π΄ Microsoft Fixes 58 CVEs for December Patch Tuesday π΄
π Read
via "Dark Reading".
The last Patch Tuesday of 2020 brings fixes for Critical vulnerabilities in Microsoft SharePoint and Exchange.π Read
via "Dark Reading".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β FireEye Cyberattack Compromises Red-Team Security Tools β
π Read
via "Threat Post".
An attacker stole FireEye's Red Team assessment tools that the company uses to test its customersβ security.π Read
via "Threat Post".
Threat Post
FireEye Cyberattack Compromises Red-Team Security Tools
An attacker stole FireEye's Red Team assessment tools that the company uses to test its customersβ security.
π΄ Nation-State Hackers Breached FireEye, Stole Its Red Team Tools π΄
π Read
via "Dark Reading".
"Novel techniques" used by the attackers cheated security tools and forensics, according to FireEye CEO Kevin Mandia.π Read
via "Dark Reading".
Dark Reading
Nation-State Hackers Breached FireEye, Stole Its Red Team Tools
Novel techniques used by the attackers cheated security tools and forensics, according to FireEye CEO Kevin Mandia.
β Google Patches Critical Wi-Fi and Audio Bugs in Android Handsets β
π Read
via "Threat Post".
Google updates its mobile OS, fixing ten critical bugs, including one remote code execution flaw.π Read
via "Threat Post".
Threat Post
Google Patches Critical Wi-Fi and Audio Bugs in Android Handsets
Google updates its mobile OS, fixing ten critical bugs, including one remote code execution flaw.
π΄ Open-Source Developers Still Not Interested in Secure Coding π΄
π Read
via "Dark Reading".
Security and development are still two different worlds, with open-source developers resistant to spending time finding and fixing vulnerabilities.π Read
via "Dark Reading".
Dark Reading
Open Source Developers Still Not Interested in Secure Coding
Security and development are still two different worlds, with open source developers resistant to spending time finding and fixing vulnerabilities.
βΌ CVE-2020-27910 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted audio file may lead to arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27925 βΌ
π Read
via "National Vulnerability Database".
An issue existed in the handling of incoming calls. The issue was addressed with additional state checks. This issue is fixed in iOS 14.2 and iPadOS 14.2. A user may answer two calls simultaneously without indication they have answered a second call.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27821 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27917 βΌ
π Read
via "National Vulnerability Database".
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27906 βΌ
π Read
via "National Vulnerability Database".
Multiple integer overflows were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1. A remote attacker may be able to cause unexpected application termination or heap corruption.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27900 βΌ
π Read
via "National Vulnerability Database".
An issue existed in the handling of snapshots. The issue was resolved with improved permissions logic. This issue is fixed in macOS Big Sur 11.0.1. A malicious application may be able to preview files it does not have access to.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25667 βΌ
π Read
via "National Vulnerability Database".
TIFFGetProfiles() in /coders/tiff.c calls strstr() which causes a large out-of-bounds read when it searches for `"dc:format=\"image/dng\"` within `profile` due to improper string handling, when a crafted input file is provided to ImageMagick. The patch uses a StringInfo type instead of a raw C string to remedy this. This could cause an impact to availability of the application. This flaw affects ImageMagick versions prior to 7.0.9-0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27911 βΌ
π Read
via "National Vulnerability Database".
An integer overflow was addressed through improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. A remote attacker may be able to cause unexpected application termination or arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27750 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/colorspace-private.h and MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned char` and math division by zero. This would most likely lead to an impact to application availability, but could potentially cause other problems related to undefined behavior. This flaw affects ImageMagick versions prior to 7.0.8-68.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27753 βΌ
π Read
via "National Vulnerability Database".
There are several memory leaks in the MIFF coder in /coders/miff.c due to improper image depth values, which can be triggered by a specially crafted input file. These leaks could potentially lead to an impact to application availability or cause a denial of service. It was originally reported that the issues were in `AcquireMagickMemory()` because that is where LeakSanitizer detected the leaks, but the patch resolves issues in the MIFF coder, which incorrectly handles data being passed to `AcquireMagickMemory()`. This flaw affects ImageMagick versions prior to 7.0.9-0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27752 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in ImageMagick in MagickCore/quantum-private.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger a heap buffer overflow. This would most likely lead to an impact to application availability, but could potentially lead to an impact to data integrity as well. This flaw affects ImageMagick versions prior to 7.0.9-0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27895 βΌ
π Read
via "National Vulnerability Database".
An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25674 βΌ
π Read
via "National Vulnerability Database".
WriteOnePNGImage() from coders/png.c (the PNG coder) has a for loop with an improper exit condition that can allow an out-of-bounds READ via heap-buffer-overflow. This occurs because it is possible for the colormap to have less than 256 valid values but the loop condition will loop 256 times, attempting to pass invalid colormap data to the event logger. The patch replaces the hardcoded 256 value with a call to MagickMin() to ensure the proper value is used. This could impact application availability when a specially crafted input file is processed by ImageMagick. This flaw affects ImageMagick versions prior to 7.0.8-68.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27927 βΌ
π Read
via "National Vulnerability Database".
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted font file may lead to arbitrary code execution.π Read
via "National Vulnerability Database".
βΌ CVE-2020-27755 βΌ
π Read
via "National Vulnerability Database".
in SetImageExtent() of /MagickCore/image.c, an incorrect image depth size can cause a memory leak because the code which checks for the proper image depth size does not reset the size in the event there is an invalid size. The patch resets the depth to a proper size before throwing an exception. The memory leak can be triggered by a crafted input file that is processed by ImageMagick and could cause an impact to application reliability, such as denial of service. This flaw affects ImageMagick versions prior to 7.0.9-0.π Read
via "National Vulnerability Database".
βΌ CVE-2020-25675 βΌ
π Read
via "National Vulnerability Database".
In the CropImage() and CropImageToTiles() routines of MagickCore/transform.c, rounding calculations performed on unconstrained pixel offsets was causing undefined behavior in the form of integer overflow and out-of-range values as reported by UndefinedBehaviorSanitizer. Such issues could cause a negative impact to application availability or other problems related to undefined behavior, in cases where ImageMagick processes untrusted input data. The upstream patch introduces functionality to constrain the pixel offsets and prevent these issues. This flaw affects ImageMagick versions prior to 7.0.9-0.π Read
via "National Vulnerability Database".