-http-client from 1.0.26.Final-redhat-00001 to 1.0.28.Final-redhat-00001
JBEAP-21435 – (7.3.z) Upgrade Elytron from 1.10.12.Final-redhat-00001 to 1.10.13.Final-redhat-00001
JBEAP-21437 – (7.3.z) Upgrade netty from 4.1.60.Final to 4.1.63
JBEAP-21441 – (7.3.z) Upgrade Undertow from 2.0.35.SP1-redhat-00001 to 2.0.38.SP1-redhat-00001
JBEAP-21443 – (7.3.z) Upgrade jberet from 1.3.7.Final-redhat-00001 to 1.3.8.Final-redhat-00001
JBEAP-21444 – (7.3.z) Upgrade wf-core from 10.1.20.Final-redhat-00001 to 10.1.21.Final-redhat-00001
JBEAP-21567 – [GSS](7.3.z) Upgrade HAL from 3.2.14.Final-redhat-00001 to 3.2.15.Final-redhat-00001
JBEAP-21582 – (7.3.z) Upgrade remoting from 5.0.20.SP1-redhat-00001 to 5.0.23.Final-redhat-00001
JBEAP-21739 – (7.3.z) Upgrade elytron-web from 1.6.2.Final-redhat-00001 to 1.6.3.Final-redhat-00001
JBEAP-21977 – [SET](7.3.z) Update product CP branch github template

7. Package List:

Red Hat JBoss EAP 7.3 for RHEL 7 Server:

Source:
eap7-elytron-web-1.6.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el7eap.src.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el7eap.src.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-http-client-1.0.28-1.Final_redhat_00001.1.el7eap.src.rpm

noarch:
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-core-5.3.20-3.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-3.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-envers-5.3.20-3.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-java8-5.3.20-3.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-client-hotrod-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-commons-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-core-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.4.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-validator-1.4.33-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jberet-core-1.3.8-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-7.Final_redhat_00008.1.el7eap.noarch.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-all-4.1.63-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-undertow-server-1.6.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.13-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.28-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.28-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.28-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.28-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk11-7.3.8-1.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk8-7.3.8-1.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-javadocs-7.3.8-1.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-modules-7.3.8-1.GA_redhat_00001.1.el7eap.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-3536
https://access.redhat.com/security/cve/CVE-2021-21409
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=tObI
– —–END PGP SIGNATURE—–

– —————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 8 security update
Advisory ID: RHSA-2021:2694-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2694
Issue date: 2021-07-13
CVE Names: CVE-2021-3536 CVE-2021-21409
=====================================================================

1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for BaseOS-8 – noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.8 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.7,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.8 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* netty: Request smuggling via content-length header (CVE-2021-21409)

* wildfly: XSS via admin console when creating roles in domain mode
(CVE-2021-3536)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1944888 – CVE-2021-21409 netty: Request smuggling via content-length header
1948001 – CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-20264 – [GSS](7.3.z) ISPN-12787 – Non Transactional Cache needs to be invalidated after commit on JPQL update/delete operation
JBEAP-20503 – [GSS](7.3.z) WFCORE-5185 – Update ProviderDefinition to use optimised service loading API
JBEAP-20623 – [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.20.Final-redhat-00001 to 5.3.20.SP1-redhat-00001
JBEAP-21180 – Tracker bug for the EAP 7.3.8 release for RHEL-8
JBEAP-21406 – [GSS](7.3.z) Upgrade Ironjacamar from 1.4.30.Final-redhat-00001 to 1.4.33.Final-redhat-00001
JBEAP-21421 – (7.3.z) Upgrade Infinispan from 9.4.22.Final-redhat-00001 to 9.4.23.Final-redhat-00001
JBEAP-21434 – (7.3.z) Upgrade wildfly-http-client from 1.0.26.Final-redhat-00001 to 1.0.28.Final-redhat-00001
JBEAP-21435 – (7.3.z) Upgrade Elytron from 1.10.12.Final-redhat-00001 to 1.10.13.Final-redhat-00001
JBEAP-21437 – (7.3.z) Upgrade netty from 4.1.60.Final to 4.1.63
JBEAP-21441 – (7.3.z) Upgrade Undertow from 2.0.35.SP1-redhat-00001 to 2.0.38.SP1-redhat-00001
JBEAP-21443 – (7.3.z) Upgrade jberet from 1.3.7.Final-redhat-00001 to 1.3.8.Final-redhat-00001
JBEAP-21444 – (7.3.z) Upgrade wf-core from 10.1.20.Final-redhat-00001 to 10.1.21.Final-redhat-00001
JBEAP-21567 – [GSS](7.3.z) Upgrade HAL from 3.2.14.Final-redhat-00001 to 3.2.15.Final-redhat-00001
JBEAP-21582 – (7.3.z) Upgrade remoting from 5.0.20.SP1-redhat-00001 to 5.0.23.Final-redhat-00001
JBEAP-21739 – (7.3.z) Upgrade elytron-web from 1.6.2.Final-redhat-00001 to 1.6.3.Final-redhat-00001
JBEAP-21977 – [SET](7.3.z) Update product CP branch github template

7. Package List:

Red Hat JBoss EAP 7.3 for BaseOS-8:

Source:
eap7-elytron-web-1.6.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el8eap.src.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el8eap.src.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-http-client-1.0.28-1.Final_redhat_00001.1.el8eap.src.rpm

noarch:
eap7-hal-console-3.2.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-5.3.20-3.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-core-5.3.20-3.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-3.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-envers-5.3.20-3.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-java8-5.3.20-3.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-client-hotrod-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-commons-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-core-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.4.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-validator-1.4.33-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jberet-1.3.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jberet-core-1.3.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-remoting-5.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-7.Final_redhat_00008.1.el8eap.noarch.rpm
eap7-netty-4.1.63-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-all-4.1.63-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-undertow-2.0.38-1.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-undertow-server-1.6.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-7.3.8-1.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-1.10.13-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.13-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.28-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.28-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.28-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.28-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.3.8-1.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.3.8-1.GA_redhat_00001.1.el8eap.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-3536
https://access.redhat.com/security/cve/CVE-2021-21409
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Uht6
– —–END PGP SIGNATURE—–

– —————————————————————————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.3.8 security update
Advisory ID: RHSA-2021:2696-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2696
Issue date: 2021-07-13
CVE Names: CVE-2021-3536 CVE-2021-21409
=====================================================================

1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.3.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.8 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.7,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.8 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* netty: Request smuggling via content-length header (CVE-2021-21409)

* wildfly: XSS via admin console when creating roles in domain mode
(CVE-2021-3536)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

The JBoss server process must be restarted for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1944888 – CVE-2021-21409 netty: Request smuggling via content-length header
1948001 – CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode

5. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-20264 – [GSS](7.3.z) ISPN-12787 – Non Transactional Cache needs to be invalidated after commit on JPQL update/delete operation
JBEAP-20503 – [GSS](7.3.z) WFCORE-5185 – Update ProviderDefinition to use optimised service loading API
JBEAP-20623 – [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.20.Final-redhat-00001 to 5.3.20.SP1-redhat-00001
JBEAP-21406 – [GSS](7.3.z) Upgrade Ironjacamar from 1.4.30.Final-redhat-00001 to 1.4.33.Final-redhat-00001
JBEAP-21421 – (7.3.z) Upgrade Infinispan from 9.4.22.Final-redhat-00001 to 9.4.23.Final-redhat-00001
JBEAP-21434 – (7.3.z) Upgrade wildfly-http-client from 1.0.26.Final-redhat-00001 to 1.0.28.Final-redhat-00001
JBEAP-21435 – (7.3.z) Upgrade Elytron from 1.10.12.Final-redhat-00001 to 1.10.13.Final-redhat-00001
JBEAP-21437 – (7.3.z) Upgrade netty from 4.1.60.Final to 4.1.63
JBEAP-21441 – (7.3.z) Upgrade Undertow from 2.0.35.SP1-redhat-00001 to 2.0.38.SP1-redhat-00001
JBEAP-21443 – (7.3.z) Upgrade jberet from 1.3.7.Final-redhat-00001 to 1.3.8.Final-redhat-00001
JBEAP-21444 – (7.3.z) Upgrade wf-core from 10.1.20.Final-redhat-00001 to 10.1.21.Final-redhat-00001
JBEAP-21567 – [GSS](7.3.z) Upgrade HAL from 3.2.14.Final-redhat-00001 to 3.2.15.Final-redhat-00001
JBEAP-21582 – (7.3.z) Upgrade remoting from 5.0.20.SP1-redhat-00001 to 5.0.23.Final-redhat-00001
JBEAP-21739 – (7.3.z) Upgrade elytron-web from 1.6.2.Final-redhat-00001 to 1.6.3.Final-redhat-00001
JBEAP-21977 – [SET](7.3.z) Update product CP branch github template

6. References:

https://access.redhat.com/security/cve/CVE-2021-3536
https://access.redhat.com/security/cve/CVE-2021-21409
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.3
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
– —–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=xciY
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=EGIr
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2363 – [RedHat] Red Hat JBoss Enterprise Application Platform: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2363-redhat-red-hat-jboss-enterprise-application-platform-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2363-redhat-red-hat-jboss-enterprise-application-platform-multiple-vulnerabilities

ESB-2021.2364 – [Debian] linuxptp: Multiple vulnerabilities

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2364
linuxptp security update
14 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: linuxptp
Publisher: Debian
Operating System: Debian GNU/Linux
Impact/Access: Execute Arbitrary Code/Commands — Existing Account
Denial of Service — Existing Account
Access Confidential Data — Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-3570

Reference: ESB-2021.2318

Original Bulletin:
https://lists.debian.org/debian-security-announce/2021/msg00121.html

– ————————–BEGIN INCLUDED TEXT——————–

– —–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– – ————————————————————————-
Debian Security Advisory DSA-4938-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
July 13, 2021 https://www.debian.org/security/faq
– – ————————————————————————-

Package : linuxptp
CVE ID : CVE-2021-3570
Debian Bug : 990748

Miroslav Lichvar reported that the ptp4l program in linuxptp, an
implementation of the Precision Time Protocol (PTP), does not validate
the messageLength field of incoming messages, allowing a remote attacker
to cause a denial of service, information leak, or potentially remote
code execution.

For the stable distribution (buster), this problem has been fixed in
version 1.9.2-1+deb10u1.

We recommend that you upgrade your linuxptp packages.

For the detailed security status of linuxptp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/linuxptp

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
– —–BEGIN PGP SIGNATURE—–
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=7/xl
– —–END PGP SIGNATURE—–

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967
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=kuHx
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2364 – [Debian] linuxptp: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/07/14/esb-2021-2364-debian-linuxptp-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2364-debian-linuxptp-multiple-vulnerabilities

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...