VARIoT IoT vulnerabilities database
| VAR-201908-1072 | CVE-2016-10887 | WordPress for all-in-one-wp-security-and-firewall In the plugin SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
The all-in-one-wp-security-and-firewall plugin before 4.0.9 for WordPress has multiple SQL injection issues. WordPress for all-in-one-wp-security-and-firewall Plug-ins include SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability stems from the lack of verification of externally input SQL statements in database-based applications. Attackers can exploit this vulnerability to execute illegal SQL commands
| VAR-201908-1073 | CVE-2016-10888 | WordPress for all-in-one-wp-security-and-firewall In the plugin SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
The all-in-one-wp-security-and-firewall plugin before 4.0.7 for WordPress has multiple SQL injection issues. WordPress for all-in-one-wp-security-and-firewall Plug-ins include SQL An injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability stems from the lack of verification of externally input SQL statements in database-based applications. Attackers can exploit this vulnerability to execute illegal SQL commands
| VAR-201908-0478 | CVE-2019-14526 | NETGEAR Nighthawk M1 Cross-Site Request Forgery Vulnerability |
CVSS V2: 5.8 CVSS V3: 8.1 Severity: HIGH |
An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices before 12.06.03. The web-interface Cross-Site Request Forgery token is stored in a dynamically generated JavaScript file, and therefore can be embedded in third party pages, and re-used against the Nighthawk web interface. This entirely bypasses the intended security benefits of the use of a CSRF-protection token. The vulnerability stems from the fact that the WEB application did not fully verify whether the request came from a trusted user. An attacker could use this vulnerability to send unexpected requests to the server through the affected client
| VAR-201908-0259 | CVE-2019-9585 | eQ-3 Homematic CCU2 and CCU3 Access control vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata. eQ-3 Homematic CCU2 and CCU3 Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. eQ-3 Homematic CCU3 and eQ-3 HomeMatic CCU2 are the central control units of a smart home system from German eQ-3 company. Attackers can use this vulnerability to read, set, and delete metadata
| VAR-201908-1950 | CVE-2019-12104 | TP-Link M7350 V3 Command Injection Vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by several post-authentication command injection vulnerabilities. TP-Link M7350 Has a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TP-Link M7350 is a portable wireless router device from China Unicom (TP-Link)
| VAR-201908-0479 | CVE-2019-14527 | NETGEAR Nighthawk M1 operating system command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered on NETGEAR Nighthawk M1 (MR1100) devices before 12.06.03. System commands can be executed, via the web interface, after authentication. NETGEAR Nighthawk M1 (MR1100) The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-202004-0619 | CVE-2019-5303 | plural Huawei Input verification vulnerabilities on smartphones |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.
A denial of service vulnerability exists in versions before Huawei Honor10 Lite Harry-AL00C 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8)
| VAR-201908-0077 | CVE-2019-3639 | McAfee Web Gateway Input validation vulnerability |
CVSS V2: 5.8 CVSS V3: 7.1 Severity: HIGH |
Clickjack vulnerability in Adminstrator web console in McAfee Web Gateway (MWG) 7.8.2.x prior to 7.8.2.12 allows remote attackers to conduct clickjacking attacks via a crafted web page that contains an iframe via does not send an X-Frame-Options HTTP header. McAfee Web Gateway (MWG) Contains an input validation vulnerability.Information may be obtained and information may be altered. The product provides features such as threat protection, application control, and data loss prevention. McAfee MWG 7.8.2.x prior to MWG 7.8.2.12 has a security vulnerability in the administrator web console. Attackers can use this vulnerability to hijack click operations by means of specially crafted web pages with iframe tags
| VAR-201908-0075 | CVE-2019-3635 | McAfee Web Gateway Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
Exfiltration of Data in McAfee Web Gateway (MWG) 7.8.2.x prior to 7.8.2.12 allows attackers to obtain sensitive data via crafting a complex webpage that will trigger the Web Gateway to block the user accessing an iframe. The product provides features such as threat protection, application control, and data loss prevention. A security vulnerability exists in McAfee MWG 7.8.2.x versions prior to 7.8.2.12. An attacker could exploit this vulnerability to obtain sensitive information
| VAR-202004-0618 | CVE-2019-5302 | plural Huawei Input verification vulnerabilities on smartphones |
CVSS V2: 2.9 CVSS V3: 5.3 Severity: MEDIUM |
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.
A denial of service vulnerability exists in Huawei Honor10 Lite Harry-AL00C versions earlier than 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8). The vulnerability stems from the fact that the two fields are not duplicated when parsing
| VAR-201908-1949 | CVE-2019-12103 | TP-Link M7350 Command injection vulnerability in some firmware |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by a pre-authentication command injection vulnerability. TP-Link M7350 Has a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TP-Link M7350 is a portable wireless router device from China Unicom (TP-Link)
| VAR-201908-1068 | CVE-2016-10883 | WordPress simple-add-pages-or-posts plugin cross-site request forgery vulnerability |
CVSS V2: 5.8 CVSS V3: 6.5 Severity: MEDIUM |
The simple-add-pages-or-posts plugin before 1.7 for WordPress has CSRF for deleting users. WordPress for simple-add-pages-or-posts The plug-in contains a cross-site request forgery vulnerability.Information may be tampered with. WordPress is a blogging platform developed by the WordPress Foundation using the PHP language. The platform supports setting up personal blog sites on PHP and MySQL servers. simple-add-pages-or-posts is a plugin that uses one of the pages (posts) to add. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
| VAR-201908-0865 | CVE-2019-13513 | Delta Industrial Automation DOPSoft DPA File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
In Delta Industrial Automation DOPSoft, Version 4.00.06.15 and prior, processing a specially crafted project file may trigger multiple out-of-bounds read vulnerabilities, which may allow information disclosure, remote code execution, or crash of the application. Delta Industrial Automation DOPSoft Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected instances of Delta Industrial Automation DOPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DPA files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Delta Electronics Industrial Automation DOPSoft is a set of human-machine interface (HMI) software from Taiwan's Delta Electronics (Delta Electronics) company. The vulnerability originated when the network system or product performed operations on the memory, and the data boundary was not correctly verified, resulting in an incorrect execution of the associated other memory location. For read and write operations, an attacker can use this vulnerability to cause a buffer overflow or heap overflow
| VAR-201908-1786 | CVE-2019-11207 | TIBCO Software Inc. TIBCO LogLogic Enterprise Virtual Appliance and TIBCO LogLogic Log Management Intelligence Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
The web server component of TIBCO Software Inc.'s TIBCO LogLogic Enterprise Virtual Appliance, and TIBCO LogLogic Log Management Intelligence contains multiple vulnerabilities that theoretically allow persistent and reflected cross-site scripting (XSS) attacks, as well as cross-site request forgery (CSRF) attacks. This issue affects: TIBCO Software Inc. TIBCO LogLogic Enterprise Virtual Appliance version 6.2.1 and prior versions. TIBCO Software Inc. TIBCO LogLogic Log Management Intelligence 6.2.1. TIBCO LogLogic LX825 Appliance 0.0.004, TIBCO LogLogic LX1025 Appliance 0.0.004, TIBCO LogLogic LX4025 Appliance 0.0.004, TIBCO LogLogic MX3025 Appliance 0.0.004, TIBCO LogLogic MX4025 Appliance 0.0.004, TIBCO LogLogic ST1025 Appliance 0.0.004, TIBCO LogLogic ST2025-SAN Appliance 0.0.004, and TIBCO LogLogic ST4025 Appliance 0.0.004 using TIBCO LogLogic Log Management Intelligence versions 6.2.1 and below. TIBCO LogLogic LX1035 Appliance 0.0.005, TIBCO LogLogic LX1025R1 Appliance 0.0.004, TIBCO LogLogic LX1025R2 Appliance 0.0.004, TIBCO LogLogic LX4025R1 Appliance 0.0.004, TIBCO LogLogic LX4025R2 Appliance 0.0.004, TIBCO LogLogic LX4035 Appliance 0.0.005, TIBCO LogLogic ST2025-SANR1 Appliance 0.0.004, TIBCO LogLogic ST2025-SANR2 Appliance 0.0.004, TIBCO LogLogic ST2035-SAN Appliance 0.0.005, TIBCO LogLogic ST4025R1 Appliance 0.0.004, TIBCO LogLogic ST4025R2 Appliance 0.0.004, and TIBCO LogLogic ST4035 Appliance 0.0.005 using TIBCO LogLogic Log Management Intelligence versions 6.2.1 and below. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-201908-1852 | CVE-2019-0338 | SAP Gateway Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
During an OData V2/V4 request in SAP Gateway, versions 750, 751, 752, 753, the HTTP Header attributes cache-control and pragma were not properly set, allowing an attacker to access restricted information, resulting in Information Disclosure. SAP Gateway Contains an information disclosure vulnerability.Information may be obtained. The product supports non-SAP applications to connect to SAP applications, and can also connect and access SAP applications on mobile devices. An attacker could exploit this vulnerability to access restricted information
| VAR-201908-1835 | CVE-2019-10929 | SIMATICS7-1200 and SIMATICS7-1500CPU families Man-in-the-middle attack vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A vulnerability has been identified in SIMATIC CP 1626 (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) (All versions), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V20.8), SIMATIC HMI Panel (incl. SIPLUS variants) (All versions), SIMATIC NET PC Software V14 (All versions < V14 SP1 Update 14), SIMATIC NET PC Software V15 (All versions), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions < V4.4.0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions < V2.8.1), SIMATIC S7-1500 Software Controller (All versions < V20.8), SIMATIC S7-PLCSIM Advanced (All versions < V3.0), SIMATIC STEP 7 (TIA Portal) (All versions < V16), SIMATIC WinCC (TIA Portal) (All versions < V16), SIMATIC WinCC OA (All versions < V3.16 P013), SIMATIC WinCC Runtime Advanced (All versions < V16), SIMATIC WinCC Runtime Professional (All versions < V16), TIM 1531 IRC (incl. SIPLUS NET variants) (All versions < V2.1). Affected devices contain a message protection bypass vulnerability due to certain properties in the calculation used for integrity protection. This could allow an attacker in a Man-in-the-Middle position to modify network traffic sent on port 102/tcp to the affected devices. plural SIMATIC The product contains an access control vulnerability.Information may be tampered with. The Simatic S7-1200 CPU and Simatic S7-1500 CPU series are discrete and continuous control in industrial environments such as manufacturing, food and beverage, and chemical industries. A man-in-the-middle attack vulnerability exists in the SIMATICS7-1200 and SIMATICS7-1500CPU families. The vulnerability could impact the integrity of the communication. No public exploitation of the vulnerability was known at the time of advisory publication. Both Siemens SIMATIC S7-1500 CPU and Siemens SIMATIC S7-1200 are products of Siemens, Germany. SIMATIC S7-1500 CPU is a CPU (central processing unit) module. Siemens SIMATIC S7-1200 is a S7-1200 series PLC (programmable logic controller). This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
| VAR-201908-1834 | CVE-2019-10928 | Siemens SCALANCE SC-600 command injection vulnerability |
CVSS V2: 4.6 CVSS V3: 6.6 Severity: MEDIUM |
A vulnerability has been identified in SCALANCE SC-600 (V2.0). An authenticated attacker with access to port 22/tcp as well as physical access to an affected device may trigger the device to allow execution of arbitrary commands. The security vulnerability could be exploited by an authenticated attacker with physical access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the confidentiality, integrity and availability of the affected device. SCALANCE SC-600 Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Siemens SCALANCE SC-600 is an industrial safety device from Germany's Siemens. This product mainly protects equipment and networks in discrete manufacturing and process industries, and protects industrial communications through mechanisms such as stateful packet inspection firewalls (SPI firewalls) and virtual private networks (VPNs).
Command injection vulnerability exists in Siemens SCALANCE SC-600 V2.0. The vulnerability stems from the fact that the network system or product did not properly filter the special elements in the process of constructing executable commands from external input data. An attacker could use this vulnerability to execute an illegal command. SCALANCE SC firewall is used to protect trusted industrial networks from untrusted networks. It allows filtering of input and output network connections in different ways
| VAR-201908-0260 | CVE-2019-9517 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNIO and Apache Traffic Server Used in HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: httpd24-httpd and httpd24-nghttp2 security update
Advisory ID: RHSA-2019:2949-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2949
Issue date: 2019-10-01
CVE Names: CVE-2019-9511 CVE-2019-9513 CVE-2019-9517
====================================================================
1. Summary:
An update for httpd24-httpd and httpd24-nghttp2 is now available for Red
Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
The httpd packages provide the Apache HTTP Server, a powerful, efficient,
and extensible web server.
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service
(CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource
consumption (CVE-2019-9513)
* HTTP/2: request for large response leads to denial of service
(CVE-2019-9517)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1735741 - CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption
1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service
1741868 - CVE-2019-9517 HTTP/2: request for large response leads to denial of service
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
httpd24-httpd-2.4.34-8.el6.1.src.rpm
httpd24-nghttp2-1.7.1-7.el6.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el6.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el6.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el6.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el6.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el6.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el6.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el6.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
httpd24-httpd-2.4.34-8.el6.1.src.rpm
httpd24-nghttp2-1.7.1-7.el6.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el6.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el6.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el6.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el6.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el6.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el6.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el6.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el6.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el6.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
aarch64:
httpd24-httpd-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.aarch64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.aarch64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.aarch64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_md-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_session-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.aarch64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.aarch64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.aarch64.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
ppc64le:
httpd24-httpd-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.ppc64le.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.ppc64le.rpm
httpd24-nghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.ppc64le.rpm
s390x:
httpd24-httpd-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.s390x.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.s390x.rpm
httpd24-nghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.s390x.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
aarch64:
httpd24-httpd-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.aarch64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.aarch64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.aarch64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.aarch64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_md-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_session-2.4.34-8.el7.1.aarch64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.aarch64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.aarch64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.aarch64.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
ppc64le:
httpd24-httpd-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.ppc64le.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.ppc64le.rpm
httpd24-nghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.ppc64le.rpm
s390x:
httpd24-httpd-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.s390x.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.s390x.rpm
httpd24-nghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.s390x.rpm
x86_64:
httpd24-httpd-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
ppc64le:
httpd24-httpd-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.ppc64le.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.ppc64le.rpm
httpd24-nghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.ppc64le.rpm
s390x:
httpd24-httpd-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.s390x.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.s390x.rpm
httpd24-nghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.s390x.rpm
x86_64:
httpd24-httpd-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
ppc64le:
httpd24-httpd-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.ppc64le.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.ppc64le.rpm
httpd24-nghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.ppc64le.rpm
s390x:
httpd24-httpd-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.s390x.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.s390x.rpm
httpd24-nghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.s390x.rpm
x86_64:
httpd24-httpd-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
ppc64le:
httpd24-httpd-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.ppc64le.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.ppc64le.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.ppc64le.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_md-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_session-2.4.34-8.el7.1.ppc64le.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.ppc64le.rpm
httpd24-nghttp2-1.7.1-7.el7.1.ppc64le.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.ppc64le.rpm
s390x:
httpd24-httpd-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.s390x.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.s390x.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.s390x.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_md-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_session-2.4.34-8.el7.1.s390x.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.s390x.rpm
httpd24-nghttp2-1.7.1-7.el7.1.s390x.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.s390x.rpm
x86_64:
httpd24-httpd-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
httpd24-httpd-2.4.34-8.el7.1.src.rpm
httpd24-nghttp2-1.7.1-7.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.34-8.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.34-8.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.34-8.el7.1.x86_64.rpm
httpd24-libnghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-libnghttp2-devel-1.7.1-7.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_md-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_session-2.4.34-8.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.34-8.el7.1.x86_64.rpm
httpd24-nghttp2-1.7.1-7.el7.1.x86_64.rpm
httpd24-nghttp2-debuginfo-1.7.1-7.el7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9513
https://access.redhat.com/security/cve/CVE-2019-9517
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBXZM+I9zjgjWX9erEAQhZww/+KbkqyDmqC5wyM0PG3/ZbsAg8Odywrvl7
P6oFYg8/Dsb5Tdrf6kZgHb6TFPYRqdptH5WTmLVedjvkvYgOeseVyzUCcjUgxP3S
GjH1rGHQosMyRG82dyB3nexUnjJsDPQZ7kAnT3QS7WwzluY+jzBmQb54nEyfOK+2
Cm7MQbRJGS9igNGWlrbJpWA1caZkLDWpXxBNwmf1lh6LR/xOlbbEn3OnU4VFnIeI
dbqAOP8DXSMvTFDvUuqZTJw2IjnWAYm2CJ3hi/BdRiAbsRtiIjFrQ3A3EaObt3ip
P+FEXawj7/NzwMEFZu5Los+bJBH21Gdr44d0iS1FQYYC41rz0g1KVHizFVkFT2Hh
m2YI65XlEd393dQMCtfrZIArZt87dBkU4JCBvKPYQ9+cF3PMR5ZzHSI2iSJ67iZM
TWxkZv5mrI7DXZooOMfrW7aX8eyKk9PZy/iU24Iu8rJ4d9WZto9oDXZb4RwrurfV
2HB7wOpDz3duWsCJojE8lbpWJ8PswajfaruJq/jX7Za++v7F7GyTbSOgsAQAfDY2
XUTGiYzbrZmaIKaP3REWwTn+xTJBh8mqvUA2E+KvZzSn8fBEry8GIUsIKmxxzsz2
uqDSPyZ4Q5UO1nwLXpghkz/S1/JJztzbpLn1BJuISsTmR12R5a2Zrd8wcqpn9SOl
I52/ZH/L3O8=N7om
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. JIRA issues fixed (https://issues.jboss.org/):
JBCS-828 - Rebase nghttp2 to 1.39.2
6.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release.
Installation instructions are available from the Fuse 7.6.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/
4. Bugs fixed (https://bugzilla.redhat.com/):
1399546 - CVE-2015-9251 js-jquery: Cross-site scripting via cross-domain ajax requests
1432858 - CVE-2017-5929 logback: Serialization vulnerability in SocketServer and ServerSocketReceiver
1591854 - CVE-2017-16012 js-jquery: XSS in responses from cross-origin ajax requests
1618573 - CVE-2018-11771 apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
1643043 - CVE-2018-15756 springframework: DoS Attack via Range Requests
1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
1709860 - CVE-2019-5427 c3p0: loading XML configuration leads to denial of service
1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
This release serves as a replacement for Red Hat JBoss Core Services Pack
Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the
Release Notes for information on the most significant bug fixes and
enhancements included in this release. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ
Artemis. It uses an asynchronous journal for fast message persistence, and
supports multiple languages, protocols, and platforms. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link (you must
log in to download the update). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201909-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Apache: Multiple vulnerabilities
Date: September 06, 2019
Bugs: #692172
ID: 201909-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Apache, the worst of which
could result in a Denial of Service condition.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/apache < 2.4.41 >= 2.4.41
Description
===========
Multiple vulnerabilities have been discovered in Apache. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.41"
References
==========
[ 1 ] CVE-2019-10081
https://nvd.nist.gov/vuln/detail/CVE-2019-10081
[ 2 ] CVE-2019-10082
https://nvd.nist.gov/vuln/detail/CVE-2019-10082
[ 3 ] CVE-2019-10092
https://nvd.nist.gov/vuln/detail/CVE-2019-10092
[ 4 ] CVE-2019-10097
https://nvd.nist.gov/vuln/detail/CVE-2019-10097
[ 5 ] CVE-2019-10098
https://nvd.nist.gov/vuln/detail/CVE-2019-10098
[ 6 ] CVE-2019-9517
https://nvd.nist.gov/vuln/detail/CVE-2019-9517
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201909-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
.
CVE-2019-9517
Jonathan Looney reported that a malicious client could perform a
denial of service attack (exhausting h2 workers) by flooding a
connection with requests and basically never reading responses on
the TCP connection.
CVE-2019-10081
Craig Young reported that HTTP/2 PUSHes could lead to an overwrite
of memory in the pushing request's pool, leading to crashes.
CVE-2019-10082
Craig Young reported that the HTTP/2 session handling could be made
to read memory after being freed, during connection shutdown.
CVE-2019-10092
Matei "Mal" Badanoiu reported a limited cross-site scripting
vulnerability in the mod_proxy error page.
CVE-2019-10097
Daniel McCarney reported that when mod_remoteip was configured to
use a trusted intermediary proxy server using the "PROXY" protocol,
a specially crafted PROXY header could trigger a stack buffer
overflow or NULL pointer deference. This vulnerability could only be
triggered by a trusted proxy and not by untrusted HTTP clients. The
issue does not affect the stretch release.
CVE-2019-10098
Yukitsugu Sasaki reported a potential open redirect vulnerability in
the mod_rewrite module.
For the oldstable distribution (stretch), these problems have been fixed
in version 2.4.25-3+deb9u8.
For the stable distribution (buster), these problems have been fixed in
version 2.4.38-3+deb10u1.
We recommend that you upgrade your apache2 packages.
For the detailed security status of apache2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/apache2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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v6GC
-----END PGP SIGNATURE-----
| VAR-201908-1967 | CVE-2019-10927 | plural SCALANCE Product vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability has been identified in SCALANCE SC-600 (V2.0), SCALANCE XB-200 (V4.1), SCALANCE XC-200 (V4.1), SCALANCE XF-200BA (V4.1), SCALANCE XP-200 (V4.1), SCALANCE XR-300WG (V4.1). An authenticated attacker with network access to to port 22/tcp of an affected device may cause a Denial-of-Service condition. The security vulnerability could be exploited by an authenticated attacker with network access to the affected device. No user interaction is required to exploit this vulnerability. The vulnerability impacts the availability of the affected device. plural SCALANCE There are unspecified vulnerabilities in the product.Service operation interruption (DoS) It may be in a state. SCALANCE SC firewall is used to protect trusted industrial networks from untrusted networks. It allows filtering of input and output network connections in different ways. SCALANCE X switches a are used to connect industrial components such as programmable logic controllers (PLCs) or human machine interfaces (HMIs). A denial of service vulnerability exists in several Siemens products. Siemens SCALANCE SC-600, etc. are all products of Siemens (Siemens) in Germany. Siemens SCALANCE SC-600 is an industrial security device. SCALANCE XB-200 is a managed industrial Ethernet switch. SCALANCE XR-300WG is a rack-mounted managed switch. The vulnerability stems from the failure of the network system or product to properly validate the input data. 1 version, SCALANCE XR-300WG V4.1 version
| VAR-201908-0654 | CVE-2019-14984 | eQ-3 Homematic CCU2 and CCU3 Command injection vulnerability |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request. eQ-3 Homematic CCU2 and CCU3 Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both eQ-3 Homematic CCU3 and eQ-3 Homematic CCU2 are central control units of a smart home system produced by German eQ-3 company. A command injection vulnerability exists in the eQ-3 Homematic CCU2 and CCU3. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data. Attackers can exploit this vulnerability to execute illegal commands