by CIRT Team
OpenSSL CVE-2017-3732 Information Disclosure Vulnerability
Description: There is a carry propagating bug in the x86_64 Montgomery squaring procedure. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private...
Read More
by CIRT Team
CVE-2017-6746: Cisco Web Security Appliance Command Injection and Privilege Escalation Vulnerability
Description: A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to insufficient validation of user-supplied input on the web interface. An attacker could exploit this vulnerability by authenticating to the affected device and performing...
Read More
by CIRT Team
Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution
Description: Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. Below versions are affected: PHP 5.6 prior to 5.6.31 PHP 7.0 prior to 7.0.21...
Read More
by CIRT Team
CVE-2017-9948: Microsoft Skype ‘MSFTEDIT.DLL’ Buffer Overflow Vulnerability
Description: A stack buffer overflow vulnerability has been discovered in Microsoft Skype 7.2, 7.35, and 7.36 before 7.37, involving MSFTEDIT.DLL mishandling of remote RDP clipboard content within the message box. Impact: Attackers can exploit this issue to crash the application, resulting in a denial-of-service condition. Due to the nature of this issue, code execution may be possible but this has not been confirmed. Microsoft Skype...
Read More
by CIRT Team
Xen Security Advisory CVE-2017-10923
Description: Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225. Impact: A guest may cause a hypervisor crash, resulting in a Denial of Service (DoS). Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://xenbits.xen.org/xsa/advisory-225.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10923
by CIRT Team
Xen Security Advisory CVE-2017-10920 CVE-2017-10921 CVE-2017-10922 [grant table operations mishandle reference counts]
Description: The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2. Impact: For the worst issue, a PV guest could gain a writeable mapping of its own pagetable, allowing it...
Read More
by CIRT Team
Xen Security Advisory CVE-2017-10912 [page transfer may allow PV guest to elevate privilege]
Description: Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. Impact: A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: https://xenbits.xen.org/xsa/advisory-217.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-10912
by CIRT Team
Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability
Description: The Struts 1 plugin in Apache Struts 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. Impact: Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the affected application. Mitigation: Updates are available. Please check specific vendor advisory for more information. Reference URL’s: http://struts.apache.org/docs/s2-048.html http://blog.trendmicro.com/trendlabs-security-intelligence/examining-cve-2017-9791-new-apache-struts-remote-code-execution-vulnerability/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9791 http://www.securityfocus.com/bid/99484/info
by CIRT Team
Microsoft Exchange Server CVE-2017-8621 Open Redirection Vulnerability
Description: An open redirect vulnerability exists in Microsoft Exchange that could lead to spoofing. To exploit the vulnerability, an attacker could send a link that has a specially crafted URL, and convince the user to click the link. When an authenticated Exchange user clicks the link, the authenticated user’s browser session could be redirected to a malicious site that is designed to impersonate a legitimate...
Read More
by CIRT Team
Microsoft Exchange Server CVE-2017-8560 Remote Privilege Escalation Vulnerability
Description: Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka “Microsoft Exchange Cross-Site Scripting Vulnerability”. This CVE ID is unique from CVE-2017-8559. Impact: Attackers can exploit this issue to gain elevated privileges. Mitigation: Updates are available....
Read More