Category Archives: Potential Risk of CVE

Oracle security update for April 2018 to address 254 vulnerabilities across multiple products

We heard tsunami so far, but it is hard to imagine that it will be happened in IT world.

Oracle has released its Critical Patch Update for April 2018 to address 254 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. A technology type of tsunami happened today which given by Oracle!

Next Critical Patch Update Schedule

  • 17 July 2018
  • 16 October 2018
  • 15 January 2019
  • 16 April 2019

No comment in this regard! Crazy! For more detail, please refer below url for reference.

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

About Apple security updates – CVE-2018-4173 – It allows invisible microphone access via a crafted app

We do not have suprise that malware infiltrate malicious code to software application because it happens in frequent from cyber technology world.  Apple counputer found a vulnerability on their iOS and MacOS was that a invisible microphone access via a crafted app but do not display on status bar. But it bring up the concerns, details are shown as below:

  1. Apple code scanning do well. But how does hacker do this implant or embedded malicous code in SDK?
  2. Even though someone turn on microphone on iphone, but the problem is that it do not shown on status bar?

About Apple security updates

About the security content of iOS 11.3

https://support.apple.com/en-hk/HT208693

About the security content of macOS High Sierra 10.13.4, Security Update 2018-002 Sierra, and Security Update 2018-002 El Capitan

https://support.apple.com/en-hk/HT208692

 

 

Be patient! KB4100375. Stay tuned!

If the memory leak is intensive, it can cause the program to crash or even make the whole computer freeze. The most common reason programs have memory leaks is due to a programming error where unused memory is not allocated back to the system.Memory leaks are a class of bugs where the application fails to release memory when no longer needed. A large leak might result in unacceptable response times due to excessive paging. The windows 10  security update (KB4100375) rescheduled because of above reasons.

For more details, please refer below url for reference.

Microsoft explains why Windows 10 Spring Creators Update delayed

https://www.windowslatest.com/2018/04/17/microsoft-explains-why-windows-10-spring-creators-update-delayed/

Company which are going to implement the opensource CMS system, you must be extra care – Apr 2018.

Using a CMS, companies can easily build sites for themselves and their clients. These systems streamline web design and content publishing, ensuring that both your site and workflow are streamlined.The open source CMS system (Drupal, Joomla, Magento and CMS Made Simple) boost up the market growth and demand. However EU is going to enforce the law on data protection and privacy for all individuals within the European Union. Just do a quick review of the vulnerabiolties found on open source this year (2018). Those vulnerabilities happened are potentially contravention of the data protect law. So company which are going to implement the opensource CMS system, you must be extra care.

Opensources CMS system vulnerability Reference –

Drupal core – Highly critical – Remote Code Execution (Mar 2018)

https://nvd.nist.gov/vuln/detail/CVE-2018-10085

VMware Releases Security Updates – especially cloud base users must staying alert! 12th Apr 2018

In java world, it has plenty of areas are allow hacker to do some tricks. VMware announced that found so called DOM Based Cross-site Scripting Vulnerability and Missing renewal of session tokens vulnerability. In regards to my comment, both vulnerabilities similar modern java applications security weakness, we are able to apply filter to do that. For example a regular expression solution. In short, please refer official announcement for reference.

vRealize Automation updates address multiple security issues

https://www.vmware.com/security/advisories/VMSA-2018-0009.html

Juniper JunOS – The giant is sick! April 2018

Kernel crash upon receipt of crafted CLNP packets (CVE-2018-0016)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10844&cat=SIRT_1&actp=LIST

Denial-of-service vulnerability in flowd daemon on devices configured with NAT-PT (CVE-2018-0017)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10845&cat=SIRT_1&actp=LIST

Crafted packet may lead to information disclosure and firewall rule bypass during compilation of IDP policies (CVE-2018-0018)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10846&cat=SIRT_1&actp=LIST

Denial-of-service vulnerability in SNMP MIB-II subagent daemon (mib2d) (CVE-2018-0019)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10847&cat=SIRT_1&actp=LIST

rpd daemon cores due to malformed BGP UPDATE packet (CVE-2018-0020)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10848&cat=SIRT_1&actp=LIST

Eclipse Jetty information disclosure vulnerability (CVE-2015-2080)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10849&cat=SIRT_1&actp=LIST

Return of Bleichenbacher’s Oracle Threat (ROBOT) RSA SSL attack (CVE-2017-1000385)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10850&cat=SIRT_1&actp=LIST

Multiple vulnerabilities resolved in OpenSSL

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10851&cat=SIRT_1&actp=LIST

Multiple vulnerabilities in stunnel 5.38

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10852&cat=SIRT_1&actp=LIST

 

Multiple vulnerabilities resolved in CentOS 6.5-based 2012.2R12 release

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10853&cat=SIRT_1&actp=LIST

 

Short MacSec keys may allow man-in-the-middle attacks

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10854&cat=SIRT_1&actp=LIST

Mbuf leak due to processing MPLS packets in VPLS networks (CVE-2018-0022)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10855&cat=SIRT_1&actp=LIST

world writeable default configuration file permission (CVE-2018-0023)

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10856&cat=SIRT_1&actp=LIST

 

 

Microsoft security update – April 10, 2018 – KB4093112

The security update of Microsoft this week included provides support to control usage of Indirect Branch Prediction Barrier (IBPB) within some AMD processors (CPUs) for mitigating CVE-2017-5715. Apart from that it also provides Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities. However I was wondering the mitigation plan coverage provided by AMD?

A insidiousness of the SIMD instruction extensions of ARM, MIPS, and x86? Does AMD cover this part because SIMD Instructions considered harmful?Any advice or we just ignore it?

For more details about the security update, please refer below url for references.

Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities – https://support.microsoft.com/en-hk/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

KB4093112 – https://www.catalog.update.microsoft.com/Search.aspx?q=KB4093112

 

Allen Bradley – The design flaw of the programmable logic controller – system vulnerability

Traditional layer 2 communication system (without TCP/IP), proprietary OS system and without internet technology similar as a antibody protect the important facilities especially electricity power supply, water supply and natural gas facilities. But the element of civilization like a non stop vehicles moving forward. Whereby the man kind went through industrial revolution till today digital technology revolution. Our daily lifes support by electricity, water and natural gas. In order to maintain the stability and quality of those resources of supply. A analogue to digital (electronics) conversion was done, Thereby those facilities are under governance and control by PLC and SCADA today. However a design limitation was found since the components embedded Microsoft operation system and Linux opensource. So we heard power facilities encountered cyber attacks. This time the design flaw found in Allen Bradly PLC product. Regarding to the CVE reference number, we found that the vulnerabilities reported last year and believed that vulnerabilities has been fix. But a reminder to all of us is that vulnerabilities not limit to your office automation system and smartphone.The vulnerabilities are go with us daily.

Below url provides an overview of cyber attack on nuclear power facilities for reference.

Potential black force – digitize Godzilla

CVE-2017-12093

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0445

CVE Number

CVE-2017-14462, CVE-2017-14463, CVE-2017-14464, CVE-2017-14465, CVE-2017-14466, CVE-2017-14467, CVE-2017-14468, CVE-2017-14469, CVE-2017-14470, CVE-2017-14471, CVE-2017-14472, CVE-2017-14473

https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0443

Adobe Security Bulletin – PhoneGap Push plugin vulnerability and the other

Coin has two sides, the computer has vulnerabilities on the other hand show benefits. Why, it provides a influence effect causes people found out resolution.And such a way go to advanced technology zone.
Security announcement by Adobe urge adobe users following the requirement apply the fix. Since there are total 5 items of security update. The item which bring my attention is the phonegap push plugin vulnerability (CVE-2018-4943). PhoneGap Push plugin that brings support for Firebase Cloud Messaging (FCM) to Apache Cordova apps on iOS and Android since PhoneGap Push Plugin version 2.0.0.
Firebase Cloud Messaging (commonly referred to as FCM), formerly known as Google Cloud Messaging (GCM), is a cross-platform solution for messages and notifications for Android, iOS, and web applications, which currently can be used at no cost. If there is vulnerability encountered on phonegap push API. It merely effect not only a small group of persons! In short, please refer official articles for reference (see below):
Security update available for the Adobe PhoneGap Push Plugin | APSB18-15

https://helpx.adobe.com/security/products/phonegap/apsb18-15.html

There are few vulnerabilities not related to phonegap push API but need to aware!

Security Updates Available for Adobe Digital Editions | APSB18-13

https://helpx.adobe.com/security/products/Digital-Editions/apsb18-13.html

Security Update Available for InDesign | APSB18-11

https://helpx.adobe.com/security/products/indesign/apsb18-11.html

Security updates available for Adobe Experience Manager | APSB18-10

https://helpx.adobe.com/security/products/experience-manager/apsb18-10.html

Security updates available for Flash Player | APSB18-08

https://helpx.adobe.com/security/products/flash-player/apsb18-08.html

Cisco IOS XE Software CLI command injection vulnerabilities CVE-2018-0193

The design objective of the Command Line Parser is used to parse the command line arguments. The parser parsing a string and returns an object representing the values extracted. This is the the regular expression design objective. The Cisco IOS XE is a train of Cisco Systems’ widely deployed Internetworking Operating System (IOS), introduced with the ASR 1000 series. IOS XE is a combination of a linux kernel and a (monolithic) application (IOSd) that runs on top of this kernel. The goal of IOS SE aim to integrate the IOS feature set for routing and switching cope with modern business critical applications.  Vulnerability found daily we have not surprise. A CLI command injection vulnerability has been found on CISCO IOS XE this month. For more details, please find below url for reference.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj