SysAdmin 24x7
4.34K subscribers
41 photos
2 videos
8 files
6.03K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Múltiples vulnerabilidades en librería PJSIP de Teluu

Fecha de publicación: 03/03/2022
Importancia: 4 - Alta

Recursos afectados:
Cualquier proyecto que utilice la librería PJSIP, con versiones anteriores a la 2.12, y pase argumentos controlados por el atacante a cualquiera de las siguientes API:

pjsua_player_create – filename,
pjsua_recorder_create – filename,
pjsua_playlist_create – file_names,
pjsua_call_dump – buffer.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-libreria-pjsip-teluu
Malware now using stolen NVIDIA code signing certificates

Threat actors are using stolen NVIDIA code signing certificates to sign malware to appear trustworthy and allow malicious drivers to be loaded in Windows.

This week, NVIDIA confirmed that they suffered a cyberattack that allowed threat actors to steal employee credentials and proprietary data.

The extortion group, known as Lapsus$, states that they stole 1TB of data during the attack and began leaking the data online

https://www.bleepingcomputer.com/news/security/malware-now-using-stolen-nvidia-code-signing-certificates/
Múltiples vulnerabilidades en productos de Asterisk

Fecha de publicación: 07/03/2022
Importancia: 5 - Crítica

Recursos afectados:
Asterisk Open Source:
versiones 16.x;
versiones 18.x;
versiones 19.x.
Certified Asterisk: versiones 16.x.

Descripción:
Asterisk ha publicado 3 vulnerabilidades: 2 de severidad crítica y 1 media, por las que un atacante podría ejecutar código arbitrario o realizar una denegación de servicio o un acceso a la memoria fuera de límites.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/multiples-vulnerabilidades-productos-asterisk
New Linux bug gives root on all major distros, exploit released.

This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.

It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit.

The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

https://dirtypipe.cm4all.com/
Divulgación de información sensible en phpMyAdmin

Fecha de publicación: 08/03/2022
Importancia: 3 - Media

Recursos afectados:
PhpMyAdmin, versión 5.1.1 y anteriores.

Descripción:
INCIBE ha coordinado la publicación de una vulnerabilidad en phpMyAdmin, con el código interno INCIBE-2022-0636, que ha sido descubierta por Rafael Pedrero.

A esta vulnerabilidad se le ha asignado el código CVE-2022-0813. Se ha calculado una puntuación base CVSS v3.1 de 5,3, siendo el cálculo del CVSS el siguiente: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N.

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/divulgacion-informacion-sensible-phpmyadmin
Deep dive: Vulnerabilities in ZTE router could lead to complete attacker control of the device.

Cisco Talos’ vulnerability research team disclosed multiple vulnerabilities in the ZTE MF971R wireless hotspot and router in October. Several months removed from that disclosure and ZTE’s patch, we decided to take an even closer look at two of these vulnerabilities — CVE-2021-21748 and CVE-2021-21745 — to show how they could be chained together by an attacker to completely take over a device.

https://blog.talosintelligence.com/2022/03/deep-dive-vulnerabilities-in-zte-router.html
Microsoft Security Update Summary for March

Critical Security Updates
============================
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2016 Cumulative Update 21
Microsoft Exchange Server 2016 Cumulative Update 22
Microsoft Exchange Server 2019 Cumulative Update 10
Microsoft Exchange Server 2019 Cumulative Update 11
HEVC Video Extension
HEVC Video Extensions
VP9 Video Extensions


https://msrc.microsoft.com/update-guide/
TLStorm

Three critical vulnerabilities discovered in APC Smart-UPS devices can allow attackers to remotely manipulate the power of millions of enterprise devices.

https://www.armis.com/research/tlstorm/