RHSA-2019:4056 - Security Advisory
Important: kernel security update
Security Advisory: Important
Tema:
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
https://access.redhat.com/errata/RHSA-2019:4056
Important: kernel security update
Security Advisory: Important
Tema:
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
https://access.redhat.com/errata/RHSA-2019:4056
Critical Flaw in #GoAhead Web Server Could Affect Wide Range of #IoT Devices
Cybersecurity researchers today uncovered details of two new vulnerabilities in the GoAhead web server software, a tiny application widely embedded in hundreds of millions of Internet-connected smart devices.
One of the two vulnerabilities, assigned as CVE-2019-5096, is a critical code execution flaw that can be exploited by attackers to execute malicious code on vulnerable devices and take control over them.
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
Cybersecurity researchers today uncovered details of two new vulnerabilities in the GoAhead web server software, a tiny application widely embedded in hundreds of millions of Internet-connected smart devices.
One of the two vulnerabilities, assigned as CVE-2019-5096, is a critical code execution flaw that can be exploited by attackers to execute malicious code on vulnerable devices and take control over them.
https://thehackernews.com/2019/12/goahead-web-server-hacking.html
Critical Vulnerability in #Microsoft #Azure Let Hackers Take Over the Complete Control of the Azure Accounts
Researchers discovered a critical vulnerability in Microsoft Azure named “ #BlackDirect ” that allows attackers to take over the Azure user’s accounts and creating the Token with the victim’s permissions.
The vulnerability specifically affected Microsoft’s OAuth 2.0 applications that allow malicious attacker access and control a victim’s account
https://gbhackers.com/microsoft-azure/
Researchers discovered a critical vulnerability in Microsoft Azure named “ #BlackDirect ” that allows attackers to take over the Azure user’s accounts and creating the Token with the victim’s permissions.
The vulnerability specifically affected Microsoft’s OAuth 2.0 applications that allow malicious attacker access and control a victim’s account
https://gbhackers.com/microsoft-azure/
GBHackers on Security | #1 Globally Trusted Cyber Security News Platform
Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts
Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts
#Cisco and #AWS Team Up for Better Application Performance, Enhanced Security
https://blogs.cisco.com/enterprise/cisco-and-aws-extend-partnership-in-campus-datacenter
https://blogs.cisco.com/enterprise/cisco-and-aws-extend-partnership-in-campus-datacenter
Cisco Blogs
Cisco and AWS Team Up for Better Application Performance, Enhanced Security - Cisco Blogs
Cisco's enhanced integration partnership with AWS will lead to cloud apps that perform better and more securely. We will make it more straightforward for you to deploy new apps on hybrid networks, to make apps more manageable using the Cisco network tools…
Breaking the Rules: A Tough #Outlook for Home Page Attacks (CVE-2017-11774)
Attackers have a dirty little secret that is being used to conduct big intrusions. We’ll explain how they're "unpatching" an exploit and then provide new Outlook hardening guidance that is not available elsewhere. Specifically, this blog post covers field-tested automated registry processing for registry keys to protect against attacker attempts to reverse Microsoft’s CVE-2017-11774 patch functionality.
https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
Attackers have a dirty little secret that is being used to conduct big intrusions. We’ll explain how they're "unpatching" an exploit and then provide new Outlook hardening guidance that is not available elsewhere. Specifically, this blog post covers field-tested automated registry processing for registry keys to protect against attacker attempts to reverse Microsoft’s CVE-2017-11774 patch functionality.
https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
Google Cloud Blog
Breaking the Rules: A Tough Outlook for Home Page Attacks (CVE-2017-11774) | Mandiant | Google Cloud Blog
[SECURITY] [DLA 2020-1] libonig security update
Package : libonig
Version : 5.9.5-3.2+deb8u4
CVE ID : CVE-2019-19012 CVE-2019-19204 CVE-2019-19246
Debian Bug : 944959 945313
Several vulnerabilities were discovered in the Oniguruma regular expressions library, notably used in PHP mbstring. CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Package : libonig
Version : 5.9.5-3.2+deb8u4
CVE ID : CVE-2019-19012 CVE-2019-19204 CVE-2019-19246
Debian Bug : 944959 945313
Several vulnerabilities were discovered in the Oniguruma regular expressions library, notably used in PHP mbstring. CVE-2019-19012
https://lists.debian.org/debian-lts-announce/2019/12/msg00002.html
Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter
Exposed private cert key may also be an issue for IBM Aspera
Updated Twitter security celeb SwiftOnSecurity on Tuesday inadvertently disclosed a zero-day vulnerability affecting enterprise software biz Atlassian, a flaw that may be echoed in IBM's Aspera software.
The SwiftOnSecurity Twitter account revealed that Atlassian provided a domain that resolved to a local server with a common SSL certificate for its Confluence cloud service, to enable the Atlassian Companion app to edit files in a preferred local application and save the files back to Confluence.
https://www.theregister.co.uk/2019/12/05/atlassian_zero_day_bug/
Exposed private cert key may also be an issue for IBM Aspera
Updated Twitter security celeb SwiftOnSecurity on Tuesday inadvertently disclosed a zero-day vulnerability affecting enterprise software biz Atlassian, a flaw that may be echoed in IBM's Aspera software.
The SwiftOnSecurity Twitter account revealed that Atlassian provided a domain that resolved to a local server with a common SSL certificate for its Confluence cloud service, to enable the Atlassian Companion app to edit files in a preferred local application and save the files back to Confluence.
https://www.theregister.co.uk/2019/12/05/atlassian_zero_day_bug/
www.theregister.co.uk
Atlassian scrambles to fix zero-day security hole accidentally disclosed on Twitter
Exposed private cert key may also be an issue for IBM Aspera
Mozilla Releases Security Updates for Firefox and Firefox ESR
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisories for Firefox 71 and Firefox ESR 68.3.
https://www.us-cert.gov/ncas/current-activity/2019/12/04/mozilla-releases-security-updates-firefox-and-firefox-esr
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Mozilla Security Advisories for Firefox 71 and Firefox ESR 68.3.
https://www.us-cert.gov/ncas/current-activity/2019/12/04/mozilla-releases-security-updates-firefox-and-firefox-esr
www.us-cert.gov
Mozilla Releases Security Updates for Firefox and Firefox ESR | CISA
Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
The Cybersecurity and Infrastructure Security Agency (CISA) encourages…
Múltiples vulnerabilidades en Liferay
Fecha de publicación: 04/12/2019
Importancia: 5 - Crítica
Recursos afectados:
Liferay Portal, versión 7.2.0 y anteriores.
Descripción:
Se han detectado 6 vulnerabilidades, una con severidad crítica y cinco con severidades altas. Un atacante remoto podría obtener credenciales de usuario, ejecución o inyección de código, generar una condición de denegación de servicio (DoS) o realizar acciones sin autorización sobre los recursos del sistema.
Solución:
Actualizar la versión Liferay Portal 7.2.1 o posterior, cuando esté disponible.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-liferay-2
Fecha de publicación: 04/12/2019
Importancia: 5 - Crítica
Recursos afectados:
Liferay Portal, versión 7.2.0 y anteriores.
Descripción:
Se han detectado 6 vulnerabilidades, una con severidad crítica y cinco con severidades altas. Un atacante remoto podría obtener credenciales de usuario, ejecución o inyección de código, generar una condición de denegación de servicio (DoS) o realizar acciones sin autorización sobre los recursos del sistema.
Solución:
Actualizar la versión Liferay Portal 7.2.1 o posterior, cuando esté disponible.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-liferay-2
INCIBE-CERT
Múltiples vulnerabilidades en Liferay
Se han detectado 6 vulnerabilidades, una con severidad crítica y cinco con severidades altas. Un atacante remoto podría obtener credenciales de usuario, ejecución o inyección de código, generar una
Two malicious #Python libraries caught stealing #SSH and #GPG keys
One library was available for only two days, but the second was live for nearly a year.
The Python security team removed two trojanized Python libraries from PyPI (Python Package Index) that were caught stealing SSH and GPG keys from the projects of infected developers.
https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/
One library was available for only two days, but the second was live for nearly a year.
The Python security team removed two trojanized Python libraries from PyPI (Python Package Index) that were caught stealing SSH and GPG keys from the projects of infected developers.
https://www.zdnet.com/article/two-malicious-python-libraries-removed-from-pypi/
ZDNET
Two malicious Python libraries caught stealing SSH and GPG keys
One library was available for only two days, but the second was live for nearly a year.
Verificación inadecuada de autenticación en Palo Alto PAN-OS
Fecha de publicación: 05/12/2019
Importancia: 4 - Alta
Recursos afectados:
PAN-OS 7.1, versiones anteriores a la 7.1.25;
PAN-OS 8.0, versiones anteriores a la 8.0.20;
PAN-OS 8.1, versiones anteriores a la 8.1.11;
PAN-OS 9.0, versiones anteriores a la 9.0.5.
Descripción:
Palo Alto ha publicado una vulnerabilidad en PAN-OS que podría permitir a un atacante escalar privilegios
Solución:
Actualizar a las versiones 7.1.25, 8.0.20, 8.1.11, 9.0.5 o posteriores.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/verificacion-inadecuada-autenticacion-palo-alto-pan-os
Fecha de publicación: 05/12/2019
Importancia: 4 - Alta
Recursos afectados:
PAN-OS 7.1, versiones anteriores a la 7.1.25;
PAN-OS 8.0, versiones anteriores a la 8.0.20;
PAN-OS 8.1, versiones anteriores a la 8.1.11;
PAN-OS 9.0, versiones anteriores a la 9.0.5.
Descripción:
Palo Alto ha publicado una vulnerabilidad en PAN-OS que podría permitir a un atacante escalar privilegios
Solución:
Actualizar a las versiones 7.1.25, 8.0.20, 8.1.11, 9.0.5 o posteriores.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/verificacion-inadecuada-autenticacion-palo-alto-pan-os
INCIBE-CERT
Verificación inadecuada de autenticación en Palo Alto PAN-OS
Palo Alto ha publicado una vulnerabilidad en PAN-OS que podría permitir a un atacante escalar privilegios
Cómo te levantan 100.000€ sin pestañear – Análisis forense de una «Estafa al CEO» (I)
https://www.securityartwork.es/2019/12/03/como-te-levantan-100-000e-sin-pestanear-analisis-forense-de-una-estafa-al-ceo-i/
Cómo te levantan 100.000€ sin pestañear – Análisis forense de una «Estafa al CEO» (II)
https://www.securityartwork.es/2019/12/05/como-te-levantan-100-000e-sin-pestanear-analisis-forense-de-una-estafa-al-ceo-ii/
https://www.securityartwork.es/2019/12/03/como-te-levantan-100-000e-sin-pestanear-analisis-forense-de-una-estafa-al-ceo-i/
Cómo te levantan 100.000€ sin pestañear – Análisis forense de una «Estafa al CEO» (II)
https://www.securityartwork.es/2019/12/05/como-te-levantan-100-000e-sin-pestanear-analisis-forense-de-una-estafa-al-ceo-ii/
#Microsoft Releases Security Advisory for #WindowsHello for Business
Microsoft has released a Security Advisory to address an issue in Windows Hello for Business (WHfB). An attacker could exploit this issue on devices that were affected by CVE-2017-15361, also known as Return of Coppersmith’s Attack (ROCA), to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Microsoft Security Advisories ADV190026 and ADV170012 and apply the recommended mitigations.
https://www.us-cert.gov/ncas/current-activity/2019/12/05/microsoft-releases-security-advisory-windows-hello-business
Microsoft has released a Security Advisory to address an issue in Windows Hello for Business (WHfB). An attacker could exploit this issue on devices that were affected by CVE-2017-15361, also known as Return of Coppersmith’s Attack (ROCA), to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Microsoft Security Advisories ADV190026 and ADV170012 and apply the recommended mitigations.
https://www.us-cert.gov/ncas/current-activity/2019/12/05/microsoft-releases-security-advisory-windows-hello-business
www.us-cert.gov
Microsoft Releases Security Advisory for Windows Hello for Business | CISA
Microsoft has released a Security Advisory to address an issue in Windows Hello for Business (WHfB). An attacker could exploit this issue on devices that were affected by CVE-2017-15361, also known as Return of Coppersmith’s Attack (ROCA), to take control…
The Advantages of Next-Generation Firewalls (NGFWs)
Network managers and security teams are facing a double-edged challenge: networks are growing far more complex and expanding across multiple perimeters just as threat vectors become increasingly difficult to detect and threats grow more sophisticated. The Next-Generation Firewall (NGFW) offers a solution. According to Cisco ASA reviews and Cisco Firepower NGFW reviews on IT Central Station, they enable greater visibility into the network and applications while improving threat mitigation.
https://blogs.cisco.com/security/the-advantages-of-next-generation-firewalls
Network managers and security teams are facing a double-edged challenge: networks are growing far more complex and expanding across multiple perimeters just as threat vectors become increasingly difficult to detect and threats grow more sophisticated. The Next-Generation Firewall (NGFW) offers a solution. According to Cisco ASA reviews and Cisco Firepower NGFW reviews on IT Central Station, they enable greater visibility into the network and applications while improving threat mitigation.
https://blogs.cisco.com/security/the-advantages-of-next-generation-firewalls
Cisco Blogs
The Advantages of Next-Generation Firewalls (NGFWs) - Cisco Blogs
Read what other IT professionals are saying about Cisco ASA and Firepower NGFW devices enabling greater visibility into the network and applications while improving threat mitigation.
Múltiples vulnerabilidades en productos de Netgear
Fecha de publicación: 05/12/2019
Importancia: 5 - Crítica
Descripción:
Netgear ha publicado 21 vulnerabilidades, 1 de severidad crítica y 20 de severidad alta, que afectan a sus productos.
Solución:
Acceder a la página de soporte de Netgear, y descargar la última versión del firmware del dispositivo afectado.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-netgear-9
Fecha de publicación: 05/12/2019
Importancia: 5 - Crítica
Descripción:
Netgear ha publicado 21 vulnerabilidades, 1 de severidad crítica y 20 de severidad alta, que afectan a sus productos.
Solución:
Acceder a la página de soporte de Netgear, y descargar la última versión del firmware del dispositivo afectado.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-netgear-9
INCIBE-CERT
Múltiples vulnerabilidades en productos de Netgear
Netgear ha publicado 21 vulnerabilidades, 1 de severidad crítica y 20 de severidad alta, que afectan a sus productos.
CVE-2019-14899 flaw allows hijacking #VPN connections on #Linux, #Unix systems
Researchers discovered a vulnerability tracked as CVE-2019-14899 that can be exploited to hijack active TCP connections in a VPN tunnel
https://securityaffairs.co/wordpress/94764/hacking/cve-2019-14899-vpn-flaw.html
Researchers discovered a vulnerability tracked as CVE-2019-14899 that can be exploited to hijack active TCP connections in a VPN tunnel
https://securityaffairs.co/wordpress/94764/hacking/cve-2019-14899-vpn-flaw.html
Security Affairs
CVE-2019-14899 flaw allows hijacking VPN connections on Linux, Unix
Researchers discovered a vulnerability tracked as CVE-2019-14899 that can be exploited to hijack active TCP connections in a VPN tunnel
VMware Releases Security Updates for ESXi and Horizon DaaS
VMware has released security updates to address a vulnerability in ESXi and Horizon DaaS. An attacker could exploit this vulnerability to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review VMware Security Advisory VMSA-2019-0022 and apply the necessary updates and workarounds.
https://www.us-cert.gov/ncas/current-activity/2019/12/06/vmware-releases-security-updates-esxi-and-horizon-daas
VMware has released security updates to address a vulnerability in ESXi and Horizon DaaS. An attacker could exploit this vulnerability to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review VMware Security Advisory VMSA-2019-0022 and apply the necessary updates and workarounds.
https://www.us-cert.gov/ncas/current-activity/2019/12/06/vmware-releases-security-updates-esxi-and-horizon-daas
www.us-cert.gov
VMware Releases Security Updates for ESXi and Horizon DaaS | CISA
VMware has released security updates to address a vulnerability in ESXi and Horizon DaaS. An attacker could exploit this vulnerability to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and…
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and…
FBI Recommends Securing Your Smart TVs and IoT Devices
The U.S. Federal Bureau of Investigation (FBI) recommends making sure that Internet of Things (IoT) devices and smart TVs in your home are properly configured to protect them and your other devices from potential attackers.
https://www.bleepingcomputer.com/news/security/fbi-recommends-securing-your-smart-tvs-and-iot-devices/
The U.S. Federal Bureau of Investigation (FBI) recommends making sure that Internet of Things (IoT) devices and smart TVs in your home are properly configured to protect them and your other devices from potential attackers.
https://www.bleepingcomputer.com/news/security/fbi-recommends-securing-your-smart-tvs-and-iot-devices/
BleepingComputer
FBI Recommends Securing Your Smart TVs and IoT Devices
The U.S. Federal Bureau of Investigation (FBI) recommends making sure that Internet of Things (IoT) devices and smart TVs in your home are properly configured to protect them and your other devices from potential attackers.
Ryuk Ransomware Decryptor Is Broken, Could Lead to Data Loss
Due to recent changes in the Ryuk Ransomware encryption process, a bug in the decryptor could lead to data loss in large files.
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-decryptor-is-broken-could-lead-to-data-loss/
Due to recent changes in the Ryuk Ransomware encryption process, a bug in the decryptor could lead to data loss in large files.
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-decryptor-is-broken-could-lead-to-data-loss/
BleepingComputer
Ryuk Ransomware Decryptor Is Broken, Could Lead to Data Loss
Due to recent changes in the Ryuk Ransomware encryption process, a bug in the decryptor could lead to data loss in large files.
Tool Illegally Enables Windows 7 Extended Security Updates
A method has been discovered that allows Windows 7 users to bypass eligibility checks and receive Extended Security Updates even if they have not paid for a license.
https://www.bleepingcomputer.com/news/microsoft/tool-illegally-enables-windows-7-extended-security-updates/
A method has been discovered that allows Windows 7 users to bypass eligibility checks and receive Extended Security Updates even if they have not paid for a license.
https://www.bleepingcomputer.com/news/microsoft/tool-illegally-enables-windows-7-extended-security-updates/
BleepingComputer
Tool Illegally Enables Windows 7 Extended Security Updates
A method has been discovered that allows Windows 7 users to bypass eligibility checks and receive Extended Security Updates even if they have not paid for a license.