mercredi 23 janvier 2019    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

CISCO WebEx Browser Extension Remote Code Execution Vulnerability (CERT-EU Security Advisory 2017-016)

A vulnerability in CISCO WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the affected browser on a targeted system. This vulnerability affects the browser extensions for...
Auteur: Cert EU

Cisco SNMP Remote Code Execution Vulnerabilities (CERT-EU Security Advisory 2017-015)

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, attacker to remotely execute code on an affected system or cause an affected system to...
Auteur: Cert EU

Petya-Like Malware Campaign (CERT-EU Security Advisory 2017-014)

A large malware campaign broke out on Tuesday, 27/06/2017 and was widely reported in the news. The malware used -- which appears to be similar to Petya -- has been augmented with efficient local network spreading mechanisms, which resulted in a...
Auteur: Cert EU

Privileges Escalation Vulnerabilities in Unix Operating Systems (CERT-EU Security Advisory 2017-013)

On 19th of June 2017, Qualys Research Team published a blog post and a security advisory about vulnerabilities in the memory management of several UNIX operating systems. These vulnerabilities can lead to privilege escalation on these systems, by...
Auteur: Cert EU

UPDATE! WannaCry Ransomware Campaign Exploiting SMB Vulnerability (CERT-EU Security Advisory 2017-012)

A large ransomware campaign has been observed since Friday, May 12th, 2017. The payload delivered is a variant of ransomware malware called WannaCry. It appears to infect computers through a recent SMB vulnerability in Microsoft Windows operating...
Auteur: Cert EU

Critical Microsoft Scripting Engine Memory Corruption Vulnerability (CERT-EU Security Advisory 2017-011)

A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file leading to memory corruption. An attacker who successfully exploits this vulnerability could execute...
Auteur: Cert EU

UPDATE Critical Privileges Escalation Vulnerability in Intel AMT Service (CERT-EU Security Advisory 2017-010)

On 1st of May 2017, Intel reported that there is "an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small BusinessTechnology that can allow an unprivileged...
Auteur: Cert EU

UPDATE Critical zero-day vulnerability in Microsoft Office actively exploited (CERT-EU Security Advisory 2017-009)

A vulnerability in Microsoft Office is actively exploited to distribute Dridex banking Trojan.
Auteur: Cert EU

Broadcom Critical Wi-Fi SoC Vulnerability in iOS and Android (CERT-EU Security Advisory 2017-008)

The vulnerability resides in a widely used Wi-Fi chipset manufactured by Broadcom and used in both iOS and Android devices. An attacker within range may be able to execute arbitrary code on the Wi-Fi chip. Google Project Zero researcher Gal...
Auteur: Cert EU

UPDATE Critical Vulnerabilities in VMWare ESXi, Workstation, and Fusion (CERT-EU Security Advisory 2017-007)

VMWare released an advisory for VMWare ESXi, Workstation, and Fusion products [1]. The advisory addresses critical and moderate security issues that may allow a guest system to execute code on the host system (CVE-2017-4902, CVE-2017-4903, and...
Auteur: Cert EU

UPDATE Critical Cisco CMP Remote Code Execution Vulnerability (CERT-EU Security Advisory 2017-006)

Cisco security researchers found a vulnerability in the Cluster Management Protocol (CMP) code in Cisco IOS and Cisco IOS XE software that could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute...
Auteur: Cert EU

Critical Apache Struts 2 Framework Vulnerability (CERT-EU Security Advisory 2017-005)

Remote code execution is possible via Apache Struts 2 framework, when performing file upload based on Jakarta multipart parser. There are already several exploits in the wild (CVE-2017-5638).
Auteur: Cert EU

Arbitrary Code Execution in Internet Explorer and Edge (CERT-EU Security Advisory 2017-004)

A high-severity vulnerability in Microsoft's Edge and Internet Explorer browsers allows attackers to execute malicious code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code (CVE-2017-0037).
Auteur: Cert EU

CISCO Smart Install Protocol Issues (CERT-EU Security Advisory 2017-003)

It has been reported that there exists a way to misuse the Cisco Smart Install protocol messages. The misuse is directed towards Smart Install Clients allowing an unauthenticated remote attacker to change the startup configuration, load...
Auteur: Cert EU

Ticketbleed Vulnerability Affecting F5 BIG-IP (CERT-EU Security Advisory 2017-002)

A vulnerability called Ticketbleed in F5 BIG-IP devices (CVE-2016-9244) could allow an unauthenticated, remote attacker to obtain sensitive information from memory if the non-default Session Tickets option is enabled for a Client SSL profile.
Auteur: Cert EU

UPDATE CISCO WebEx Browser Extension Remote Code Execution Vulnerability (CERT-EU Security Advisory 2017-001)

A vulnerability in CISCO WebEx browser extensions could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the browser on the affected system. This vulnerability concerns browser extensions for CISCO WebEx...
Auteur: Cert EU

UPDATE Critical Firefox Vulnerability (CERT-EU Security Advisory 2016-142)

On 29th of November 2016, a JavaScript code exploiting a vulnerability in Firefox has been discovered. The exploit took advantage of a bug in Firefox to allow the attacker to execute arbitrary code on the targeted system by having the victim load...
Auteur: Cert EU

Black Nurse ICMP DOS attacks (CERT-EU Security Advisory 2016-141)

TDC-SOC-CERT the CERT from TDC A/S, a Danish telecommunications company, observed and started analyzing a number of denial of service attacks (DOS) based on the ICMP protocol.
Auteur: Cert EU

URGENT - 0 day Adobe Flash vulnerability (CERT-EU Security Advisory 2016-140)

"Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and Chrome OS.These updates address a critical vulnerability that could potentially allow an attacker to take control of the affected system."
Auteur: Cert EU

Linux Kernel vulnerability "Dirty COW" (CERT-EU Security Advisory 2016-139)

It has been reported a serious vulnerability that has been present for nine years in a section of the Linux kernel, which is most probably part of all the distributions of this OS.
Auteur: Cert EU

IKEv1 vulnerability in CISCO devices (CERT-EU Security Advisory 2016-138).

The advisory recommends integrity checks and provides detection guidance for the IKEv1 vulnerabilities discovered by CISCO in its devices.
Auteur: Cert EU

Critical Adobe Flash Player vulnerabilities (APSB16-29) (CERT-EU Security Advisory 2016-137)

Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS to address multiple critical vulnerabilities.
Auteur: Cert EU

Pegasus Spyware targeting iOS devices CERT-EU Security Advisory 2016-136 - Updated

Three critical zero-day vulnerabilities were discovered, impacting Apple iOS and OS X devices. This advisory presents recommendations for end-users and Mobile Device Management administrators.
Auteur: Cert EU

Leak of hacking tools targeting Fortinet devices CERT-EU Security Advisory 2016-135

On 13th of august, a previously unknown group called "Shadow Brokers" publicly released a large number of hacking tools they claimed were used by the "Equation Group". The targeted devices include Fortinet devices. This advisory presents risk...
Auteur: Cert EU

Leak of hacking tools targeting CISCO firewalls CERT-EU Security Advisory 2016-133

On 13th of august, a previously unknown group called "Shadow Brokers" publicly released a large number of hacking tools they claimed were used by the "Equation Group". The targeted devices include CISCO Adaptive Security Appliance (ASA) and PIX...
Auteur: Cert EU
First230231232233234235236237238239Last

Événements SSI

FIC

Le 11ème Forum International de la Cybersécurité occupe les 22 et 23 janvier 2019 le Grand Palais de Lille. Organisé par la Région Hauts-de-France et Euratechnologies, la Gendarmerie Nationale et CEIS.

RENCONTRES AMRAE

Les 27èmes Rencontres de l'AMRAE (Association française des professionnels de la gestion des risques et des assurances) , le congrès annuel de référence des métiers du risque et des assurances, ont lieu du 6 au 8 février 2019 à Deauville (Centre International) sur le thème : "Le risque au coeur de la transformation". Organisées par l'AMRAE.

ACCESSECURITY

AccesSecurity, salon euro-méditerranéen de la sécurité globale, se tient à Marseille (Chanot) les 6 et 7 mars 2019. Organisé par Safim.

IT & IT SECURITY MEETINGS

IT & IT Security Meetings, «salon des réseaux, du cloud, de la mobilité et de la sécurité informatique», se tient à Cannes, Palais des Festivals et des Congrès du 19 au 21 mars 2019. Organisé par Weyou Group.

RSS