Home

2022年01月の脆弱性

誤りがあった場合はTwitterに報告をお願いします。-> Twitter《Har-sia》

今月話題になった脆弱性まとめ

CVE-2021-22045

Description from NVD

VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.

Information Acquisition Date:2022/02/01
CVSS 2.0: 6.9 MEDIUM CVSS 3.x: 7.8 HIGH

Highest Score:56 (2022/01/06)

脆弱性情報:Har-sia CVE-2021-22045


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2021-4034

Description from NVD

A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.

Information Acquisition Date:2022/02/01
CVSS 2.0: 0.0 None CVSS 3.x: 0.0 None

Highest Score:621 (2022/01/26)

脆弱性情報:Har-sia CVE-2021-4034


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2021-40444

Description from NVD

Microsoft MSHTML Remote Code Execution Vulnerability

Information Acquisition Date:2022/02/01
CVSS 2.0: 6.8 MEDIUM CVSS 3.x: 7.8 HIGH
This vulnerability may involve a PoC.

Highest Score:268 (2021/09/08)

脆弱性情報:Har-sia CVE-2021-40444


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2021-44228

Description from NVD

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Information Acquisition Date:2022/02/01
CVSS 2.0: 9.3 HIGH CVSS 3.x: 10.0 CRITICAL
This vulnerability may involve a PoC.

Highest Score:1785 (2021/12/14)

脆弱性情報:Har-sia CVE-2021-44228


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2021-44757

Description from NVD

Zoho ManageEngine Desktop Central before 10.1.2137.9 and Desktop Central MSP before 10.1.2137.9 allow attackers to bypass authentication, and read sensitive information or upload an arbitrary ZIP archive to the server.

Information Acquisition Date:2022/02/01
CVSS 2.0: 6.4 MEDIUM CVSS 3.x: 9.1 CRITICAL

Highest Score:68 (2022/01/18)

脆弱性情報:Har-sia CVE-2021-44757


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-0185


Highest Score:67 (2022/01/26)

脆弱性情報:Har-sia CVE-2022-0185


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21658

Description from NVD

Rust is a multi-paradigm, general-purpose programming language designed for performance and safety, especially safe concurrency. The Rust Security Response WG was notified that the `std::fs::remove_dir_all` standard library function is vulnerable a race condition enabling symlink following (CWE-363). An attacker could use this security issue to trick a privileged program into deleting files and directories the attacker couldn't otherwise access or delete. Rust 1.0.0 through Rust 1.58.0 is affected by this vulnerability with 1.58.1 containing a patch. Note that the following build targets don't have usable APIs to properly mitigate the attack, and are thus still vulnerable even with a patched toolchain: macOS before version 10.10 (Yosemite) and REDOX. We recommend everyone to update to Rust 1.58.1 as soon as possible, especially people developing programs expected to run in privileged contexts (including system daemons and setuid binaries), as those have the highest risk of being affected by this. Note that adding checks in your codebase before calling remove_dir_all will not mitigate the vulnerability, as they would also be vulnerable to race conditions like remove_dir_all itself. The existing mitigation is working as intended outside of race conditions.

Information Acquisition Date:2022/02/01
CVSS 2.0: 0.0 None CVSS 3.x: 7.3 HIGH
This vulnerability may involve a PoC.

Highest Score:49 (2022/01/21)

脆弱性情報:Har-sia CVE-2022-21658


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21892

Description from NVD

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

Information Acquisition Date:2022/02/01
CVSS 2.0: 7.2 HIGH CVSS 3.x: 6.8 MEDIUM

Highest Score:39 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21892


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21907

Description from NVD

HTTP Protocol Stack Remote Code Execution Vulnerability.

Information Acquisition Date:2022/02/01
CVSS 2.0: 10.0 HIGH CVSS 3.x: 9.8 CRITICAL
This vulnerability may involve a PoC.

Highest Score:155 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21907


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21928

Description from NVD

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

Information Acquisition Date:2022/02/01
CVSS 2.0: 6.9 MEDIUM CVSS 3.x: 6.4 MEDIUM

Highest Score:37 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21928


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21958

Description from NVD

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

Information Acquisition Date:2022/02/01
CVSS 2.0: 7.2 HIGH CVSS 3.x: 6.8 MEDIUM

Highest Score:40 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21958


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21959

Description from NVD

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

Information Acquisition Date:2022/02/01
CVSS 2.0: 7.2 HIGH CVSS 3.x: 6.8 MEDIUM

Highest Score:37 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21959


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


CVE-2022-21960

Description from NVD

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

Information Acquisition Date:2022/02/01
CVSS 2.0: 7.2 HIGH CVSS 3.x: 6.8 MEDIUM

Highest Score:37 (2022/01/12)

脆弱性情報:Har-sia CVE-2022-21960


管理者コメント

(自動翻訳)脆弱性まとめる際にここに自動翻訳を挿入します。次月までお待ちください。(自動翻訳ここまで)

###---###

参考URL:

上に戻る


計13件

Tweet