VARIoT IoT vulnerabilities database
| VAR-201905-0862 | CVE-2018-4073 | Sierra Wireless AirLink ES450 Firmware vulnerabilities related to authorization, authority, and access control |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The the binary the endpoint /cgi-bin/Embeded_Ace_TLSet_Task.cgi is a very similar endpoint that is designed for use with setting table values that can cause an arbitrary setting writes, resulting in the unverified changes to any system setting. An attacker can make an authenticated HTTP request, or run the binary as any user, to trigger this vulnerability. Sierra Wireless AirLink ES450 Firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Sierra Wireless AirLink ES450 is a cellular network modem device from Sierra Wireless Canada. An attacker could exploit this vulnerability by sending specially crafted HTTP requests to change other users' passwords, enable or disable services, and change arbitrary configuration settings
| VAR-201905-0861 | CVE-2018-4072 | Sierra Wireless AirLink ES450 Firmware vulnerabilities related to authorization, authority, and access control |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable Permission Assignment vulnerability exists in the ACEManager EmbeddedAceSet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The EmbeddedAceSet_Task.cgi executable is used to change MSCII configuration values within the configuration manager of the AirLink ES450. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_Set_Task.cgi endpoint. Sierra Wireless AirLink ES450 Firmware contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The SierraWirelessAirLinkES450 is a cellular network modem device from Sierra Wireless, Canada. A security vulnerability exists in the ACEManagerEmbeddedAceSet_Task.cgi feature in the SierraWirelessAirLinkES450 using firmware version 4.9.3. An attacker could exploit the vulnerability to change other user passwords by sending a specially crafted HTTP request, enable or disable the service, and change any configuration settings
| VAR-201905-0857 | CVE-2018-4068 | Sierra Wireless AirLink ES450 Information disclosure vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability. The SierraWirelessAirLinkES450 is a cellular network modem device from Sierra Wireless, Canada. Unauthorized attackers can exploit the vulnerability to obtain sensitive information about the affected component. This vulnerability stems from configuration errors in network systems or products during operation
| VAR-201905-0858 | CVE-2018-4069 |
Sierra Wireless AirLink ES450 Information Disclosure Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201904-0009 |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An information disclosure vulnerability exists in the ACEManager authentication functionality of Sierra Wireless AirLink ES450 FW 4.9.3. The ACEManager authentication functionality is done in plaintext XML to the web server. An attacker can listen to network traffic upstream from the device to capitalize on this vulnerability. The SierraWirelessAirLinkES450 is a cellular network modem device from Sierra Wireless, Canada. A command-injection vulnerability
2. A security-bypass vulnerability
3. A remote code-execution vulnerability
4. An cross-site scripting vulnerability
5. A cross-site request-forgery vulnerability
6. Multiple information disclosure vulnerabilities
An attacker may leverage these issues to execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information, perform certain administrative actions and gain unauthorized access to the affected application, execute arbitrary code, execute arbitrary commands with system-level privileges, This may aid in further attacks
| VAR-201910-1514 | CVE-2018-4064 |
Sierra Wireless AirLink ES450 FW Authentication vulnerability
Related entries in the VARIoT exploits database: VAR-E-201904-0010 |
CVSS V2: 5.5 CVSS V3: 7.1 Severity: HIGH |
An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. The SierraWirelessAirLinkES450 is a cellular network modem device from Sierra Wireless, Canada. An unauthorized password modification vulnerability exists in the ACEManagerupload.cgi feature in the SierraWirelessAirLinkES450 using version 4.9.3 of the firmware
| VAR-201904-0976 | CVE-2018-19442 | Neato Botvac Connected Buffer error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a vendors/neato/robots/[robot_serial]/messages Neato cloud URI on the nucleo.neatocloud.com web site (port 4443). Neato Botvac Connected Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Neato Robotics Neato Botvac Connected is a cleaning robot from Neato Robotics in the United States. The 'Network::AuthenticationClient::VerifySignature' function of Neato Robotics Neato Botvac Connected 2.2.0 has a buffer overflow vulnerability. Data boundary, resulting in erroneous reads and writes to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201904-0566 | CVE-2018-14993 | ASUS Zenfone V Live Android Command injection vulnerability in devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The ASUS Zenfone V Live Android device with a build fingerprint of asus/VZW_ASUS_A009/ASUS_A009:7.1.1/NMF26F/14.0610.1802.78-20180313:user/release-keys and the Asus ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys both contain a pre-installed platform app with a package name of com.asus.splendidcommandagent (versionCode=1510200090, versionName=1.2.0.18_160928) that contains an exported service named com.asus.splendidcommandagent.SplendidCommandAgentService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, obtain the user's text messages, and more. ASUS Zenfone V Live and Asus ZenFone 3 Max are both smartphones based on the Android platform of Taiwan's ASUS (ASUS).
ASUS Zenfone V Live (build fingerprint is asus/VZW_ASUS_A009/ASUS_A009:7.1.1/NMF26F/14.0610.1802.78-20180313:user/release-keys) and Asus ZenFone 3 Max (build fingerprint is asus/US_Phone/ASUS_X008_1:7.0/NRD90M /US_Phone-14.14.1711.92-20171208: user/release-keys) has a security vulnerability in the com.asus.splendidcommandagent package (versionCode=1510200090, versionName=1.2.0.18_160928)
| VAR-201904-0573 | CVE-2018-14980 | ASUS Asus ZenFone 3 Max command injection vulnerability |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains the android framework (i.e., system_server) with a package name of android (versionCode=24, versionName=7.0) that has been modified by ASUS or another entity in the supply chain. The system_server process in the core android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage (i.e., sdcard). The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device. ASUS Asus ZenFone 3 Max is a smartphone based on the Android platform of the Taiwanese company Asus (ASUS).
ASUS ZenFone 3 Max (build fingerprint is asus/US_Phone/ASUS_X008_1: 7.0/NRD90M/US_Phone-14.14.1711.92-20171208: user/release-keys) there is a security vulnerability. Attackers can use this vulnerability to take screenshots, obtain information or remove notifications
| VAR-201904-0690 | CVE-2018-14559 | plural Tenda Buffer error vulnerability in product firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A buffer overflow vulnerability exists in the router's web server (httpd). When processing the list parameters for a post request, the value is directly written with sprintf to a local variable placed on the stack, which overrides the return address of the function, causing a buffer overflow. Tenda AC7 , AC9 , AC10 The firmware contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Tenda AC7 and others are all wireless routers from China's Tenda. This vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be associated with other memory locations
| VAR-201910-1646 | CVE-2018-5743 | ISC BIND 9 Multiple vulnerabilities in |
CVSS V2: 7.8 CVSS V3: 5.3 Severity: Medium |
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743. ISC BIND 9 Contains the following multiple vulnerabilities: *TCP The number of client connections is not limited as configured - CVE-2018-5743 *nxdomain-redirect Due to lack of functions query.c In Assertion Failure Occurs - CVE-2019-6467 *nxdomain-redirect Due to lack of functions Assertion Failure Occurs - CVE-2019-6468The expected impact depends on each vulnerability, but can be affected as follows: * By attacker named File descriptors will be depleted, adversely affecting network connectivity and log and zone journal file management - CVE-2018-5743 *nxdomain-redirect If the function is enabled, an attacker may interfere with service operation (DoS) Attacked - CVE-2019-6467, CVE-2019-6468. ISC BIND is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause a denial-of-service condition. ISC BIND is a set of open source software developed by ISC Corporation in the United States that implements the DNS protocol. An attacker could exploit this vulnerability to run out of file descriptors, affecting network connections and file management.
ISC.org has confirmed the vulnerability and released software updates. ==========================================================================
Ubuntu Security Notice USN-3956-1
April 25, 2019
bind9 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Bind could be made to consume resources if it received specially crafted
network traffic. A remote attacker could possibly use this issue
to cause Bind to consume resources, leading to a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
bind9 1:9.11.5.P1+dfsg-1ubuntu2.3
Ubuntu 18.10:
bind9 1:9.11.4+dfsg-3ubuntu5.3
Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.7
Ubuntu 16.04 LTS:
bind9 1:9.10.3.dfsg.P4-8ubuntu1.14
In general, a standard system update will make all the necessary changes.
CVE-2018-5745
The "managed-keys" feature was susceptible to denial of service by
triggering an assert.
CVE-2019-6465
ACLs for zone transfers were incorrectly enforced for dynamically
loadable zones (DLZs).
For the stable distribution (stretch), these problems have been fixed in
version 1:9.10.3.dfsg.P4-12.3+deb9u5.
We recommend that you upgrade your bind9 packages.
For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlzUio4ACgkQEMKTtsN8
Tjb1uw/+MdjOu171QHxImVOxln3m0yQUVlBq1LLq5JuiFgPffYu0lVUTujBGINia
T6DUFWnO5Ct7I+B4LIEXTpAY7UYTaBnt8cWxkGqacDxwG21wanJ+EWgo9NtfNmfw
s6Zh1rfBDkvDT1OsOcmw8nuisyvZsWvZrNP+2mzfCTSm7jaqVLp1MfJZDBmXPlAF
VoPvAwDO/XjDxQDUcxwCxRu590pbHrS5Fdi+9IN81Vd/MaKwebsQ4MFtLE5J1miU
nnzWDT7V8JbLFj4KzFn7ugLTVw4e/lLXK3h+Qsssxa5o0emNPRz21q6HqTeFB8sg
pT4F7krQq1lbEI1viTqXChK4Slj6uEnagt0WOzoJ+SLpcY9pojoVabivFf3UNXg7
ceflAcb9jdm1M7KCYy34XCMMwrFiwr078NTj5+158qrXX/I7ydFTkJLCmDrqcKfP
sF738m0XuhnPunycZk6SFZpoRi+bZlbs6oEXyBU3QgFKjz/qkgCdXUC0TO6wxAed
QkeSksPO5/Hwegr/UYDnB77htWmOaXUllDlGicGseFWe0GoeYr0p8AWIUnb1cCa4
YwtNJzEqK0TrN73IWFQd6YJxMxNajRXItnuijxon6vtjCTu+/8ROujqfNz9EYJZ2
85aJ/noHLePNV4MBka0kSBapZRocrcNKjKX8QMDb8N1nEvjSl8k=
=VAvv
-----END PGP SIGNATURE-----
.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/bind-9.11.6_P1-i586-1_slack14.2.txz: Upgraded.
This update fixes a security issue:
The TCP client quota set using the tcp-clients option could be exceeded
in some cases. This could lead to exhaustion of file descriptors.
For more information, see:
https://kb.isc.org/docs/cve-2018-5743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/bind-9.11.6_P1-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/bind-9.11.6_P1-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.1.txz
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/bind-9.11.6_P1-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/bind-9.11.6_P1-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/bind-9.14.1-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/bind-9.14.1-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 package:
d6835a3a22d339df9ca0afd5ab8561bc bind-9.11.6_P1-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
892265f47674a12362bf821dab2cc9fa bind-9.11.6_P1-x86_64-1_slack14.0.txz
Slackware 14.1 package:
4c55681ae3fb61df7d1af3c92fc53db5 bind-9.11.6_P1-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
932435bf42a652149c5d7a68267696f1 bind-9.11.6_P1-x86_64-1_slack14.1.txz
Slackware 14.2 package:
65779b9f25e221aa3bb1726e331218d4 bind-9.11.6_P1-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
a6b8c6ea2b4abd53b9cb21a77ffc93b7 bind-9.11.6_P1-x86_64-1_slack14.2.txz
Slackware -current package:
c1f720dd751a405a60b8e6b59dcb3279 n/bind-9.14.1-i586-1.txz
Slackware x86_64 -current package:
65a617602a5e83d626d1a7045f346cf4 n/bind-9.14.1-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg bind-9.11.6_P1-i586-1_slack14.2.txz
Then, restart the name server:
# /etc/rc.d/rc.bind restart
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. 6) - i386, x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: bind security update
Advisory ID: RHSA-2019:1294-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:1294
Issue date: 2019-05-29
CVE Names: CVE-2018-5743
====================================================================
1. Summary:
An update for bind is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted
automatically.
5. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
bind-9.9.4-74.el7_6.1.src.rpm
noarch:
bind-license-9.9.4-74.el7_6.1.noarch.rpm
x86_64:
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-9.9.4-74.el7_6.1.i686.rpm
bind-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.i686.rpm
bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm
bind-utils-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bind-9.9.4-74.el7_6.1.x86_64.rpm
bind-chroot-9.9.4-74.el7_6.1.x86_64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-devel-9.9.4-74.el7_6.1.i686.rpm
bind-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.i686.rpm
bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
bind-9.9.4-74.el7_6.1.src.rpm
noarch:
bind-license-9.9.4-74.el7_6.1.noarch.rpm
x86_64:
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-9.9.4-74.el7_6.1.i686.rpm
bind-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.i686.rpm
bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm
bind-utils-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bind-9.9.4-74.el7_6.1.x86_64.rpm
bind-chroot-9.9.4-74.el7_6.1.x86_64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-devel-9.9.4-74.el7_6.1.i686.rpm
bind-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.i686.rpm
bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
bind-9.9.4-74.el7_6.1.src.rpm
noarch:
bind-license-9.9.4-74.el7_6.1.noarch.rpm
ppc64:
bind-9.9.4-74.el7_6.1.ppc64.rpm
bind-chroot-9.9.4-74.el7_6.1.ppc64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.ppc.rpm
bind-debuginfo-9.9.4-74.el7_6.1.ppc64.rpm
bind-libs-9.9.4-74.el7_6.1.ppc.rpm
bind-libs-9.9.4-74.el7_6.1.ppc64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.ppc.rpm
bind-libs-lite-9.9.4-74.el7_6.1.ppc64.rpm
bind-utils-9.9.4-74.el7_6.1.ppc64.rpm
ppc64le:
bind-9.9.4-74.el7_6.1.ppc64le.rpm
bind-chroot-9.9.4-74.el7_6.1.ppc64le.rpm
bind-debuginfo-9.9.4-74.el7_6.1.ppc64le.rpm
bind-libs-9.9.4-74.el7_6.1.ppc64le.rpm
bind-libs-lite-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.ppc64le.rpm
bind-utils-9.9.4-74.el7_6.1.ppc64le.rpm
s390x:
bind-9.9.4-74.el7_6.1.s390x.rpm
bind-chroot-9.9.4-74.el7_6.1.s390x.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390x.rpm
bind-libs-9.9.4-74.el7_6.1.s390.rpm
bind-libs-9.9.4-74.el7_6.1.s390x.rpm
bind-libs-lite-9.9.4-74.el7_6.1.s390.rpm
bind-libs-lite-9.9.4-74.el7_6.1.s390x.rpm
bind-utils-9.9.4-74.el7_6.1.s390x.rpm
x86_64:
bind-9.9.4-74.el7_6.1.x86_64.rpm
bind-chroot-9.9.4-74.el7_6.1.x86_64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-9.9.4-74.el7_6.1.i686.rpm
bind-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.i686.rpm
bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpm
bind-utils-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
bind-9.9.4-74.el7_6.1.src.rpm
aarch64:
bind-9.9.4-74.el7_6.1.aarch64.rpm
bind-chroot-9.9.4-74.el7_6.1.aarch64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.aarch64.rpm
bind-libs-9.9.4-74.el7_6.1.aarch64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.aarch64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.aarch64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.aarch64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.aarch64.rpm
bind-utils-9.9.4-74.el7_6.1.aarch64.rpm
noarch:
bind-license-9.9.4-74.el7_6.1.noarch.rpm
ppc64le:
bind-9.9.4-74.el7_6.1.ppc64le.rpm
bind-chroot-9.9.4-74.el7_6.1.ppc64le.rpm
bind-debuginfo-9.9.4-74.el7_6.1.ppc64le.rpm
bind-libs-9.9.4-74.el7_6.1.ppc64le.rpm
bind-libs-lite-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.ppc64le.rpm
bind-utils-9.9.4-74.el7_6.1.ppc64le.rpm
s390x:
bind-9.9.4-74.el7_6.1.s390x.rpm
bind-chroot-9.9.4-74.el7_6.1.s390x.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390x.rpm
bind-libs-9.9.4-74.el7_6.1.s390.rpm
bind-libs-9.9.4-74.el7_6.1.s390x.rpm
bind-libs-lite-9.9.4-74.el7_6.1.s390.rpm
bind-libs-lite-9.9.4-74.el7_6.1.s390x.rpm
bind-utils-9.9.4-74.el7_6.1.s390x.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bind-debuginfo-9.9.4-74.el7_6.1.ppc.rpm
bind-debuginfo-9.9.4-74.el7_6.1.ppc64.rpm
bind-devel-9.9.4-74.el7_6.1.ppc.rpm
bind-devel-9.9.4-74.el7_6.1.ppc64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.ppc.rpm
bind-lite-devel-9.9.4-74.el7_6.1.ppc64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.ppc64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.ppc.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.ppc64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.ppc.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.ppc64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.ppc64.rpm
bind-sdb-9.9.4-74.el7_6.1.ppc64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.ppc64.rpm
ppc64le:
bind-debuginfo-9.9.4-74.el7_6.1.ppc64le.rpm
bind-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-lite-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-sdb-9.9.4-74.el7_6.1.ppc64le.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.ppc64le.rpm
s390x:
bind-debuginfo-9.9.4-74.el7_6.1.s390.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390x.rpm
bind-devel-9.9.4-74.el7_6.1.s390.rpm
bind-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-lite-devel-9.9.4-74.el7_6.1.s390.rpm
bind-lite-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.s390.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.s390.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.s390x.rpm
bind-sdb-9.9.4-74.el7_6.1.s390x.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.s390x.rpm
x86_64:
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-devel-9.9.4-74.el7_6.1.i686.rpm
bind-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.i686.rpm
bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
bind-debuginfo-9.9.4-74.el7_6.1.aarch64.rpm
bind-devel-9.9.4-74.el7_6.1.aarch64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.aarch64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.aarch64.rpm
bind-sdb-9.9.4-74.el7_6.1.aarch64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.aarch64.rpm
ppc64le:
bind-debuginfo-9.9.4-74.el7_6.1.ppc64le.rpm
bind-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-lite-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.ppc64le.rpm
bind-sdb-9.9.4-74.el7_6.1.ppc64le.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.ppc64le.rpm
s390x:
bind-debuginfo-9.9.4-74.el7_6.1.s390.rpm
bind-debuginfo-9.9.4-74.el7_6.1.s390x.rpm
bind-devel-9.9.4-74.el7_6.1.s390.rpm
bind-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-lite-devel-9.9.4-74.el7_6.1.s390.rpm
bind-lite-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.s390.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.s390.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.s390x.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.s390x.rpm
bind-sdb-9.9.4-74.el7_6.1.s390x.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.s390x.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
bind-9.9.4-74.el7_6.1.src.rpm
noarch:
bind-license-9.9.4-74.el7_6.1.noarch.rpm
x86_64:
bind-9.9.4-74.el7_6.1.x86_64.rpm
bind-chroot-9.9.4-74.el7_6.1.x86_64.rpm
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-9.9.4-74.el7_6.1.i686.rpm
bind-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-libs-lite-9.9.4-74.el7_6.1.i686.rpm
bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpm
bind-utils-9.9.4-74.el7_6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bind-debuginfo-9.9.4-74.el7_6.1.i686.rpm
bind-debuginfo-9.9.4-74.el7_6.1.x86_64.rpm
bind-devel-9.9.4-74.el7_6.1.i686.rpm
bind-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-lite-devel-9.9.4-74.el7_6.1.i686.rpm
bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpm
bind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm
bind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-5743
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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2g+S
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201904-0309 | CVE-2019-3721 | Dell EMC Open Manage System Administrator Vulnerable to resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Dell EMC Open Manage System Administrator (OMSA) versions prior to 9.3.0 contain an Improper Range Header Processing Vulnerability. A remote unauthenticated attacker may send crafted requests with overlapping ranges to cause the application to compress each of the requested bytes, resulting in a crash due to excessive memory consumption and preventing users from accessing the system.
Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve arbitrary files from the affected system in the context of the application and cause denial-of-service condition. The solution supports online diagnosis, system operation detection, equipment management, etc
| VAR-201904-0308 | CVE-2019-3720 | Dell EMC Open Manage System Administrator Path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Dell EMC Open Manage System Administrator (OMSA) versions prior to 9.3.0 contain a Directory Traversal Vulnerability. A remote authenticated malicious user with admin privileges could potentially exploit this vulnerability to gain unauthorized access to the file system by exploiting insufficient sanitization of input parameters.
Remote attackers may use a specially crafted request with directory-traversal sequences ('../') to retrieve arbitrary files from the affected system in the context of the application and cause denial-of-service condition. The solution supports online diagnosis, system operation detection, equipment management, etc. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories
| VAR-201904-1023 | CVE-2019-10955 | plural Rockwell Automation Open redirect vulnerability in products |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine. plural Rockwell Automation The product contains an open redirect vulnerability.Information may be obtained and information may be altered. Rockwell Automation MicroLogix 1400 Controllers Series A are all programmable logic controllers from Rockwell Automation. An input validation error vulnerability exists in several Rockwell Automation products that originated from a network system or product that did not properly validate the input data. An attacker exploiting a vulnerability can build a well-designed URI and entice a user to follow it. When a victim tracks a link, they may be redirected to an attacker-controlled site to aid in phishing attacks. Other attacks are possible
| VAR-201904-1127 | CVE-2019-10710 | Hisilicon Hi3510 Permission vulnerability in firmware |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
Insecure permissions in the Web management portal on all IP cameras based on Hisilicon Hi3510 firmware allow authenticated attackers to receive a network's cleartext WiFi credentials via a specific HTTP request. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc. Hisilicon Hi3510 There is a permission vulnerability in the firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Hisilicon Hi3510 is a firmware used by an IP camera of Hisilicon in China. There is a security vulnerability in the web management portal in the Hisilicon Hi3510 firmware. Attackers can use HTTP requests to exploit this vulnerability to obtain network WiFi passwords in clear text. The following manufacturers are affected: LOOSAFE; LEVCOECAM; Sywstoda; BESDER; WUSONGLUSAN; GADINAN;
| VAR-201904-0641 | CVE-2018-17169 | PrinterOn In XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 7.7 Severity: HIGH |
An XML external entity (XXE) vulnerability in PrinterOn version 4.1.4 and lower allows remote authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request. PrinterOn Is XML An external entity vulnerability exists.Information may be obtained
| VAR-201904-1101 | CVE-2019-10688 | UCS Software and Better Together over Ethernet Connector Vulnerabilities related to the use of hard-coded credentials |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
VVX products with software versions including and prior to, UCS 5.9.2 with Better Together over Ethernet Connector (BToE) application 3.9.1, use hard-coded credentials to establish connections between the host application and the device. Polycom UC Software is prone to a local information-disclosure vulnerability.
Local attackers can exploit this issue to gain sensitive information from the affected application
| VAR-201904-1020 | CVE-2019-10950 | plural Fujifilm Authentication vulnerabilities in products |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X provide insecure telnet services that lack authentication requirements. An attacker who successfully exploits this vulnerability may be able to access the underlying operating system. Fujifilm CR-IR357FCRCarbonX and others are all radioactive medical image reading devices of Fujifilm Corporation of Japan. Fujifilm FCR Capsula X/Carbon X are prone to a denial-of-service vulnerability and an access-bypass vulnerability.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions or cause a denial-of-service condition. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products
| VAR-201904-1018 | CVE-2019-10948 | plural Fujifilm Product depletion vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Fujifilm FCR Capsula X/ Carbon X/ FCR XC-2, model versions CR-IR 357 FCR Carbon X, CR-IR 357 FCR XC-2, FCR-IR 357 FCR Capsula X are susceptible to a denial-of-service condition as a result of an overflow of TCP packets, which requires the device to be manually rebooted. Fujifilm CR-IR357FCRCarbonX and others are all radioactive medical image reading devices of Fujifilm Corporation of Japan. A resource management error vulnerability exists in FujifilmCR-IR357FCRCarbonX, FCRXC-2, and FCRCapsulaX that could be exploited by an attacker to cause a denial of service. Fujifilm FCR Capsula X/Carbon X are prone to a denial-of-service vulnerability and an access-bypass vulnerability.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions or cause a denial-of-service condition. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
| VAR-201904-0615 | CVE-2018-1360 | Fortinet FortiManager Vulnerable to information disclosure |
CVSS V2: 4.3 CVSS V3: 8.1 Severity: HIGH |
A cleartext transmission of sensitive information vulnerability in Fortinet FortiManager 5.2.0 through 5.2.7, 5.4.0 and 5.4.1 may allow an unauthenticated attacker in a man in the middle position to retrieve the admin password via intercepting REST API JSON responses. Fortinet FortiManager Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fortinet FortiManager is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.
Fortinet FortiManager versions 5.2.0 through 5.2.7, 5.4.0 and 5.4.1 are vulnerable. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management
| VAR-201904-1316 | CVE-2018-20818 | OpenPLC Buffer Overflow Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A buffer overflow vulnerability was discovered in the OpenPLC controller, in the OpenPLC_v2 and OpenPLC_v3 versions. It occurs in the modbus.cpp mapUnusedIO() function, which can cause a runtime crash of the PLC or possibly have unspecified other impact. OpenPLC_v2 and OpenPLC_v3 Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. OpenPLC is an open source programmable logic controller. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations