{"id":4832,"date":"2023-05-20T19:44:14","date_gmt":"2023-05-20T17:44:14","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=4832"},"modified":"2023-05-20T19:44:14","modified_gmt":"2023-05-20T17:44:14","slug":"samsung-aslr-ranjivost-cve-2023-21492","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2023\/05\/20\/samsung-aslr-ranjivost-cve-2023-21492\/","title":{"rendered":"Samsung ASLR ranjivost (CVE-2023-21492)"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Agencija za sajber bezbjednost i bezbjednost infrastrukture SAD (eng. <em>U.S. Cybersecurity and Infrastructure Security Agency \u2013 CISA<\/em>) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/05\/19\/cisa-adds-three-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">upozorava korisnike na ranjivost u <em>Samsung<\/em> ure\u0111ajima<\/a> koja omogu\u0107ava zaobila\u017eenje za\u0161tite <em>Android<\/em> adresnog prostora nasumi\u010dnim rasporedom (eng. <em>Android address space layout randomization \u2013 ASLR<\/em>).<\/span><\/p>\n<div id=\"attachment_4834\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4834\" class=\"size-full wp-image-4834\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/Samsung-Security-Flaw.jpg\" alt=\"Samsung ASLR ranjivost \" width=\"1024\" height=\"644\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/Samsung-Security-Flaw.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/Samsung-Security-Flaw-300x189.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/Samsung-Security-Flaw-768x483.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2023\/05\/Samsung-Security-Flaw-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-4834\" class=\"wp-caption-text\"><em>Samsung ASLR ranjivost (CVE-2023-21492); Dizajn: Sa\u0161a \u0110uri\u0107<\/em><\/p><\/div>\n<h2><span style=\"font-size: 14pt;\"><strong>\u0160ta je <em>ASLR<\/em>?<\/strong><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\"><em>ASLR<\/em> je bezbjednosna funkcija <em>Android<\/em> operativnog sistema koja nasumi\u010dno postavlja memorijske adrese gdje se klju\u010dne komponente aplikacije i operativnog sistema u\u010ditavaju u memoriju ure\u0111aja.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Ovo napada\u010dima ote\u017eava da iskoriste ranjivosti u vezi sa memorijom i uspje\u0161no pokrenu napade kao \u0161to su prelivanje pomo\u0107ne memorije, programiranje orijentisano na povratak ili druge na\u010dine iskori\u0161tavanja ranjivosti bazirane na memoriji.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"font-size: 14pt;\"><strong><em>Samsung<\/em> <em>ASLR<\/em> ranjivost (<em>CVE<\/em>&#8211;<em>2023<\/em>&#8211;<em>21492<\/em>)<\/strong><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\"><em>CISA<\/em> upozorava na ranjivost u <em>Samsung<\/em> mobilnim ure\u0111ajima ozna\u010denu kao <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-21492\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-21492<\/em><\/a> (sa ocjenom <em>CVSS: 4.4<\/em>) koja poga\u0111a ure\u0111aje sa <em>Android<\/em> verzijama operativnog sistema <em>11<\/em>, <em>12<\/em> i <em>13<\/em>, a radi se o umetanja osvetljivih informacija u datoteke evidencije. Izlo\u017eene informacije mogu da iskoriste lokalni napada\u010di sa visokim privilegijama da zaobi\u0111u <em>ASLR<\/em> za\u0161titu, \u0161to im mo\u017ee da omogu\u0107i upravljanje memorijom.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Vi\u0161e detalja o tome kako se ova ranjivost iskori\u0161tava trenutno nije poznato, ali ranjivosti u <em>Samsung<\/em> mobilnim ure\u0111ajima su u pro\u0161losti bili iskori\u0161teni od strane <a href=\"https:\/\/sajberinfo.com\/en\/2022\/12\/04\/hakeri-placenici-epizoda-10\/\" rel=\"nofollow\">komercijalnih prodavaca \u0161pijunskog softvera<\/a> za postavljanje <a href=\"https:\/\/sajberinfo.com\/en\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjernog softvera<\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-size: 14pt;\"><strong>A\u017euriranje<\/strong><\/span><\/h4>\n<p><span style=\"font-size: 14pt;\">U <a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2023&amp;month=05#:~:text=%E2%80%BB%20Samsung%20was%20notified%20that%20an%20exploit%20for%20this%20issue%20had%20existed%20in%20the%20wild.\" target=\"_blank\" rel=\"noopener\">bezbjednosnim a\u017euriranjima ovog mjeseca<\/a>, <em>Samsung<\/em> je rije\u0161io ovaj problem tako \u0161to je osigurao da se pokaziva\u010di jezgra sistema vi\u0161e ne \u0161tampaju u datotekama evidencije, pa se korisnicima preporu\u010duje da respektivno primjene najnovije a\u017euriranje.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Koliko ova ranjivost mo\u017ee biti ozbiljna, mo\u017eda govori da je <em>CISA<\/em> ovaj nedostatak dodala na svoju listu poznatih ranjivosti koje se iskori\u0161tavaju (eng. <em>Known Exploited Vulnerabilities \u2013 KEV<\/em>), pozivaju\u0107i dr\u017eavne agencije da izvr\u0161e a\u017euriranje ure\u0111aja najkasnije do 09. juna 2023. godine.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Agencija za sajber bezbjednost i bezbjednost infrastrukture SAD (eng. U.S. Cybersecurity and Infrastructure Security Agency \u2013 CISA) upozorava korisnike na ranjivost u Samsung ure\u0111ajima koja omogu\u0107ava zaobila\u017eenje za\u0161tite Android adresnog prostora nasumi\u010dnim rasporedom (eng.&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":4834,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[187,378,379,199,126],"class_list":["post-4832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-android","tag-aslr","tag-cisa","tag-samsung","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=4832"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/4832\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/4834"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=4832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=4832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=4832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}