ZDI-24-903: IrfanView WSQ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Read Time:16 Second

This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-6811.

Read More

SolarWinds Serv-U Information Disclosure Vulnerability (CVE-2024-28995)

Read Time:54 Second

What is the Vulnerability?A Directory Traversal Vulnerability in SolarWinds Serv-U software is being actively exploited in the wild. Tracked as CVE-2024-28995, the vulnerability is due to improper validation of the user-supplied inputs. An attacker could exploit this vulnerability by sending crafted requests to the target host machine. Successful exploitation could allow access to read sensitive files on the host machine. CISA has added CVE-2024-28995 to its Known Exploited Vulnerabilities (KEV) catalog on July 17, 2024 and a publicly available proof-of-concept (PoC) exploit code is available.What is the recommended Mitigation?Apply the most recent upgrade or patch from the vendor. https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28995 What FortiGuard Coverage is available?FortiGuard Labs has provided protection through the IPS signature ” SolarWinds.Serv-U.InternalDir.Directory.Traversal” to detect and block any attack attempts targeting the vulnerability (CVE-2024-28995).  FortiGuard Endpoint Vulnerability Signature can help to detect vulnerable software instances (CVE-2024-28995).  The FortiGuard Incident Response team can be engaged to help with any suspected compromise.

Read More