2020年2月27日 星期四

[USN-4282-1] PostgreSQL vulnerability

---------- Forwarded message ---------
From: Marc Deslauriers
Date: Feb 18, 2020 10:08PM

It was discovered that PostgreSQL incorrectly performed authorization
checks when handling the "ALTER ... DEPENDS ON EXTENSION" sub-commands. A
remote attacker could possibly use this issue to drop any function,
procedure, materialized view, index, or trigger under certain conditions.

References:
  https://usn.ubuntu.com/4282-1
  CVE-2020-1720

2020年2月26日 星期三

Cloudflare: Empowering Your Privacy


REF: https://blog.cloudflare.com/empowering-your-privacy/

2020年2月25日 星期二

Updated Debian 9: 9.12 released

---------- Forwarded message ---------
From: Ana Guerrero Lopez
Date: Feb 9, 2020 4:51AM

------------------------------------------------------------------------
The Debian Project                               https://www.debian.org/
Updated Debian 9: 9.12 released                         press@debian.org
February 8th, 2020           https://www.debian.org/News/2020/2020020802
------------------------------------------------------------------------

The Debian project is pleased to announce the twelth update of its
oldstable distribution Debian 9 (codename "stretch"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 9 but only updates some of the packages included. There is no
need to throw away old "stretch" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list

Cloudflare: JavaScript Libraries Are Almost Never Updated Once Installed



Spikes in the CDNJS data as you see with version 3.3.1 are not uncommon as very large sites add and remove CDNJS script tags.
REF: https://blog.cloudflare.com/javascript-libraries-are-almost-never-updated/

[USN-4279-2] PHP regression

---------- Forwarded message ---------
From: Leonidas S. Barbosa
Date: Feb 20, 2020 2:51AM

 It was discovered that PHP incorrectly handled certain scripts.
 An attacker could possibly use this issue to cause a denial of service.
 This issue only affected Ubuntu 12.04 ESM, Ubuntu 14.04 ESM and Ubuntu 16.04 LTS.
 (CVE-2015-9253)

 It was discovered that PHP incorrectly handled certain inputs. An attacker
 could possibly use this issue to expose sensitive information.
 (CVE-2020-7059)

 It was discovered that PHP incorrectly handled certain inputs.
 An attacker could possibly use this issue to execute arbitrary code.
 This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS
 and Ubuntu 19.10. (CVE-2020-7060)

phpReferences:
  https://usn.ubuntu.com/4279-2
  https://usn.ubuntu.com/4279-1
  CVE-2015-9253

2020年2月22日 星期六

TrendLabs: LokiBot Impersonates Popular Game Launcher and Drops Compiled C# Code File

Figure 2. Screenshot of installer script
REF: https://blog.trendmicro.com/trendlabs-security-intelligence/lokibot-impersonates-popular-game-launcher-and-drops-compiled-c-code-file/

MagicSoft Playout ver 7.5.2 and MagicSoft CG ver 8.3.11

MagicSoft Playout ver 7.5.2 and MagicSoft CG ver 8.3.11 was released and
it adds the possibility to display subtitles with CG by superimposing the text over video.
The subtitles can have between 1 and 3 rows supporting auto-fit and UNICODE
( choosing a specific language encoding for ANSI text is also supported ).

REF: https://www.magicsoft.tv/news.html

Cloudflare: Using your devices as the key to your apps


REF: https://blog.cloudflare.com/using-your-devices-as-the-key-to-your-apps/

[LSN-0063-1] Linux kernel vulnerability

---------- Forwarded message ---------
From: benjamin.romer@canonical.com
Date: Feb 20, 2020 9:30AM

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19050)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

It was discovered that a race condition can lead to a use-after-free while
destroying GEM contexts in the i915 driver for the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-7053)

References:
  CVE-2019-5108, CVE-2019-14615, CVE-2019-19050, CVE-2019-20096,
  CVE-2020-7053

When work expects you to be available 24/7: How to push back


Regular working hours – remember those?
REF: https://enterprisersproject.com/article/2020/1/work-expects-you-be-available-247-how-push-back

2020年2月17日 星期一

[openssh-unix-announce] Announce: OpenSSH 8.2 released

---------- Forwarded message ---------
From: Damien Miller
Date: Feb 14, 2020 12:53PM

OpenSSH 8.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.

OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.

Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested snapshots or donated to the
project. More information on donations may be found at:
http://www.openssh.com/donations.html

Cloudflare: New tools to monitor your server and avoid downtime



REF: https://blog.cloudflare.com/new-tools-to-monitor-your-server-and-avoid-downtime/

TrendLabs: February Patch Tuesday: Fixes for Critical LNK, RDP, Trident Vulnerabilities

The first Patch Tuesday of 2020 in January brought an unusually long list of patches, but February brings an even wider range of fixes that address a total of 99 vulnerabilities — including 12 classified as Critical, with the remaining 99 deemed Important. Only five of the vulnerabilities were made public before the patches were released; one of these was rated as Critical.

REF: https://blog.trendmicro.com/trendlabs-security-intelligence/february-patch-tuesday-fixes-for-critical-lnk-rdp-trident-vulnerabilities/

LM: Kali Linux (64-bit)


REF: http://www.linux-magazine.com/Issues/2020/232/This-Month-s-DVD

[LSN-0062-1] Linux kernel vulnerability

---------- Forwarded message ---------
Date: Feb 3, 2020 10:32PM

It was discovered that the binder IPC implementation in the Linux kernel
did not properly perform bounds checking in some situations, leading to an
out-of-bounds write. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2019-2214)

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a heap-based buffer overflow existed in the Marvell
WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-14895)

It was discovered that a heap-based buffer overflow existed in the Marvell
Libertas WLAN Driver for the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-14896)

It was discovered that a heap-based buffer overflow existed in the Marvell
Libertas WLAN Driver for the Linux kernel. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2019-14897)

It was discovered that a heap-based buffer overflow existed in the Marvell
WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2019-14901)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

References:
  CVE-2019-2214, CVE-2019-14615, CVE-2019-14895, CVE-2019-14896,
  CVE-2019-14897, CVE-2019-14901, CVE-2019-18885

TrendLabs: Outlaw Updates Kit to Kill Older Miner Versions, Targets More Systems

Figure 1. Anomalous properties of a command detected from traffic

REF: https://blog.trendmicro.com/trendlabs-security-intelligence/outlaw-updates-kit-to-kill-older-miner-versions-targets-more-systems/

2020年2月11日 星期二

[USN-4253-1] Linux kernel vulnerability

---------- Forwarded message ---------
From: Steve Beattie
Date: Jan 28, 2020 12:17PM

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.

References:
  https://usn.ubuntu.com/4253-1
  CVE-2019-14615

2020年2月10日 星期一

[USN-4257-1] OpenJDK vulnerabilities

---------- Forwarded message ---------
From: Eduardo Barretto
Date: Jan 29, 2020 5:13AM

It was discovered that OpenJDK incorrectly handled exceptions during
deserialization in BeanContextSupport. An attacker could possibly use this
issue to cause a denial of service or other unspecified impact.
(CVE-2020-2583)

It was discovered that OpenJDK incorrectly validated properties of SASL
messages included in Kerberos GSSAPI. An unauthenticated remote attacker
with network access via Kerberos could possibly use this issue to insert,
modify or obtain sensitive information. (CVE-2020-2590)

It was discovered that OpenJDK incorrectly validated URLs. An attacker
could possibly use this issue to insert, edit or obtain sensitive
information. (CVE-2020-2593)

It was discovered that OpenJDK Security component still used MD5 algorithm.
A remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2020-2601)

It was discovered that OpenJDK incorrectly handled the application of
serialization filters. An attacker could possibly use this issue to bypass the
intended filter during serialization. (CVE-2020-2604)

Bo Zhang and Long Kuan discovered that OpenJDK incorrectly handled X.509
certificates. An attacker could possibly use this issue to cause a denial
of service. (CVE-2020-2654)

Bengt Jonsson, Juraj Somorovsky, Kostis Sagonas, Paul Fiterau Brostean and
Robert Merget discovered that OpenJDK incorrectly handled CertificateVerify
TLS handshake messages. A remote attacker could possibly use this issue to
insert, edit or obtain sensitive information. This issue only affected
OpenJDK 11. (CVE-2020-2655)

It was discovered that OpenJDK incorrectly enforced the limit of datagram
sockets that can be created by a code running within a Java sandbox. An
attacker could possibly use this issue to bypass the sandbox restrictions
causing a denial of service. This issue only affected OpenJDK 8.
(CVE-2020-2659)

References:
  https://usn.ubuntu.com/4257-1
  CVE-2020-2583, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601,
  CVE-2020-2604, CVE-2020-2654, CVE-2020-2655, CVE-2020-2659

Building a home lab: Sysadmin after dark


Building a home lab
Photo by Pixabay from Pexels
REF: https://www.redhat.com/sysadmin/building-home-lab

MagicSoft Playout ver 7.5.1

  • It adds the possibility to introduce still images in playlist.
  • You can configure the duration associated to the pictures and you can resize the pictures similar to other video materials.

REF: https://www.magicsoft.tv/news.html

TrendLabs: Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud

Figure 2. A graphic representation of the relationships between the malicious ad configuration servers based on data obtained from VirusTotal
REF: https://blog.trendmicro.com/trendlabs-security-intelligence/malicious-apps-on-google-play-communicate-with-trojans-install-malware-perform-mobile-ad-fraud/

[USN-4250-1] MySQL vulnerabilities

---------- Forwarded message ---------
From: Marc Deslauriers
Date: Jan 28, 2020 12:27AM

Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.

MySQL has been updated to 8.0.19 in Ubuntu 19.10. Ubuntu 16.04 LTS and
Ubuntu 18.04 LTS have been updated to MySQL 5.7.29.

In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.

Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-29.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-19.html
https://www.oracle.com/security-alerts/cpujan2020.html

References:
  https://usn.ubuntu.com/4250-1
  CVE-2020-2570, CVE-2020-2572, CVE-2020-2573, CVE-2020-2574,
  CVE-2020-2577, CVE-2020-2579, CVE-2020-2584, CVE-2020-2588,
  CVE-2020-2589, CVE-2020-2627, CVE-2020-2660, CVE-2020-2679,
  CVE-2020-2686, CVE-2020-2694

Cloudflare: Introducing the GraphQL Analytics API: exactly the data you need, all in one place


REF: https://blog.cloudflare.com/introducing-the-graphql-analytics-api-exactly-the-data-you-need-all-in-one-place/

[USN-4252-1] tcpdump vulnerabilities

---------- Forwarded message ---------
From: Marc Deslauriers
Date: Jan 28, 2020 12:27AM

Multiple security issues were discovered in tcpdump. A remote attacker
could use these issues to cause tcpdump to crash, resulting in a denial of
service, or possibly execute arbitrary code.

References:
  https://usn.ubuntu.com/4252-1
  CVE-2017-16808, CVE-2018-10103, CVE-2018-10105, CVE-2018-14461,
  CVE-2018-14462, CVE-2018-14463, CVE-2018-14464, CVE-2018-14465,
  CVE-2018-14466, CVE-2018-14467, CVE-2018-14468, CVE-2018-14469,
  CVE-2018-14470, CVE-2018-14879, CVE-2018-14880, CVE-2018-14881,
  CVE-2018-14882, CVE-2018-16227, CVE-2018-16228, CVE-2018-16229,
  CVE-2018-16230, CVE-2018-16300, CVE-2018-16451, CVE-2018-16452,
  CVE-2018-19519, CVE-2019-1010220, CVE-2019-15166, CVE-2019-15167

One open source chat tool to rule them all

Person using a laptop
REF: https://opensource.com/article/20/1/open-source-chat-tool

MagicSoft Playout ver 7.4.12

MagicSoft Playout ver 7.4.12 was released and it adds the possibility to assign colors to playlist entries ( related to program type and parental rating ).

REF: https://www.magicsoft.tv/news.html

Announcing deeper insights and new monitoring capabilities from Cloudflare Analytics


REF: https://blog.cloudflare.com/announcing-deeper-insights-and-new-monitoring-capabilities/

[USN-4239-1] PHP vulnerabilities

---------- Forwarded message ---------
From: Leonidas S. Barbosa
Date: Jan 15, 2020 10:34PM

It was discovered that PHP incorrectly handled certain files. An attacker
could possibly use this issue to cause a denial of service. This issue only affected
Ubuntu 14.04 ESM, 16.04 LTS, 18.04 LTS, 19.04 and 19.10. (CVE-2019-11045)

It was discovered that PHP incorrectly handled certain inputs. An attacker
could possibly use this issue to expose sensitive information.
(CVE-2019-11046)

It was discovered that PHP incorrectly handled certain images. An attacker
could possibly use this issue to access sensitive information.
(CVE-2019-11047, CVE-2019-11050)

References:
  https://usn.ubuntu.com/4239-1
  CVE-2019-11045, CVE-2019-11046, CVE-2019-11047, CVE-2019-11050

Cloudflare: Delegated Credentials for TLS


REF: https://blog.cloudflare.com/keyless-delegation/