![]() ![]() Malicious Microsoft-signed Windows drivers wielded in cyberattacks.Microsoft fixes Hyper-V VM problem caused by Patch Tuesday.Rackspace blames ransomware woes on zero-day attack.This is the end, Windows 7 and 8 friends: Microsoft drops support this week. ![]() Both of the systems of a communication scenario need to be patched to mitigate the vulnerability." "Complete patching of the vulnerability includes applying a kernel patch, an ABAP patch, and a manual migration of all trusted RFC and HTTP destinations. "A Capture-Replay vulnerability in the architecture of trusted-trusting RFC and HTTP communication scenarios allows malicious users to obtain illegitimate access to an SAP system," he explained. While SAP Security Note #3089413 ranks the lowest in terms of the new HotNews Notes with a CVSS of 9.0, "it is possibly the most critical one of SAP's January Patch Day, since it affects the majority of all SAP customers, and its mitigation is a challenge," said Thomas Fritsch, SAP security researcher at Onapsis. And two bugs in Dimension could lead to memory leak and arbitrary code execution in the context of the current user. Six vulnerabilities in InCopy could lead to arbitrary code execution and memory leak. ![]() InDesign, meanwhile has six critical and important bugs that could allow arbitrary code execution, application denial-of-service and memory leak attacks. The Reader update address 15 critical and important vulnerabilities, which would lead to application denial-of-service, arbitrary code execution, privilege escalation and memory leak. The company said it's not aware of any exploits in the wild for any of the security issues addressed in the updates. If you're running Exchange on-prem, please test and deploy all the Exchange fixes quickly, and hope that Microsoft fixed these bugs correctly this time." Adobe joins the partyĪdobe today released four patches to fix 29 vulnerabilities across its Acrobat and Reader, InDesign, InCopy, and Dimension software. "A recent report showed nearly 70,000 unpatched Exchange servers that were accessible from the internet. "Thanks to the use of a hard-coded path, a local attacker could load their own DLL and execute code at the level of SYSTEM," he explained. ZDI researcher Piotr Bazydło found the pair, and Childs said they resulted from a failed patch of CVE-2022-41123. We'd bet that Rackspace would attest to that.Īnd two more Exchange server bugs, CVE-2023-21763 and CVE-2023-21764, could allow attackers to escalate privileges up to SYSTEM level. "Email servers like Exchange are high-value targets for attackers, as they can allow an attacker to gain sensitive information through reading emails, or to facilitate Business Email Compromise style attacks by sending emails that appear to be legitimate," Immersive Labs' Director of Cyber Threat Research Kev Breen told The Register. Microsoft explains how to trigger this upgrade in the alert, but, as Childs notes: "Situations like this are why people who scream 'Just patch it!' show they have never actually had to patch an enterprise in the real world." More Exchange server bugsĪ pair of spoofing vulnerabilities have been found in Microsoft Exchange servers, tracked as CVE-2023-21762 and CVE-2023-21745, with the second flagged as "exploitation more likely," are notable in that they are Exchange server bugs. ![]() Redmond deems "exploitation more likely," for this flaw, and notes that it could allow an unauthenticated attacker to make an anonymous connection.īut in addition to installing the security update for SharePoint server, admins also need to trigger another upgrade action to be protected from possible exploit. Some of the other more interesting vulnerabilities, according to security researchers, include CVE-2023-21743, a security feature bypass bug in Microsoft Sharepoint Server. This could allow the attacker to escalate privileges, and then execute RPC functions that can only be sent by privileged accounts. ![]()
0 Comments
Leave a Reply. |