{"vulnerability": "CVE-2021-4326", "sightings": [{"uuid": "2851213d-7275-4ab0-b32c-6d3f844bb07f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/884", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aLocal PoC exploit for CVE-2021-43267 (Linux TIPC)\nURL\uff1ahttps://github.com/ohnonoyesyes/CVE-2021-43267", "creation_timestamp": "2021-11-26T01:56:17.000000Z"}, {"uuid": "b59e91b9-fa07-4c9e-b701-0be04feac289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://gist.github.com/alon710/2e3eb11d610be881a988f98cf52cb146", "content": "", "creation_timestamp": "2026-02-12T06:30:05.000000Z"}, {"uuid": "0e4bfa01-485b-4855-b1be-fafc4f37d873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8219", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Exploiting CVE-2021-43267\n\nWriteup:  https://haxx.in/posts/pwning-tipc/\n\nExploit code: https://haxx.in/files/blasty-vs-tipc.c", "creation_timestamp": "2021-11-25T22:43:19.000000Z"}, {"uuid": "93238e01-3dea-4888-8bdc-5b8fb24540ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "Telegram/XiVibqPdaU-x_KxdI2FLNgF4J_RC02_jDbQsHz1BA_zuEAs", "content": "", "creation_timestamp": "2025-11-23T09:00:06.000000Z"}, {"uuid": "5be1282c-efb9-47db-a3dc-9b44be31242b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/135", "content": "Exploiting CVE-2021-43267 \u2014 a bug in the TIPC module\n\nBlasty published an article on how to escalate privileges via the slab-buffer-overflow in the Transparent Inter-Process Communication (TIPC) module. A PoC is provided as well.\n\nThe vulnerability was previously discovered by maxpl0it, and it's claimed to be exploitable both locally and remotely.", "creation_timestamp": "2021-11-25T14:40:52.000000Z"}, {"uuid": "9a9a77d3-650c-4633-ac6d-25d58cca2b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8205", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Interesting thread: Weaponized CVE-2021-43267.\n\nhttps://twitter.com/bl4sty/status/1463527698756689921", "creation_timestamp": "2021-11-24T19:27:42.000000Z"}, {"uuid": "c586ac2e-b5d4-48f9-b7b6-755bf423539e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/cKure/7913", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2021-43267: Remote Linux Kernel Heap Overflow | TIPC Module Allows Arbitrary Code Execution.\n\nhttps://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution/", "creation_timestamp": "2021-11-05T09:45:43.000000Z"}, {"uuid": "87629217-a131-4ea5-a333-adfa6b3f930d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/poxek/572", "content": "\u041f\u0440\u0438\u0432\u0435\u0442  \ud83d\udc7a\ud83d\udc7a\ud83d\udc7a\n\u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0432\u043e\u0442 \u0442\u0443\u0442 \u041b\u0438\u043d\u0443\u0441 \u0422\u043e\u0440\u0432\u0430\u043b\u044c\u0434\u0441  \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u043b \u043d\u0430 \u0434\u044b\u0440\u043a\u0443 \u0432 net/tipc/crypto.c \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u044f\u0434\u0440\u0430 \u0434\u043e 5.14.16 (\u0442\u043e \u0435\u0441\u0442\u044c  \u043f\u043e\u0447\u0442\u0438 \u0441\u0432\u0435\u0436\u0430\u043a!!!)\n\u0421\u0443\u0442\u044c \u0434\u044b\u0440\u043a\u0438 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u0445 \u0442\u0438\u043f\u0430 MSG_CRYPTO \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430, \u0447\u0442\u043e \u0432\u0435\u0434\u0435\u0442 \u043b\u0438\u0431\u043e \u043a DoS, \u043b\u0438\u0431\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u0438\u044e \u043f\u0440\u0430\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435).\n\u0412\u0441\u044f\u043a\u0438\u0445 local POC exploit \u043f\u043e\u043b\u043d\u043e \u043d\u0430  \u0433\u0438\u0442\u0445\u0430\u0431\u0435, \u0430 \u0432\u043e\u0442 \u0440\u0430\u0431\u043e\u0447\u0438\u0439 \u0441\u043f\u043b\u043e\u0438\u0442\n\ud83d\ude0e", "creation_timestamp": "2022-01-26T12:39:14.000000Z"}, {"uuid": "000a627e-994e-4b7f-a65b-817f56e1e80c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/linkersec/124", "content": "CVE-2021-43267: Remote Linux Kernel Heap Overflow | TIPC Module Allows Arbitrary Code Execution\n\nAn article about a remotely-triggerable slab-buffer-overflow in the packet parsing paths for the TIPC protocol. By Max Van Amerongen.\n\nThe bug was found with CodeQL. Neither a remote nor a local exploit is provided. The TIPC module needs to be loaded manually for the bug to be triggerable.", "creation_timestamp": "2021-11-06T01:35:23.000000Z"}, {"uuid": "80c5f817-b565-43a3-90f8-0eb905910c5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/orderofsixangles/1681", "content": "\u042f \u0441\u0430\u043c \u0447\u0430\u0441\u0442\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0441\u044c \u0442\u0443\u043b\u0437\u043e\u0439 pe-sieve, \u0434\u043b\u044f \u0434\u0430\u043c\u043f\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0435\u0439\u043b\u043e\u0434\u043e\u0432 \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438, \u0432\u0438\u0434\u043e\u0441 \u0441 \u043e\u0431\u044a\u044f\u0441\u043d\u0435\u043d\u0438\u044f\u043c\u0438 \u0447\u0442\u043e \u044d\u0442\u043e\n\n\u041f\u0440\u043e\u0435\u043a\u0442 \u043f\u043e \u0444\u0430\u043d\u0434\u0438\u043d\u0433\u0443 \u043e\u043f\u0435\u043d\u0441\u0443\u0440\u0441 \u0441\u0435\u043a\u0443\u0440\u0438\u0442\u0438 \u0442\u0443\u043b\u0437, \u0435\u0441\u0442\u044c \u0441\u043f\u0438\u0441\u043e\u043a \u0442\u0443\u043b\u0437\n\nCVE-2021-43267\n\n\u0432\u0440\u0430\u0439\u0442\u0430\u043f \u043f\u043e \u0438\u0437\u0438 \u0442\u0430\u0441\u043a\u0443 K3RN3LCTF 2021 (Linux Kernel Exploitation)\n\nJava bytecode editor \n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u0443\u043f\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 PE \u0444\u0430\u0439\u043b\u043e\u0432\n\n\u0421\u043e\u0432\u0435\u0442\u044b \u043f\u043e \u0440\u0430\u0431\u043e\u0442\u0435 \u0441 enum \u0432 IDA", "creation_timestamp": "2021-11-26T14:39:36.000000Z"}, {"uuid": "f388cee8-6f8d-4467-bf27-dae6eca908b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/poxek/163", "content": "CVE-2021-43267\n\nLocal PoC exploit for #CVE-2021-43267 (Linux TIPC)\n\nhttps://github.com/ohnonoyesyes/CVE-2021-43267\n\nReference:\nhttps://haxx.in/posts/pwning-tipc/\n\n@dnevnik_infosec", "creation_timestamp": "2021-11-28T09:47:14.000000Z"}, {"uuid": "041ae271-d982-4654-9827-9447023e55dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/anwar1213xx/1358", "content": "\u0627\u0633\u062a\u063a\u0644\u0627\u0644 CVE-2021-43267 \u0641\u064a Linux kernel TIPC\n\n\u0644\u0642\u062f \u0646\u0634\u0631 Blasty \u0645\u0642\u0627\u0644\u0627\u064b \u0648 PoC \u0644\u0640 CVE-2021-43267 \u0641\u064a \u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0627\u0644\u0634\u0641\u0627\u0641\u0629 \u0628\u064a\u0646 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a (TIPC) \u0644\u0646\u0648\u0627\u0629 Linux.\n\n\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0645\u0633\u0628\u0642\u064b\u0627 \u0628\u0648\u0627\u0633\u0637\u0629 maxpl0it. \u0648\u0623\u0639\u0644\u0646 \u0623\u0646\u0647 \u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0639\u0646 \u0628\u0639\u062f \u0623\u0648 \u0645\u062d\u0644\u064a\u0627.\n\n\u0648\u0643\u062a\u0628 \u0628\u0644\u0627\u0633\u062a\u064a \u0643\u062a\u0627\u0628 \u0625\u062b\u0628\u0627\u062a \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646 \u0623\u062c\u0644 \u062a\u0635\u0639\u064a\u062f \u0627\u0644\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0627\u0644\u0645\u062d\u0644\u064a\u0629.", "creation_timestamp": "2021-11-25T12:26:20.000000Z"}, {"uuid": "04d2e138-8908-4eae-9d58-00fd3491bbe3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "Telegram/TXmZ8EBGvdc4uufvEqu6hfgyjEc7K_gjD1Jpp8Uzvu6-KK0", "content": "", "creation_timestamp": "2023-03-23T09:18:19.000000Z"}, {"uuid": "0fcbb8ac-b4a6-412f-967f-a31cc32e5faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/piratesofyemen1213/98", "content": "CVE-2021-43267\n\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0645\u0632\u064a\u062f \u0641\u064a \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0648\u0637\u0646\u064a\u0629 (NVD)\n\u2022 \u062a\u0635\u0646\u064a\u0641 \u0627\u0644\u062e\u0637\u0648\u0631\u0629 CVSS \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0625\u0635\u0644\u0627\u062d \u2022 \u0625\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0636\u0639\u064a\u0641\u0629 \u2022 \u062a\u0639\u064a\u064a\u0646\u0627\u062a SCAP \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a CPE\n\n\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u0634\u0643\u0644\u0629 \u0641\u064a net / tipc / crypto.c \u0641\u064a Linux kernel \u0642\u0628\u0644 5.14.16. \u062a\u0633\u0645\u062d \u0648\u0638\u064a\u0641\u0629 \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0627\u0644\u0634\u0641\u0627\u0641 \u0628\u064a\u0646 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a (TIPC) \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0639\u0646 \u0628\u0639\u062f \u0628\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062a\u062d\u0642\u0642 \u063a\u064a\u0631 \u0627\u0644\u0643\u0627\u0641\u064a \u0645\u0646 \u0627\u0644\u0623\u062d\u062c\u0627\u0645 \u0627\u0644\u062a\u064a \u064a\u0648\u0641\u0631\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u0646\u0648\u0639 \u0631\u0633\u0627\u0644\u0629 MSG_CRYPTO.\n\n\u27aa t.me/yemeni_cyber_security", "creation_timestamp": "2021-11-04T17:21:27.000000Z"}, {"uuid": "c81f0db7-b92a-4555-bf2b-4cdae309303b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/anwar1213xx/1205", "content": "CVE-2021-43267\n\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0645\u0632\u064a\u062f \u0641\u064a \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0648\u0637\u0646\u064a\u0629 (NVD)\n\u2022 \u062a\u0635\u0646\u064a\u0641 \u0627\u0644\u062e\u0637\u0648\u0631\u0629 CVSS \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0625\u0635\u0644\u0627\u062d \u2022 \u0625\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0636\u0639\u064a\u0641\u0629 \u2022 \u062a\u0639\u064a\u064a\u0646\u0627\u062a SCAP \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a CPE\n\n\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u0634\u0643\u0644\u0629 \u0641\u064a net / tipc / crypto.c \u0641\u064a Linux kernel \u0642\u0628\u0644 5.14.16. \u062a\u0633\u0645\u062d \u0648\u0638\u064a\u0641\u0629 \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0627\u0644\u0634\u0641\u0627\u0641 \u0628\u064a\u0646 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a (TIPC) \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0639\u0646 \u0628\u0639\u062f \u0628\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062a\u062d\u0642\u0642 \u063a\u064a\u0631 \u0627\u0644\u0643\u0627\u0641\u064a \u0645\u0646 \u0627\u0644\u0623\u062d\u062c\u0627\u0645 \u0627\u0644\u062a\u064a \u064a\u0648\u0641\u0631\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u0646\u0648\u0639 \u0631\u0633\u0627\u0644\u0629 MSG_CRYPTO.\n\n\u27aa t.me/yemeni_cyber_security", "creation_timestamp": "2021-11-04T17:21:27.000000Z"}, {"uuid": "5630459e-d3cd-4301-864c-99a9a38f2466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/piratesofyemen/248", "content": "CVE-2021-43267\n\u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u0645\u0632\u064a\u062f \u0641\u064a \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0648\u0637\u0646\u064a\u0629 (NVD)\n\u2022 \u062a\u0635\u0646\u064a\u0641 \u0627\u0644\u062e\u0637\u0648\u0631\u0629 CVSS \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0625\u0635\u0644\u0627\u062d \u2022 \u0625\u0635\u062f\u0627\u0631\u0627\u062a \u0627\u0644\u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0636\u0639\u064a\u0641\u0629 \u2022 \u062a\u0639\u064a\u064a\u0646\u0627\u062a SCAP \u2022 \u0645\u0639\u0644\u0648\u0645\u0627\u062a CPE\n\n\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0645\u0634\u0643\u0644\u0629 \u0641\u064a net / tipc / crypto.c \u0641\u064a Linux kernel \u0642\u0628\u0644 5.14.16. \u062a\u0633\u0645\u062d \u0648\u0638\u064a\u0641\u0629 \u0627\u0644\u0627\u062a\u0635\u0627\u0644 \u0627\u0644\u0634\u0641\u0627\u0641 \u0628\u064a\u0646 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a (TIPC) \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0639\u0646 \u0628\u0639\u062f \u0628\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062a\u062d\u0642\u0642 \u063a\u064a\u0631 \u0627\u0644\u0643\u0627\u0641\u064a \u0645\u0646 \u0627\u0644\u0623\u062d\u062c\u0627\u0645 \u0627\u0644\u062a\u064a \u064a\u0648\u0641\u0631\u0647\u0627 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0644\u0646\u0648\u0639 \u0631\u0633\u0627\u0644\u0629 MSG_CRYPTO.\n\n\u27aa t.me/yemeni_cyber_security", "creation_timestamp": "2021-11-04T17:21:27.000000Z"}, {"uuid": "b1af2529-7655-4c6f-9f7d-71a18638bd0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/BlackHut_Egy/541", "content": "A heap overflow vulnerability (CVE-2021-43267) has been reported in Linux Kernel's Transparent Inter Process Communication (TIPC) module that can be exploited either locally or remotely within a network to gain kernel privileges.\n\n\ud83d\udd25\ud83d\udd25\ud83d\udd25\ud83d\udd25\ud83d\udd25", "creation_timestamp": "2021-11-08T17:29:28.000000Z"}, {"uuid": "5e9c10f8-069a-48d3-8cc1-996be4291e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43269", "type": "seen", "source": "https://t.me/cibsecurity/35906", "content": "\u203c CVE-2021-43269 \u203c\n\nIn Code42 app before 8.8.0, eval injection allows an attacker to change a device\u00e2\u20ac\u2122s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cloud; and CrashPlan for Small Business. (Incydr Professional and Enterprise are unaffected.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-20T07:41:08.000000Z"}, {"uuid": "b7030f70-940f-4fe0-913a-f1c1384b4739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1427", "content": "kernel-linux-factory\n*\n\u0423\u0434\u043e\u0431\u043d\u043e \u0442\u0435\u043c, \u0447\u0442\u043e \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043b\u0438 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0442\u044c \u0441\u0440\u0435\u0434\u0443, \u0433\u043b\u044f\u043d\u0443\u043b \u043a\u0430\u043a\u043e\u0435 \u044f\u0434\u0440\u043e, \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u043b \u0441\u043f\u043b\u043e\u0435\u0442, \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043f\u043e \u043c\u043e\u0440\u0434\u0435 #root\n*\n\u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 exploits \u0434\u043b\u044f:\nCVE-2016-9793\n4-20-BPF-integer\nCVE-2017-5123\nCVE-2017-6074\nCVE-2017-7308\nCVE-2017-8890\nCVE-2017-11176\nCVE-2017-16995\nCVE-2017-1000112\nCVE-2018-5333\nCVE-2019-9213 &amp; CVE-2019-8956\nCVE-2019-15666\nCVE-2020-8835\nCVE-2020-27194\nCVE-2021-3156\nCVE-2021-31440\nCVE-2021-3490\nCVE-2021-22555\nCVE-2021-41073\nCVE-2021-4154\nCVE-2021-42008\nCVE-2021-43267\nCVE-2022-0185\nCVE-2022-0847\nCVE-2022-0995\nCVE-2022-1015\nCVE-2022-2588\nCVE-2022-2639\nCVE-2022-25636\nCVE-2022-27666\nCVE-2022-32250\nCVE-2022-34918\n\ndownload\n\n#linux #exploits #kernel", "creation_timestamp": "2023-03-23T06:30:43.000000Z"}, {"uuid": "739d8616-0d3e-4fab-bffd-3ada666c71e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/575", "content": "\u041f\u0440\u0438\u0432\u0435\u0442  \ud83d\udc7a\ud83d\udc7a\ud83d\udc7a\n\u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0432\u043e\u0442 \u0442\u0443\u0442 \u041b\u0438\u043d\u0443\u0441 \u0422\u043e\u0440\u0432\u0430\u043b\u044c\u0434\u0441  \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u043b \u043d\u0430 \u0434\u044b\u0440\u043a\u0443 \u0432 net/tipc/crypto.c \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u044f\u0434\u0440\u0430 \u0434\u043e 5.14.16 (\u0442\u043e \u0435\u0441\u0442\u044c  \u043f\u043e\u0447\u0442\u0438 \u0441\u0432\u0435\u0436\u0430\u043a!!!)\n\u0421\u0443\u0442\u044c \u0434\u044b\u0440\u043a\u0438 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u0445 \u0442\u0438\u043f\u0430 MSG_CRYPTO \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430, \u0447\u0442\u043e \u0432\u0435\u0434\u0435\u0442 \u043b\u0438\u0431\u043e \u043a DoS, \u043b\u0438\u0431\u043e \u043f\u043e\u0434\u043d\u044f\u0442\u0438\u044e \u043f\u0440\u0430\u0432 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435).\n\u0412\u0441\u044f\u043a\u0438\u0445 local POC exploit \u043f\u043e\u043b\u043d\u043e \u043d\u0430  \u0433\u0438\u0442\u0445\u0430\u0431\u0435, \u0430 \u0432\u043e\u0442 \u0440\u0430\u0431\u043e\u0447\u0438\u0439 \u0441\u043f\u043b\u043e\u0438\u0442\n\ud83d\ude0e", "creation_timestamp": "2022-01-26T11:24:37.000000Z"}, {"uuid": "5f538648-e6b9-4eb2-a694-7ac8b57f212a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/true_secator/2290", "content": "Linux Foundation \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 \u044f\u0434\u0440\u0430 , \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u043c\u0438 \u041e\u0421 \u0438 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u044f\u0434\u0440\u0430 \u043c\u0435\u0436\u0434\u0443 5.10 \u0438 5.15.\n \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e CVE-2021-43267 \u043c\u043e\u0436\u043d\u043e \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u0442\u0430\u043a \u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439.\n \n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 TIPC (Transparent Inter-Process Communication) \u044f\u0434\u0440\u0430 Linux, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u043c\u0435\u043d \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043c\u0435\u0436\u0434\u0443 \u0443\u0437\u043b\u0430\u043c\u0438 \u0432 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430\u0445 \u0432 \u043e\u0442\u043a\u0430\u0437\u043e\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435.\n \n\u0414\u044b\u0440\u0443 \u0432 \u044f\u0434\u0440\u0435 Linux \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0412\u0430\u043d \u0410\u043c\u0435\u0440\u043e\u043d\u0433\u0435\u043d \u0438\u0437 SentinelOne \u0435\u0449\u0435 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2020 \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u0431\u044b\u043b \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0442\u0438\u043f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c MSG_CRYPTO, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043e\u0434\u043d\u043e\u0440\u0430\u043d\u0433\u043e\u0432\u044b\u043c \u0443\u0437\u043b\u0430\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u043b\u044e\u0447\u0438. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0441\u0435\u043c\u0430\u043d\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043a\u043e\u0434\u0430 \u043e\u0442 Microsoft CodeQL, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043f\u043e\u0447\u0442\u0438 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e \u0441\u043c\u043e\u0433 \u0437\u0430\u043c\u0435\u0442\u0438\u0442\u044c \u00ab\u044f\u0432\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u044f\u0434\u0440\u0430\u00bb \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438 \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f.\n \n\u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u043c\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u043d\u0430\u0434 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438, \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0432 \u043a\u0443\u0447\u0435 \u044f\u0434\u0440\u0430, \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0438\u0433\u043d\u0443\u0442\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f TIPC.\n \n\u041d\u0435\u043c\u043d\u043e\u0433\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043f\u0430\u0441\u0430\u0435\u0442 \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0442\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043c\u043e\u0434\u0443\u043b\u044c TIPC \u043d\u0435 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0430 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0434\u043e \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043e.\n \n\u0412\u043c\u0435\u0441\u0442\u0435 \u0441 \u0442\u0435\u043c, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u0442\u044c TIPC \u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c - \u0432\u0441\u0435 \u0436\u0435 \u0434\u0435\u043b\u0430\u0435\u0442 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438.\n \n\u041d\u043e \u043b\u0443\u0447\u0448\u0435 \u043d\u0435 \u0438\u0441\u043f\u044b\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0443\u0434\u044c\u0431\u0443, \u0430 \u0441\u0440\u0430\u0437\u0443 \u043d\u0430\u043a\u0430\u0442\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2021-11-08T18:45:11.000000Z"}, {"uuid": "0fd23077-891f-4fd9-baf9-ad0407b85c3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/NeKaspersky/1431", "content": "\u0412 \u043c\u043e\u0434\u0443\u043b\u0435 \u044f\u0434\u0440\u0430 TIPC Linux \u043d\u0430\u0448\u043b\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439. \n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-43267 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 9,8 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS. \u041e\u043d\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0435\u0439 \u043a \u043f\u043e\u043b\u043d\u043e\u043c\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u0438 \u043c\u043e\u0436\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u0442\u0430\u043a \u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e. \n\n\u0411\u0440\u0435\u0448\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0412\u0430\u043d \u0410\u043c\u0435\u0440\u043e\u043d\u0433\u0435\u043d \u0438\u0437 SentinelOne. \u041f\u0440\u0438\u0447\u0438\u043d\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0435\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 MSG_CRYPTO.\n\nLinux Foundation \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u044f\u0434\u0440\u0430 \u043e\u0442 5.10 \u0434\u043e 5.15.", "creation_timestamp": "2021-11-09T17:25:27.000000Z"}, {"uuid": "19e1eaf1-3a77-4f94-a8b0-17ec7cf433d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43268", "type": "seen", "source": "https://t.me/cibsecurity/32965", "content": "\u203c CVE-2021-43268 \u203c\n\nAn issue was discovered in VxWorks 6.9 through 7. In the IKE component, a specifically crafted packet may lead to reading beyond the end of a buffer, or a double free.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-24T20:27:02.000000Z"}, {"uuid": "4c83b030-d208-48bf-981f-2404374f3df5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/cibsecurity/31812", "content": "\u274c Critical Linux Kernel Bug Allows Remote Takeover \u274c\n\nThe bug (CVE-2021-43267) exists in a TIPC message type that allows Linux nodes to send cryptographic keys to each other.\n\n\ud83d\udcd6 Read\n\nvia \"Threat Post\".", "creation_timestamp": "2021-11-04T17:08:07.000000Z"}, {"uuid": "268794b6-44dd-4cc4-8c36-ec0fc7a4ec61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43264", "type": "seen", "source": "https://t.me/cibsecurity/31668", "content": "\u203c CVE-2021-43264 \u203c\n\nIn Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, adjusting the path component for the page help file allows attackers to bypass the intended access control for HTML files via directory traversal. It replaces the - character with the / character.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T01:23:04.000000Z"}, {"uuid": "51f361f4-3e06-479b-8a97-d41514836ee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/cibsecurity/31666", "content": "\u203c CVE-2021-43267 \u203c\n\nAn issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T01:23:02.000000Z"}, {"uuid": "69d0712d-3865-4e1b-96a1-a48cd2cf3e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1226", "content": "CVE-2021\nLocal PoC exploit for CVE-2021-43267 (Linux TIPC)\n\nhttps://github.com/ohnonoyesyes/CVE-2021-43267\n@BlueRedTeam", "creation_timestamp": "2021-11-26T03:55:46.000000Z"}, {"uuid": "aa727f2c-f23c-49b5-8bf7-e0e39814f28a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/thehackernews/1632", "content": "A heap overflow vulnerability (CVE-2021-43267) has been reported in Linux Kernel's Transparent Inter Process Communication (TIPC) module that can be exploited either locally or remotely within a network to gain kernel privileges.\n\nRead: https://thehackernews.com/2021/11/critical-rce-vulnerability-reported-in.html", "creation_timestamp": "2021-11-04T13:12:53.000000Z"}, {"uuid": "7ff3a8f8-6d78-487b-a177-e2c9395c7296", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "Telegram/ef7CFAclTMEwgwEiSi6JebmAB-RNthk9RDMvgVFJRzgdQLMb", "content": "", "creation_timestamp": "2021-11-04T13:15:04.000000Z"}, {"uuid": "1a1fe9b0-b951-48c9-b9d4-6790299bf5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4889", "content": "#Analytics\nTop 10 Most Used Vulns of the Month (Nov 1-30)\nCVE-2021-22205 - GitLab CE/EE RCE\nhttps://t.me/cybersecuritytechnologies/4602\nCVE-2021-30883 - iOS IOMFB Vuln\nhttps://t.me/cybersecuritytechnologies/4497\nCVE-2021-3064 - Memory Corruption in PAN-OS GlobalProtect Portal/Gateway Interfaces\nhttps://t.me/cybersecuritytechnologies/4724\nCVE-2021-41379 - Windows Installer LPE\nhttps://t.me/cybersecuritytechnologies/4813\nCVE-2021-42321 - MS Exchange Post-Auth RCE\nhttps://t.me/cybersecuritytechnologies/4809\nCVE-2021-40539 - Zoho ManageEngine Auth. Bypass\nhttps://t.me/cybersecuritytechnologies/4718\nCVE-2021-41277 - MetaBase Arbitrary File Read\nhttps://t.me/cybersecuritytechnologies/4802\nCVE-2021-43267 - Remote Kernel Heap Overflow in TIPC\nhttps://t.me/cybersecuritytechnologies/4678\nCVE-2021-42574 - Unicode Bidirectional override vuln\nhttps://github.com/js-on/CVE-2021-42574\nhttps://github.com/pierDipi/unicode-control-characters-action\nCVE-2021-24084 - Windows MDM LPE\nhttps://t.me/cybersecuritytechnologies/4850", "creation_timestamp": "2021-12-03T11:00:35.000000Z"}, {"uuid": "2dc88652-cbe8-4b1f-a3c6-dfc1c9d9c1c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "seen", "source": "https://t.me/S_E_Reborn/1262", "content": "Linux Foundation \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 \u044f\u0434\u0440\u0430 , \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u043c\u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u043c\u0438 \u041e\u0421 \u0438 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u0438 \u044f\u0434\u0440\u0430 \u043c\u0435\u0436\u0434\u0443 5.10 \u0438 5.15.\n \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e CVE-2021-43267 \u043c\u043e\u0436\u043d\u043e \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e, \u0442\u0430\u043a \u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439.\n \n\u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043a\u0440\u043e\u0435\u0442\u0441\u044f \u0432 \u043c\u043e\u0434\u0443\u043b\u0435 TIPC (Transparent Inter-Process Communication) \u044f\u0434\u0440\u0430 Linux, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u043c\u0435\u043d \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043c\u0435\u0436\u0434\u0443 \u0443\u0437\u043b\u0430\u043c\u0438 \u0432 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430\u0445 \u0432 \u043e\u0442\u043a\u0430\u0437\u043e\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435.\n \n\u0414\u044b\u0440\u0443 \u0432 \u044f\u0434\u0440\u0435 Linux \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0412\u0430\u043d \u0410\u043c\u0435\u0440\u043e\u043d\u0433\u0435\u043d \u0438\u0437 SentinelOne \u0435\u0449\u0435 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2020 \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u0431\u044b\u043b \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0442\u0438\u043f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c MSG_CRYPTO, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043e\u0434\u043d\u043e\u0440\u0430\u043d\u0433\u043e\u0432\u044b\u043c \u0443\u0437\u043b\u0430\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043a\u043b\u044e\u0447\u0438. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c \u0441\u0435\u043c\u0430\u043d\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043a\u043e\u0434\u0430 \u043e\u0442 Microsoft CodeQL, \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043f\u043e\u0447\u0442\u0438 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e \u0441\u043c\u043e\u0433 \u0437\u0430\u043c\u0435\u0442\u0438\u0442\u044c \u00ab\u044f\u0432\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u044f\u0434\u0440\u0430\u00bb \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438 \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f.\n \n\u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u043c\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044e \u043d\u0430\u0434 \u043e\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438, \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0432 \u043a\u0443\u0447\u0435 \u044f\u0434\u0440\u0430, \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0438\u0433\u043d\u0443\u0442\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f TIPC.\n \n\u041d\u0435\u043c\u043d\u043e\u0433\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043f\u0430\u0441\u0430\u0435\u0442 \u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0442\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043c\u043e\u0434\u0443\u043b\u044c TIPC \u043d\u0435 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0430 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0434\u043e \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u043e.\n \n\u0412\u043c\u0435\u0441\u0442\u0435 \u0441 \u0442\u0435\u043c, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0430\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u0442\u044c TIPC \u0438 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c - \u0432\u0441\u0435 \u0436\u0435 \u0434\u0435\u043b\u0430\u0435\u0442 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0432 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438.\n \n\u041d\u043e \u043b\u0443\u0447\u0448\u0435 \u043d\u0435 \u0438\u0441\u043f\u044b\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0443\u0434\u044c\u0431\u0443, \u0430 \u0441\u0440\u0430\u0437\u0443 \u043d\u0430\u043a\u0430\u0442\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2021-11-08T19:19:56.000000Z"}, {"uuid": "91e859cc-35e1-4429-8c86-e00da0dd2acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-43267", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4678", "content": "#exploit\nCVE-2021-43267:\nRemote Linux Kernel Heap Overflow in TIPC Module\nhttps://www.sentinelone.com/labs/tipc-remote-linux-kernel-heap-overflow-allows-arbitrary-code-execution", "creation_timestamp": "2021-11-05T13:15:21.000000Z"}]}