SysAdmin 24x7
4.34K subscribers
41 photos
2 videos
8 files
6.02K links
Noticias y alertas de seguridad informática.
Chat y contacto:
t.me/sysadmin24x7chat
Download Telegram
Múltiples vulnerabilidades en BIND

Fecha 22/06/2023
Importancia 4 - Alta

Recursos Afectados
Versiones de BIND:
desde 9.11.0 hasta 9.16.41;
desde 9.16.33 hasta 9.16.41;
desde 9.18.0 hasta 9.18.15;
desde 9.19.0 hasta 9.19.13.
Versiones de BIND Supported Preview Edition:
desde 9.11.3-S1 hasta 9.16.41-S1;
desde 9.16.8-S1 hasta 9.16.41-S1;
desde 9.18.11-S1 hasta 9.18.15-S1.
Las versiones anteriores a 9.11.37 y 9.11.37-S1 no han sido analizadas, pero el fabricante sospecha que todas las versiones 9.11 son vulnerables. Algunas ramas ( branches) principales, incluso más antiguas, también podrían ser vulnerables.

Descripción
Varios investigadores han reportado 3 vulnerabilidades de severidad alta que afectan a BIND, cuya explotación podría provocar una condición de denegación de servicio (DoS), un desbordamiento de búfer o forzar la finalización de la instancia name .

https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-bind
Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows Privilege Escalation Vulnerability

First Published: 2023 June 7 16:00 GMT
Last Updated: 2023 June 22 17:26 GMT

Cisco has confirmed that this vulnerability does not affect the following products:

Cisco AnyConnect Secure Mobility Client for Linux
Cisco AnyConnect Secure Mobility Client for MacOS
Cisco Secure Client-AnyConnect for Android
Cisco Secure Client AnyConnect VPN for iOS
Cisco Secure Client for Linux
Cisco Secure Client for MacOS

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ac-csc-privesc-wx4U4Kw
Microsoft Teams vulnerability discovered to bypass file sending restrictions

A newly discovered vulnerability in Microsoft Teams allows attackers to push malware onto the devices of other Microsoft Teams users, even if they are considered external.

IT security researchers at Jumpsec have discovered a new vulnerability in Microsoft Teams. The vulnerability may be exploited to bypass traditional security protections, e.g., against phishing or malware, to push malicious files to the devices of Microsoft Teams users.

https://www.ghacks.net/2023/06/26/microsoft-teams-vulnerability-discovered-to-bypass-file-sending-restrictions/
Sage soluciona una vulnerabilidad que afecta al uso de credenciales

Fecha 04/07/2023
Importancia 4 - Alta

Recursos Afectados
Sage 200 versión 2023.38.001.

Descripción
INCIBE ha coordinado la publicación de una vulnerabilidad de tipo 0day que afecta a Sage 200, una solución ERP de gestión de negocio para pequeñas y medianas empresas.

Solución
Se recomienda actualizar a la versión 2023.75, que soluciona la vulnerabilidad descrita en este aviso.

http://www.incibe.es/empresas/avisos/sage-soluciona-una-vulnerabilidad-que-afecta-al-uso-de-credenciales
Microsoft denies data breach, theft of 30 million customer accounts

Microsoft has denied the claims of the so-called hacktivists “Anonymous Sudan” that they breached the company's servers and stole credentials for 30 million customer accounts.

Anonymous Sudan is known for debilitating distributed denial-of-service (DDoS) attacks against Western entities in recent months. The group has confirmed their affiliation with pro-Russian hacktivists like Killnet.

Last month, Microsoft admitted that Anonymous Sudan was responsible for service disruptions and outages at the beginning of June that impacting several of its services, including Azure, Outlook, and OneDrive.

https://www.bleepingcomputer.com/news/security/microsoft-denies-data-breach-theft-of-30-million-customer-accounts/
Firefox 115 Patches High-Severity Use-After-Free Vulnerabilities

Mozilla has released Firefox 115 to the stable channel with patches for two high-severity use-after-free vulnerabilities.

Mozilla on Tuesday announced the release of Firefox 115 to the stable channel with patches for a dozen vulnerabilities, including two high-severity use-after-free bugs.

Tracked as CVE-2023-37201, the first of the high-severity issues is described as a use-after-free flaw in WebRTC certificate generation.

https://www.securityweek.com/firefox-115-patches-high-severity-use-after-free-vulnerabilities/

https://www.mozilla.org/en-US/security/advisories/mfsa2023-22/
VMSA-2023-0015

CVSSv3 Range:5.3
Issue Date:2023-07-06
CVE(s):CVE-2023-20899

Synopsis:
VMware SD-WAN update addresses a bypass authentication vulnerability (CVE-2023-20899)

Impacted Products
VMware SD-WAN (Edge)

Introduction
An Authentication Bypass Vulnerability affecting VMware SD-WAN was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0015.html
VMSA-2023-0007.1

CVSSv3 Range:7.2-9.8
Issue Date:2023-04-20
Updated On:2023-07-10

CVE(s):
CVE-2023-20864, CVE-2023-20865

Synopsis:
VMware Aria Operations for Logs (Operations for Logs) update addresses multiple vulnerabilities. (CVE-2023-20864, CVE-2023-20865)

Impacted Products
VMware Aria Operations for Logs (formerly vRealize Log Insight)

Introduction
Multiple vulnerabilities in VMware Aria Operations for Logs were privately reported to VMware. Updates and workarounds are available to address these vulnerabilities in affected VMware products.

https://www.vmware.com/security/advisories/VMSA-2023-0007.html
0day de tipo ejecución de código arbitrario en WebKit de Apple

Fecha 11/07/2023
Importancia 5 - Crítica

Recursos Afectados
Versiones anteriores a:
iOS 16.5.1 y iPadOS 16.5.1;
macOS Ventura 13.4.1;
Safari 16.5.2.

Descripción
Un investigador anónimo ha informado a Apple de una vulnerabilidad, de tipo 0day, que podría permitir a un atacante ejecutar código arbitrario.

http://www.incibe.es/incibe-cert/alerta-temprana/avisos/0day-de-tipo-ejecucion-de-codigo-arbitrario-en-webkit-de-apple
Microsoft Updates
July 2023 Security Updates

https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul
Adobe Releases Security Updates for ColdFusion and InDesign
Release DateJuly 11, 2023

Adobe has released security updates to address vulnerabilities affecting ColdFusion and InDesign. An attacker can exploit some of these vulnerabilities to take control of an affected system.

CISA encourages users and administrators to review the Adobe security releases APSB23-38 and APSB23-40 and apply the necessary updates.

https://www.cisa.gov/news-events/alerts/2023/07/11/adobe-releases-security-updates-coldfusion-and-indesign
Fortinet Releases Security Update for FortiOS and FortiProxy
Release DateJuly 11, 2023

Fortinet has released a security update to address a critical vulnerability (CVE-2023-33308) affecting FortiOS and FortiProxy. A remote attacker can exploit this vulnerability to take control of an affected system.

CISA encourages users and administrators to review the Fortinet security release FG-IR-23-183 and apply the necessary updates.

https://www.cisa.gov/news-events/alerts/2023/07/11/fortinet-releases-security-update-fortios-and-fortiproxy
Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws

Today is Microsoft's July 2023 Patch Tuesday, with security updates for 132 flaws, including six actively exploited and thirty-seven remote code execution vulnerabilities.

While thirty-seven RCE bugs were fixed, Microsoft only rated nine as 'Critical.' However, one of the RCE flaws remains unpatched and is actively exploited in attacks seen by numerous cybersecurity firms.

The number of bugs in each vulnerability category is listed below:

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/
Citrix Secure Access client for Ubuntu Security Bulletin for CVE-2023-24492

Description of Problem
Vulnerabilities have been discovered in Citrix Secure Access client for Ubuntu (previously Citrix Gateway VPN client for Ubuntu).

The following supported versions are affected by the vulnerability:

Versions before 23.5.2

https://support.citrix.com/article/CTX564169/citrix-secure-access-client-for-ubuntu-security-bulletin-for-cve202324492