lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

63
active users

#cve202323397

0 posts0 participants0 posts today
Taggart: ~# :idle:<p>I'm once again asking if _anyone_ has seen the PoCs for <a href="https://fosstodon.org/tags/CVE202323397" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202323397</span></a> actually work against remote targets. </p><p>MDSec demo: local attack<br>Hammond's demo: local attack<br>My own testing: local attack</p><p>With both flavors of PoC right now, I can only get this thing to trigger on my own machine, but not recipients. The invite is received, but the SMB server is not contacted by the target. I'm wondering if we're missing something here.</p><p><a href="https://fosstodon.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://fosstodon.org/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://fosstodon.org/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a></p>
Joe Słowik<p><a href="https://infosec.exchange/tags/CVE202323397" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202323397</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
Frehi<p><a href="https://fosstodon.org/tags/twinclams" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>twinclams</span></a> now has detection support for <a href="https://fosstodon.org/tags/CVE202323397" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202323397</span></a> exploits. Add it to your <a href="https://fosstodon.org/tags/clamav" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>clamav</span></a> installation with <a href="https://fosstodon.org/tags/fangfrisch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fangfrisch</span></a>.</p><p><a href="https://github.com/twinwave-security/twinclams/commit/de7534849fada879eb613c57db0f421c93f9ed7f" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/twinwave-security/t</span><span class="invisible">winclams/commit/de7534849fada879eb613c57db0f421c93f9ed7f</span></a></p><p><a href="https://blog.frehi.be/2021/01/25/using-fangfrisch-to-improve-malware-e-mail-detection-with-clamav/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.frehi.be/2021/01/25/using</span><span class="invisible">-fangfrisch-to-improve-malware-e-mail-detection-with-clamav/</span></a></p>
Kevin Beaumont<p>You definitely want to update Microsoft Office. </p><p>MDSec beat me to it on CVE-2023-23397, it's supppper easy to exploit + works with remote images disabled - turns out the spec (which is open) has a function to specify a sound when an Outlook email arrives - which loads via UNC and sends NTML password hash for AD account to internet = no click cred theft, PoC in wild. </p><p><a href="https://cyberplace.social/tags/CVE202323397" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202323397</span></a> <a href="https://www.mdsec.co.uk/2023/03/exploiting-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">mdsec.co.uk/2023/03/exploiting</span><span class="invisible">-cve-2023-23397-microsoft-outlook-elevation-of-privilege-vulnerability/</span></a></p>