dcsimg

CVE-2019-5736 Exploits the Common runc Container Binary to Escape to Host

CVE-2019-5736 allows for an escape to host attack in specific container configurations. Background A new vulnerability (CVE-2019-5736) was recently announced in runc, the runtime used by popular container platforms Docker and Kubernetes. The disclosure for this vulnerability details how a malicious container can escape its sandbox and execute arbitrary commands on the host. This attack does, … [Read more...]

LibreOffice Vulnerable to Code Execution in URL Mouseover Preview Feature

Researcher Alex Inführ discovered that LibreOffice 6.1.0-6.1.3.1 is susceptible to a code injection attack if a user hovers their mouse over a malicious URL. Background Researcher Alex Inführ disclosed a LibreOffice vulnerability (CVE-2018-16858) in versions 6.1.0-6.1.3.1 which shows that code injection is possible on both Linux and Windows versions when a user hovers their mouse over a malicious … [Read more...]

Apple iOS 12.1.3 Security Updates Address Multiple Vulnerabilities

Apple has released iOS 12.1.3 to fix 31 CVEs including a FaceTime remote code execution vulnerability Background On January 22, Apple released iOS 12.1.3, which includes fixes for 31 different CVEs across multiple apps and services. This update also includes fixes for CVE-2019-6227 and CVE-2019-6225, which security researcher Qixun Zhao of Qihoo 360 Vulcan Team reportedly used in a code execution … [Read more...]

Critical Vulnerability Fixes Available For Juniper Devices

Juniper has addressed multiple critical vulnerabilities in Junos, Junos Space, and JATP devices. Administrators are advised to update to the latest OS version on any affected Juniper device. Background Juniper has released a number of security advisories this week which include critical vulnerabilities across many of its devices. The Juniper Advanced Threat Prevention Appliance (JATP) update … [Read more...]

Microsoft Releases Out-of-Band Patch for Internet Explorer Remote Code Execution Vulnerability (CVE-2018-8653)

<p>Clement Lecigne of Google’s Threat Analysis Group has reported exploitation of an Internet Explorer vulnerability, CVE-2018-8653, prompting an out-of-band patch from Microsoft.</p> <h2>Background</h2> <p>On December 19, Microsoft released a critical out-of-band (OOB) patch for a remote code execution (RCE) vulnerability in Internet Explorer (IE). This vulnerability … [Read more...]

Privilege Escalation Flaw Discovered in the Cisco Adaptive Security Appliance

Tenable has discovered a privilege escalation flaw in the Cisco Adaptive Security Appliance that allows low-level users to run higher-level commands when certain configuration settings are set. What you need to know: An authenticated remote unprivileged user can change or download the running configuration or replace the appliance firmware where they shouldn’t. What’s the attack vector? HTTP … [Read more...]

Adobe Flash Vulnerability Can Lead to Code Execution and Asset Takeover (CVE-2018-15982)

Adobe has issued an out-of-band advisory for CVE-2018-15982. Through the use of a maliciously crafted RAR file, an attacker exploiting this vulnerability can take over the machine of users that run it. Background Adobe has released an out-of-band security bulletin. that includes patches for CVE-2018-15982, a critical arbitrary code execution vulnerability in Adobe Flash which has been used to … [Read more...]

Popular WordPress ‘AMP for WP’ Plugin Vulnerable to Privilege Escalation Attacks

The ‘AMP for WP – Accelerated Mobile Pages’ plugin for WordPress is vulnerable to a privilege escalation attack. Updating the plugin to version ‘0.9.97.20’ fixes the flaw. Background Following the discovery of a critical vulnerability in the WP GDPR Compliance Plugin, another critical WordPress plugin vulnerability was discovered this week in the popular AMP for WP plugin by researchers at WebARX … [Read more...]

New WordPress Privilege Escalation Flaw In WP GDPR Compliance Plugin

<p>A privilege escalation flaw in WordPress’ popular WP GDPR Compliance plugin has led to exploitation of numerous WordPress sites. Site owners and administrators are encouraged to upgrade to the latest version of the affected plugin.</p> <h2>Background</h2> <p>WordPress plugin "<a href="https://wordpress.org/plugins/wp-gdpr-compliance/">WP GDPR … [Read more...]

APT Malware Activity Detected Exploiting a Patched ColdFusion Vulnerability (CVE-2018-15961)

<p>Researchers at Volexity have identified multiple groups exploiting CVE-2018-15961 in unpatched, web-facing Adobe ColdFusion servers. Users are urged to upgrade to the latest version of ColdFusion.</p> <h2>Background</h2> <p>On November 8, <a href="https://www.volexity.com/blog/2018/11/08/active-exploitation-of-newly-pa... reported Advanced Persistent Threat … [Read more...]