Type: Vulnerability. Microsoft Office is prone to a privilege-escalation vulnerability; fixes are available.
More info:
http://www.symantec.com/security_response/vulnerability.jsp?bid=104405&om_rssid=sr-advisories
https://blogvault.net/wp-security-audit-log-review/ Regular scan and backups are core security measures. So pat on the back for doing a good job but you should also set up monitoring your website. Keeping a vigilant eye on everything that is happening on your WordPress website … The post WP Security Audit Log: Plugin That Helps
More info:
https://blogvault.net/wp-security-audit-log-review/
Red Hat Enterprise Linux: An update for chromium-browser is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-6148
More info:
http://rhn.redhat.com/errata/RHSA-2018-1825.html
https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/Recently, Defiant’s analysts have been tracking a particularly sophisticated malware infection responsible for generating spam links and redirection, while still remaining relatively difficult for victims to detect. This post is Copyright 2018 Defiant, Inc. and was published on the wordfence.com official blog. Republication of this post without permission is prohibited. You can find this post […]
More info:
https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/
Ivan Fratric discovered a buffer overflow in the Skia graphics libraryused by Firefox, which could result in the execution of arbitrary code.
More info:
https://www.debian.org/security/2018/dsa-4220
Today VMware has released the following new and updated security advisories: VMSA-2018-0015 – https://www.vmware.com/security/advisories/VMSA-2018-0015.html Please sign up to the Security-Announce mailing list to receive new and updated VMware Security Advisories. Customers should review the security advisories and direct any questions to VMware Support.The post VMSA-2018-0015 appeared first on VMware Security & Compliance Blog.
More info:
https://blogs.vmware.com/security/2018/06/vmsa-2018-0015.html
Red Hat Enterprise Linux: An update for flash-plugin is now available for Red Hat Enterprise Linux 6Supplementary.Red Hat Product Security has rated this update as having a security impact ofCritical. A Common Vulnerability Scoring System (CVSS) base score, which gives adetailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-4945, CVE-2018-5000, CVE-2018-5001, CVE-2018-5002
More info:
http://rhn.redhat.com/errata/RHSA-2018-1827.html
Several vulnerabilities have been discovered in OpenJDK, animplementation of the Oracle Java platform, resulting in denial ofservice, sandbox bypass, execution of arbitrary code or bypass of JARsignature validation.
More info:
https://www.debian.org/security/2018/dsa-4225
Red Hat Enterprise Linux: An update for imgbased, redhat-release-virtualization-host, andredhat-virtualization-host is now available for Red Hat Virtualization 4 forRHEL-7.Red Hat Product Security has rated this update as having a security impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. CVE-2018-1124, CVE-2018-1126
More info:
http://rhn.redhat.com/errata/RHSA-2018-1820.html
Adobe ha publicado un boletín de seguridad para Adobe Flash Player, que en esta ocasión soluciona un '0-day' y otras 3 vulnerabilidades que afectan al popular reproductor
Adobe ha publicado un boletín de seguridad (APSB18-19) que corrige cuatro vulnerabilidades en su reproductor Flash Player para Windows, macOS, Linux y Chrome OS. Dos de estas vulnerabilidades son de carácter crítico (una de ellas un '0-day') y los dos restantes están clasificadas como importantes.
Según sus identificadores CVE, los errores de seguridad son los siguientes:
- CVE-2018-4945: un error de confusión de tipos que podría permitir la ejecución de código arbitrario en el contexto del usuario. Este fallo de seguridad ha sido descubierto por Jihui Lu de Tencent KeenLab y willJ de Tencent PC Manager trabajando junto a Trend Micro's Zero Day Initiative.
- CVE-2018-5000: un desbordamiento de enteros que permitiría la revelación de información. Ha sido reportada anónimamente a través de Trend Micro's Zero Day Initiative.
- CVE-2018-5001: una lectura fuera de límites que también permitiría revelar información. Ha sido reportada anónimamente vía Trend Micro's Zero Day Initiative.
- CVE-2018-5002: un desbordamiento de memoria que permitiría ejecutar código arbitrario. Esta vulnerabilidad ha sido descubierta de manera independiente por Chenming Xu y Jason Jones de ICEBRG, Bai Haowen, Zeng Haitao y Huang Chaowen de 360 Threat Intelligence Center (360 Enterprise Security Group), y Yang Kang, Hu Jiang, Zhang Qing, y Jin Quan de Qihoo 360 Core Security.
Existe un exploit '0-day' para esta última vulnerabilidad (CVE-2018-5002) que está siendo explotada, y se tiene constancia de su utilización en ataques dirigidos contra usuarios de Windows en Oriente Medio. Estos ataques aprovechan documentos de Office con contenido incrustado malicioso de Flash Player distribuido por correo electrónico, con nombres como '***salary.xlsx' para llamar la atención del usuario.
Las vulnerabilidades afectan a las versiones de Adobe Flash Player 29.0.0.171 (y anteriores) para Windows, macOS, Linux, y los navegadores Google Chrome, Internet Explorer y Edge.
Adobe ha publicado la versión 30.0.0.113 de Adobe Flash Player destinada a solucionar las vulnerabilidades anteriormente expuestas, y se encuentran disponibles para su descarga desde la página oficial.
Adobe recomienda a los usuarios de Adobe Flash Player Desktop Runtime para Windows, macOS y Linux actualizar a través del sistema de actualización del propio producto o desde 'Adobe Flash Player Download Center'.
Más información