What is the vulnerability?A use-after-free vulnerability tagged as CVE-2023-49606 exists in Tinyproxy, a lightweight open-source HTTP proxy daemon. The threat actor may trigger this memory corruption and execute arbitrary code by sending a specially crafted HTTP header that triggers the reuse of previously freed memory. That can lead to remote code execution. As of May 3, 2024, Censys observed over 90,000 hosts running Tinyproxy service exposed in the Internet where 57% of which are potentially vulnerable to this CVE-2023-49606.What is the recommended Mitigation?FortiGuard Labs is not aware of any patches released by the vendor as of this report. To mitigate the risk, users are advised to make sure that Tinyproxy service is not exposed to the internet.What FortiGuard Coverage is available?FortiGuard Labs is currently investigating relevant protections and will update the threat signal as they are released. FortiGuard Incident Response team can be engaged to help with any suspected compromise.
Category Archives: Advisories
GLSA 202405-20: libjpeg-turbo: Multiple Vulnerabilities
GLSA 202405-19: xar: Unsafe Extraction
GLSA 202405-18: Xpdf: Multiple Vulnerabilities
DSA-5682-1 glib2.0 – security update
Alicia Boya Garcia reported that the GDBus signal subscriptions in the
GLib library are prone to a spoofing vulnerability. A local attacker can
take advantage of this flaw to cause a GDBus-based client to behave
incorrectly, with an application-dependent impact.
gnome-shell is updated along with this update to avoid a screencast
regression after fixing CVE-2024-34397.
Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.
secuvera-SA-2024-02: Multiple Persistent Cross-Site Scritping (XSS) flaws in Drupal-Wiki
Posted by Simon Bieber via Fulldisclosure on May 06
secuvera-SA-2024-02: Multiple Persistent Cross-Site Scritping (XSS) flaws in Drupal-Wiki
Affected Products
Drupal Wiki 8.31
Drupal Wiki 8.30 (older releases have not been tested)
References
https://www.secuvera.de/advisories/secuvera-SA-2024-02.txt (used for updates)
CVE-2024-34481
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
CVSS-B: 6.4 (…
OXAS-ADV-2024-0002: OX App Suite Security Advisory
Posted by Martin Heiland via Fulldisclosure on May 06
Dear subscribers,
We’re sharing our latest advisory with you and like to thank everyone who contributed in finding and solving those
vulnerabilities. Feel free to join our bug bounty programs for OX App Suite, Dovecot and PowerDNS at YesWeHack.
This advisory has also been published at
https://documentation.open-xchange.com/appsuite/security/advisories/html/2024/oxas-adv-2024-0002.html.
Yours sincerely,
Martin Heiland, Open-Xchange…
python-tqdm-4.66.4-2.fc39
FEDORA-2024-ef71921bde
Packages in this update:
python-tqdm-4.66.4-2.fc39
Update description:
Address CVE-2024-34062 (local code execution)
python-tqdm-4.66.4-2.fc38
FEDORA-2024-24e4bba70f
Packages in this update:
python-tqdm-4.66.4-2.fc38
Update description:
Address CVE-2024-34062 (local code execution)