Security Bulletins

US-CERT: The United States Computer Emergency Readiness Team   more  xml  hide  
last updated: Sat, 20 Oct 2018 07:28:22 GMT

 Sat, 20 Oct 2018 00:13:52 +0000 NCSC Releases 2018 Annual Review
Original release date: October 19, 2018

The United Kingdom's (UK) National Cyber Security Centre (NCSC) has released its Annual Review for 2018, which provides a snapshot of their work from September 1, 2017, to August 31, 2018. NCSC provides enhanced services to protect the UK against cybersecurity threats.

NCCIC encourages users and administrators to review NCSC’s 2018 Annual Review for more information.


This product is provided subject to this Notification and this Privacy & Use policy.


 Fri, 19 Oct 2018 21:43:54 +0000 libssh Releases Security Updates
Original release date: October 19, 2018

libssh has released security updates addressing a vulnerability affecting libssh versions 0.6 and above. A remote attacker could exploit this vulnerability to take control of an affected system.

NCCIC encourages users and administrators to review the libssh Security Release for additional information and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


 Fri, 19 Oct 2018 21:09:53 +0000 Microsoft Releases Security Update for Yammer
Original release date: October 19, 2018

Microsoft has released a security update to address a vulnerability in the Yammer desktop application. A remote attacker could exploit this vulnerability to take control of an affected system.

NCCIC encourages users and administrators to review the Microsoft Security Advisory and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.


 Thu, 18 Oct 2018 22:00:21 +0000 Drupal Releases Security Updates
Original release date: October 18, 2018

Drupal has released security updates addressing multiple vulnerabilities in Drupal 7.x and 8.x. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

NCCIC encourages users and administrators to review Drupal's Security Advisory and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


 Wed, 17 Oct 2018 18:53:23 +0000 Cisco Releases Security Updates
Original release date: October 17, 2018

Cisco has released security updates to address multiple vulnerabilities affecting Cisco products. An attacker could exploit one of these vulnerabilities to take control of an affected system.

NCCIC encourages users and administrators to review the Cisco Security Advisories and Alerts webpage and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.



[logo] SecurityFocus Vulnerabilities   more  xml  hide  
last updated: Sat, 20 Oct 2018 07:43:54 GMT

 2018-10-19 Vuln: cURL CVE-2018-1000300 Heap Buffer Overflow Vulnerability
cURL CVE-2018-1000300 Heap Buffer Overflow Vulnerability
 2018-10-19 Vuln: Apache Groovy CVE-2016-6814 Remote Code Execution Vulnerability
Apache Groovy CVE-2016-6814 Remote Code Execution Vulnerability
 2018-10-19 Vuln: Apache Struts CVE-2016-1182 Security Bypass Vulnerability
Apache Struts CVE-2016-1182 Security Bypass Vulnerability
 2018-10-19 Vuln: OpenSSL CVE-2018-0732 Denial of Service Vulnerability
OpenSSL CVE-2018-0732 Denial of Service Vulnerability
  Bugtraq: [SECURITY] [DSA 4269-1] postgresql-9.6 security update
[SECURITY] [DSA 4269-1] postgresql-9.6 security update

[logo] Yahoo News - Latest News & Headlines   more  xml  hide  
last updated: Sat, 20 Oct 2018 07:28:23 GMT

 Thu, 18 Oct 2018 17:13:44 -0400 Cory Booker says the U.S. needs to ‘reexamine’ its ‘entire relationship’ with Saudi Arabia

Cory Booker says the U.S. needs to ‘reexamine’ its ‘entire relationship’ with Saudi ArabiaThe Democratic New Jersey senator said the disappearance of Jamal Khashoggi is just one of many concerns he has about Saudi Arabia and America's close ties to the Gulf country.


 Fri, 19 Oct 2018 15:25:13 -0400 New York Man Arrested For Threatening To Kill Senators Over Kavanaugh Confirmation

New York Man Arrested For Threatening To Kill Senators Over Kavanaugh ConfirmationLong Island resident Ronald DeRisi, 74, was arrested Friday and charged with


 Fri, 19 Oct 2018 10:02:39 -0400 Nikki Haley Jokes She's Not An 'Indian Woman' In Swipe At Elizabeth Warren

Nikki Haley Jokes She's Not An 'Indian Woman' In Swipe At Elizabeth WarrenNikki Haley, the outgoing U.S. ambassador to the United Nations, drew laughter


 Fri, 19 Oct 2018 08:00:00 -0400 Best Bites: Roasted brussel sprouts with parmesan sauce

Best Bites: Roasted brussel sprouts with parmesan sauceWelcome to Best Bites, a twice-weekly video series that aims to satisfy your


 Thu, 18 Oct 2018 15:11:27 -0400 The Republican who shocked the world 4 years ago could lose because of redistricting

The Republican who shocked the world 4 years ago could lose because of redistrictingThe Virginia congressional district that Dave Brat took in 2014 is now less favorable to the GOP.



Cisco Security Advisory   more  xml  hide  
last updated: Sat, 20 Oct 2018 07:24:10 GMT

 Fri, 19 Oct 2018 17:52:10 CDT Linux Kernel IP Fragment Reassembly Denial of Service Vulnerability Affecting Cisco Products: August 2018

On August 14, 2018, the Vulnerability Coordination team of the National Cyber Security Centre of Finland (NCSC-FI) and the CERT Coordination Center (CERT/CC) disclosed a vulnerability in the IP stack that is used by the Linux Kernel. This vulnerability is publicly known as FragmentSmack.

The vulnerability could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. An attack could be executed by an attacker who can submit a stream of fragmented IPv4 or IPv6 packets that are designed to trigger the issue on an affected device.

The vulnerability is due to inefficient IPv4 and IPv6 fragment reassembly algorithms in the IP stack that is used by the affected kernel. Linux Kernel Versions 3.9 and later are known to be affected by this vulnerability.

This advisory will be updated as additional information becomes available.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-ip-fragment


Security Impact Rating: High
CVE: CVE-2018-5391
 Fri, 19 Oct 2018 16:00:00 CDT libssh Authentication Bypass Vulnerability Affecting Cisco Products: October 2018

A vulnerability in libssh could allow an unauthenticated, remote attacker to bypass authentication on a targeted system.

The vulnerability is due to improper authentication operations by the server-side state machine of the affected software. An attacker could exploit this vulnerability by presenting a SSH2_MSG_USERAUTH_SUCCESS message to a targeted system. A successful exploit could allow the attacker to bypass authentication and gain unauthorized access to a targeted system.

This advisory will be updated as additional information becomes available.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181019-libssh


Security Impact Rating: Critical
CVE: CVE-2018-10933
 Wed, 17 Oct 2018 16:00:00 CDT Cisco Wireless LAN Controller Software GUI Privilege Escalation Vulnerability

A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to perform certain operations within the GUI that are not normally available to that user on the CLI.

The vulnerability is due to incorrect parsing of a specific TACACS attribute received in the TACACS response from the remote TACACS server. An attacker could exploit this vulnerability by authenticating via TACACS to the GUI on the affected device. A successful exploit could allow an attacker to create local user accounts with administrative privileges on an affected WLC and execute other commands that are not allowed from the CLI and should be prohibited.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-gui-privesc


Security Impact Rating: High
CVE: CVE-2018-0417
 Wed, 17 Oct 2018 16:00:00 CDT Cisco Aironet 1560, 1800, 2800, and 3800 Series Access Points Denial of Service Vulnerability

A vulnerability in the Cisco Aironet 1560, 1800, 2800, and 3800 Series Access Points (APs) software could allow an authenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.

The vulnerability is due to a deadlock condition that may occur when an affected AP attempts to dequeue aggregated traffic that is destined to an attacker-controlled wireless client. An attacker who can successfully transition between multiple Service Set Identifiers (SSIDs) hosted on the same AP while replicating the required traffic patterns could trigger the deadlock condition. A watchdog timer that detects the condition will trigger a reload of the device, resulting in a DoS condition while the device restarts.

Cisco has released software updates that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-aironet-dos


Security Impact Rating: Medium
CVE: CVE-2018-0381
 Wed, 17 Oct 2018 16:00:00 CDT Cisco Wireless LAN Controller Software Directory Traversal Vulnerability

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information.

The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-traversal


Security Impact Rating: Medium
CVE: CVE-2018-0420

powered by zFeeder

Reload this page to check for the most recent news updates.

Please read our legal disclaimer for the use of this information.

Stay Secure
Axiom understands how vital the security of your data is to your organization. Please don't hesitate to contact us if you would like a professional assessment of your network infrastructure.
Home Axiom Advisor Security Bulletins