FERRAMENTAS LINUX: Critical Security Update: GSS NTLMSSP Vulnerabilities Patched (CVE-2023-25563 to CVE-2023-25567)

terça-feira, 24 de junho de 2025

Critical Security Update: GSS NTLMSSP Vulnerabilities Patched (CVE-2023-25563 to CVE-2023-25567)

 



Critical security flaws in GSS NTLMSSP (CVE-2023-25563 to CVE-2023-25567) may lead to DoS & memory corruption. Learn how to patch Ubuntu systems & secure enterprise networks with Ubuntu Pro’s 10-year coverage.

Publication Date: June 23, 2025

Overview

Multiple high-severity security vulnerabilities have been discovered in GSS NTLMSSP, a critical authentication mechanism used in enterprise environments. 

These flaws could allow attackers to trigger denial-of-service (DoS) attacks, memory corruption, and unauthorized access. Immediate patching is recommended for all affected systems.

Detailed Vulnerability Analysis

1. Out-of-Bounds Read Vulnerabilities (CVE-2023-25563, CVE-2023-25567)

  • Discovered by: Phil Turnbull

  • Impact: Attackers could exploit improper NTLM field decoding to crash services, leading to system instability and service disruption.

  • Affected Systems: Ubuntu LTS versions (16.04 Xenial to 22.04 Jammy).

2. Improper Memory Initialization (CVE-2023-25564)

  • Risk: Uninitialized memory in UTF16 string parsing could allow out-of-bounds writes, potentially leading to remote code execution (RCE).

  • Mitigation: Apply the latest security patches immediately.

3. Memory Cleanup Failure (CVE-2023-25565)

  • Threat: Poor memory handling may cause assertion failures, crashing authentication services and disrupting enterprise workflows.

How to Update & Secure Your Systems

Patch Instructions

A standard system update will resolve these issues. Below are the latest secure versions for Ubuntu:

Ubuntu ReleasePackage Version
22.04 Jammygss-ntlmssp – 0.7.0-4ubuntu0.22.04.1~esm1
20.04 Focalgss-ntlmssp – 0.7.0-4ubuntu0.20.04.1~esm1
18.04 Bionicgss-ntlmssp – 0.7.0-4ubuntu0.18.04.1~esm1
16.04 Xenialgss-ntlmssp – 0.7.0-3~ubuntu0.16.04.1+esm1

🔹 Pro Tip: Ensure automatic security updates are enabled to prevent zero-day exploits.

Extended Security with Ubuntu Pro

For enterprises requiring long-term protectionUbuntu Pro offers:

✅ 10-year security coverage for 25,000+ packages

✅ Free for up to 5 machines

✅ Enhanced vulnerability patching

👉 Get Ubuntu Pro Now

Why This Update Matters for Enterprises

  • Prevents costly downtime from DoS attacks.

  • Reduces attack surface in corporate networks.

  • Ensures compliance with security best practices.

Frequently Asked Questions (FAQ)

Q: Is this vulnerability actively being exploited?

A: No confirmed exploits yet, but patching immediately is critical to prevent future attacks.

Q: Does this affect Windows systems?

A: No, GSS NTLMSSP is primarily used in Linux/Unix environments.

Q: Can I mitigate this without updating?

A: No—applying the official patches is the only secure solution.

Conclusion & Next Steps

These GSS NTLMSSP vulnerabilities pose serious risks to enterprise security. To protect your systems:

  1. Apply updates immediately.

  2. Enable Ubuntu Pro for extended security.

  3. Monitor authentication logs for unusual activity.

🔒 Stay secure, stay patched!



Nenhum comentário:

Postar um comentário