Critical Remote Code Execution Vulnerability in #DHCP Client Let Hackers Take Control of the Network
https://gbhackers.com/dhcp-client/
https://gbhackers.com/dhcp-client/
GBHackers On Security
Critical Remote Code Execution Vulnerability in DHCP Client
A critical remote code execution vulnerability that resides in the DHCP client allows attackers to take control of the system by sending malicious DHCP reply packets.
#NVIDIA Patches High Severity Flaws in Windows GPU Display Driver
NVIDIA released a GPU display driver security update to fix five high and medium severity vulnerabilities that could lead to local code execution, escalation of privileges, and denial of service on vulnerable Windows computers.
https://www.bleepingcomputer.com/news/security/nvidia-patches-high-severity-flaws-in-windows-gpu-display-driver/
NVIDIA released a GPU display driver security update to fix five high and medium severity vulnerabilities that could lead to local code execution, escalation of privileges, and denial of service on vulnerable Windows computers.
https://www.bleepingcomputer.com/news/security/nvidia-patches-high-severity-flaws-in-windows-gpu-display-driver/
BleepingComputer
NVIDIA Patches High Severity Flaws in Windows GPU Display Driver
NVIDIA released a GPU display driver security update to fix five high and medium severity vulnerabilities that could lead to local code execution, escalation of privileges, and denial of service on vulnerable Windows computers.
NTAP-20190802-0001: August 2019 VxWorks TCP/IP Stack (IPNET) Vulnerabilities in #NetApp Products
https://security.netapp.com/advisory/ntap-20190802-0001/
https://security.netapp.com/advisory/ntap-20190802-0001/
Netapp
August 2019 VxWorks TCP/IP Stack (IPNET) Vulnerabilities in NetApp Products | NetApp Product Security
Multiple NetApp products incorporate VxWorks. VxWorks versions 7(SR540 and SR610), 6.5 through 6.9.4.11 and versions of VxWorks using the Interpeak standalone network stack are susceptible to vulnerabilities which when successfully exploited could lead to…
#Cisco Releases Security Updates
Cisco has released security updates to address a vulnerability in Cisco Nexus 9000 Series Fabric Switches. An attacker could exploit this vulnerability to take control of an affected system.
https://www.us-cert.gov/ncas/current-activity/2019/08/01/cisco-releases-security-updates
Cisco has released security updates to address a vulnerability in Cisco Nexus 9000 Series Fabric Switches. An attacker could exploit this vulnerability to take control of an affected system.
https://www.us-cert.gov/ncas/current-activity/2019/08/01/cisco-releases-security-updates
www.us-cert.gov
Cisco Releases Security Updates | CISA
Cisco has released security updates to address a vulnerability in Cisco Nexus 9000 Series Fabric Switches. An attacker could exploit this vulnerability to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
#Pentesting #ActiveDirectory & Pentesting Active Directory Forests
https://www.sniferl4bs.com/2019/08/pentesting-active-directory-pentesting.html
https://www.sniferl4bs.com/2019/08/pentesting-active-directory-pentesting.html
Sniferl4Bs
Pentesting Active Directory & Pentesting Active Directory Forests
Es viernes y el blog vuelve con una entrada? algo raro pasa aquí. Si estas del otro lado del charco es Sabado por la mañana. Como di...
#VMware Releases Security Updates for Multiple Products
https://www.us-cert.gov/ncas/current-activity/2019/08/03/vmware-releases-security-updates-multiple-products
https://www.us-cert.gov/ncas/current-activity/2019/08/03/vmware-releases-security-updates-multiple-products
www.us-cert.gov
VMware Releases Security Updates for Multiple Products | CISA
VMware has released a security advisory to address vulnerabilities affecting multiple products. An attacker could exploit one of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
Forwarded from Una al día
Elevación de privilegios con Avira Software Updater
https://unaaldia.hispasec.com/2019/08/elevacion-de-privilegios-con-avira-software-updater.html
https://unaaldia.hispasec.com/2019/08/elevacion-de-privilegios-con-avira-software-updater.html
Una al Día
Elevación de privilegios con Avira Software Updater — Una al Día
Avira Software Updater es una herramienta diseñada para actualizar automáticamente todos los programas, aplicaciones y controladores instalados en el ordenador, tanto aquellos pertenecientes a Micr…
One Misconfig ( #JIRA ) to Leak Them All- Including NASA and Hundreds of Fortune 500 Companies!
https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including-nasa-and-hundreds-of-fortune-500-companies-a70957ef03c7
https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including-nasa-and-hundreds-of-fortune-500-companies-a70957ef03c7
Medium
One Misconfig (JIRA) to Leak Them All- Including NASA and Hundreds of Fortune 500 Companies!
Hi Guys,
An Introduction To Code Analysis With #Ghidra
https://threatvector.cylance.com/en_us/home/an-introduction-to-code-analysis-with-ghidra.html
https://threatvector.cylance.com/en_us/home/an-introduction-to-code-analysis-with-ghidra.html
BlackBerry
Code Analysis With Ghidra: An Introduction
Ghidra is a free software reverse-engineering framework developed by the NSA and released as open-source software. Learn how to use Ghidra to perform malicious code analysis.
Beware of Emails Asking You to "Confirm Your Unsubscribe" Request
A long-running #scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be clicked on or responded to as they are designed to harvest working email addresses or to perform some other type of scam.
https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/
A long-running #scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be clicked on or responded to as they are designed to harvest working email addresses or to perform some other type of scam.
https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/
BleepingComputer
Beware of Emails Asking You to "Confirm Your Unsubscribe" Request
A long-running scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be clicked on or responded to as they are designed to harvest working email addresses or to perform some other…
Package : #proftpd dfsg
CVE ID : CVE-2019-12815
Debian Bug : 932453
Tobias Maedel discovered that the mod_copy module of ProFTPD, a FTP/SFTP/FTPS server, performed incomplete permission validation for the CPFR/CPTO commands.
https://lists.debian.org/debian-security-announce/2019/msg00139.html
CVE ID : CVE-2019-12815
Debian Bug : 932453
Tobias Maedel discovered that the mod_copy module of ProFTPD, a FTP/SFTP/FTPS server, performed incomplete permission validation for the CPFR/CPTO commands.
https://lists.debian.org/debian-security-announce/2019/msg00139.html
Múltiples vulnerabilidades en productos VMware
Fecha de publicación: 05/08/2019
Importancia: 4 - Alta
Recursos afectados:
VMware vSphere ESXi, versiones 6.5 y 6.7.
VMware Workstation Pro / Player, versiones 14.x y 15.x.
VMware Fusion Pro / Fusion, versiones 10.x y 11.x.
Descripción:
Piotr Bania, de Cisco Talos, ha reportado dos vulnerabilidades a VMware, de lectura y escritura fuera de límites que afectan a los productos ESXi, Workstation y Fusion.
#Incibe
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-vmware-10
Fecha de publicación: 05/08/2019
Importancia: 4 - Alta
Recursos afectados:
VMware vSphere ESXi, versiones 6.5 y 6.7.
VMware Workstation Pro / Player, versiones 14.x y 15.x.
VMware Fusion Pro / Fusion, versiones 10.x y 11.x.
Descripción:
Piotr Bania, de Cisco Talos, ha reportado dos vulnerabilidades a VMware, de lectura y escritura fuera de límites que afectan a los productos ESXi, Workstation y Fusion.
#Incibe
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-vmware-10
INCIBE-CERT
Múltiples vulnerabilidades en productos VMware
Piotr Bania, de Cisco Talos, ha reportado dos vulnerabilidades a VMware, de lectura y escritura fuera de límites que afectan a los productos ESXi, Workstation y Fusion.
#Microsoft launches #Azure Security Lab, expands #bugbounty rewards
Researchers can earn up to $40,000 for reporting Azure vulnerabilities.
https://www.zdnet.com/article/microsoft-announces-azure-security-lab-azure-bug-bounty-expansion/
Researchers can earn up to $40,000 for reporting Azure vulnerabilities.
https://www.zdnet.com/article/microsoft-announces-azure-security-lab-azure-bug-bounty-expansion/
ZDNet
Microsoft launches Azure Security Lab, expands bug bounty rewards
Researchers can earn up to $40,000 for reporting Azure vulnerabilities.
ECh0raix #Ransomware #Decryptor Restores #QNAP Files For Free
A decryptor for the eCh0raix Ransomware, or QNAPCrypt, has been released that allows victims to recover encrypted files on their QNAP NAS devices.
https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/
A decryptor for the eCh0raix Ransomware, or QNAPCrypt, has been released that allows victims to recover encrypted files on their QNAP NAS devices.
https://www.bleepingcomputer.com/ransomware/decryptor/ech0raix-ransomware-decryptor-restores-qnap-files-for-free/
¿NECESITAS AYUDA para desbloquear tu vida digital sin pagar el rescate a tus atacantes?
#decryptor #Ransomware
https://www.nomoreransom.org/
#decryptor #Ransomware
https://www.nomoreransom.org/
Hide *Exploitable* Extended-Rights (including DCSync privs) to remain persistence
#ActiveDirectory
https://medium.com/@huykha/hide-exploitable-extended-rights-to-remain-persistence-92a2e1d3670d
#ActiveDirectory
https://medium.com/@huykha/hide-exploitable-extended-rights-to-remain-persistence-92a2e1d3670d
Auditing containers with #osquery
When running containers in production with Docker, bad configurations can easily lead to vulnerable environments: privileged containers, processes inside a container that are running with the root user or lack of AppArmor profiles for security restrictions are some common examples. An attacker who exploits application vulnerabilities in the container could use this lack of restrictions to access to the host or other servers on your network. Using osquery, we will query the Docker daemon like a relational database and quickly identify these security flaws.
https://itnext.io/auditing-containers-with-osquery-389636f8c420
When running containers in production with Docker, bad configurations can easily lead to vulnerable environments: privileged containers, processes inside a container that are running with the root user or lack of AppArmor profiles for security restrictions are some common examples. An attacker who exploits application vulnerabilities in the container could use this lack of restrictions to access to the host or other servers on your network. Using osquery, we will query the Docker daemon like a relational database and quickly identify these security flaws.
https://itnext.io/auditing-containers-with-osquery-389636f8c420
Medium
Auditing containers with osquery
When running containers in production with Docker, bad configurations can easily lead to vulnerable environments: privileged containers…
#OSQuery Nuestro Linux controlado en todo momento
https://www.ochobitshacenunbyte.com/2018/07/19/osquery-nuestro-linux-controlado-en-todo-momento/
https://www.ochobitshacenunbyte.com/2018/07/19/osquery-nuestro-linux-controlado-en-todo-momento/
ochobitshacenunbyte
OSQuery: Nuestro Linux controlado en todo momento - ochobitshacenunbyte
Analizamos este framework llamado OSQuery, creado en sus origienes por el equipo de Desarrollo, que nos permite tener controlado nuestro sistema Linux.
Múltiples vulnerabilidades en Cisco Small Business 220 Series Smart Switches
Fecha de publicación: 07/08/2019
Importancia: 5 - Crítica
Recursos afectados:
Cisco Small Business 220 Series Smart Switches que ejecuten firmware anterior a 1.1.4.4 con la interfaz de gestión web habilitada.
Descripción:
El investigador de seguridad, bashis, a través del programa de divulgación VDOO, ha informado del descubrimiento de dos vulnerabilidades, ambas de severidad crítica, de tipo omisión de autenticación y ejecución remota de código.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-cisco-small-business-220-series-smart
Fecha de publicación: 07/08/2019
Importancia: 5 - Crítica
Recursos afectados:
Cisco Small Business 220 Series Smart Switches que ejecuten firmware anterior a 1.1.4.4 con la interfaz de gestión web habilitada.
Descripción:
El investigador de seguridad, bashis, a través del programa de divulgación VDOO, ha informado del descubrimiento de dos vulnerabilidades, ambas de severidad crítica, de tipo omisión de autenticación y ejecución remota de código.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-cisco-small-business-220-series-smart
INCIBE-CERT
Múltiples vulnerabilidades en Cisco Small Business 220 Series Smart Switches
El investigador de seguridad, bashis, a través del programa de divulgación VDOO, ha informado del descubrimiento de dos vulnerabilidades, ambas de severidad crítica, de tipo omisión de autenticación y ejecución remota de código.
Evasión de restricciones de acceso en CVAE de HPE
Fecha de publicación: 07/08/2019
Importancia: 4 - Alta
Recursos afectados:
HP XP7 CVAE (Command View Advanced Edition), versiones anteriores a 8.6.2-02.
DevMgr, versiones desde 7.0.0-00, hasta la anterior a 8.6.1-02.
RepMgr y TSMgr, si están instalados en la misma máquina que DevMgr.
Descripción:
El equipo de respuesta de seguridad de HPE ha descubierto una vulnerabilidad que podría saltarse o evitar las restricciones de acceso, tanto de manera local como remota, en el producto CVAE (Command View Advanced Edition) del fabricante.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/evasion-restricciones-acceso-cvae-hpe
Fecha de publicación: 07/08/2019
Importancia: 4 - Alta
Recursos afectados:
HP XP7 CVAE (Command View Advanced Edition), versiones anteriores a 8.6.2-02.
DevMgr, versiones desde 7.0.0-00, hasta la anterior a 8.6.1-02.
RepMgr y TSMgr, si están instalados en la misma máquina que DevMgr.
Descripción:
El equipo de respuesta de seguridad de HPE ha descubierto una vulnerabilidad que podría saltarse o evitar las restricciones de acceso, tanto de manera local como remota, en el producto CVAE (Command View Advanced Edition) del fabricante.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/evasion-restricciones-acceso-cvae-hpe
INCIBE-CERT
Evasión de restricciones de acceso en CVAE de HPE
El equipo de respuesta de seguridad de HPE ha descubierto una vulnerabilidad que podría saltarse o evitar las restricciones de acceso, tanto de manera local como remota, en el producto CVAE (Command View Advanced Edition) del fabricante.
Vulnerabilidad de canal lateral SWAPGS en múltiples CPUs
Fecha de publicación: 07/08/2019
Importancia: 3 - Media
Recursos afectados:
Las CPUs que soportan la instrucción SWAPGS se ven afectadas. Varios fabricantes han publicado avisos relativos a esta vulnerabilidad, especificando sus productos afectados:
Microsoft.
Red Hat.
Descripción:
Los investigadores Dan Horea Luțaș y Andrei Vlad Luțaș, de Bitdefender, han descubierto una nueva vulnerabilidad de ejecución especulativa, y han demostrado cómo puede ser explotada a través de un ataque de canal lateral (side-channel attack), denominándolo ataque SWAPGS. Esta vulnerabilidad es una variante de Spectre Variant 1
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-canal-lateral-swapgs-multiples-cpus
Fecha de publicación: 07/08/2019
Importancia: 3 - Media
Recursos afectados:
Las CPUs que soportan la instrucción SWAPGS se ven afectadas. Varios fabricantes han publicado avisos relativos a esta vulnerabilidad, especificando sus productos afectados:
Microsoft.
Red Hat.
Descripción:
Los investigadores Dan Horea Luțaș y Andrei Vlad Luțaș, de Bitdefender, han descubierto una nueva vulnerabilidad de ejecución especulativa, y han demostrado cómo puede ser explotada a través de un ataque de canal lateral (side-channel attack), denominándolo ataque SWAPGS. Esta vulnerabilidad es una variante de Spectre Variant 1
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-canal-lateral-swapgs-multiples-cpus
INCIBE-CERT
Vulnerabilidad de canal lateral SWAPGS en múltiples CPUs
Los investigadores Dan Horea Luțaș y Andrei Vlad Luțaș, de Bitdefender, han descubierto una nueva vulnerabilidad de ejecución especulativa, y han demostrado cómo puede ser explotada a través de un ataque de canal lateral (side-channel attack), denominándolo…