πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2023-3567 β€Ό

A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This flaw allows an attacker with local user access to cause a system crash or leak internal kernel information.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32252 β€Ό

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33952 β€Ό

A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3745 β€Ό

A heap-based buffer overflow issue was found in ImageMagick's PushCharPixel() function in quantum-private.h. This issue may allow a local attacker to trick the user into opening a specially crafted file, triggering an out-of-bounds read error and allowing an application to crash, resulting in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3019 β€Ό

A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32257 β€Ό

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26078 β€Ό

Privilege escalation vulnerability was discovered in Atera Agent 1.8.4.4 and prior on Windows due to mishandling of privileged APIs.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32247 β€Ό

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3812 β€Ό

An out-of-bounds memory access flaw was found in the Linux kernelÒ€ℒs TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3750 β€Ό

A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-38200 β€Ό

A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3870 β€Ό

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-32248 β€Ό

A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-2860 β€Ό

An out-of-bounds read vulnerability was found in the SR-IPv6 implementation in the Linux kernel. The flaw exists within the processing of seg6 attributes. The issue results from the improper validation of user-supplied data, which can result in a read past the end of an allocated buffer. This flaw allows a privileged local user to disclose sensitive information on affected installations of the Linux kernel.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-33951 β€Ό

A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.

πŸ“– Read

via "National Vulnerability Database".
❀1
🦿 Hardware-bound passkeys are still ultimate in security: Yubico VP 🦿

Derek Hanson, Yubico’s VP of standards and alliances and an industry expert on passkeys, discusses why device-bound-to-shareable passkeys are critical.

πŸ“– Read

via "Tech Republic".
β€Ό CVE-2023-3321 β€Ό

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB AbilityΓ’β€žΒ’ zenon: from 11 build through 11 build 106404.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3324 β€Ό

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB AbilityΓ’β€žΒ’ zenon: from 11 build through 11 build 106404.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-26077 β€Ό

Atera Agent through 1.8.3.6 on Windows Creates a Temporary File in a Directory with Insecure Permissions.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3323 β€Ό

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB AbilityΓ’β€žΒ’ zenon: from 11 build through 11 build 106404.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2023-3322 β€Ό

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially craftedprograms to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.This issue affects ABB AbilityΓ’β€žΒ’ zenon: from 11 build through 11 build 106404.

πŸ“– Read

via "National Vulnerability Database".