跳转到帖子

ISHACK AI BOT

超级管理员
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. FreeBSD: VID-9E2FDFC7-E237-4393-9FA5-2D50908C66B3 (CVE-2023-5380): xorg-server -- Multiple vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:S/C:N/I:N/A:C) Published 10/25/2023 Created 10/27/2023 Added 10/26/2023 Modified 01/28/2025 Description A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. Solution(s) freebsd-upgrade-package-xephyr freebsd-upgrade-package-xorg-nestserver freebsd-upgrade-package-xorg-server freebsd-upgrade-package-xorg-vfbserver freebsd-upgrade-package-xwayland freebsd-upgrade-package-xwayland-devel References CVE-2023-5380
  2. OS X update for Image Capture (CVE-2023-40401) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  3. OS X update for AppleMobileFileIntegrity (CVE-2023-40401) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  4. Oracle Linux: CVE-2023-46316: ELSA-2024-2483:traceroute security update (MODERATE) (Multiple Advisories) Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 10/25/2023 Created 05/22/2024 Added 05/07/2024 Modified 12/06/2024 Description In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines. A vulnerability was found in traceroute. This security issue is caused by wrapper scripts that do not properly parse command lines. Solution(s) oracle-linux-upgrade-traceroute References https://attackerkb.com/topics/cve-2023-46316 CVE - 2023-46316 ELSA-2024-2483 ELSA-2024-3211
  5. VMware vCenter Server: CVE-2023-34048 (VMSA-2023-0023) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 10/25/2023 Created 10/27/2023 Added 10/27/2023 Modified 06/28/2024 Description vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. Solution(s) vmware-vcenter-server-upgrade-latest References https://attackerkb.com/topics/cve-2023-34048 CVE - 2023-34048 CVE - 2023-34056 https://www.vmware.com/security/advisories/VMSA-2023-0023
  6. CentOS Linux: CVE-2023-5730: Important: firefox security update (CESA-2023:6162) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 10/25/2023 Created 11/01/2023 Added 11/01/2023 Modified 01/28/2025 Description Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. Solution(s) centos-upgrade-firefox centos-upgrade-firefox-debuginfo References CVE-2023-5730
  7. OS X update for LaunchServices (CVE-2023-40401) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  8. CentOS Linux: CVE-2023-5721: Important: firefox security update (CESA-2023:6162) Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 10/25/2023 Created 11/01/2023 Added 11/01/2023 Modified 01/28/2025 Description It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. Solution(s) centos-upgrade-firefox centos-upgrade-firefox-debuginfo References CVE-2023-5721
  9. CentOS Linux: CVE-2023-5367: Important: xorg-x11-server security update (Multiple Advisories) Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 10/25/2023 Created 11/10/2023 Added 11/09/2023 Modified 01/28/2025 Description A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service. Solution(s) centos-upgrade-tigervnc centos-upgrade-tigervnc-debuginfo centos-upgrade-tigervnc-icons centos-upgrade-tigervnc-license centos-upgrade-tigervnc-server centos-upgrade-tigervnc-server-applet centos-upgrade-tigervnc-server-minimal centos-upgrade-tigervnc-server-module centos-upgrade-xorg-x11-server-common centos-upgrade-xorg-x11-server-debuginfo centos-upgrade-xorg-x11-server-devel centos-upgrade-xorg-x11-server-source centos-upgrade-xorg-x11-server-xdmx centos-upgrade-xorg-x11-server-xephyr centos-upgrade-xorg-x11-server-xnest centos-upgrade-xorg-x11-server-xorg centos-upgrade-xorg-x11-server-xvfb centos-upgrade-xorg-x11-server-xwayland References CVE-2023-5367
  10. CentOS Linux: CVE-2023-5380: Important: tigervnc security update (CESA-2023:7428) Severity 4 CVSS (AV:L/AC:M/Au:S/C:N/I:N/A:C) Published 10/25/2023 Created 11/23/2023 Added 11/22/2023 Modified 01/28/2025 Description A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. Solution(s) centos-upgrade-tigervnc centos-upgrade-tigervnc-debuginfo centos-upgrade-tigervnc-icons centos-upgrade-tigervnc-license centos-upgrade-tigervnc-server centos-upgrade-tigervnc-server-applet centos-upgrade-tigervnc-server-minimal centos-upgrade-tigervnc-server-module References CVE-2023-5380
  11. Huawei EulerOS: CVE-2023-5574: xorg-x11-server security update Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 10/25/2023 Created 12/13/2024 Added 12/12/2024 Modified 01/28/2025 Description A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service. Solution(s) huawei-euleros-2_0_sp12-upgrade-xorg-x11-server-help References https://attackerkb.com/topics/cve-2023-5574 CVE - 2023-5574 EulerOS-SA-2024-2962
  12. OS X update for BOM (CVE-2023-32359) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  13. OS X update for Graphics Drivers (CVE-2023-32359) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  14. OS X update for Shortcuts (CVE-2023-32359) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  15. OS X update for Safari (CVE-2023-41977) Severity 4 CVSS (AV:N/AC:M/Au:N/C:P/I:N/A:N) Published 10/25/2023 Created 11/01/2023 Added 10/31/2023 Modified 01/28/2025 Description The issue was addressed with improved handling of caches. This issue is fixed in macOS Sonoma 14.1, iOS 16.7.2 and iPadOS 16.7.2. Visiting a malicious website may reveal browsing history. Solution(s) apple-osx-upgrade-14_1 References https://attackerkb.com/topics/cve-2023-41977 CVE - 2023-41977 https://support.apple.com/kb/HT213984
  16. CentOS Linux: CVE-2023-5363: Moderate: openssl security update (CESA-2024:0310) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 01/24/2024 Added 01/23/2024 Modified 01/28/2025 Description Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths.This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established.Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values.The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality.For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception.However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue. Solution(s) centos-upgrade-openssl centos-upgrade-openssl-debuginfo centos-upgrade-openssl-debugsource centos-upgrade-openssl-devel centos-upgrade-openssl-libs centos-upgrade-openssl-libs-debuginfo centos-upgrade-openssl-perl References CVE-2023-5363
  17. OS X update for AppleVA (CVE-2023-42842) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  18. OS X update for AppSandbox (CVE-2023-40401) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  19. OS X update for AppleEvents (CVE-2023-41989) Severity 7 CVSS (AV:L/AC:L/Au:N/C:C/I:C/A:C) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)
  20. Citrix ADC (NetScaler) Bleed Scanner Disclosed 10/25/2023 Created 10/31/2023 Description This module scans for a vulnerability that allows a remote, unauthenticated attacker to leak memory for a target Citrix ADC server. The leaked memory is then scanned for session cookies which can be hijacked if found. Author(s) Dylan Pindur Spencer McIntyre Development Source Code History
  21. Amazon Linux 2023: CVE-2023-5367: Important priority package update for xorg-x11-server Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 10/25/2023 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service. Solution(s) amazon-linux-2023-upgrade-xorg-x11-server-common amazon-linux-2023-upgrade-xorg-x11-server-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-debugsource amazon-linux-2023-upgrade-xorg-x11-server-devel amazon-linux-2023-upgrade-xorg-x11-server-source amazon-linux-2023-upgrade-xorg-x11-server-xdmx amazon-linux-2023-upgrade-xorg-x11-server-xdmx-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xephyr amazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xnest amazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xorg amazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xvfb amazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfo References https://attackerkb.com/topics/cve-2023-5367 CVE - 2023-5367 https://alas.aws.amazon.com/AL2023/ALAS-2023-404.html
  22. Amazon Linux 2023: CVE-2023-5380: Important priority package update for xorg-x11-server Severity 4 CVSS (AV:L/AC:H/Au:S/C:N/I:N/A:C) Published 10/25/2023 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. Solution(s) amazon-linux-2023-upgrade-xorg-x11-server-common amazon-linux-2023-upgrade-xorg-x11-server-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-debugsource amazon-linux-2023-upgrade-xorg-x11-server-devel amazon-linux-2023-upgrade-xorg-x11-server-source amazon-linux-2023-upgrade-xorg-x11-server-xdmx amazon-linux-2023-upgrade-xorg-x11-server-xdmx-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xephyr amazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xnest amazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xorg amazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xvfb amazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfo References https://attackerkb.com/topics/cve-2023-5380 CVE - 2023-5380 https://alas.aws.amazon.com/AL2023/ALAS-2023-404.html
  23. Amazon Linux 2023: CVE-2023-5574: Important priority package update for xorg-x11-server Severity 6 CVSS (AV:L/AC:H/Au:S/C:C/I:C/A:C) Published 10/25/2023 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service. Solution(s) amazon-linux-2023-upgrade-xorg-x11-server-common amazon-linux-2023-upgrade-xorg-x11-server-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-debugsource amazon-linux-2023-upgrade-xorg-x11-server-devel amazon-linux-2023-upgrade-xorg-x11-server-source amazon-linux-2023-upgrade-xorg-x11-server-xdmx amazon-linux-2023-upgrade-xorg-x11-server-xdmx-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xephyr amazon-linux-2023-upgrade-xorg-x11-server-xephyr-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xnest amazon-linux-2023-upgrade-xorg-x11-server-xnest-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xorg amazon-linux-2023-upgrade-xorg-x11-server-xorg-debuginfo amazon-linux-2023-upgrade-xorg-x11-server-xvfb amazon-linux-2023-upgrade-xorg-x11-server-xvfb-debuginfo References https://attackerkb.com/topics/cve-2023-5574 CVE - 2023-5574 https://alas.aws.amazon.com/AL2023/ALAS-2023-444.html
  24. OS X update for Contacts (CVE-2023-41072) Severity 5 CVSS (AV:L/AC:M/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 11/01/2023 Added 10/31/2023 Modified 01/28/2025 Description A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.1, iOS 17.1 and iPadOS 17.1. An app may be able to access sensitive user data. Solution(s) apple-osx-upgrade-14_1 References https://attackerkb.com/topics/cve-2023-41072 CVE - 2023-41072 https://support.apple.com/kb/HT213984
  25. OS X update for Pro Res (CVE-2023-32359) Severity 8 CVSS (AV:N/AC:L/Au:N/C:C/I:N/A:N) Published 10/25/2023 Created 10/14/2024 Added 10/14/2024 Modified 01/28/2025 Description Deprecated Solution(s)