Rackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware attack.
Daily Archives: December 6, 2022
firefox-107.0.1-1.fc35
FEDORA-2022-0dea602292
Packages in this update:
firefox-107.0.1-1.fc35
Update description:
Updated to latest upstream (107.0.1)
firefox-107.0.1-1.fc36
FEDORA-2022-8c3ebc1a18
Packages in this update:
firefox-107.0.1-1.fc36
Update description:
Updated to latest upstream (107.0.1)
firefox-107.0.1-1.fc37
FEDORA-2022-b58437c302
Packages in this update:
firefox-107.0.1-1.fc37
Update description:
Updated to latest upstream (107.0.1)
CVE-2022-23470 (galaxy)
Galaxy is an open-source platform for data analysis. An arbitrary file read exists in Galaxy 22.01 and Galaxy 22.05 due to the switch to Gunicorn, which can be used to read any file accessible to the operating system user under which Galaxy is running. This vulnerability affects Galaxy 22.01 and higher, after the switch to gunicorn, which serve static contents directly. Additionally, the vulnerability is mitigated when using Nginx or Apache to serve /static/* contents, instead of Galaxy’s internal middleware. This issue has been patched in commit `e5e6bda4f` and will be included in future releases. Users are advised to manually patch their installations. There are no known workarounds for this vulnerability.
CVE-2022-23466
teler is an real-time intrusion detection and threat alert dashboard. teler prior to version 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized. This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This vulnerability has been fixed on version `v2.0.0-rc.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
China-Based Hackers Target Amnesty International Canada
Results suggest the attack was executed using tools and techniques associated with Chinese APTs.
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSC
Majority of third-party domain names impersonating the biggest global brands use domain privacy services, indicating the owner’s intention to mask their identity
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks
The move would shed light on hackers and sound the alarm more widely on cyber-threats in the country.
Flaws in MegaRAC baseband management firmware impact many server brands
Researchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple server manufacturers. If exploited, the flaws could allow attackers to remotely control servers, deploy malware and firmware implants, or trigger damaging actions that leave them inoperable.
BMCs are microcontrollers present on server motherboards that have their own firmware, dedicated memory, power, and network ports and are used for out-of-band management of servers when their main operating systems are shut down. They are essentially small independent computers running inside bigger computers that allow administrators to remotely perform a variety of maintenance and diagnostic tasks including reinstalling operating systems, restarting servers when they’re unresponsive, deploying firmware updates and more.