by CIRT Team
Xen Security Advisory CVE-2017-10912 [page transfer may allow PV guest to elevate privilege]
Description: Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. Impact: A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://xenbits.xen.org/xsa/advisory-217.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-10912
by CIRT Team
A deep dive into AWS S3 access controls – taking full control over your assets
Setting up access control of AWS S3 consists of multiple levels, each with its own unique risk of misconfiguration. We will go through the specifics of each level and identify the dangerous cases where weak ACLs can create vulnerable configurations impacting the owner of the S3-bucket and/or through third party assets used by a lot of companies. We also show how to do it properly...
Read More
by CIRT Team
21-Year-Old Bug in Kerberos Protocol Gets Patch in Windows, Linux [bleepingcomputer]
Researchers have contacted projects where the Kerberos protocol was used. Microsoft patched the vulnerability in its Kerberos implementation (CVE-2017-8495) in this week’s Patch Tuesday security update. Debian, FreeBSD, and Samba — projects using the Heimdal Kerberos implementation — have also released patches for the flaw, tracked as CVE-2017-11103.
by CIRT Team
Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability
Description: The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. Impact: Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: http://struts.apache.org/docs/s2-048.html http://blog.trendmicro.com/trendlabs-security-intelligence/examining-cve-2017-9791-new-apache-struts-remote-code-execution-vulnerability/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9791 http://www.securityfocus.com/bid/99484/info
by CIRT Team
Microsoft Exchange Server CVE-2017-8621 Open Redirection Vulnerability
Description: An open redirect vulnerability exists in Microsoft Exchange that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL, and convince the user to click the link. When an authenticated Exchange user clicks the link, the authenticated user’s browser session could be redirected to a malicious site that is designed to impersonate a legitimate...
Read More
by CIRT Team
Microsoft Exchange Server CVE-2017-8560 Remote Privilege Escalation Vulnerability
Description: Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka “Microsoft Exchange Cross-Site Scripting Vulnerability”. This CVE ID is unique from CVE-2017-8559. Impact: Attackers can exploit this issue to gain elevated privileges. Mitigation: Updates are available....
Read More
by CIRT Team
Microsoft Exchange CVE-2017-8559 Cross-Site Scripting Vulnerability
Description: An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests. An attacker who successfully exploited this vulnerability could perform script/content injection attacks and attempt to trick the user into disclosing sensitive information. Impact: Attackers can exploit this issue to gain elevated privileges. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference...
Read More
by CIRT Team
Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
Description: Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. Impact: Attackers can exploit this issue to obtain sensitive information or may crash the application resulting in a denial-of-service condition. Mitigation: Updates are available. Please check specific vendor advisory for more information....
Read More
by CIRT Team
Oracle July 2017 Critical Patch Update Multiple Vulnerabilities
Description: Oracle has released advance notification regarding the July 2017 Critical Patch Update (CPU) to be released on July 18, 2017. The update addresses 315 vulnerabilities affecting the following software: Oracle Database Server, versions 11.2.0.4, 12.1.0.2, 12.2.0.1 Oracle REST Data Services, versions prior to 3.0.10.25.02.36 Oracle API Gateway, version 11.1.2.4.0 Oracle BI Publisher, versions 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, 12.2.1.2.0 Oracle Business...
Read More
by CIRT Team
The WPSetup Attack: New Campaign Targets Fresh WordPress Installs [wordfence]
At Wordfence, we track millions of attacks from a wide variety of sources every day. From this data we create a list of the worst-of-the-worst attackers and add those to our IP blacklist to protect our Premium customers. We also carefully monitor the activity that those known bad IP addresses engage in. In May and June, we saw our worst-of-the-worst IPs start using a new...
Read More