This research discusses two different vulnerabilities addressed in the June 2020 Microsoft Patch Tuesday. An integer overflow in OLE marshalling and a race condition with arbitrary file deletion are described in detail.
f2ff9502f5dc2b23c74162a79247bc1573fccd90ac78ca8ecdbcb3d0bea1c968
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities.
d72b8bcba0def6ba93b650d6f25896d9326ee0b02113b80696f47b08bd73e964
WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.
627e3a9e07f586f13b2e64c027516af00395135b18c0f950dc884b7872f65ccf
This Metasploit module exploits a vulnerability in LinuxKI Toolset versions 6.01 and below which allows remote code execution. The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in the security vulnerability.
fd9d232691fc54e620006cc480b1bc31a3d0a9f3015b5ff23f6b2af4b02b0a6e
Ubuntu Security Notice 4394-1 - It was discovered that SQLite incorrectly handled certain corrupted schemas. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS. It was discovered that SQLite incorrectly handled certain SELECT statements. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 19.10. It was discovered that SQLite incorrectly handled certain self-referential views. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 19.10. Various other issues were also addressed.
e7adf052a76885b1a06b476369d7df3eafc9798b3c97d81a489ca472fb568056
Red Hat Security Advisory 2020-2462-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. An unsafe object creation vulnerability was addressed.
1576300abb112c0cce67f21db1323127c5b52263bd9173ed9f6c9939f81de4bb
Red Hat Security Advisory 2020-2480-01 - Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller framework for web application development. Action Pack implements the controller and the view components. Timing attack vulnerabilities have been addressed.
9e63ef4400d812ae1945b2df0d03fce729a14dbc358e52c1d7f3026094f03bce
Red Hat Security Advisory 2020-2475-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.105 and .NET Core Runtime 3.1.5. Issues addressed include a denial of service vulnerability.
659636b8f768e3f7761a9dde065662d8eeda36073ddabe3108076813ab877df8
Red Hat Security Advisory 2020-2471-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. A new version of .NET Core that addresses a security vulnerability is now available. The updated version is .NET Core Runtime 2.1.19 and SDK 2.1.515. Issues addressed include a denial of service vulnerability.
2909833a170f17cc648f9e395a14a207d7f92519c7184e4f15e560a9feb8ef8f
Red Hat Security Advisory 2020-2476-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. A new version of .NET Core that addresses a security vulnerability is now available. The updated version is .NET Core Runtime 2.1.19 and SDK 2.1.515. Issues addressed include a denial of service vulnerability.
8e4cff7c308f2c24d1051fe31c9287f88bd7bc53f5c0a69ebe2662088cbdc910
Red Hat Security Advisory 2020-2473-01 - The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities. An unsafe object creation vulnerability was addressed.
af347e2e66f36555e110f5641661140afff5dc11ca29078fc3f682cdd7f98f60
Red Hat Security Advisory 2020-2474-01 - The libexif packages provide a library for extracting extra information from image files. Issues addressed include buffer over-read, denial of service, and information leakage vulnerabilities.
7b18ba0e8bf4e9bc229b77050687414eff11bac5389d9f5b471517af4be20755
Red Hat Security Advisory 2020-2472-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. An out-of-bounds heap access issue was addressed.
24cbe04364c257f21634732291cd311b68c195aeb26b828bf8897958e566c3e5
Ubuntu Security Notice 4392-1 - It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
a9845b95b2be0fccbe823366e518cf239b87cde96d4347530b55da617eeaf0ce
Ubuntu Security Notice 4388-1 - It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
24b25c54711167debfb3a1de96a5ccaa82b46c8875ceb35c4dff6a5f8c785c0b
Ubuntu Security Notice 4391-1 - It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle setxattr operations in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
e0a6c38a113dc261822095ed2e1b728d5bf4288b2229b470472eb7d9064118a4
Ubuntu Security Notice 4389-1 - It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
f91b1d179a358a863ed6403af909ce4727dd59ab224a69ff38ddbe33c0f7103a
Ubuntu Security Notice 4390-1 - It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
e5d410bb0a6f3e7d3022679274328cddc80018c6f7dbebfd3e18c23532085b9d
Ubuntu Security Notice 4393-1 - It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
d67938a188343bd47c630ca6e60398865571efabd19edc8b47139693334158f3
Ubuntu Security Notice 4387-1 - It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
bd340315f27bc9d671191343b29fab5e75a7725ec24c0f65dd4be9d374ebd114
Red Hat Security Advisory 2020-2432-01 - Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available.
9daf2759fb6843a04a2f6b474d87b081e6378f7fdbced917377803dda0604fbd
Red Hat Security Advisory 2020-2450-01 - .NET Core is a managed-software framework. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. New versions of .NET Core that address a security vulnerability are now available. The updated versions are .NET Core SDK 3.1.105 and .NET Core Runtime 3.1.5. Issues addressed include a denial of service vulnerability.
b7b1f2d9c2d8e8b2d0d3b4298d1430f790e10c6ee7e8a5b1d752dc77f1106290
Red Hat Security Advisory 2020-2430-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a null pointer vulnerability.
b5baa0a08a4524612a4be8e7d7bbfacc88c6958d9e43eb4bcc09b6ac2fdca665
Ubuntu Security Notice 4385-1 - It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. It was discovered that on some Intel processors, partial data values previously read from a vector register on a physical core may be propagated into unused portions of the store buffer. A local attacker could possible use this to expose sensitive information. Various other issues were also addressed.
6230499d9a942bd8e6f2a63e2dc0739be6d09e02fa3a13daa47e7ae2e5bc8072
Ubuntu Security Notice 4386-1 - It was discovered that libjpeg-turbo incorrectly handled certain PPM files. An attacker could possibly use this issue to access sensitive information.
fb3eeda7c0de27ed55c37cfb837124339f792be09a62b2f5dd6f4029f6a67871