FEDORA-2024-7fc5bae919
Packages in this update:
mingw-openexr-3.1.10-4.fc39
Update description:
Backport fix for CVE-2023-5841.
mingw-openexr-3.1.10-4.fc39
Backport fix for CVE-2023-5841.
mingw-openexr-3.1.10-4.fc38
Backport fix for CVE-2023-5841.
mingw-expat-2.6.0-1.fc39
Update to 2.6.0, fixes CVE-2023-52425, CVE-2023-52426.
mingw-expat-2.6.0-1.fc38
Update to 2.6.0, fixes CVE-2023-52425, CVE-2023-52426.
mingw-python3-3.11.8-1.fc39
Update to python3.11.8, backport fix for CVE-2023-27043.
mingw-python3-3.11.8-1.fc38
Update to python3.11.8, backport fix for CVE-2023-27043.
dhcpcd-10.0.6-2.el9
Finished security issue handling broken DHCP packets.
dhcpcd-10.0.6-2.fc39
Finished security issue handling broken DHCP packets.
dhcpcd-10.0.6-2.fc38
Finished security issue handling broken DHCP packets.
What is the Vulnerability?
Microsoft disclosed a critical security flaw in the Exchange Server. Tracked as CVE-2024-21410, the issue has been described as a privilege escalation vulnerability. This security flaw can let remote unauthenticated threat actors escalate privileges in NTLM relay attacks against vulnerable Exchange Servers. Microsoft reported that the flaw has been actively exploited in the wild.
What is the Vendor Solution?
Microsoft released a patch on Feb 13, 2024, as part of its Patch Tuesday updates. Please follow the link to learn more about mitigation steps. [ Link ]
What FortiGuard Coverage is available?
FortiGuard Labs has an Endpoint Vulnerability Signature in place for CVE-2024-21410 to detect any vulnerable systems and auto patch if enabled.
FortiGuard Labs recommends administrators to review and apply the most recent upgrade or patch from Microsoft as soon as possible.