Tuesday, November 26, 2024
HomeSecurity UpdateDebian Security Update - Fix for Vulnerabilities that Leads to DOS and...

Debian Security Update – Fix for Vulnerabilities that Leads to DOS and Arbitrary Code Execution

Published on

Debian released security updates that fix multiple vulnerabilities with Thunderbird mail client, twig and dovecot Packages that leads to DOS, information disclosure and Arbitrary Code Execution.

DSA-4420 thunderbird

The security update covers multiple vulnerabilities with Thunderbird mail client that allows an attacker to execute an arbitrary code execution or denial of service.

The vulnerabilities can be tracked as CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796

- Advertisement - SIEM as a Service

All the security issues addressed with version 1:60.6.1-1~deb9u1, users are recommended to update their thunderbird packages.

DSA-4419 twig

Twig is a template engine for PHP and it fails in enforcing the sandboxing that results in potential information disclosure.

The vulnerability has been fixed with version 1.24.0-2+deb9u1.

DSA-4418-1 dovecot

The vulnerability resides in the Dovecot email server on reading the FTS or POP3-UIDL headers from the Dovecot index.

Bounds index is not defined, which allows an attacker to modify the dovecot indexes, which leads to an privilege escalation or the execution of arbitrary code with the permissions of the dovecot user.

Installation using FTS or pop3 migration plugins are affected with the vulnerability and it has been fixed with has been fixed in version 1:2.2.27-3+deb9u4.

You can update the latest security updates by using apt package manager. Before running apt command add the repository to your source list.

deb http://security.debian.org/debian-security stretch/updates main contrib non-free

To be added with /etc/apt/sources.list file and to update apt-get update && apt-get upgrade.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Detailed Tools Used By Hacktivists Fueling Ransomware Attacks

CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec,...

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has...

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Wireshark 4.4.2 Released: What’s New!

The Wireshark Foundation has officially announced the release of Wireshark 4.4.2, the latest version...

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version...