{"id":20345,"date":"2022-02-07T08:30:00","date_gmt":"2022-02-07T08:30:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2022\/02\/07\/trend-micro-plays-vital-role-in-uncovering-critical-samba-bug-3\/"},"modified":"2022-02-07T08:30:00","modified_gmt":"2022-02-07T08:30:00","slug":"trend-micro-plays-vital-role-in-uncovering-critical-samba-bug-3","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2022\/02\/07\/trend-micro-plays-vital-role-in-uncovering-critical-samba-bug-3\/","title":{"rendered":"Trend Micro Plays Vital Role in Uncovering Critical Samba Bug"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\" rel=\"sponsored\">Media<br \/>\nOutReach<\/a>\u00a0&#8211;\u00a07 February 2022\u00a0&#8211;\u00a0<a href=\"http:\/\/www.trendmicro.com.hk\/\" rel=\"sponsored\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\" rel=\"sponsored\">TYO: 4704<\/a>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\" rel=\"sponsored\"> TSE: 4704<\/a>),<br \/>\na global cybersecurity leader, today<br \/>\nconfirmed its commitment to making the digital world safer by revealing the<br \/>\ninstrumental role its Zero Day Initiative (ZDI)* played in finding and<br \/>\nreporting a critical vulnerability in the file sharing protocol Samba.<\/p>\n<p>\u00a0<\/p>\n<p><b><i>To find<br \/>\nout more about the Samba flaw and how to mitigate its impact, please visit our<br \/>\nblog <\/i><\/b><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/22\/b\/the-samba-vulnerability-what-is-cve-2021-44142-and-how-to-fix-it.html\" rel=\"sponsored\"><i>here<\/i><\/a><b><i> and technical support alert <\/i><\/b><a href=\"https:\/\/success.trendmicro.com\/solution\/000290434\" rel=\"sponsored\"><i>here.<\/i><\/a><b><i\/><\/b><\/p>\n<p><b><i>\u00a0<\/i><\/b><\/p>\n<p>&#8220;This latest<br \/>\nvulnerability disclosure comes on the heels of the recent Log4j vulnerability<br \/>\nand highlights the challenges many global security teams have in mitigating<br \/>\nrisk across a multitude of applications and open source software,&#8221; said Jon<br \/>\nClay, vice president of threat intelligence at Trend Micro. &#8220;The good news is<br \/>\nthis was found during our Pwn2Own event, which means we had an opportunity to<br \/>\nwork with the developers to responsibly patch and disclose the vulnerabilities.<br \/>\nSo far, we have not heard of any in-the-wild attacks occurring.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>Trend Micro&#8217;s<br \/>\nPwn2Own events run regularly around the world, challenging contestants to find<br \/>\nnew vulnerabilities and exploits in widely used software and systems. They are<br \/>\npart of a company-wide effort to enhance cybersecurity for customers and the<br \/>\nentire online community through the ZDI and Trend Micro&#8217;s own global threat<br \/>\nintelligence team of thousands of researchers.<\/p>\n<p>\u00a0<\/p>\n<p>These efforts<br \/>\nare increasingly important as organizations continue to digitally transform,<br \/>\nexpanding their attack surface and reliance on software \u2013\u00a0particularly<br \/>\nopen source components. <\/p>\n<p>\u00a0<\/p>\n<p>The<br \/>\nvulnerability in question, <a href=\"https:\/\/www.samba.org\/samba\/security\/CVE-2021-44142.html\" rel=\"sponsored\">CVE-2021-44142<\/a>, was given a CVSS score of 9.9,<br \/>\nillustrating its potentially critical impact on affected organizations. If<br \/>\nexploited, the out-of-bounds heap read write bug could allow remote attackers<br \/>\nto execute arbitrary code as root.<\/p>\n<p>\u00a0<\/p>\n<p>While no<br \/>\nexploits of this vulnerability have been seen in the wild, the window in which<br \/>\naffected organizations must patch critical new vulnerabilities before threat<br \/>\nactors start exploiting them is increasingly short.<\/p>\n<p>\u00a0<\/p>\n<p>Trend Micro<br \/>\ntherefore calls on all organizations to patch CVE-2021-44142 or update to the<br \/>\nlatest Samba version as a matter of urgency.<\/p>\n<p>\u00a0<\/p>\n<p><i>*<\/i> <i>The vulnerability was originally<br \/>\ndisclosed at Pwn2Own Austin 2021 by Nguyen Hoang Thach and Billy Jheng<br \/>\nBing-Jhong of STAR Labs. Lucas Leong of Trend Micro&#8217;s ZDI discovered additional<br \/>\nvariants which were disclosed to Samba as part of this fix. The original issue<br \/>\nwas also independently found by Orange Tsai of DEVCORE. The ZDI is the world&#8217;s<br \/>\nlargest vendor-agnostic bug bounty program. Since 2005, it has been making<br \/>\nsoftware safer by incentivizing researchers to find and responsibly disclose<br \/>\nvulnerabilities to vendors.<\/i><\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/hong-kong\/2022\/02\/07\/118835\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211;\u00a07 February 2022\u00a0&#8211;\u00a0Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today confirmed its commitment to making the digital world safer by revealing the instrumental role its Zero Day Initiative (ZDI)* played in finding and reporting a critical vulnerability in the file sharing protocol Samba. \u00a0 To find out &hellip;<\/p>\n","protected":false},"author":1,"featured_media":20288,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/20345"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=20345"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/20345\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/20288"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=20345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=20345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=20345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}