A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site

Alerts

Mozilla Security Update

Mozilla has released security updates to address vulnerabilities in Firefox prior to ver.64 and Firefox ESR prior to ver.60.4. Exploitation of these vulnerabilities may allow an attacker to take control of affected product.

Users and administrators are encouraged to review Mozilla Security Advisories and apply necessary updates.

Microsoft Team Foundation Server Remote Code Execution Vulnerability

Advisory No: TZCERT/SA/2018/12/05

Date of First Release: 6 December 2018

Source: Microsoft

Software Affected:

  1. Team Foundation Server 2018 Update 1.1
  2. Team Foundation Server 2018 Update 3
  3. Team Foundation Server 2018 Update 3.1
  4. Team Foundation Server 2017 Update 3.1

Overview:

Multiple vulnerabilities have been identified in Microsoft Team Foundation Server that could allow a remote unauthorized execution of arbitrary code that may result into compromise of potentially sensitive information on the targeted system.

Description:

Microsoft Team Foundation Server (TFS) has been reported to vulnerable to a remote code execution and Cross-site Scripting (CSS) vulnerabilities.

The remote code execution vulnerability is a result of disabling basic authorization on the communication between the Team Foundation Server (TFS) and the search services. Whereas, the Cross-site scripting vulnerability is caused by improper handling of user input into the Team Foundation Server (TFS).

An authenticated remote access exploit can exploit these vulnerabilities by sending a specially crafted payload to the Team Foundation Server, which can be executed on user’s behalf upon visiting the compromised page.

Impacts:

Successful exploitation of the remote code execution vulnerability could allow remote unauthorized access to bypass authorization to run certain commands on the Search service to execute arbitrary code with the privileges of the user.

The cross-site scripting vulnerability could allow unauthorized access to perform cross-site scripting attacks on affected systems. Exploitation of these vulnerabilities could allow take off control of the affected system.

Solution:

Users and administrators are urged to review security updates guide available on Microsoft web portal to fix the vulnerabilities.

Reference:

  1. https://portal.msrc.microsoft.com/en-US/security-guidance
  2. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018 – -8529
  3. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018 – -8602
  4. https://www.securityfocus.com/bid/105910/info

PHP Denial of Service Vulnerability

Advisory No: TZCERT/SA/2018/12/05

Date of First Release: 6th December, 2018

Source: PHP, CISCO

Software Affected: PHP versions 5.x through 7.1.24

Overview:
Potential vulnerability has been discovered in Hypertext Pre-processor (PHP) which can allow a remote attacker to cause denial of service condition on the affected system.

Description:

It has been revealed that “ext/standard/var.c” and “ext/standard/var_unserializer.c” files in PHP software are susceptible to Denial of Service (DoS) condition due to a NULL pointer dereference.

A  remote unauthorized user can exploit this vulnerability when either unserialize call is made to “ext/standard/var_unserializer.c” file for the “com”, “dotnet” and its variant class or a specially crafted request sent malicious input to the affected PHP software.

Impact:

Successful exploitation of the vulnerabilities can allow an attacker to trigger pointer dereference condition that cause users of software crash resulted into a DoS condition on affected PHP software.

Solution:

Users and System administrators are advised to update the affected PHP to the latest version as well as the implement the following security measures;

  1. Run firewall and antivirus applications to minimize the potential of inbound and outbound threats.
  2. Implement IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.
  3. Implement a strong firewall policy and monitor the affected systems.

References:

  1. https://tools.cisco.com/security/center/viewAlert.x?alertId=59180
  2. https://tools.cisco.com/security/center/viewAlert.x?alertId=59181
  3. https://www.securityfocus.com/bid/105989

Cisco Security update

Cisco has released security update to address vulnerability in Cisco Prime License Manager. Exploitation of this vulnerability may allow an attacker to take control of affected database with privileges of the postgres user.

Users and Administrators are encouraged to review Cisco Security Advisory and apply necessary updates.