2023年11月27日星期一

NetApp 產品阻斷服務狀況漏洞

發佈日期: 2023年11月27日

風險: 中度風險

類型: 伺服器 - 其他伺服器

類型: 其他伺服器

於 NetApp 產品發現一個漏洞。遠端攻擊者可利用這個漏洞,於目標系統觸發阻斷服務狀況。

 

影響

  • 阻斷服務

受影響之系統或技術

  • NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S
  • NetApp HCI Baseboard Management Controller (BMC) - H410C

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝供應商提供的修補程式:

 


漏洞識別碼


資料來源


相關連結

NetApp Denial of Service Vulnerability

Release Date: 27 Nov 2023

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

A vulnerability was identified in a NetApp Product. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted system.


Impact

  • Denial of Service

System / Technologies affected

  • NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S
  • NetApp HCI Baseboard Management Controller (BMC) - H410C

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 


Vulnerability Identifier


Source


Related Link

2023年11月25日星期六

RedHat Linux 核心多個漏洞

發佈日期: 2023年11月23日

風險: 中度風險

類型: 操作系統 - LINUX

類型: LINUX

於 RedHat Linux核心產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料及繞過保安限制。


影響

  • 阻斷服務
  • 遠端執行程式碼
  • 繞過保安限制
  • 資料洩露

受影響之系統或技術

  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64
  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

RedHat Linux Kernel Multiple Vulnerabilities

Release Date: 23 Nov 2023

RISK: Medium Risk

TYPE: Operating Systems - Linux

TYPE: Linux

Multiple vulnerabilities were identified in RedHat Linux Kernel Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, sensitive information disclosure and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.2 x86_64
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.2 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.2 s390x
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le
  • Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64
  • Red Hat Enterprise Linux for Real Time 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.2 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV 7 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.0 x86_64
  • Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.0 x86_64
  • Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
  • Red Hat Virtualization Host 4 for RHEL 8 x86_64

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2023年11月22日星期三

Mozilla 產品多個漏洞

發佈日期: 2023年11月22日

風險: 中度風險

類型: 用戶端 - 瀏覽器

類型: 瀏覽器

於 Mozilla 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發觸發篡改、洩露敏感資料、權限提升、阻斷服務、繞過保安限制及遠端執行任意程式碼。


影響

  • 阻斷服務
  • 遠端執行程式碼
  • 資料洩露
  • 篡改
  • 權限提升
  • 繞過保安限制

受影響之系統或技術

以下版本之前的版本﹕

 

  • Firefox ESR 115.5
  • Firefox for iOS 120
  • Firefox 120
  • Thunderbird 115.5
 

解決方案

在安裝軟體之前,請先瀏覽供應商之官方網站,以獲得更多詳細資料。

更新至版本:

 

  • Firefox ESR 115.5
  • Firefox for iOS 120
  • Firefox 120
  • Thunderbird 115.5
 

漏洞識別碼

 

資料來源


相關連結

Mozilla Products Multiple Vulnerabilities

Release Date: 22 Nov 2023

RISK: Medium Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities were identified in Mozilla Products. A remote attacker could exploit some of these vulnerabilities to data manipulation, sensitive information disclosure, elevation of privilege, denial of service, security restriction bypass and remote code execution on the targeted system.


Impact

  • Denial of Service
  • Remote Code Execution
  • Information Disclosure
  • Data Manipulation
  • Elevation of Privilege
  • Security Restriction Bypass

System / Technologies affected

Versions prior to:

 

  • Firefox ESR 115.5
  • Firefox for iOS 120
  • Firefox 120
  • Thunderbird 115.5

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • Firefox ESR 115.5
  • Firefox for iOS 120
  • Firefox 120
  • Thunderbird 115.5
 

Vulnerability Identifier

 

Source


Related Link

2023年11月20日星期一

Splunk 產品多個漏洞

發佈日期: 2023年11月20日

風險: 中度風險

類型: 伺服器 - 其他伺服器

類型: 其他伺服器

於 Splunk 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端跨網站指令碼及執行任意程式碼。

 

影響

  • 跨網站指令碼
  • 遠端執行程式碼

受影響之系統或技術

  • Splunk Cloud Platform: Splunk Web 9.1.2308 以前版本
  • Splunk Enterprise: Splunk Web 9.0.0 至 9.0.6 版本
  • Splunk Enterprise: Splunk Web 9.1.0 至 9.1.1 版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Splunk Products Multiple Vulnerabilities

Release Date: 20 Nov 2023

RISK: Medium Risk

TYPE: Servers - Other Servers

TYPE: Other Servers

Multiple vulnerabilities were identified in Splunk products. A remote attacker could exploit some of these vulnerabilities to trigger cross-site scripting and remote code execution on the targeted system.


Impact

  • Cross-Site Scripting
  • Remote Code Execution

System / Technologies affected

  • Splunk Cloud Platform: Splunk Web versions below 9.1.2308
  • Splunk Enterprise: Splunk Web versions 9.0.0 to 9.0.6
  • Splunk Enterprise: Splunk Web versions 9.1.0 to 9.1.1
 

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2023年11月18日星期六

ChromeOS 繞過保安限制漏洞

發佈日期: 2023年11月17日

風險: 中度風險

類型: 操作系統 - 其他操作系統

類型: 其他操作系統

於 ChromeOS 發現一個漏洞。遠端攻擊者可利用此漏洞,於目標系統觸發繞過保安限制。


影響

  • 繞過保安限制

受影響之系統或技術

  • 114.0.5735.340 (平台版本: 15437.78.0) 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式,詳情請參閱以下連結:


漏洞識別碼


資料來源


相關連結

ChromeOS Security Restriction Bypass Vulnerability

Release Date: 17 Nov 2023

RISK: Medium Risk

TYPE: Operating Systems - Others OS

TYPE: Others OS

A vulnerability has been identified in ChromeOS. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • Version prior to 114.0.5735.340 (Platform Version: 15437.78.0)

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor. For detail, please refer to the link below:


Vulnerability Identifier


Source


Related Link

Microsoft Edge 多個漏洞

發佈日期: 2023年11月17日

風險: 中度風險

類型: 用戶端 - 瀏覽器

類型: 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發彷冒及遠端執行任意程式碼。


影響

  • 遠端執行程式碼
  • 仿冒

受影響之系統或技術

  • Microsoft Edge (Stable) 119.0.2151.72 之前的版本
  • Microsoft Edge (Extended Stable) 118.0.2088.109 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 Microsoft Edge (Stable) 119.0.2151.72 或之後版本
  • 更新至 Microsoft Edge (Extended Stable) 118.0.2088.109 或之後版本

漏洞識別碼


資料來源


相關連結

Microsoft Edge Multiple Vulnerabilities

Release Date: 17 Nov 2023

RISK: Medium Risk

TYPE: Clients - Browsers

TYPE: Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger spoofing and remote code execution on the targeted system.


Impact

  • Remote Code Execution
  • Spoofing

System / Technologies affected

  • Microsoft Edge (Stable) prior to 119.0.2151.72
  • Microsoft Edge (Extended Stable) prior to 118.0.2088.109

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to Microsoft Edge (Stable) version 119.0.2151.72 or later
  • Update to Microsoft Edge (Extended Stable) version 118.0.2088.109 or later

Vulnerability Identifier


Source


Related Link

IBM WebSphere 產品多個漏洞

發佈日期: 2023年11月17日

風險: 極高度風險

類型: 伺服器 - 互聯網應用伺服器

類型: 互聯網應用伺服器

於 IBM WebSphere 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。

 

注意:

CVE-2023-44487 是 HTTP/2 協定中的阻斷服務 (DoS) 漏洞。 該漏洞被稱為“快速重置”,已被廣泛利用。


IBM WebSphere Products Multiple Vulnerabilities

Release Date: 17 Nov 2023

RISK: Extremely High Risk

TYPE: Servers - Internet App Servers

TYPE: Internet App Servers

Multiple vulnerabilities were identified in IBM WebSphere Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system.

 

Note:

CVE-2023-44487 is a denial-of-service (DoS) vulnerability in HTTP/2 protocol. The vulnerability known as Rapid Reset, has been exploited in the wild.


Aruba 產品多個漏洞

發佈日期: 2023年11月16日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

類型: 保安軟件及應用設備

在Aruba產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況及遠端執行任意程式碼。

 

影響

  • 遠端執行程式碼
  • 阻斷服務
  • 篡改

受影響之系統或技術

  • ArubaOS 10.5.0.0 及之前版本
  • ArubaOS 10.4.0.2 及之前版本
  • InstantOS 8.11.1.2 及之前版本
  • InstantOS 8.10.0.8 及之前版本
  • InstantOS 8.6.0.22 及之前版本
 

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Aruba Products Multiple Vulnerabilities

Release Date: 16 Nov 2023

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

TYPE: Security Software & Appliance

Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit some of these vulnerabilities to trigger data manipulation, denial of service condition and remote code execution on the targeted system.


Impact

  • Remote Code Execution
  • Denial of Service
  • Data Manipulation

System / Technologies affected

  • ArubaOS 10.5.0.0 and below
  • ArubaOS 10.4.0.2 and below
  • InstantOS 8.11.1.2 and below
  • InstantOS 8.10.0.8 and below
  • InstantOS 8.6.0.22 and below

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Fortinet 產品多個漏洞

發佈日期: 2023年11月16日

風險: 中度風險

類型: 操作系統 - Network

類型: Network

於 Fortinet Products 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發資料篡改、遠端執行任意程式碼、洩露敏感資料、阻斷服務、權限提升及繞過保安限制。

 

影響

  • 繞過保安限制
  • 資料洩露
  • 遠端執行程式碼
  • 權限提升
  • 阻斷服務
  • 篡改

受影響之系統或技術

  • FGT_VM64_KVM 版本 7.0.1 至 7.0.13
  • FGT_VM64_KVM 版本 7.2.0 至 7.2.6
  • FGT_VM64_KVM 版本 7.4.0 至 7.4.1
  • FortiClientWindows 6.0 所有版本
  • FortiClientWindows 6.2 所有版本
  • FortiClientWindows 版本 6.4.0 至 6.4.8
  • FortiClientWindows 版本 7.0.0 至 7.0.9
  • FortiClientWindows 版本 7.2.0 至 7.2.1
  • FortiGate (僅FGT_VM64_KVM型號受到影響,且需要身份驗證 )
  • FortiMail 6.0 所有版本
  • FortiMail 6.2 所有版本
  • FortiMail 6.4 所有版本
  • FortiMail verison 7.0.0 至 7.0.6
  • FortiMail 版本 7.2.0 至 7.2.4
  • FortiMail 版本 7.4.0
  • FortiOS 版本 6.0 所有版本
  • FortiOS 版本 6.2 所有版本
  • FortiOS 版本 6.4 所有版本
  • FortiOS 版本 7.0.0 至 7.0.12
  • FortiOS 版本 7.2.0 至 7.2.5
  • FortiOS 版本 7.4.0
  • FortiProxy 1.0 所有版本
  • FortiProxy 1.1 所有版本
  • FortiProxy 1.2 所有版本
  • FortiProxy 2.0 所有版本
  • FortiProxy 7.0 所有版本
  • FortiProxy 7.2 所有版本
 

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Fortinet Products Multiple Vulnerabilities

Release Date: 16 Nov 2023

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

TYPE: Networks OS

Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger data manipulation, remote code execution, sensitive information disclosure, denial of service, elevation of privilege and security restriction bypass on the targeted system.


Impact

  • Security Restriction Bypass
  • Information Disclosure
  • Remote Code Execution
  • Elevation of Privilege
  • Denial of Service
  • Data Manipulation

System / Technologies affected

  • FGT_VM64_KVM version 7.0.1 through 7.0.13
  • FGT_VM64_KVM version 7.2.0 through 7.2.6
  • FGT_VM64_KVM version 7.4.0 through 7.4.1
  • FortiClientWindows 6.0 all versions
  • FortiClientWindows 6.2 all versions
  • FortiClientWindows version 6.4.0 through 6.4.8
  • FortiClientWindows version 7.0.0 through 7.0.9
  • FortiClientWindows version 7.2.0 through 7.2.1
  • FortiGate (Only FGT_VM64_KVM model is impacted and authentication is required)
  • FortiMail 6.0 all versions
  • FortiMail 6.2 all versions
  • FortiMail 6.4 all versions
  • FortiMail verison 7.0.0 through 7.0.6
  • FortiMail version 7.2.0 through 7.2.4
  • FortiMail version 7.4.0
  • FortiOS version 6.0 all versions
  • FortiOS version 6.2 all versions
  • FortiOS version 6.4 all versions
  • FortiOS version 7.0.0 through 7.0.12
  • FortiOS version 7.2.0 through 7.2.5
  • FortiOS version 7.4.0
  • FortiProxy 1.0 all versions
  • FortiProxy 1.1 all versions
  • FortiProxy 1.2 all versions
  • FortiProxy 2.0 all versions
  • FortiProxy 7.0 all versions
  • FortiProxy 7.2 all versions
 

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2023年11月15日星期三

Adobe 每月保安更新 (2023年11月)

發佈日期: 2023年11月15日

風險: 中度風險

類型: 用戶端 - 辦公室應用

類型: 辦公室應用

Adobe已為產品提供本月保安更新:

 

受影響產品風險程度影響備註詳情(包括 CVE)
Adobe ColdFusion中度風險 中度風險遠端執行程式碼
繞過保安限制
跨網站指令碼
 APSB23-52
Adobe RoboHelp Server中度風險 中度風險資料洩露
遠端執行程式碼
 APSB23-53
Adobe Acrobat and Reader中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-54
Adobe InDesign中度風險 中度風險阻斷服務
資料洩露
 APSB23-55
Adobe Photoshop中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-56
Adobe Bridge中度風險 中度風險資料洩露 APSB23-57
Adobe Framemaker中度風險 中度風險繞過保安限制 APSB23-58
Adobe InCopy中度風險 中度風險遠端執行程式碼 APSB23-60
Adobe Animate中度風險 中度風險資料洩露 APSB23-61
Adobe Dimension中度風險 中度風險資料洩露 APSB23-62
Adobe Media Encoder中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-63
Adobe Audition中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-64
Adobe Premiere Pro中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-65
Adobe After Effects中度風險 中度風險遠端執行程式碼
資料洩露
 APSB23-66

 

「極高度風險」產品數目:0

「高度風險」產品數目:0

「中度風險」產品數目:14

「低度風險」產品數目:0

整體「風險程度」評估:中度風險


影響

  • 遠端執行程式碼
  • 阻斷服務
  • 跨網站指令碼
  • 資料洩露
  • 繞過保安限制

受影響之系統或技術

  • ColdFusion 2023 Update 5 及以前版本
  • ColdFusion 2021 Update 11 及以前版本
  • RoboHelp Server RHS 11.4 及以前版本
  • Acrobat DC 23.006.20360 及以前版本
  • Acrobat Reader DC 23.006.20360 及以前版本
  • Acrobat 2020 20.005.30524 及以前版本
  • Acrobat Reader 2020 20.005.30524 及以前版本
  • Adobe InDesign ID18.5 及以前版本
  • Adobe InDesign ID17.4.2 及以前版本
  • Photoshop 2023 24.7.1 及以前版本
  • Photoshop 2024 25.0 及以前版本
  • Adobe Bridge  13.0.4 及以前版本
  • Adobe Bridge  14.0.0 及以前版本
  • Adobe FrameMaker Publishing Server Version - 2022   及以前版本
  • Adobe InCopy  18.5 及以前版本
  • Adobe InCopy  17.4.2 及以前版本
  • Adobe Animate 2023 23.0.2 及以前版本
  • Adobe Dimension 3.4.9 及以前版本
  • Adobe Media Encoder 24.0.2 及以前版本
  • Adobe Media Encoder 23.6 及以前版本
  • Adobe Audition 24.0 及以前版本
  • Adobe Audition 23.6.1 及以前版本
  • Adobe Premiere Pro 24.0 及以前版本
  • Adobe Premiere Pro 23.6 及以前版本
  • Adobe After Effects 24.0.2 及以前版本
  • Adobe After Effects 23.6 及以前版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

  • 安裝供應商提供的修補程式。個別產品詳情可參考上表「詳情」一欄或執行軟件更新。

漏洞識別碼


資料來源


相關連結

Adobe Monthly Security Update (November 2023)

Release Date: 15 Nov 2023

RISK: Medium Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products

Adobe has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotesDetails (including CVE)
Adobe ColdFusionMedium Risk Medium RiskRemote Code Execution
Security Restriction Bypass
Cross-site Scripting
 APSB23-52
Adobe RoboHelp ServerMedium Risk Medium RiskInformation Disclosure
Remote Code Execution
 APSB23-53
Adobe Acrobat and ReaderMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-54
Adobe InDesignMedium Risk Medium RiskDenial of Service
Information Disclosure
 APSB23-55
Adobe PhotoshopMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-56
Adobe BridgeMedium Risk Medium RiskInformation Disclosure APSB23-57
Adobe FramemakerMedium Risk Medium RiskSecurity Restriction Bypass APSB23-58
Adobe InCopyMedium Risk Medium RiskRemote Code Execution APSB23-60
Adobe AnimateMedium Risk Medium RiskInformation Disclosure APSB23-61
Adobe DimensionMedium Risk Medium RiskInformation Disclosure APSB23-62
Adobe Media EncoderMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-63
Adobe AuditionMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-64
Adobe Premiere ProMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-65
Adobe After EffectsMedium Risk Medium RiskRemote Code Execution
Information Disclosure
 APSB23-66

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 0

Number of 'Medium Risk' product(s): 14

Number of 'Low Risk' product(s): 0

Evaluation of overall 'Risk Level': Medium Risk


Impact

  • Remote Code Execution
  • Denial of Service
  • Cross-Site Scripting
  • Information Disclosure
  • Security Restriction Bypass

System / Technologies affected

  • ColdFusion 2023 Update 5 and earlier versions
  • ColdFusion 2021 Update 11 and earlier versions
  • RoboHelp Server RHS 11.4 and earlier versions
  • Acrobat DC 23.006.20360 and earlier versions
  • Acrobat Reader DC 23.006.20360 and earlier versions
  • Acrobat 2020 20.005.30524 and earlier versions
  • Acrobat Reader 2020 20.005.30524 and earlier versions
  • Adobe InDesign ID18.5 and earlier versions
  • Adobe InDesign ID17.4.2 and earlier versions
  • Photoshop 2023 24.7.1 and earlier versions
  • Photoshop 2024 25.0 and earlier versions
  • Adobe Bridge  13.0.4 and earlier versions
  • Adobe Bridge  14.0.0 and earlier versions
  • Adobe FrameMaker Publishing Server Version - 2022   and earlier versions
  • Adobe InCopy  18.5 and earlier versions
  • Adobe InCopy  17.4.2 and earlier versions
  • Adobe Animate 2023 23.0.2 and earlier versions
  • Adobe Dimension 3.4.9 and earlier versions
  • Adobe Media Encoder 24.0.2 and earlier versions
  • Adobe Media Encoder 23.6 and earlier versions
  • Adobe Audition 24.0 and earlier versions
  • Adobe Audition 23.6.1 and earlier versions
  • Adobe Premiere Pro 24.0 and earlier versions
  • Adobe Premiere Pro 23.6 and earlier versions
  • Adobe After Effects 24.0.2 and earlier versions
  • Adobe After Effects 23.6 and earlier versions

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  • Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update

Vulnerability Identifier


Source


Related Link

惡意軟件警報 - 零售商成為 Scattered Spider 黑客組織勒索軟件攻擊的目標

惡意軟件警報 - 零售商成為 Scattered Spider 黑客組織勒索軟件攻擊的目標 發佈日期: 2025年05月02日 類別: ...