Comunidad Pen7esting
3.59K subscribers
511 photos
40 videos
142 files
5.09K links
Download Telegram
Próximamente, nuevo canal de Youtube NFT
Multiple Cisco Products Snort Modbus Denial of Service Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Multiple%20Cisco%20Products%20Snort%20Modbus%20Denial%20of%20Service%20Vulnerability&vs_k=1

A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj



Security Impact Rating: High



CVE: CVE-2022-20685
VMSA-2021-0028.9

CVSSv3 Range:9.0-10.0
Issue Date:2021-12-10
Updated On:2022-01-19

CVE(s): CVE-2021-44228, CVE-2021-45046

Synopsis:
VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)

https://www.vmware.com/security/advisories/VMSA-2021-0028.html
📃 "Mejores distribuciones de Linux para hacking ético" https://blog.elhacker.net/2021/11/mejores-distribuciones-de-linux-para-hacking-etico-pentest.html
🛠 Kali Linux (Debian)
🛠 ArchStrike (ex ArchAssault)
🛠 BackArch (Arch)
🛠 Demon Linux (Debian)
🛠 BackBox (Ubuntu)
🛠 Parrot OS (Debian)
🛠 CAINE
🛠 Pentoo
🛠 Network Security (NST, Debian)
🛠 Samurai Web Training Framework OWASP (OVA)
🛠 Cyborg Hawk
Nueva vulnerabilidad en SolarWinds es utilizada para aprovechar fallas de Log4j
https://blog.segu-info.com.ar/2022/01/nueva-vulnerabilidad-en-solarwinds-es.html
🔐▶️ La Unión Europea prepara un DNS público propio con el que bloquear el tráfico "ilegal y malicioso" pero también podrán filtrar webs o apps consideradas "maliciosas".

DNS4EU ha sido propuesto esta semana por la UE. Su funcionamiento es sencillo, se trata de un DNS más pero que sigue los designios de las administraciones europeas. "DNS4EU ofrecerá un alto nivel de resiliencia, protección de ciberseguridad global y específica de la UE, protección de datos y privacidad de acuerdo con las normas de la UE, garantizará que los datos de resolución de DNS se procesen en Europa y que los datos personales no se moneticen", explica el comunicado.

https://www.xataka.com/privacidad/union-europea-prepara-dns-publico-propio-que-bloquear-trafico-ilegal-malicioso