SysAdmin 24x7
4.35K subscribers
41 photos
2 videos
8 files
6.04K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Múltiples vulnerabilidades en productos de TIBCO

Fecha de publicación: 12/01/2022
Importancia: 5 - Crítica

Recursos afectados:
TIBCO eFTL:
Community Edition, versión 6.7.2 y anteriores;
Developer Edition, versión 6.7.2 y anteriores;
Enterprise Edition, versión 6.7.2 y anteriores.
TIBCO FTL:
Community Edition, versión 6.7.2 y anteriores;
TIBCO FTL - Developer Edition, versión 6.7.2 y anteriores;
TIBCO FTL - Enterprise Edition, versión 6.7.2 y anteriores.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-tibco-3
Home routers with NetUSB support could have critical kernel hole.

Now that a patch has been circulated to vendors, researchers at Sentinel One have released details of a worrying bug in an IoT software driver called NetUSB.

https://nakedsecurity.sophos.com/2022/01/11/home-routers-with-netusb-support-could-have-critical-kernel-hole/
SysJoker, a previously undetected cross-platform backdoor made the headlines

Security researchers found a new cross-platform backdoor, dubbed SysJoker, the is suspected to be the work of an APT group.

https://securityaffairs.co/wordpress/126656/malware/sysjoker-backdoor.html
HTTP Protocol Stack Remote Code Execution Vulnerability
CVE-2022-21907

CVSS:3.1 9.8 / 8.5

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21907
Citrix Hypervisor Security Update

2022-01-12 Initial Publication

What Customers Should Do
Citrix has released hotfixes to address these issues. Citrix recommends that affected customers install these hotfixes as their patching schedule allows. The hotfixes can be downloaded from the following locations:
Citrix Hypervisor 8.2 CU1 LTSR: CTX338448 and CTX335882
Citrix Hypervisor 8.2: CTX338444 and CTX335880
Citrix XenServer 7.1 LTSR CU2: CTX335531 and CTX335881

https://support.citrix.com/article/CTX335432
Múltiples vulnerabilidades en IBM HTTP Server

Fecha de publicación: 13/01/2022
Importancia: 5 - Crítica

Recursos afectados:
IBM HTTP Server (utilizado por IBM WebSphere Application Server), versión 9.0

Descripción:
IBM ha publicado 2 vulnerabilidades, 1 crítica y 1 alta, que podrían permitir a un atacante enviar peticiones a un Unix Domain Socket del endpoint, la ejecución remota de código o el bloqueo de la aplicación.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-ibm-http-server
Security problem of zabbix-agent2
CVE-2022-22704
CVSS Score : 10.0

The zabbix-agent2 package before 5.4.9-r1 for Alpine Linux sometimes allows privilege escalation to root because the design incorrectly expected that systemd would (in effect) determine part of the configuration.
Publish Date : 2022-01-06
Last Update Date : 2022-01-13


https://gitlab.alpinelinux.org/alpine/aports/-/issues/13368
VMSA-2022-0002
CVSSv3 Range: 4.0
Issue Date: 2022-01-18
Updated On: 2022-01-18 (Initial Advisory)
CVE(s): CVE-2022-22938

Synopsis:
VMware Workstation and Horizon Client for Windows updates address a denial-of-service vulnerability (CVE-2022-22938)

Impacted Products
VMware Workstation Pro / Player (Workstation)
VMware Horizon Client for Windows


https://www.vmware.com/security/advisories/VMSA-2022-0002.html
Emotet often uses information from emails and address books stolen from infected Windows hosts. Malicious spam (malspam) from Emotet spoofs legitimate senders to trick potential victims into running malicious files.

Additionally, Emotet uses IP address 0.0.0.0 in spambot traffic, possibly attempting to hide the actual IP address of an Emotet-infected host.


https://isc.sans.edu/diary/0.0.0.0+in+Emotet+Spambot+Traffic/28254
VMSA-2021-0028.9

CVSSv3 Range:9.0-10.0
Issue Date:2021-12-10
Updated On:2022-01-19

CVE(s): CVE-2021-44228, CVE-2021-45046

Synopsis:
VMware Response to Apache Log4j Remote Code Execution Vulnerabilities (CVE-2021-44228, CVE-2021-45046)

https://www.vmware.com/security/advisories/VMSA-2021-0028.html