Vulnerabilidad de autorización inapropiada en Dell EMC Isilon OneFS
Fecha de publicación: 30/01/2020
Importancia: 4 - Alta
Recursos afectados:
Dell EMC Isilon OneFS, versiones:
8.1.2;
8.1.0.4;
8.1.0.3;
8.0.0.7.
Descripción:
Dell EMC ha detectado una vulnerabilidad, de criticidad alta, que permitiría a un atacante remoto comprometer el equipo afectado mediante el acceso a archivos restringidos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-autorizacion-inapropiada-dell-emc-isilon-onefs
Fecha de publicación: 30/01/2020
Importancia: 4 - Alta
Recursos afectados:
Dell EMC Isilon OneFS, versiones:
8.1.2;
8.1.0.4;
8.1.0.3;
8.0.0.7.
Descripción:
Dell EMC ha detectado una vulnerabilidad, de criticidad alta, que permitiría a un atacante remoto comprometer el equipo afectado mediante el acceso a archivos restringidos.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-autorizacion-inapropiada-dell-emc-isilon-onefs
INCIBE-CERT
Vulnerabilidad de autorización inapropiada en Dell EMC Isilon OneFS
Dell EMC ha detectado una vulnerabilidad, de criticidad alta, que permitiría a un atacante remoto comprometer el equipo afectado mediante el acceso a archivos restringidos.
Adobe Releases Security Updates for Magento
Adobe has released security updates to address vulnerabilities affecting Magento Commerce and Open Source editions. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Adobe Security Bulletin APSB20-02 and apply the necessary updates.
https://www.us-cert.gov/ncas/current-activity/2020/01/31/adobe-releases-security-updates-magento
Adobe has released security updates to address vulnerabilities affecting Magento Commerce and Open Source editions. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review Adobe Security Bulletin APSB20-02 and apply the necessary updates.
https://www.us-cert.gov/ncas/current-activity/2020/01/31/adobe-releases-security-updates-magento
www.us-cert.gov
Adobe Releases Security Updates for Magento | CISA
Adobe has released security updates to address vulnerabilities affecting Magento Commerce and Open Source editions. An attacker could exploit some of these vulnerabilities to take control of an affected system.
The Cybersecurity and Infrastructure Security…
The Cybersecurity and Infrastructure Security…
Validación insuficiente en el servidor de correo OpenSMTPD de OpenBSD
Fecha de publicación: 31/01/2020
Importancia: 5 - Crítica
Recursos afectados:
OpenSMTPD, versiones:
6.0.2p1-2;
6.0.3p1-5;
6.6.1p1-5~bpo10+1.
Descripción:
Investigadores de Qualys Research Labs han descubierto una vulnerabilidad en una función de OpenSMTPD, que puede ser explotada para ejecutar código arbitrario con permisos de root en un servidor vulnerable.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/validacion-insuficiente-el-servidor-correo-opensmtpd-openbsd
Fecha de publicación: 31/01/2020
Importancia: 5 - Crítica
Recursos afectados:
OpenSMTPD, versiones:
6.0.2p1-2;
6.0.3p1-5;
6.6.1p1-5~bpo10+1.
Descripción:
Investigadores de Qualys Research Labs han descubierto una vulnerabilidad en una función de OpenSMTPD, que puede ser explotada para ejecutar código arbitrario con permisos de root en un servidor vulnerable.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/validacion-insuficiente-el-servidor-correo-opensmtpd-openbsd
INCIBE-CERT
Validación insuficiente en el servidor de correo OpenSMTPD de OpenBSD
Investigadores de Qualys Research Labs han descubierto una vulnerabilidad en una función de OpenSMTPD, que puede ser explotada para ejecutar código arbitrario con permisos de root en un servidor vulnerable.
Vulnerabilidad de denegación de servicio en IBM WebSphere Application Server
Fecha de publicación: 31/01/2020
Importancia: 4 - Alta
Recursos afectados:
WebSphere Application Server, versiones:
9.0;
8.5;
8.0;
7.0.
WebSphere Application Server Liberty: entrega continua.
Descripción:
Se ha descubierto una vulnerabilidad, de severidad alta, de tipo denegación de servicio en el producto WebSphere Application Server de IBM.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-denegacion-servicio-ibm-websphere-application-server
Fecha de publicación: 31/01/2020
Importancia: 4 - Alta
Recursos afectados:
WebSphere Application Server, versiones:
9.0;
8.5;
8.0;
7.0.
WebSphere Application Server Liberty: entrega continua.
Descripción:
Se ha descubierto una vulnerabilidad, de severidad alta, de tipo denegación de servicio en el producto WebSphere Application Server de IBM.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-denegacion-servicio-ibm-websphere-application-server
INCIBE-CERT
Vulnerabilidad de denegación de servicio en IBM WebSphere Application Server
Se ha descubierto una vulnerabilidad, de severidad alta, de tipo denegación de servicio en el producto WebSphere Application Server de IBM.
[SECURITY] [DSA 4614-1] sudo security update
https://lists.debian.org/debian-security-announce/2020/msg00017.html
https://lists.debian.org/debian-security-announce/2020/msg00017.html
Forwarded from Derecho de la Red
👾 "Nuevo 0-day de PHP publicado en GitHub."
No se puede usar para ataques remotos.
Es el segundo exploit para este "disable_functions bypass" en los últimos meses.
https://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass
No se puede usar para ataques remotos.
Es el segundo exploit para este "disable_functions bypass" en los últimos meses.
https://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass
GitHub
exploits/php7-backtrace-bypass at master · mm0r1/exploits
Pwn stuff. Contribute to mm0r1/exploits development by creating an account on GitHub.
Microsoft announces the launch of a bug bounty program for Xbox
Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.
https://securityaffairs.co/wordpress/97169/hacking/xbox-bug-bounty-program.html
Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.
https://securityaffairs.co/wordpress/97169/hacking/xbox-bug-bounty-program.html
Security Affairs
Microsoft announces the launch of a bug bounty program for Xbox
Microsoft announced the launch of an Xbox bug bounty program with rewards of up to $20,000 for critical remote code execution flaws.
The Russian Government blocked ProtonMail and ProtonVPN
The popular ProtonMail end-to-end encrypted email service and ProtonVPN VPN service have been blocked by the Russian government this week.
https://securityaffairs.co/wordpress/97185/security/russian-gov-block-protonmail.html
The popular ProtonMail end-to-end encrypted email service and ProtonVPN VPN service have been blocked by the Russian government this week.
https://securityaffairs.co/wordpress/97185/security/russian-gov-block-protonmail.html
Security Affairs
The Russian Government blocked ProtonMail and ProtonVPN
The popular ProtonMail end-to-end encrypted email service and ProtonVPN VPN service have been blocked by the Russian government this week.
Sudo Bug Lets Non-Privileged Linux and macOS Users Run Commands as Root
Joe Vennix of Apple security has found another significant vulnerability in sudo utility that under a specific configuration could allow low privileged users or malicious programs to execute arbitrary commands with administrative ('root') privileges on Linux or macOS systems.
https://thehackernews.com/2020/02/sudo-linux-vulnerability.html
Joe Vennix of Apple security has found another significant vulnerability in sudo utility that under a specific configuration could allow low privileged users or malicious programs to execute arbitrary commands with administrative ('root') privileges on Linux or macOS systems.
https://thehackernews.com/2020/02/sudo-linux-vulnerability.html
Vulnerabilidad de desbordamiento de búfer en sudo
Fecha de publicación: 03/02/2020
Importancia: 4 - Alta
Recursos afectados:
Versiones de sudo, desde 1.7.1 hasta 1.8.25p1, si la opción pwfeedback está habilitada en el archivo sudoers.
Descripción:
Joe Vennix ha descubierto una vulnerabilidad de criticidad alta en sudo, que podría permitir a un atacante desencadenar un desbordamiento de búfer basado en pila (stack).
Solución:
Actualizar a la versión 1.8.31.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-desbordamiento-bufer-sudo
Fecha de publicación: 03/02/2020
Importancia: 4 - Alta
Recursos afectados:
Versiones de sudo, desde 1.7.1 hasta 1.8.25p1, si la opción pwfeedback está habilitada en el archivo sudoers.
Descripción:
Joe Vennix ha descubierto una vulnerabilidad de criticidad alta en sudo, que podría permitir a un atacante desencadenar un desbordamiento de búfer basado en pila (stack).
Solución:
Actualizar a la versión 1.8.31.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/vulnerabilidad-desbordamiento-bufer-sudo
INCIBE-CERT
Vulnerabilidad de desbordamiento de búfer en sudo
Joe Vennix ha descubierto una vulnerabilidad de criticidad alta en sudo, que podría permitir a un atacante desencadenar un desbordamiento de búfer basado en pila (stack).
OpenSMTPD Vulnerability
The CERT Coordination Center (CERT/CC) has released information on a vulnerability affecting OpenSMTPD. An attacker could exploit this vulnerability to take control of an affected system. OpenSMTPD is an open-source server-side implementation of the Simple Mail Transfer Protocol (SMTP) that is part of the OpenBSD Project.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review CERT/CC’s Vulnerability Note VU#390745 and apply the necessary updates.
https://www.us-cert.gov/ncas/current-activity/2020/02/03/opensmtpd-vulnerability
The CERT Coordination Center (CERT/CC) has released information on a vulnerability affecting OpenSMTPD. An attacker could exploit this vulnerability to take control of an affected system. OpenSMTPD is an open-source server-side implementation of the Simple Mail Transfer Protocol (SMTP) that is part of the OpenBSD Project.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review CERT/CC’s Vulnerability Note VU#390745 and apply the necessary updates.
https://www.us-cert.gov/ncas/current-activity/2020/02/03/opensmtpd-vulnerability
www.us-cert.gov
OpenSMTPD Vulnerability | CISA
The CERT Coordination Center (CERT/CC) has released information on a vulnerability affecting OpenSMTPD. An attacker could exploit this vulnerability to take control of an affected system. OpenSMTPD is an open-source server-side implementation of the Simple…
New EmoCheck Tool Checks if You're Infected With Emotet
A new utility has been released by Japan CERT (computer emergency response team) that allows Windows users to easily check if they are infected with the Emotet Trojan.
https://www.bleepingcomputer.com/news/security/new-emocheck-tool-checks-if-youre-infected-with-emotet/
A new utility has been released by Japan CERT (computer emergency response team) that allows Windows users to easily check if they are infected with the Emotet Trojan.
https://www.bleepingcomputer.com/news/security/new-emocheck-tool-checks-if-youre-infected-with-emotet/
BleepingComputer
New EmoCheck Tool Checks if You're Infected With Emotet
A new utility has been released by Japan CERT (computer emergency response team) that allows Windows users to easily check if they are infected with the Emotet Trojan.
Mysterious New Ransomware Targets Industrial Control Systems
EKANS appears to be the work of cybercriminals, rather than nation-state hackers—a worrying development, if so.
https://www.wired.com/story/ekans-ransomware-industrial-control-systems/
EKANS appears to be the work of cybercriminals, rather than nation-state hackers—a worrying development, if so.
https://www.wired.com/story/ekans-ransomware-industrial-control-systems/
Wired
Mysterious New Ransomware Targets Industrial Control Systems
EKANS appears to be the work of cybercriminals, rather than nation-state hackers—a worrying development, if so.
Múltiples vulnerabilidades en Squid
Fecha de publicación: 04/02/2020
Importancia: 4 - Alta
Recursos afectados:
Las siguientes versiones de Squid:
desde la 2.x hasta la 2.7.STABLE9;
desde la 3.x hasta la 3.5.28;
desde la 4.x hasta la 4.9.
Descripción:
Se han detectado tres vulnerabilidades en múltiples versiones del servidor proxy Squid que podrían permitir a un atacante omitir los controles de seguridad de acceso, la denegación del servicio o la divulgación de información.
Solución:
Actualizar a la versión 4.10.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-squid-1
Fecha de publicación: 04/02/2020
Importancia: 4 - Alta
Recursos afectados:
Las siguientes versiones de Squid:
desde la 2.x hasta la 2.7.STABLE9;
desde la 3.x hasta la 3.5.28;
desde la 4.x hasta la 4.9.
Descripción:
Se han detectado tres vulnerabilidades en múltiples versiones del servidor proxy Squid que podrían permitir a un atacante omitir los controles de seguridad de acceso, la denegación del servicio o la divulgación de información.
Solución:
Actualizar a la versión 4.10.
https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-squid-1
INCIBE-CERT
Múltiples vulnerabilidades en Squid
Se han detectado tres vulnerabilidades en múltiples versiones del servidor proxy Squid que podrían permitir a un atacante omitir los controles de seguridad de acceso, la denegación del servicio o la divulgación de información.
IRS Launches “Identity Theft Central” Webpage
The Internal Revenue Service (IRS) has launched its “Identity Theft Central” webpage to provide 24/7 access to online information regarding tax-related identity theft and data security protection. Tax-related identity theft occurs when someone steals personal information to commit tax fraud.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages taxpayers, tax professionals, and businesses to review the IRS news release and CISA’s Tip on Preventing and Responding to Identity Theft for more information
https://www.us-cert.gov/ncas/current-activity/2020/02/04/irs-launches-identity-theft-central-webpage
The Internal Revenue Service (IRS) has launched its “Identity Theft Central” webpage to provide 24/7 access to online information regarding tax-related identity theft and data security protection. Tax-related identity theft occurs when someone steals personal information to commit tax fraud.
The Cybersecurity and Infrastructure Security Agency (CISA) encourages taxpayers, tax professionals, and businesses to review the IRS news release and CISA’s Tip on Preventing and Responding to Identity Theft for more information
https://www.us-cert.gov/ncas/current-activity/2020/02/04/irs-launches-identity-theft-central-webpage
www.us-cert.gov
IRS Launches “Identity Theft Central” Webpage | CISA
The Internal Revenue Service (IRS) has launched its “Identity Theft Central” webpage to provide 24/7 access to online information regarding tax-related identity theft and data security protection. Tax-related identity theft occurs when someone steals personal…
Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce
Cisco
Cisco Security Advisory: Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability
A vulnerability in the Cisco Discovery Protocol implementation for Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code or cause a reload on an affected device.
The vulnerability exists because the Cisco Discovery…
The vulnerability exists because the Cisco Discovery…
Cisco Patches Critical CDP Flaws Affecting Millions of Devices
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
BleepingComputer
Cisco Patches Critical CDP Flaws Affecting Millions of Devices
Five critical vulnerabilities found in various implementations of the Cisco Discovery Protocol (CDP) could allow attackers on the local network to take over tens of millions of enterprise devices as discovered by IoT security company Armis.
Forwarded from Una al día
Google expuso por error vídeos privados de usuarios
https://unaaldia.hispasec.com/2020/02/google-expuso-por-error-videos-privados-de-usuarios.html
https://unaaldia.hispasec.com/2020/02/google-expuso-por-error-videos-privados-de-usuarios.html
Una al Día
Google expuso por error vídeos privados de usuarios — Una al Día
La tecnológica admitió en una nota de seguridad que se produjo una filtración accidental que expuso vídeos privados alojados en sus servidores. La filtración hizo accesible estos archivos a otros u…