Daily threat assessment 19JAN2016 (rules users see notes)

Security annoucements of interest to the AtomiCorp community, such as vulnerabilities in third party applications.
User avatar
mikeshinn
Atomicorp Staff - Site Admin
Atomicorp Staff - Site Admin
Posts: 4149
Joined: Thu Feb 07, 2008 7:49 pm
Location: Chantilly, VA

Daily threat assessment 19JAN2016 (rules users see notes)

Unread post by mikeshinn »

This report is a daily analysis of all published vulnerabilities in any product, weaknesses in technologies, exploits Internet wide, current internet threats associated with platforms and products our customer use, and if any action is required to protect their assets from these these vulnerabilities, weaknesses and exploits depending on the Atomicorp product they are using.

Please see this forum post for an explanation of the categories used in this report.

Note: CVEs are sometimes created after a vulnerability is published (sometimes far after it has been made public). When CVEs are referenced, it is because a CVE was created today, not because an issue was resolved today, and it is included here for reference.

ASL users

Summary: No action required.

Already protect against/Known Method/No update required

CVE-2016-0728 (Linux Kernel Session Keyring Reference Count Overflow Bug)
CakePHP 3.2.0 CSRF Bypass
WordPress Extredj Open Redirection
Quick Cart v6.6 XSS Vulnerability

Not already protected against/New Method/Update Available

None.

Not already protected against/Doesnt protect against/Solution

None.

Potential Vulnerability/Solution

None.

Rules only users

Summary: Non-ASL Linux users see notes below regarding root level vulnerability in some Linux kernels. ASL users are immune to this vulnerability.

Already protect against/Known Method/No update required

CakePHP 3.2.0 CSRF Bypass
WordPress Extredj Open Redirection
Quick Cart v6.6 XSS Vulnerability

Already protect against/Known Method/No update required

None.

Not already protected against/Doesnt protect against/Solution

modsecurity can not protect against kernel level vulnerabilities such as the one below. All non-ASL Linux users are vulnerable to a kernel level exploit that was made public this morning. ASL users are immune to this vulnerability.

CVE-2016-0728 (Linux Kernel Session Keyring Reference Count Overflow Bug)

Potential Vulnerability/Solution

None.
prupert
Forum Regular
Forum Regular
Posts: 573
Joined: Tue Aug 01, 2006 2:45 pm
Location: Netherlands

Re: Daily threat assessment 19JAN2016 (rules users see notes

Unread post by prupert »

Rules-only users with stock kernels, be advised that the kernel update for EL 7 was only *just* released.
https://rhn.redhat.com/errata/RHSA-2016-0064.html
Lemonbit Internet Dedicated Server Management
Post Reply