FEDORA-2022-eeeff46680
Packages in this update:
slurm-21.08.8-1.fc34
Update description:
Update to 21.08.8 to fix CVE-2022-29500, CVE-2022-29501, and CVE-2022-29502.
slurm-21.08.8-1.fc34
Update to 21.08.8 to fix CVE-2022-29500, CVE-2022-29501, and CVE-2022-29502.
slurm-21.08.8-1.fc35
Update to 21.08.8 to fix CVE-2022-29500, CVE-2022-29501, and CVE-2022-29502.
By Oliver Devane
McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called ‘The B Word’ where Elon Musk, Cathie Wood, and Jack Dorsey discuss various aspects of cryptocurrency.
The modified live streams make the original video smaller and put a frame around it advertising malicious sites that it claims will double the amount of cryptocurrency you send them. As the topic of the video is on cryptocurrency it adds some legitimacy to the websites being advertised.
The original video is shown below on the left and a modified one which includes a reference to a scam site is shown on the right.
We identified several different streams occurring at a similar same time. The images of some are shown below:
The YouTube streams advertised several sites which shared a similar theme. They claim to send cryptocurrency worth double the value which they’ve received. For example, if you send 1BTC you will receive 2BTC in return. One of the site‘s frequently asked questions (FAQ) is shown below:
Here are some more examples of the scam sites we discovered:
The sites attempt to trick the visitors into thinking that others are sending cryptocurrency to it by showing a table with recent transactions. This is fake and is generated by JavaScript which creates random crypto wallets and amounts and then adds these to the table.
The wallets associated with the malicious sites have received a large number of transactions with a combined value of $280,000 as of 5 PM UTC on the 5th of May 2022
Scam Site
Crypto Type
Wallet
Value as on 5PM UTC 5th May 2022
22ark-invest[.]org
ETH
0x820a78D8e0518fcE090A9D16297924dB7941FD4f
$25,726.46
22ark-invest[.]org
BTC
1Q3r1TzwCwQbd1dZzVM9mdFKPALFNmt2WE
$29,863.78
2xEther[.]com
ETH
0x5081d1eC9a1624711061C75dB9438f207823E694
$2,748.50
2x-musk[.]net
ETH
0x18E860308309f2Ab23b5ab861087cBd0b65d250A
$10,409.13
2x-musk[.]net
BTC
17XfgcHCfpyYMFdtAWYX2QcksA77GnbHN9
$4,779.47
arkinvest22[.]net
ETH
0x2605dF183743587594A3DBC5D99F12BB4F19ac74
$11,810.57
arkinvest22[.]net
BTC
1GLRZZHK2fRrywVUEF83UkqafNV3GnBLha
$5,976.80
doublecrypto22[.]com
ETH
0x12357A8e2e6B36dd6D98A2aed874D39c960eC174
$0.00
doublecrypto22[.]com
BTC
1NKajgogVrRYQjJEQY2BcvZmGn4bXyEqdY
$0.00
elonnew[.]com
ETH
0xAC9275b867DAb0650432429c73509A9d156922Dd
$0.00
elonnew[.]com
BTC
1DU2H3dWXbUA9mKWuZjbqqHuGfed7JyqXu
$0.00
elontoday[.]org
ETH
0xBD73d147970BcbccdDe3Dd9340827b679e70d9d4
$18,442.96
elontoday[.]org
BTC
bc1qas66cgckep3lrkdrav7gy8xvn7cg4fh4d7gmw5
$0.00
Teslabtc22[.]com
ETH
0x9B857C44C500eAf7fAfE9ed1af31523d84CB5bB0
$27,386.69
Teslabtc22[.]com
BTC
18wJeJiu4MxDT2Ts8XJS665vsstiSv6CNK
$17,609.62
tesla-eth[.]org
ETH
0x436F1f89c00f546bFEf42F8C8d964f1206140c64
$5,841.84
tesla-eth[.]org
BTC
1CHRtrHVB74y8Za39X16qxPGZQ12JHG6TW
$132.22
teslaswell[.]com
ETH
0x7007Fa3e7dB99686D337C87982a07Baf165a3C1D
$9.43
teslaswell[.]com
BTC
bc1qdjma5kjqlf7l6fcug097s9mgukelmtdf6nm20v
$0.00
twittergive[.]net
ETH
0xB8e257C18BbEC93A596438171e7E1E77d18671E5
$25,918.90
twittergive[.]net
BTC
1EX3dG9GUNVxoz6yiPqqoYMQw6SwQUpa4T
$99,123.42
Scammers have been using social media sites such as Twitter and Youtube to attempt to trick users into parting ways with their cryptocurrency for the past few years. McAfee urges its customers to be vigilant and if something sounds too good to be true then it is most likely not legitimate.
Our customers are protected against the malicious sites detailed in this blog as they are blocked with McAfee Web Advisor
Type
Value
Product
Blocked
URL – Crypto Scam
twittergive[.]net
McAfee WebAdvisor
YES
URL – Crypto Scam
tesla-eth[.]org
McAfee WebAdvisor
YES
URL – Crypto Scam
22ark-invest[.]org
McAfee WebAdvisor
YES
URL – Crypto Scam
2xEther[.]com
McAfee WebAdvisor
YES
URL – Crypto Scam
Teslabtc22[.]com
McAfee WebAdvisor
YES
URL – Crypto Scam
elontoday[.]org
McAfee WebAdvisor
YES
URL – Crypto Scam
elonnew[.]com
McAfee WebAdvisor
YES
URL – Crypto Scam
teslaswell[.]com
McAfee WebAdvisor
YES
URL – Crypto Scam
2x-musk[.]net
McAfee WebAdvisor
YES
URL – Crypto Scam
doublecrypto22[.]com
McAfee WebAdvisor
YES
URL – Crypto Scam
arkinvest22[.]net
McAfee WebAdvisor
YES
The post Crypto Scammers exploit talk on Cryptocurrency appeared first on McAfee Blog.
It was discovered that jbig2dec incorrectly handled memory when parsing
invalid files. An attacker could use this issue to cause jbig2dec to crash,
leading to a denial of service. (CVE-2017-9216)
It was discovered that jbig2dec incorrectly handled memory when processing
untrusted input. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-12268)
slurm-21.08.8-1.fc37
Automatic update for slurm-21.08.8-1.fc37.
* Thu May 5 2022 Carl George <carl@george.computer> – 21.08.8-1
– Update to 21.08.8, resolves: rhbz#2082276
– Fix CVE-2022-29500, resolves: rhbz#2082286
– Fix CVE-2022-29501, resolves: rhbz#2082289
– Fix CVE-2022-29502, resolves: rhbz#2082293
CIS excited to sponsor and attend the 2022 AWS Summit Washington, DC at Booth 520. Join us and learn about CIS STIG resources.
Some odd and potentially dangerous behavior within the Google Cloud Platform (GCP) was revealed by cloud security company Mitiga Thursday. If GCP is not configured correctly, it could be exploited by attackers to engage in malicious activity inside a user’s cloud environment, according to a blog posted on the Israeli company’s website.
The behavior is linked to one of the APIs used by Google Cloud. The API allows users to retrieve data from serial ports, but by creating a virtual machine in the cloud, data could also be continuously written to the ports. Moreover, because of the way Google Cloud classifies such traffic, administrators aren’t given much visibility into it. If an attacker were exploiting the behavior, their constant calls to the ports might tip their hand, Mitiga explained, but the malicious activity is likely to be missed by developers unfamiliar with the specifics of the API.
Pieter Agten discovered that Rsyslog incorrectly handled certain requests.
An attacker could possibly use this issue to cause a crash.
CVE-2022-1388: Authentication Bypass in F5 BIG-IP
F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution.
As part of its Quarterly Security Notification for May 2022, F5 patched CVE-2022-1388, a critical authentication bypass vulnerability in BIG-IP, a family of hardware and software solutions used for application delivery and centralized device management.
Attackers have capitalized on previously disclosed flaws in BIG-IP: CVE-2021-22986, a flaw in the iControl REST component of BIG-IP and CVE-2020-5902, a flaw in the BIG-IP traffic management user interface, have both been exploited in the wild. The Security Response Team included CVE-2020-5902 among its top 5 vulnerabilities in the 2020 Threat Landscape Retrospective due to the scope of exploitation.
CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.
At the time of publication, there were no public exploits for CVE-2022-1388. However, it’s likely only a matter of time before researchers and threat actors develop proof-of-concept exploit code for this vulnerability.
While patching is the recommended course of action, F5 has provided some mitigation guidance if it is not immediately possible. To reduce the attack service, organizations can restrict access to the vulnerable iControl REST API to trusted networks and devices. It is advisable to disallow access to device management interfaces from untrusted networks.
The following table lists the branches of BIG-IP, affected versions and fixed versions:
Branch
Affected Versions
Fixed Version
17.x
None
17.0.0
16.x
16.1.0 – 16.1.2
16.1.2.2
15.x
15.1.0 – 15.1.5
15.1.5.1
14.x
14.1.0 – 14.1.4
14.1.4.6
13.x
13.1.0 – 13.1.4
13.1.5
12.x
12.1.0 – 12.1.6
Will not fix
11.x
11.6.1 – 11.6.5
Will not fix
A list of Tenable plugins to identify this vulnerability can be found here.
F5 Advisory for CVE-2022-5902
K55879220: Overview of F5 vulnerabilities (May 2022)
Join Tenable’s Security Response Team on the Tenable Community.
Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.
Get a free 30-day trial of Tenable.io Vulnerability Management.
Repairman sues politician and news media for allegedly calling him a hacker and a Russian asset