0dayroot

Inicio

Heading Title



DestacadosFeatured

Curso – Seguridad 101

by Gustavo

written by Gustavo

Muy buenas a tod@s! espero se encuentren muy bien, se que me encuentro publicando menos pero es por algunos cambios en cuanto al plano laboral.

En esta oportunidad quiero traerles una linda noticia, estaré brindando un curso sobre seguridad y privacidad online para los que no tengan mucho conocimiento sobre el tema y quieran saber como proteger sus cuentas y datos en línea.

Conocerán como protegerse y los riesgos mas populares que se ven día a día.

El temario será:

  • Internet hoy en día
  • Datos personales
  • Amenazas
  • Wifi Públicas
  • Recomendaciones
  • Q&A

Lo mejor de esto es que será un curso para recaudar fondos y así ayudar a Amigo a Casa (https://www.instagram.com/amigoacasa/) que se encargan de rescatar animales y buscarles una familia, no dejen de visitar su Instagram.

TODO LO DONADO SERÁ RECIBIDO DIRECTAMENTE POR ELLOS.
PARA AGILIZAR EL PROCESO PUEDEN ENVIAR SUS COMPROBANTES A:
gustavo@0dayroot.net

Una vez se inscriban les llegará un correo con las instrucciones de como hacer la donación para confirmar su lugar en el curso, las donaciones son a elección de cada uno pero tiene un mínimo de 100 pesos ya que considero que es un piso muy razonable y además Amigo a Casa necesita nuestra ayuda.

Fecha: 13/10/2018
Horario: 14:00 hs

Preguntas

¿El evento será grabado?

– Si, el evento será grabado y se enviará un link a todos los participantes luego del evento.

¿Se repetirá otra vez?

– Por el momento será la única fecha.

¿Donde se hará el evento?

– Es un evento Online y podrán verlo desde cualquier dispositivo que tenga internet.

¿A que nivel está enfocado el curso?

– El curso está enfocado a nivel principiante. La idea es enseñarles de experiencias propias y que se lleven nuevos conceptos.

¿Este curso me volverá paranóico/a?

– No es para tanto :P, pero ojalá les haga pensar sobre los riesgos que existen.

¿Habrá un espacio para hacer preguntas?

– Por supuesto!.

¿Existen mas formas de colaborar con Amigo a Casa?

– Claro! ingresá a su instagram y ponete en contacto! (https://www.instagram.com/amigoacasa/)

¿Cuanto tiempo dura el curso?

– Aproximadamente unos 60 minutos.

¿Que necesito para ver el curso?

– Conexión a Internet, preferiblemente mayor a 5MB. Se les enviará un link con el acceso al sistema de cursos, podrán ingresar con Internet Explorer (11 y superior), Edge, Chrome, Firefox, Safari



0 comment
0 FacebookTwitterPinterestEmail



FeaturedGeneral

Webinar Seguridad Informática

by Gustavo

written by Gustavo

Hola a tod@s! me encuentro con la idea de querer realizar un webinar sobre seguridad informática y me gustaría que me comentaran que temas les gustaría que trate como ser:

  • Pentest
  • OSINT
  • Seguridad Web
  • Seguridad para el usuario
  • Seguridad empresarial

Entre otros temas que se les ocurra, me gustaría escuchar sus ideas y así puedo organizar algo que les guste.

Aquí debajo pueden escribir sus comentarios.

Saludos!!







 



0 comment
0 FacebookTwitterPinterestEmail



GeneralHerramientas

Facebook OSINT

by Gustavo

written by Gustavo

Muy buenas a tod@s!! en esta oportunidad les traigo una web que utilizo con frecuencia para tareas de investigación ((cof..cof…)) se trata de OSINT SEARCH TOOL . Esta tool nos viene a ayudar para la fase de recolección de información que podemos usar para un ataque dirigido a un usuario específico o conocer mucho mas a nuestro target.

Continue Reading


0 comment
0 FacebookTwitterPinterestEmail



DestacadosGeneral

Certificaciones Microsoft Azure con descuento

by Gustavo

written by Gustavo

Hola a tod@s tanto tiempo!! se que he descuidado mucho este sitio pero es que me encuentro trabajando en varios proyectos personales y realmente me queda poco tiempo para poder dedicarle.

Siempre me pueden seguir en mi twitter @gjs_sj donde ahí publico siempre notas y/o programas interesantes que voy testeando.

Esta vez les traigo un muy buen dato, Microsoft acaba de liberar los siguientes exámenes BETA de Azure:

Continue Reading


0 comment
0 FacebookTwitterPinterestEmail



General

Proximamente…

by Gustavo

written by Gustavo

Estimados lectores hace un tiempo que no escribo debido a varios proyectos personales que les comentaré dentro de poco, muchas cosas han pasado en todo este tiempo en el ámbito de la seguridad y se que nos hemos quedado cortos :(.

Les prometo que dentro de unos días volveré a poner todo el contenido y el tiempo que este blog merece ? Trust me!

Nos leemos pronto!!



0 comment
0 FacebookTwitterPinterestEmail



DestacadosGeneral

EkoParty 2016

by Gustavo

written by Gustavo

Estos días se está realizando la EkoParty aquí en argentina y la verdad el nivel de expositores e información es muy alto, recomiendo que si nunca fuistes a un evento de este estílo, el año que viene anotes tu agenda el día y concurras.

Se está haciendo mucho incapié en Car Hacking, exploits de Windows y Malware. Como siempre los stands cuentan con los Challenges (Retos) muy buenos y divertidos.
No podemos dejar pasar desapercibido al muñeco mas golpeado de la EkoParty (para los que lo conocen saben de quien hablo).

Para destacar el nivel de las charlas, son excelentes y los expositores mejoran cada año.

Mañana será el último día de la Eko y se esperan presentaciones geniales que hablan sobre Voto Electrónico, Seguridad en Automóviles, Payloads, Samsung Pay, entre otros.

Espero verlos mañana!!!

 

 



0 comment
0 FacebookTwitterPinterestEmail



Vulnerabilidades

Microsoft Security Bulletin Summary For August 2016

by Gustavo

written by Gustavo

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Microsoft Security Bulletin Summary for August 2016
Issued: August 09, 2016
********************************************************************
This bulletin summary lists security bulletins released for
August 2016.
The full version of the Microsoft Security Bulletin Summary for 
August 2016 can be found at 
<https://technet.microsoft.com/library/security/ms16-aug>.
Critical Security Bulletins
============================
MS16-095
  - Affected Software:
    - Windows Vista Service Pack 2:
      - Internet Explorer 9
    - Windows Vista x64 Edition Service Pack 2:
      - Internet Explorer 9
    - Windows Server 2008 for 32-bit Systems Service Pack 2:
      - Internet Explorer 9
      (Windows Server 2008 Server Core installation not affected)
    - Windows Server 2008 for x64-based Systems Service Pack 2:
      - Internet Explorer 9
      (Windows Server 2008 Server Core installation not affected)
    - Windows 7 for 32-bit Systems Service Pack 1:
      - Internet Explorer 11
    - Windows 7 for x64-based Systems Service Pack 1:
      - Internet Explorer 11
    - Windows Server 2008 R2 for x64-based Systems 
      Service Pack 1:
      - Internet Explorer 11
      (Windows Server 2008 R2 Server Core installation 
      not affected)
    - Windows 8.1 for 32-bit Systems:
      - Internet Explorer 11
    - Windows 8.1 for x64-based Systems:
      - Internet Explorer 11
    - Windows Server 2012
      - Internet Explorer 10
    - Windows Server 2012 R2:
      - Internet Explorer 11
      (Windows Server 2012 R2 Server Core installation not affected)
    - Windows RT 8.1:
      - Internet Explorer 11
    - Windows 10 for 32-bit Systems:
      - Internet Explorer 11
    - Windows 10 for x64-based Systems:
      - Internet Explorer 11
    - Windows 10 Version 1511 for 32-bit Systems:
      - Internet Explorer 11
    - Windows 10 Version 1511 for x64-based Systems:
      - Internet Explorer 11
    - Windows 10 Version 1607 for 32-bit Systems
      - Internet Explorer 11
    - Windows 10 Version 1607 for x64-based Systems
      - Internet Explorer 11
  - Impact: Remote Code Execution
  - Version Number: 1.0
MS16-096
  - Affected Software:
    - Windows 10 for 32-bit Systems
      - Microsoft Edge
    - Windows 10 for x64-based Systems
      - Microsoft Edge
    - Windows 10 Version 1511 for 32-bit Systems
      - Microsoft Edge
    - Windows 10 Version 1511 for x64-based Systems
      - Microsoft Edge
    - Windows 10 Version 1607 for 32-bit Systems
      - Microsoft Edge
    - Windows 10 Version 1607 for x64-based Systems
      - Microsoft Edge
  - Impact: Remote Code Execution
  - Version Number: 1.0 
MS16-097
  - Affected Software:
    - Windows Vista Service Pack 2 
    - Windows Vista x64 Edition Service Pack 2 
    - Windows Server 2008 for 32-bit Systems Service Pack 2 
     (Windows Server 2008 Server Core installation affected)
    - Windows Server 2008 for x64-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    - Windows Server 2008 for Itanium-based Systems Service Pack 2 
     (Windows Server 2008 Server Core installation affected)
    - Windows 7 for 32-bit Systems Service Pack 1 
    - Windows 7 for x64-based Systems Service Pack 1 
    - Windows Server 2008 R2 for x64-based Systems Service Pack 1 
      (Windows Server 2008 R2 Server Core installation affected)
    - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    - Windows 8.1 for 32-bit Systems
    - Windows 8.1 for x64-based Systems
    - Windows Server 2012 
     (Windows Server 2012 Server Core installation affected)
    - Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation affected)
    - Windows RT 8.1
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
    - Windows 10 Version 1607 for 32-bit Systems
    - Windows 10 Version 1607 for x64-based Systems
    - Microsoft Office 2007 Service Pack 3
    - Microsoft Office 2010 Service Pack 2 (32-bit editions) 
    - Microsoft Office 2010 Service Pack 2 (64-bit editions) 
    - Microsoft Word Viewer
    - Skype for Business 2016 (32-bit editions)
    - Skype for Business 2016 (64-bit editions)
    - Skype for Business Basic 2016 (32-bit editions)
    - Skype for Business Basic 2016 (64-bit editions)
    - Microsoft Lync 2013 Service Pack 1 (32-bit)(Skype for
      Business)
    - Microsoft Lync Basic 2013 Service Pack 1 (32-bit)(Skype
      for Business Basic)
    - Microsoft Lync 2013 Service Pack 1 (64-bit)(Skype for
      Business)
    - Microsoft Lync Basic 2013 Service Pack 1 (64-bit)(Skype
      for Business Basic)
    - Microsoft Lync 2010 (32-bit)
    - Microsoft Lync 2010 (64-bit)
    - Microsoft Lync 2010 Attendee (user level install)
    - Microsoft Lync 2010 Attendee (admin level install)
    - Microsoft Live Meeting 2007 Console
  - Impact: Remote Code Execution
  - Version Number: 1.0 
MS16-099
  - Affected Software:
    - Microsoft Office 2007 Service Pack 3
    - Microsoft OneNote 2007 Service Pack 3
    - Microsoft Word 2007 Service Pack 3
    - Microsoft Office 2010 Service Pack 2 (32-bit editions)
    - Microsoft Office 2010 Service Pack 2 (64-bit editions)
    - Microsoft OneNote 2010 Service Pack 2 (32-bit editions)
    - Microsoft OneNote 2010 Service Pack 2 (64-bit editions)
    - Microsoft Word 2010 Service Pack 2 (32-bit editions)
    - Microsoft Word 2010 Service Pack 2 (64-bit editions)
    - Microsoft Office 2013 Service Pack 1 (32-bit editions)
    - Microsoft Office 2013 Service Pack 1 (64-bit editions)
    - Microsoft OneNote 2013 Service Pack 1 (32-bit editions)
    - Microsoft OneNote 2013 Service Pack 1 (64-bit editions)
    - Microsoft Word 2013 Service Pack 1 (32-bit editions)
    - Microsoft Word 2013 Service Pack 1 (64-bit editions)
    - Microsoft Office 2013 RT Service Pack 1
    - Microsoft OneNote 2013 RT Service Pack 1
    - Microsoft Word 2013 RT Service Pack 1
    - Microsoft Office 2016 (32-bit edition)
    - Microsoft Office 2016 (64-bit edition)
    - Microsoft OneNote 2016 (32-bit edition)
    - Microsoft Word 2016 (32-bit edition)
    - Microsoft Word 2016 (64-bit edition)
    - Microsoft Word for Mac 2011
    - Microsoft OneNote 2016 for Mac
    - Microsoft Word 2016 for Mac
    - Microsoft Word Viewer
  - Impact: Remote Code Execution
  - Version Number: 1.0 
MS16-102
  - Affected Software:
    - Windows 8.1 for 32-bit Systems
    - Windows 8.1 for x64-based Systems
    - Windows Server 2012 
      (Windows Server 2012 Server Core installation not affected)
    - Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    - Windows RT 8.1
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
    - Windows 10 Version 1607 for 32-bit Systems
    - Windows 10 Version 1607 for x64-based Systems
  - Impact: Remote Code Execution
  - Version Number: 1.0 
Important Security Bulletins
============================
MS16-098
  - Affected Software:
    - Windows Vista Service Pack 2 
    - Windows Vista x64 Edition Service Pack 2 
    - Windows Server 2008 for 32-bit Systems Service Pack 2 
      (Windows Server 2008 Server Core installation affected) 
    - Windows Server 2008 for x64-based Systems Service Pack 2 
      (Windows Server 2008 Server Core installation affected) 
    - Windows Server 2008 for Itanium-based Systems Service Pack 2 
    - Windows 7 for 32-bit Systems Service Pack 1 
    - Windows 7 for x64-based Systems Service Pack 1 
    - Windows Server 2008 R2 for x64-based Systems Service Pack 1 
      (Windows Server 2008 R2 Server Core installation affected) 
    - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    - Windows 8.1 for 32-bit Systems
    - Windows 8.1 for x64-based Systems
    - Windows Server 2012 
      (Windows Server 2012 Server Core installation affected)
    - Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    - Windows RT 8.1
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
    - Windows 10 Version 1607 for 32-bit Systems
    - Windows 10 Version 1607 for x64-based Systems
  - Impact: Elevation of Privilege
  - Version Number: 1.0 
MS16-100
  - Affected Software:
    - Windows 8.1 for 32-bit Systems
    - Windows 8.1 for x64-based Systems
    - Windows Server 2012 
      (Windows Server 2012 Server Core installation affected)
    - Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    - Windows RT 8.1
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
  - Impact: Security Feature Bypass
  - Version Number: 1.0 
MS16-101
  - Affected Software:
    - Windows Vista Service Pack 2 
    - Windows Vista x64 Edition Service Pack 2 
    - Windows Server 2008 for 32-bit Systems Service Pack 2 
      (Windows Server 2008 Server Core installation affected) 
    - Windows Server 2008 for x64-based Systems Service Pack 2 
      (Windows Server 2008 Server Core installation affected) 
    - Windows Server 2008 for Itanium-based Systems Service Pack 2 
    - Windows 7 for 32-bit Systems Service Pack 1 
    - Windows 7 for x64-based Systems Service Pack 1 
    - Windows Server 2008 R2 for x64-based Systems Service Pack 1 
      (Windows Server 2008 R2 Server Core installation affected) 
    - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    - Windows 8.1 for 32-bit Systems
    - Windows 8.1 for x64-based Systems
    - Windows Server 2012 
      (Windows Server 2012 Server Core installation affected)
    - Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    - Windows RT 8.1
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
    - Windows 10 Version 1607 for 32-bit Systems
    - Windows 10 Version 1607 for x64-based Systems
  - Impact: Elevation of Privilege
  - Version Number: 1.0 
MS16-103
  - Affected Software:
    - Windows 10 for 32-bit Systems 
    - Windows 10 for x64-based Systems 
    - Windows 10 Version 1511 for 32-bit Systems
    - Windows 10 Version 1511 for x64-based Systems
  - Impact: Information Disclosure
  - Version Number: 1.0 
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at 
<https://technet.microsoft.com/security/dn753714>.
********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************
Microsoft respects your privacy. Please read our online Privacy
Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.
If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwi
zard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.
These settings will not affect any newsletters you've requested or
any mandatory service communications that are considered part of
certain Microsoft services.
For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8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=SPSP
-----END PGP SIGNATURE-----



0 comment
0 FacebookTwitterPinterestEmail



Vulnerabilidades

Cisco Security Advisory 20160810-iosxr

by Gustavo

written by Gustavo

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Cisco Security Advisory: Cisco IOS XR Software for Cisco ASR 9001 Aggregation Services Routers Fragmented Packet Denial of Service Vulnerability
Advisory ID: cisco-sa-20160810-iosxr
Revision 1.0
For Public Release 2016 August 10 16:00  GMT
+---------------------------------------------------------------------
Summary
=======
A vulnerability in the driver processing functions of Cisco IOS XR Software for Cisco ASR 9001 Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a memory leak on the route processor (RP) of an affected device, which could cause the device to drop all control-plane protocols and lead to a denial of service condition (DoS) on a targeted system. 
The vulnerability is due to improper handling of crafted, fragmented packets that are directed to an affected device. An attacker could exploit this vulnerability by sending crafted, fragmented packets to an affected device for processing and reassembly. A successful exploit could allow the attacker to cause a memory leak on the RP of the device, which could cause the device to drop all control-plane protocols and eventually lead to a DoS condition on the targeted system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. However, there are mitigations for this vulnerability.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160810-iosxr
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=hP4Y
-----END PGP SIGNATURE-----



0 comment
0 FacebookTwitterPinterestEmail



DestacadosHerramientas

Xerosploit nuevo MITM en el barrio

by Gustavo

written by Gustavo

Hace un tiempito salió al público una herramienta llamada Xerosploit, que viene a traernos las cosas mas fáciles a la hora de hacer un Man-in-the-middle.

Como se puede ver en su video, es muy sencillo utilizarlo y realizar un ataque, actualmente consta de los siguientes módulos:

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download intercaption and replacement
  • Sniffing
  • Dns spoofing
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement

Realmente es super sencillo usarla, está creada en Python, por lo que se necesitan algunas dependencias:

  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminaltables

La instalación es tan sensilla como:

git clone https://github.com/LionSec/xerosploit cd xerosploit && sudo python install.py sudo xerosploit

Pueden encontrar toda la información en: https://github.com/LionSec/xerosploit

No se olviden de unirse a nuestro canal de Telegram para todas las noticias actualizadas.



0 comment
0 FacebookTwitterPinterestEmail



Vulnerabilidades

Red Hat Security Advisory 2016-1546-01

by Gustavo

written by Gustavo

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
                   Red Hat Security Advisory
Synopsis:          Important: libtiff security update
Advisory ID:       RHSA-2016:1546-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2016-1546.html
Issue date:        2016-08-02
CVE Names:         CVE-2014-8127 CVE-2014-8129 CVE-2014-8130 
                   CVE-2014-9330 CVE-2014-9655 CVE-2015-1547 
                   CVE-2015-7554 CVE-2015-8665 CVE-2015-8668 
                   CVE-2015-8683 CVE-2015-8781 CVE-2015-8782 
                   CVE-2015-8783 CVE-2015-8784 CVE-2016-3632 
                   CVE-2016-3945 CVE-2016-3990 CVE-2016-3991 
                   CVE-2016-5320 
=====================================================================
1. Summary:
An update for libtiff is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The libtiff packages contain a library of functions for manipulating Tagged
Image File Format (TIFF) files.
Security Fix(es):
* Multiple flaws have been discovered in libtiff. A remote attacker could
exploit these flaws to cause a crash or memory corruption and, possibly,
execute arbitrary code by tricking an application linked against libtiff
into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547,
CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782,
CVE-2015-8783, CVE-2016-3990, CVE-2016-5320)
* Multiple flaws have been discovered in various libtiff tools (bmp2tiff,
pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit,
tiff2rgba). By tricking a user into processing a specially crafted file, a
remote attacker could exploit these flaws to cause a crash or memory
corruption and, possibly, execute arbitrary code with the privileges of the
user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129,
CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632,
CVE-2016-3945, CVE-2016-3991)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running applications linked against libtiff must be restarted for this
update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1177893 - CVE-2014-9330 libtiff: Out-of-bounds reads followed by a crash in bmp2tiff
1185805 - CVE-2014-8127 libtiff: out-of-bounds read with malformed TIFF image in multiple tools
1185815 - CVE-2014-8129 libtiff: out-of-bounds read/write with malformed TIFF image in tiff2pdf
1185817 - CVE-2014-8130 libtiff: divide by zero in the tiffdither tool
1190703 - CVE-2014-9655 libtiff: use of uninitialized memory in putcontig8bitYCbCr21tile and NeXTDecode
1190709 - CVE-2015-1547 libtiff: use of uninitialized memory in NeXTDecode
1294417 - CVE-2015-7554 libtiff: Invalid-write in _TIFFVGetField() when parsing some extension tags
1294425 - CVE-2015-8668 libtiff: OOB read in bmp2tiff
1294427 - CVE-2015-8683 libtiff: Out-of-bounds when reading CIE Lab image format files
1294444 - CVE-2015-8665 libtiff: Out-of-bounds read in tif_getimage.c
1301649 - CVE-2015-8781 CVE-2015-8782 CVE-2015-8783 libtiff: invalid assertion
1301652 - CVE-2015-8784 libtiff: out-of-bound write in NeXTDecode()
1325093 - CVE-2016-3945 libtiff: out-of-bounds write in the tiff2rgba tool
1325095 - CVE-2016-3632 libtiff: out-of-bounds write in _TIFFVGetField function
1326246 - CVE-2016-3990 libtiff: out-of-bounds write in horizontalDifference8()
1326249 - CVE-2016-3991 libtiff: out-of-bounds write in loadImage() function
1346687 - CVE-2016-5320 libtiff: Out-of-bounds write in PixarLogDecode() function in tif_pixarlog.c
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
libtiff-4.0.3-25.el7_2.src.rpm
x86_64:
libtiff-4.0.3-25.el7_2.i686.rpm
libtiff-4.0.3-25.el7_2.x86_64.rpm
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-devel-4.0.3-25.el7_2.i686.rpm
libtiff-devel-4.0.3-25.el7_2.x86_64.rpm
libtiff-static-4.0.3-25.el7_2.i686.rpm
libtiff-static-4.0.3-25.el7_2.x86_64.rpm
libtiff-tools-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
libtiff-4.0.3-25.el7_2.src.rpm
x86_64:
libtiff-4.0.3-25.el7_2.i686.rpm
libtiff-4.0.3-25.el7_2.x86_64.rpm
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-devel-4.0.3-25.el7_2.i686.rpm
libtiff-devel-4.0.3-25.el7_2.x86_64.rpm
libtiff-static-4.0.3-25.el7_2.i686.rpm
libtiff-static-4.0.3-25.el7_2.x86_64.rpm
libtiff-tools-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
libtiff-4.0.3-25.el7_2.src.rpm
ppc64:
libtiff-4.0.3-25.el7_2.ppc.rpm
libtiff-4.0.3-25.el7_2.ppc64.rpm
libtiff-debuginfo-4.0.3-25.el7_2.ppc.rpm
libtiff-debuginfo-4.0.3-25.el7_2.ppc64.rpm
libtiff-devel-4.0.3-25.el7_2.ppc.rpm
libtiff-devel-4.0.3-25.el7_2.ppc64.rpm
ppc64le:
libtiff-4.0.3-25.el7_2.ppc64le.rpm
libtiff-debuginfo-4.0.3-25.el7_2.ppc64le.rpm
libtiff-devel-4.0.3-25.el7_2.ppc64le.rpm
s390x:
libtiff-4.0.3-25.el7_2.s390.rpm
libtiff-4.0.3-25.el7_2.s390x.rpm
libtiff-debuginfo-4.0.3-25.el7_2.s390.rpm
libtiff-debuginfo-4.0.3-25.el7_2.s390x.rpm
libtiff-devel-4.0.3-25.el7_2.s390.rpm
libtiff-devel-4.0.3-25.el7_2.s390x.rpm
x86_64:
libtiff-4.0.3-25.el7_2.i686.rpm
libtiff-4.0.3-25.el7_2.x86_64.rpm
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-devel-4.0.3-25.el7_2.i686.rpm
libtiff-devel-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
libtiff-debuginfo-4.0.3-25.el7_2.ppc.rpm
libtiff-debuginfo-4.0.3-25.el7_2.ppc64.rpm
libtiff-static-4.0.3-25.el7_2.ppc.rpm
libtiff-static-4.0.3-25.el7_2.ppc64.rpm
libtiff-tools-4.0.3-25.el7_2.ppc64.rpm
ppc64le:
libtiff-debuginfo-4.0.3-25.el7_2.ppc64le.rpm
libtiff-static-4.0.3-25.el7_2.ppc64le.rpm
libtiff-tools-4.0.3-25.el7_2.ppc64le.rpm
s390x:
libtiff-debuginfo-4.0.3-25.el7_2.s390.rpm
libtiff-debuginfo-4.0.3-25.el7_2.s390x.rpm
libtiff-static-4.0.3-25.el7_2.s390.rpm
libtiff-static-4.0.3-25.el7_2.s390x.rpm
libtiff-tools-4.0.3-25.el7_2.s390x.rpm
x86_64:
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-static-4.0.3-25.el7_2.i686.rpm
libtiff-static-4.0.3-25.el7_2.x86_64.rpm
libtiff-tools-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
libtiff-4.0.3-25.el7_2.src.rpm
x86_64:
libtiff-4.0.3-25.el7_2.i686.rpm
libtiff-4.0.3-25.el7_2.x86_64.rpm
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-devel-4.0.3-25.el7_2.i686.rpm
libtiff-devel-4.0.3-25.el7_2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
libtiff-debuginfo-4.0.3-25.el7_2.i686.rpm
libtiff-debuginfo-4.0.3-25.el7_2.x86_64.rpm
libtiff-static-4.0.3-25.el7_2.i686.rpm
libtiff-static-4.0.3-25.el7_2.x86_64.rpm
libtiff-tools-4.0.3-25.el7_2.x86_64.rpm
These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-8127
https://access.redhat.com/security/cve/CVE-2014-8129
https://access.redhat.com/security/cve/CVE-2014-8130
https://access.redhat.com/security/cve/CVE-2014-9330
https://access.redhat.com/security/cve/CVE-2014-9655
https://access.redhat.com/security/cve/CVE-2015-1547
https://access.redhat.com/security/cve/CVE-2015-7554
https://access.redhat.com/security/cve/CVE-2015-8665
https://access.redhat.com/security/cve/CVE-2015-8668
https://access.redhat.com/security/cve/CVE-2015-8683
https://access.redhat.com/security/cve/CVE-2015-8781
https://access.redhat.com/security/cve/CVE-2015-8782
https://access.redhat.com/security/cve/CVE-2015-8783
https://access.redhat.com/security/cve/CVE-2015-8784
https://access.redhat.com/security/cve/CVE-2016-3632
https://access.redhat.com/security/cve/CVE-2016-3945
https://access.redhat.com/security/cve/CVE-2016-3990
https://access.redhat.com/security/cve/CVE-2016-3991
https://access.redhat.com/security/cve/CVE-2016-5320
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFXoNKIXlSAg2UNWIIRAn0mAJ49V9uRtJCn4vAWPIfVZ3ptCa4NDQCbBuTb
H5YX3gD3gJu8C4EadiP+wtg=
=Z4gh
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce



0 comment
0 FacebookTwitterPinterestEmail

Salir de la versión móvil