SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
CVE-2023-38545: curl SOCKS5 oversized hostname vulnerability. How bad is it?
Published: 2023-10-11
Last Updated: 2023-10-11 12:29:24 UTC
by Johannes Ullrich (Version: 1)
Last week, Daniel Stenberg announced that he would release a new version of the curl library and command line tool today, fixing a significant vulnerability. Curl is the de-facto standard library to create HTTP requests unless you still use Perl (good old LWP..). A significant vulnerability in curl will affect pretty much anything connecting to a web server. With everything becoming an HTTP-based API, code using curl is probably written faster than ever, and Daniel's work is more important than ever.
Today, we got the promised fix for CVE-2023-38545. So here is a quick overview of how severe it is:
The vulnerability is a heap-based buffer overflow, which may lead to arbitrary code execution. Modern operating systems should make exploitation of heap-based buffer overflows more difficult, but exploitation is possible.
To exploit this vulnerability, the attacker has to be able to supply an oversized hostname to curl. Host names passed to curl should be validated, and I do not believe such an oversized hostname would pass input validation. Sure, an attacker can run "curl" on the command line, but if they can do so, they already have code execution capabilities. A valid exploit would require an attacker to trigger code execution by, for example, passing a hostname to a web app that would trigger the code execution in curl.
Next, the exploit only exists if curl is used to connect to a SOCKS5 proxy. This is another dependency, making exploitation less likely.
Read the full entry: https://isc.sans.edu/diary/CVE202338545+curl+SOCKS5+oversized+hostname+vulnerability+How+bad+is+it/30304/
October 2023 Microsoft Patch Tuesday Summary
Published: 2023-10-10
Last Updated: 2023-10-10 18:03:47 UTC
by Johannes Ullrich (Version: 1)
For October, Microsoft released patches for 105 different vulnerabilities. This count includes one Chromium vulnerability that was patched earlier this month.
There are a total of three already exploited vulnerabilities:
CVE-2023-44487 HTTP/2 Rapid Reset Attack: This vulnerability was disclosed by Cloudflare in a blog post earlier today. Cloudflare started to see these attacks late in August. This issue led to unprecedented DoS attacks. An attacker will set an HTTP/2 stream and immediately "cancel" it with a reset stream. This avoids limits on the number of streams accepted and can lead to CPU exhaustion on the server attempting to clean up the canceled streams. This is not a TCP RST but an application layer (HTTP/2) feature. On the other hand, it does look a bit like a SYN flood attack, maybe? HTTP/2 often appears to re-implement some of the features found in TCP, so it is no surprise to see similar vulnerabilities.
CVE-2023-36563 Wordpad Information Disclosure: Yet another problem with linked resources that may cause the client (Wordpad in this case) to initiate an SMB connection and in the process, automatically pass along weakly hashed credentials. See this blog post for details: https://support.microsoft.com/en-us/topic/kb5032314-how-to-manage-the-ole-object-conversion-vulnerability-in-wordpad-associated-with-cve-2023-36563-98d95ae9-2f9e-4f65-9231-46363c31cf07
CVE-2023-41763: Skype for Business elevation of privileges. This is a vulnerability in the Skype for Business server product. IP addresses and port numbers may be disclosed.
Noteworthy are the nine critical vulnerabilities in the Layer 2 Tunneling protocol and the vulnerabilities in the Microsoft Message Queue (one with a CVSS score of 9.8). These two components received numerous patches for the last couple of months.
Overall, I would rate this patch Tuesday as "average." There are no "outrageously important" vulnerabilities to patch.
Read the full entry: https://isc.sans.edu/diary/October+2023+Microsoft+Patch+Tuesday+Summary/30300/
Apple fixes vulnerabilities in iOS and iPadOS.
Published: 2023-10-04
Last Updated: 2023-10-04 19:53:02 UTC
by Johannes Ullrich (Version: 1)
Apple today released iOS/iPadOS 17.0.3. These updates fix two vulnerabilities. A WebRTC vulnerability that could be used to execute arbitrary code, establishing initial access to the device, and a Kernel vulnerability used to elevate privileges. The privilege escalation vulnerability has been exploited against older versions of iOS. See Apple's page about these vulnerabilities: https://support.apple.com/en-us/HT213961.
Read the full entry: https://isc.sans.edu/diary/Apple+fixes+vulnerabilities+in+iOS+and+iPadOS/30280/
ZIP's DOSTIME & DOSDATE Formats (2023.10.09)
https://isc.sans.edu/diary/ZIPs+DOSTIME+DOSDATE+Formats/30296/
Wireshark 4.2.0 First Release Candidate (2023.10.08)
https://isc.sans.edu/diary/Wireshark+420+First+Release+Candidate/30292/
Binary IPv6 Addresses (2023.10.07)
https://isc.sans.edu/diary/Binary+IPv6+Addresses/30290/
Wireshark releases 2 updates in one day. Mac users especially will want the latest. (2023.10.07)
New tool: le-hex-to-ip.py (2023.10.05)
https://isc.sans.edu/diary/New+tool+lehextoippy/30284/
What's Normal? Connection Sizes (2023.10.04)
https://isc.sans.edu/diary/Whats+Normal+Connection+Sizes/30278/
Product: Atlassian Confluence Data CenterCVSS Score: 9.8** KEV since 2023-10-05 ** NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-22515NVD References: - https://confluence.atlassian.com/display/KB/FAQ+for+CVE-2023-22515- https://confluence.atlassian.com/pages/viewpage.action?pageId=1295682276- https://jira.atlassian.com/browse/CONFSERVER-92457CVE-2023-4911 - GNU C Library's dynamic loader ld.so is vulnerable to a buffer overflow during the processing of the GLIBC_TUNABLES environment variable, enabling a local attacker to execute code with elevated privileges via maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission.Product: GNU GlibcCVSS Score: 7.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-4911ISC Podcast: https://isc.sans.edu/podcastdetail.html?podcastid=8688NVD References: https://www.qualys.com/cve-2023-4911/CVE-2023-35349, CVE-2023-36570 through CVE-2023-36575, CVE-2023-36577, CVE-2023-36578, CVE-2023-36582, CVE-2023-36583, CVE-2023-36589 through CVE-2023-36593 - Microsoft Message Queuing Remote Code Execution VulnerabilitiesProduct: Microsoft Message QueuingCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-35349NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36570NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36571NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36572NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36573NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36574NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36575NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36577NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36578NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36582NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36583NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36589NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36590NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36591NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36592NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36593ISC Diary: https://isc.sans.edu/diary/30300MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35349MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36570MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36571MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36572MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36573MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36574MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36575MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36577MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36578MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36582MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36583MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36589MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36590MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36591MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36592MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36593MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36434 CVE-2023-36431, CVE-2023-36579, CVE-2023-36581, CVE-2023-36606 - Microsoft Message Queuing Denial of Service VulnerabilitiesProduct: Microsoft Message QueuingCVSS Score: 7.5NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36431NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36579NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36581NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-36606ISC Diary: https://isc.sans.edu/diary/30300MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36431MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36579MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36581MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36606 CVE-2023-42824 - iOS and iPadOS versions before 17.0.3 allow local attackers to elevate privileges, possibly with active exploitation in earlier iOS versions.Product: Apple iPadOSCVSS Score: 7.8** KEV since 2023-10-05 **NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-42824NVD References: - https://support.apple.com/en-us/HT213961- https://support.apple.com/en-us/HT213972- https://support.apple.com/kb/HT213972CVE-2023-22385 - Memory Corruption in Data Modem while making a MO call or MT VOLTE call.Product: Qualcomm 315 5G Iot ModemCVSS Score: 9.8NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-22385NVD References: https://www.qualcomm.com/company/product-security/bulletins/october-2023-bulletinCVE-2023-24855 - Memory corruption in Modem while processing security related configuration before AS Security Exchange.Product:…
Sponsored By Devo Technology, Inc.Celebrate SOC Analyst Appreciation Day | Devo is hosting its third annual SOC Analyst Appreciation Day on October 18. In this free virtual event, you’ll hear from some of the world’s most influential cybersecurity leaders and obtain insights on how to manage your mental well-being and fast-track your SOC career. Don’t miss out. Register today!
This year's CloudSecNext Summit Solutions Track kicks off in just 5 days! Join AJ Yawn and invited guest speakers on Tue, October 17, as we explore various cloud security topics that align with the 5 NIST CSF functions, while showcasing capabilities to implement for each function. Walk away from this free virtual event with a better understanding of how to improve your organization's cloud security environment. | Register now:
SANS Research | In our SANS Detection Engineering Survey, we're asking the cyber community to share their insights on the state of practice in “detection engineering." Share your thoughts with us to be entered into our drawing for a chance to win a $250 Amazon gift card! | Complete the survey:
Microsegmentation in a Click - Tue, October 17 at 10:30am ET | In this short and sweet 30-min webcast, Matt Bromiley and Nicolas DiCola from Zero Networks, will explore how Segment by Zero Networks centrally manages host-based firewalls and automates policy implementation in real time. | Register now: