GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Tom Sellers (tomsellers@infosec.exchange)

  1. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 16-Apr-2025 22:43:53 JST Tom Sellers Tom Sellers

    I see a couple online news sources stating that CISA has extended the funding. They are using statements such as the following:

    CISA says the U.S. government has extended funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.

    They leave out the sourcing on this. Who said it? How was it said? Via direct email requesting a comment? X post? Was it official or OTR? Like, I believe them but please provide SOME form of indication of provenance when claiming statements are made by the US Gov.

    #Security #CISA #CVE

    In conversation about 2 months ago from infosec.exchange permalink
  2. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Sunday, 16-Mar-2025 08:38:33 JST Tom Sellers Tom Sellers

    Folks have pointed out that in the current state of ... /waves around .. that it might be a good idea for US based institutions to reconsider hosting sites on non-US country code top-level domains (ccTLD) such as .io (Indian Ocean, going away soon anyway), .it (Italy), and .ai (Anguilla)

    One that always bugged me was various Mississippi Gov departments using .ms which belongs to Montserrat. In light of current events these might have more risk than they did before. It looks like most of the State of MS related sites are now forwarders/shorteners for the real sites but there are plenty of official sites for MS counties as well as various private orgs that are still fully hosted on .ms domains.

    Search: mississippi site:.ms

    This happens for other states to various degrees as well. In some cases it's mostly private company domains and in others there are a few official state domains.

    Arizona / Azerbaijan
    Search: Arizona site:.az

    Georgia / Gabon
    Search: georgia site:.ga

    Idaho / Indonesia
    Search: idaho site:.id

    Louisiana / Laos
    Search: Louisiana site:.la

    Maine / Montenegro
    Search: Maine site:.me

    etc. etc.

    #security #risk

    In conversation about 3 months ago from infosec.exchange permalink
  3. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 05-Mar-2025 04:53:13 JST Tom Sellers Tom Sellers
    • Kevin Beaumont
    • Dan Goodin

    @GossiTheDog @dangoodin Compromise of the VMware ESXi host can result in compromise of the guests. Companies often run Active Directory controllers on VMware so compromise of the host can result in AD compromise as well. The VMware management infrastructure, such as vSphere, vCloud Director, etc also runs in VMware so you can compromise those as well. This applies to any sensitive workloads that you can run in a virtual machine.

    Networking for the guests is handled by the ESXi host. If you have full control of the host you can sniff and inject traffic, potentially impact local routing, etc.

    In conversation about 3 months ago from gnusocial.jp permalink
  4. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 05-Mar-2025 02:46:29 JST Tom Sellers Tom Sellers
    in reply to
    • Kevin Beaumont

    @GossiTheDog

    In the Github version of the advisory and FAQ they actually state that ALL unpatched versions are vulnerable though they indicate that they haven't tested most unsupported versions. Here are few snippets from the link below:

    You are affected if you are running any version of VMware ESX, VMware vSphere, VMware Cloud Foundation, or VMware Telco Cloud Platform prior to the versions listed as “fixed” in the VMSA.

    For a definitive list of affected versions, please refer to the VMSA directly. If there is any uncertainty about whether a system is affected, it should be presumed vulnerable, and immediate action should be taken.

    Does this impact VMware vSphere 6.5 or 6.7?

    Yes. A patch has been released for ESX 6.7 and is available via the Support Portal to all customers. ESX 6.5 customers should use the extended support process for access to ESX 6.5 patches.

    Products that are past their End of General Support dates are not evaluated as part of security advisories, and are not listed in the official VMSA. Broadcom strongly encourages all customers using vSphere 6.5 and 6.7 to update to vSphere 8.

    https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004

    In conversation about 3 months ago from infosec.exchange permalink
  5. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Monday, 03-Mar-2025 10:50:36 JST Tom Sellers Tom Sellers

    Federal Crypto Reserve, the thing you implement when you want something that absolutely cannot be recovered once you steal it.

    In conversation about 4 months ago from infosec.exchange permalink
  6. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Friday, 31-Jan-2025 08:01:43 JST Tom Sellers Tom Sellers

    WAT

    H.R.792 - To direct the Secretary of the Interior to arrange for the carving of the figure of President Donald J. Trump on Mount Rushmore National Memorial.

    https://www.congress.gov/bill/119th-congress/house-bill/792

    In conversation about 5 months ago from infosec.exchange permalink
  7. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 22-Jan-2025 01:19:30 JST Tom Sellers Tom Sellers

    @Infoseepage That was my understanding as well. It appears that they have renamed and re-tasked the existing United States Digital Service

    In conversation about 5 months ago from infosec.exchange permalink
  8. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 21-Jan-2025 11:59:23 JST Tom Sellers Tom Sellers

    New US DOGE Service to have access to all unclassified US Gov records.

    Reference: https://www.whitehouse.gov/presidential-actions/2025/01/establishing-and-implementing-the-presidents-department-of-government-efficiency/

    In conversation about 5 months ago from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/864/056/380/109/232/original/bc1352dadaa09c17.png
    2. Domain not in remote thumbnail source whitelist: www.whitehouse.gov
      Establishing And Implementing The President's "Department Of Government Efficiency" – The White House
      from @whitehouse
      By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered: Section 1.
  9. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 17-Sep-2024 10:25:48 JST Tom Sellers Tom Sellers

    Muscle memory is such a powerful thing when not trained away. Recently my wife and I took a trip that involved quite a bit of swimming. As a kid and teenager I enjoyed swimming but unfortunately I haven't done much of it in the last 30 years.

    So, muscle memory.. On the recent trip, every time I surfaced from swimming underwater I would use my hands to slick back my hair to keep it, and water, out of my face. This is a very distinctive motion that actually starts just before I surface. Every time, without fail.

    Reader, I haven't had hair, much less enough to need slicking back, in over 20 years. It made me laugh nearly every time I surfaced. It has been so long since I spent any time underwater that I had forgotten that I even did it. I chalk that up to rarely swimming now and being blind AF w/o glasses so I wouldn't swim underwater much when I did. It's probably been 10+ years since I did it for any significant time.

    Anyway, muscle memory is a hell of a thing and so is being able to laugh at yourself.

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments


  10. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 07-Feb-2024 08:39:51 JST Tom Sellers Tom Sellers
    • Kevin Beaumont

    @GossiTheDog It's also 6 years old. Seems I skimmed a bit too fast.

    In conversation Wednesday, 07-Feb-2024 08:39:51 JST from infosec.exchange permalink
  11. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 07-Feb-2024 07:18:41 JST Tom Sellers Tom Sellers
    in reply to
    • Kevin Beaumont

    @GossiTheDog

    Here is a Fortinet PDF for the Is my toothbrush really smart? presentation by Axelle Apvrille at Troopers in 2018. I suspect this information is what they are referencing in the article.

    https://filestore.fortinet.com/fortiguard/research/toothbrush.pdf

    In conversation Wednesday, 07-Feb-2024 07:18:41 JST from infosec.exchange permalink
  12. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 26-Sep-2023 23:56:11 JST Tom Sellers Tom Sellers
    in reply to

    In my earlier thread I should have recommended that folks be on the lookout for end of life(EoL) versions of Electron that are bundled with software that is itself updated to the latest version. I've observed a case where fully updated software was using Electron 22.x.x that isn't EoL yet, but will be in 2 weeks. In those cases I strongly suggest you notify your vendor and, if it is paid software, pressure them to migrate to a supported version ASAP.

    Note: There IS a patched version of 22.x.x which is 22.3.24.

    Reference: https://www.electronjs.org/docs/latest/tutorial/electron-timelines

    #Security #Electron #SBOM #CVE20234863 #CVE-2023-4863 #CVE_2023_4863

    In conversation Tuesday, 26-Sep-2023 23:56:11 JST from infosec.exchange permalink

    Attachments


    1. https://media.infosec.exchange/infosecmediaeu/media_attachments/files/111/128/421/161/251/171/original/e4d6a179a4883e8d.png
    2. No result found on File_thumbnail lookup.
      Electron Releases | Electron
      Electron frequently releases major versions alongside every other Chromium release. This document focuses on the release cadence and version support policy. For a more in-depth guide on our git branches and how Electron uses semantic versions, check out our Electron Versioning doc.
  13. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 26-Sep-2023 23:55:12 JST Tom Sellers Tom Sellers
    in reply to
    • Jason Levine

    The patched (fixed) versions of Electron are

    Electron v22.3.24, v24.8.3, v25.8.1 - released September 13 and fixes CVE-2023-4863 as well as CVE-2023-4763, CVE-2023-4762, and CVE-2023-4761

    Electron v26.2.1 - released September 13 and updates Chrome. Fixes the CVEs but does not call them out

    Here are the fixed versions of some other common software:

    GitHub Desktop v3.3.3 - bumps Electron to v24.8.3 which fixes CVE-2023-4863

    VS Code 1.82.2 - bumps Electron to v25.8.1 which fixes CVE-2023-4863

    Signal Desktop v6.30.2 - bumps Electron to v25.8.1 which fixes CVE-2023-4863

    Slack v4.34.119 - bumps Electron to v26.2.1, indicates a security fix but doesn't label it with its highest risk label

    Apple iOS 16.7, 17.0.1
    Apple iPadOS 16.7, 17.0.1
    Apple macOS Ventura 13.6
    Apple macOS Monterey 12.7
    Apple watchOS 9.6.3, 10.0.1
    Apple Safari 16.6.1

    Google Chrome 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows

    Mozilla Firefox 117.0.1, ESR 102.15.1, ESR 115.2.1
    Mozilla Thunderbird 102.15.1, 115.2.2

    Edit: Added Electron v22.3.24 to the patched list. Thanks @delfuego

    In conversation Tuesday, 26-Sep-2023 23:55:12 JST from infosec.exchange permalink
  14. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 26-Sep-2023 23:55:07 JST Tom Sellers Tom Sellers
    in reply to
    • Mark Gardner
    • Dan Goodin

    @mjgardner @dangoodin

    I can confirm that a fresh install of Keybase on macoS is using Electron 22.1.0 which has not been patched and will go EoL on October 10. I find this very concerning from security software.

    I can also confirm that a fresh install of Microsoft Teams on macOS is using Electron 19.1.8 which has not been patched and went EoL last November. A note that 19.1.9 is the last version of this train and includes at least two security fixes.

    In conversation Tuesday, 26-Sep-2023 23:55:07 JST from infosec.exchange permalink
  15. Embed this notice
    Tom Sellers (tomsellers@infosec.exchange)'s status on Tuesday, 26-Sep-2023 11:43:51 JST Tom Sellers Tom Sellers
    • Dan Goodin

    Roughly 2 weeks ago Google patched a critical vulnerability, CVE-2023-4863, that was being exploited in the wild. The broad impact of the root cause of the vuln and the fact that it will have a long tail of unpatched software has been poorly communicated. You can read more in @dangoodin 's excellent article on Ars Technica.

    As pointed out in the article above, Electron is based on Chromium and is impacted. Electron is bundled in a ton of apps that people might overlook.

    I threw together the following shell command to help macOS audit which versions of Electron apps are installed.

    find /Applications -type f -name "*Electron Framework*" -exec \
    sh -c "echo \"{}\" && strings \"{}\" | grep '^Chrome/[0-9.]* Electron/[0-9]' | head -n1 && echo " \;

    When run, you should see something similar to the following:

    /Applications/Visual Studio Code.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework
    Chrome/114.0.5735.289 Electron/25.8.1

    /Applications/Slack.app/Contents/Frameworks/Electron Framework.framework/Versions/A/Electron Framework
    Chrome/116.0.5845.188 Electron/26.2.1

    #Security #Electron #CVE20234863 #CVE-2023-4863

    In conversation Tuesday, 26-Sep-2023 11:43:51 JST from infosec.exchange permalink

    Attachments


User actions

    Tom Sellers

    Tom Sellers

    Security geek, packet abuserResearch Eng at @runZeroInchttp://LinkedIn.com/in/tomsellers http://fadedlab.wordpress.com he/him/they/goofball

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          179340
          Member since
          26 Sep 2023
          Notices
          15
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.