Category Archives: Advisories

baresip-3.10.1-1.el8

Read Time:16 Second

FEDORA-EPEL-2024-092f7564a8

Packages in this update:

baresip-3.10.1-1.el8

Update description:

Baresip v3.10.1 (2024-03-12)

Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954

aureceiver: fix mtx_unlock on discard

Read More

baresip-3.10.1-1.fc39

Read Time:16 Second

FEDORA-2024-e34efa1300

Packages in this update:

baresip-3.10.1-1.fc39

Update description:

Baresip v3.10.1 (2024-03-12)

Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954

aureceiver: fix mtx_unlock on discard

Read More

USN-6663-2: OpenSSL update

Read Time:16 Second

USN-6663-1 provided a security update for OpenSSL.
This update provides the corresponding update for
Ubuntu 16.04 LTS.

Original advisory details:

As a security improvement, this update prevents OpenSSL
from returning an error when detecting wrong padding
in PKCS#1 v1.5 RSA, to prevent its use in possible
Bleichenbacher timing attacks.

Read More

ZDI-24-292: Adobe Premiere Pro AVI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability

Read Time:17 Second

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adobe Premiere Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-20745.

Read More

Jenkins Arbitrary File Read Vulnerability (CVE-2024-23897)

Read Time:51 Second

What is the Vulnerability?
Cyber threat actors are actively targeting Jenkins which is a Java-based open-source automation server widely used by application developers. The critical vulnerability tracked as CVE-2024-23897 could enable remote code execution (RCE) potentially leading to unauthorized access and data compromise. Exploiting this vulnerability allows attackers to read any files on the Jenkins controller file system.FortiRecon ACI service has observed active and recent discussions in the Dark Web. Also, a Proof of Concept (PoC) exploit has been made publicly available which makes this vulnerability crucial for continuous monitoring and more exploitation activities.

What is the Vendor Solution?

Jenkins released a security advisory on January 24, 2024 about this vulnerability. [ Link ]

What FortiGuard Coverage is available?

FortiGuard Labs has provided protection via the IPS signature “Jenkins.LTS.Command.Line.Interface.Arbitrary.File.Read” which was released in early February to detect and block any attack attempts targeting the vulnerability (CVE-2024-23897).

FortiGuard Labs advises organizations to apply the latest Jenkins security updates and patches.

Read More