This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Monthly Archives: August 2022
ZDI-22-1074: Microsoft Outlook MIME Header Heap Corruption Denial-of-Service Vulnerability
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Microsoft Outlook. Authentication is not required to exploit this vulnerability.
ZDI-22-1075: Microsoft Windows win32kfull Bitmap Use-After-Free Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
DSA-5213 schroot – security update
Julian Gilbey discovered that schroot, a tool allowing users to execute
commands in a chroot environment, had too permissive rules on chroot or
session names, allowing a denial of service on the schroot service for
all users that may start a schroot session.
DSA-5212 chromium – security update
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
CVE-2020-14394
An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
java-1.8.0-openjdk-aarch32-1.8.0.345.b01-1.fc35.1
FEDORA-2022-29943d5ec5
Packages in this update:
java-1.8.0-openjdk-aarch32-1.8.0.345.b01-1.fc35.1
Update description:
8u345 update
java-1.8.0-openjdk-aarch32-1.8.0.345.b01-1.fc36.1
FEDORA-2022-bada1dbc10
Packages in this update:
java-1.8.0-openjdk-aarch32-1.8.0.345.b01-1.fc36.1
Update description:
8u345 update
New Deep Instinct partner program targets MSSPs fighting ransomware
Cybersecurity firm Deep Instinct has rolled out a new partner program to provide its endpoint and application protection software to managed security service providers (MSSPs), the company announced Wednesday.
The Stratosphere program was initially announced in April, and designed as a simplified channel program that focuses on expected partner margins, instead of set discounts on the product. Volume-based recognition and “medallion tiers” for sales are out. Instead, the company is offering “loyalty points” for achieving a range of different sales-related goals—like creating leads, getting customers certified, or completing business plans.
Universal database of device vulnerability information launched
A universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository allows the company’s customers to identify the accurate security posture for each device in their organization, according to the maker of a security platform for connected devices.
“It’s difficult to get information on agentless devices because every vendor publishes their data the way they want to do it,” explains DeviceTotal founder and CEO Carmit Yadin. “There’s no standardization. There’s no one place you can go today and identify the risk of a device on your network or that you want to purchase. That’s why we created this repository.”