VARIoT IoT vulnerabilities database
| VAR-201901-0387 | CVE-2016-4642 | plural Apple In product HTTP Vulnerabilities where a proxy incorrectly reports that it has received authentication information |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, proxy authentication incorrectly reported HTTP proxies received credentials securely. This issue was addressed through improved warnings
| VAR-201901-0379 | CVE-2016-4644 | plural Apple Downgraded vulnerabilities in products |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a downgrade issue existed with HTTP authentication credentials saved in Keychain. This issue was addressed by storing the authentication types with the credentials. Apple iOS, tvOS, and OS X El Capitan are all products of Apple Inc. in the United States. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; OS X El Capitan is a dedicated operating system developed for Mac computers. CFNetwork Proxies is one of the components used to handle proxy connection response issues. An attacker could exploit this vulnerability to disclose sensitive user information
| VAR-201901-0378 | CVE-2016-4643 | plural Apple In product 407 Response parsing vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a validation issue existed in the parsing of 407 responses. This issue was addressed through improved response validation. in the United States. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; OS X El Capitan is a dedicated operating system developed for Mac computers. CFNetwork Proxies is one of the components used to handle proxy connection response issues. An attacker could exploit this vulnerability to disclose sensitive user information
| VAR-201901-0457 | CVE-2018-12167 | Intel(R) Optane(TM) SSD DC P4800X Input validation vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Firmware update routine in bootloader for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Optane(TM) SSD DC P4800X Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. IntelOptaneSSDDCP4800X is a solid state drive from Intel Corporation of the United States. A security vulnerability exists in the firmware update subroutine of the bootloader in previous versions of IntelOptaneSSDDCP4800XE2010435. A local attacker can exploit this vulnerability to cause a denial of service
| VAR-201901-0456 | CVE-2018-12166 | Intel(R) Optane(TM) SSD DC P4800X Input validation vulnerability |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Insufficient write protection in firmware for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Optane(TM) SSD DC P4800X Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. IntelOptaneSSDDCP4800X is a solid state drive from Intel Corporation of the United States. A security vulnerability exists in the firmware in previous versions of IntelOptaneSSDDCP4800XE2010435 due to a program failing to write protect. A local attacker can exploit this vulnerability to cause a denial of service
| VAR-201901-0858 | CVE-2018-19027 | OMRON CX-One CX-Protocol CObject Type Confusion Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions
| VAR-201901-0856 | CVE-2018-19021 | Emerson DeltaV Distributed Control System Authentication Bypass Vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
A specially crafted script could bypass the authentication of a maintenance port of Emerson DeltaV DCS Versions 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior, which may allow an attacker to cause a denial of service. Emerson DeltaV DCS Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. The Emerson DeltaV Distributed Control System is an automated distributed control system from Emerson Electric. The system includes network security management, alarm management, batch control and change management. Emerson DeltaV is prone to an authentication-bypass vulnerability.
DeltaV Distributed Control System 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior are vulnerable
| VAR-201901-0860 | CVE-2018-18985 | plural Tridium Niagara Product Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality. plural Tridium Niagara Product Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Multiple Tridium Products are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
| VAR-201904-0637 | CVE-2018-13810 | CP 1604 and CP 1616 Vulnerable to cross-site request forgery |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known. CP 1604 and CP 1616 Contains a cross-site request forgery vulnerability.Information may be tampered with. The SIEMENS CP1604 is used to connect a PCI-104 system to PROFINET IO. The SIEMENS CP1616 is an innovative product that is installed in a PC for PROFINET communication. Siemens CP1604 and CP1616 are prone to following security vulnerabilities:
1. An information disclosure vulnerability
2. A cross-site-scripting vulnerability
3. A cross-site request-forgery vulnerability
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary code or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
The following products and versions are vulnerable:
All versions prior to Siemens CP1604 2.8
All versions prior to Siemens CP1616 2.8. The vulnerability stems from the fact that the WEB application does not fully verify whether the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client
| VAR-201904-0635 | CVE-2018-13808 | CP 1604 and CP 1616 Vulnerable to information disclosure |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known. CP 1604 and CP 1616 Contains an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. The SIEMENS CP1604 is used to connect a PCI-104 system to PROFINET IO. The SIEMENS CP1616 is an innovative product that is installed in a PC for PROFINET communication. A denial of service vulnerability exists in the SIEMENS CP1604 and CP1616 devices. Siemens CP1604 and CP1616 are prone to following security vulnerabilities:
1. An information disclosure vulnerability
2. A cross-site-scripting vulnerability
3. A cross-site request-forgery vulnerability
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary code or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
The following products and versions are vulnerable:
All versions prior to Siemens CP1604 2.8
All versions prior to Siemens CP1616 2.8
| VAR-201904-0636 | CVE-2018-13809 | CP 1604 and CP 1616 Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated web server of the affected CP devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into following a malicious link. User interaction is required for a successful exploitation. At the time of advisory publication no public exploitation of this vulnerability was known. CP 1604 and CP 1616 Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The SIEMENS CP1604 is used to connect a PCI-104 system to PROFINET IO. The SIEMENS CP1616 is an innovative product that is installed in a PC for PROFINET communication. A cross-site scripting vulnerability exists in the SIEMENS CP1604 and CP1616 devices. An attacker could exploit a vulnerability to make a trusted user spoofed to track a malicious link. Siemens CP1604 and CP1616 are prone to following security vulnerabilities:
1. An information disclosure vulnerability
2. A cross-site-scripting vulnerability
3. A cross-site request-forgery vulnerability
Attackers can exploit these issues to obtain sensitive information, or execute arbitrary code or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks.
The following products and versions are vulnerable:
All versions prior to Siemens CP1604 2.8
All versions prior to Siemens CP1616 2.8. The vulnerability stems from the lack of correct verification of client data in WEB applications
| VAR-201904-0659 | CVE-2018-16561 | SIMATIC S7-300 CPU Resource management vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue. SIMATIC S7-300 CPU Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The Siemens SIMATIC S7-300 CPU is a modular universal controller for the manufacturing industry from Siemens. A denial of service vulnerability exists in the Siemens SIMATIC S7-300 CPU.
Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201901-0450 | CVE-2017-3718 | Intel(R) NUC kits Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 6.2 Severity: MEDIUM |
Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access. Intel(R) NUC kits Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. IntelNUCKitNUC7CJYH and other are all mini-host products of Intel Corporation of the United States. There is a configuration error vulnerability in the system firmware in several Intel products. An attacker with a physical location nearby can exploit this vulnerability to increase privileges. ImpressCMS is a MySQL-based, modular content management system (CMS). The system includes modules such as news release, forum and photo album. The following products are affected: Intel NUC Kit NUC7CJYH ; NUC Kit NUC8i7HNK ; Compute Card CD1M3128MK ; Compute Card CD1IV128MK ; Compute Card CD1P64GK ; NUC Kit NUC7i7DNKE ; NUC Kit NUC7i5DNKE ; NUC Kit NUC7i3DNHE ; NUC Kit NUC7i7BNH ; NUC Kit NUC6CAYS ; NUC Kit DE3815TYBE ; NUC Kit NUC6i5SYH ; NUC Kit NUC6i7KYK ; NUC Kit NUC5PGYH ; NUC Kit NUC5CPYH ; NUC Kit NUC5i7RYH ; NUC Kit NUC5i5MYHE ; NUC Kit NUC5i3MYHE ; NUC Kit DE3815TYBE ; NUC Kit DN2820FYKH ; NUC Kit D54250WYB ; NUC Kit D53427RKE ; NUC Kit D33217GKE ; Compute Stick STK2mv64CC; Compute Stick STK2m3W64CC; Compute Stick STK1AW32SC; Compute Stick STCK1A32WFC
| VAR-201906-0354 | CVE-2019-5214 | Huawei Mate10 Vulnerability related to the use of released memory on smartphones |
CVSS V2: 7.1 CVSS V3: 5.5 Severity: MEDIUM |
There is a use after free vulnerability on certain driver component in Huawei Mate10 smartphones versions earlier than ALP-AL00B 9.0.0.167(C00E85R2P20T8). An attacker tricks the user into installing a malicious application, which make the software to reference memory after it has been freed. Successful exploit could cause a denial of service condition. Huawei Mate10 Smartphones are vulnerable to the use of freed memory.Service operation interruption (DoS) There is a possibility of being put into a state. HuaweiMate10 is a smartphone product from China's Huawei company
| VAR-201901-1500 | CVE-2018-20685 | OpenSSH Access control vulnerability |
CVSS V2: 2.6 CVSS V3: 5.3 Severity: MEDIUM |
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side. OpenSSH Contains an access control vulnerability.Information may be tampered with. OpenSSH is prone to an access-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
OpenSSH version 7.9 is vulnerable. ==========================================================================
Ubuntu Security Notice USN-3885-1
February 07, 2019
openssh vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in OpenSSH.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
openssh-client 1:7.7p1-4ubuntu0.2
Ubuntu 18.04 LTS:
openssh-client 1:7.6p1-4ubuntu0.2
Ubuntu 16.04 LTS:
openssh-client 1:7.2p2-4ubuntu2.7
Ubuntu 14.04 LTS:
openssh-client 1:6.6p1-2ubuntu2.12
In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201903-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenSSH: Multiple vulnerabilities
Date: March 20, 2019
Bugs: #675520, #675522
ID: 201903-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in OpenSSH, the worst of which
could allow a remote attacker to gain unauthorized access.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/openssh < 7.9_p1-r4 >= 7.9_p1-r4
Description
===========
Multiple vulnerabilities have been discovered in OpenSSH. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenSSH users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/openssh-7.9_p1-r4"
References
==========
[ 1 ] CVE-2018-20685
https://nvd.nist.gov/vuln/detail/CVE-2018-20685
[ 2 ] CVE-2019-6109
https://nvd.nist.gov/vuln/detail/CVE-2019-6109
[ 3 ] CVE-2019-6110
https://nvd.nist.gov/vuln/detail/CVE-2019-6110
[ 4 ] CVE-2019-6111
https://nvd.nist.gov/vuln/detail/CVE-2019-6111
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201903-16
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openssh security, bug fix, and enhancement update
Advisory ID: RHSA-2019:3702-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:3702
Issue date: 2019-11-05
CVE Names: CVE-2018-20685 CVE-2019-6109 CVE-2019-6111
=====================================================================
1. Summary:
An update for openssh is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
OpenSSH is an SSH protocol implementation supported by a number of Linux,
UNIX, and similar operating systems. It includes the core files necessary
for both the OpenSSH client and server.
The following packages have been upgraded to a later upstream version:
openssh (8.0p1).
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.1 Release Notes linked from the References section. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the OpenSSH server daemon (sshd) will be
restarted automatically.
1686065 - SSH connections get closed when time-based rekeyring is used and ClientAliveMaxCount=0
1691045 - Rebase OpenSSH to latest release (8.0p1?)
1707485 - Use high-level API to do signatures
1712436 - MD5 is used when writing password protected PEM
1732424 - ssh-keygen -A fails in FIPS mode because of DSA key
1732449 - rsa-sha2-*-cert-v01@openssh.com host key types are ignored in FIPS despite being in the policy
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
aarch64:
openssh-askpass-8.0p1-3.el8.aarch64.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-clients-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-debugsource-8.0p1-3.el8.aarch64.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-server-debuginfo-8.0p1-3.el8.aarch64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.aarch64.rpm
ppc64le:
openssh-askpass-8.0p1-3.el8.ppc64le.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-clients-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-debugsource-8.0p1-3.el8.ppc64le.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-server-debuginfo-8.0p1-3.el8.ppc64le.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.ppc64le.rpm
s390x:
openssh-askpass-8.0p1-3.el8.s390x.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-clients-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-debugsource-8.0p1-3.el8.s390x.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-server-debuginfo-8.0p1-3.el8.s390x.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.s390x.rpm
x86_64:
openssh-askpass-8.0p1-3.el8.x86_64.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-clients-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-debugsource-8.0p1-3.el8.x86_64.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-server-debuginfo-8.0p1-3.el8.x86_64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
openssh-8.0p1-3.el8.src.rpm
aarch64:
openssh-8.0p1-3.el8.aarch64.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-cavs-8.0p1-3.el8.aarch64.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-clients-8.0p1-3.el8.aarch64.rpm
openssh-clients-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-debugsource-8.0p1-3.el8.aarch64.rpm
openssh-keycat-8.0p1-3.el8.aarch64.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-ldap-8.0p1-3.el8.aarch64.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.aarch64.rpm
openssh-server-8.0p1-3.el8.aarch64.rpm
openssh-server-debuginfo-8.0p1-3.el8.aarch64.rpm
pam_ssh_agent_auth-0.10.3-7.3.el8.aarch64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.aarch64.rpm
ppc64le:
openssh-8.0p1-3.el8.ppc64le.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-cavs-8.0p1-3.el8.ppc64le.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-clients-8.0p1-3.el8.ppc64le.rpm
openssh-clients-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-debugsource-8.0p1-3.el8.ppc64le.rpm
openssh-keycat-8.0p1-3.el8.ppc64le.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-ldap-8.0p1-3.el8.ppc64le.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.ppc64le.rpm
openssh-server-8.0p1-3.el8.ppc64le.rpm
openssh-server-debuginfo-8.0p1-3.el8.ppc64le.rpm
pam_ssh_agent_auth-0.10.3-7.3.el8.ppc64le.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.ppc64le.rpm
s390x:
openssh-8.0p1-3.el8.s390x.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-cavs-8.0p1-3.el8.s390x.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-clients-8.0p1-3.el8.s390x.rpm
openssh-clients-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-debugsource-8.0p1-3.el8.s390x.rpm
openssh-keycat-8.0p1-3.el8.s390x.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-ldap-8.0p1-3.el8.s390x.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.s390x.rpm
openssh-server-8.0p1-3.el8.s390x.rpm
openssh-server-debuginfo-8.0p1-3.el8.s390x.rpm
pam_ssh_agent_auth-0.10.3-7.3.el8.s390x.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.s390x.rpm
x86_64:
openssh-8.0p1-3.el8.x86_64.rpm
openssh-askpass-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-cavs-8.0p1-3.el8.x86_64.rpm
openssh-cavs-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-clients-8.0p1-3.el8.x86_64.rpm
openssh-clients-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-debugsource-8.0p1-3.el8.x86_64.rpm
openssh-keycat-8.0p1-3.el8.x86_64.rpm
openssh-keycat-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-ldap-8.0p1-3.el8.x86_64.rpm
openssh-ldap-debuginfo-8.0p1-3.el8.x86_64.rpm
openssh-server-8.0p1-3.el8.x86_64.rpm
openssh-server-debuginfo-8.0p1-3.el8.x86_64.rpm
pam_ssh_agent_auth-0.10.3-7.3.el8.x86_64.rpm
pam_ssh_agent_auth-debuginfo-0.10.3-7.3.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-20685
https://access.redhat.com/security/cve/CVE-2019-6109
https://access.redhat.com/security/cve/CVE-2019-6111
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=iPw4
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. scp client multiple vulnerabilities
===================================
The latest version of this advisory is available at:
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
Overview
--------
SCP clients from multiple vendors are susceptible to a malicious scp server performing
unauthorized changes to target directory and/or client output manipulation.
Description
-----------
Many scp clients fail to verify if the objects returned by the scp server match those
it asked for. This issue dates back to 1983 and rcp, on which scp is based.
Finally, two vulnerabilities in clients may allow server to spoof the client output.
Details
-------
The discovered vulnerabilities, described in more detail below, enables the attack
described here in brief.
1. The attacker controlled server or Man-in-the-Middle(*) attack drops .bash_aliases
file to victim's home directory when the victim performs scp operation from the
server. The transfer of extra files is hidden by sending ANSI control sequences
via stderr. For example:
user@local:~$ scp user@remote:readme.txt .
readme.txt 100% 494 1.6KB/s 00:00
user@local:~$
2. Once the victim launches a new shell, the malicious commands in .bash_aliases get
executed.
*) Man-in-the-Middle attack does require the victim to accept the wrong host
fingerprint.
Vulnerabilities
---------------
1.
2. CWE-20: scp client missing received object name validation [CVE-2019-6111]
Due to the scp implementation being derived from 1983 rcp [1], the server chooses which
files/directories are sent to the client. However, scp client only perform cursory
validation of the object name returned (only directory traversal attacks are prevented).
A malicious scp server can overwrite arbitrary files in the scp client target directory.
If recursive operation (-r) is performed, the server can manipulate subdirectories
as well (for example overwrite .ssh/authorized_keys).
The same vulnerability in WinSCP is known as CVE-2018-20684.
3. CWE-451: scp client spoofing via object name [CVE-2019-6109]
Due to missing character encoding in the progress display, the object name can be used
to manipulate the client output, for example to employ ANSI codes to hide additional
files being transferred.
4. CWE-451: scp client spoofing via stderr [CVE-2019-6110]
Due to accepting and displaying arbitrary stderr output from the scp server, a
malicious server can manipulate the client output, for example to employ ANSI codes
to hide additional files being transferred.
Proof-of-Concept
----------------
Proof of concept malicious scp server will be released at a later date.
Vulnerable versions
-------------------
The following software packages have some or all vulnerabilities:
ver #1 #2 #3 #4
OpenSSH scp <=7.9 x x x x
PuTTY PSCP ? - - x x
WinSCP scp mode <=5.13 - x - -
Tectia SSH scpg3 is not affected since it exclusively uses sftp protocol.
Mitigation
----------
1. OpenSSH
1.1 Switch to sftp if possible
1.2 Alternatively apply the following patch to harden scp against most server-side
manipulation attempts: https://sintonen.fi/advisories/scp-name-validator.patch
NOTE: This patch may cause problems if the the remote and local shells don't
agree on the way glob() pattern matching works. YMMV.
2. PuTTY
2.1 No fix is available yet
3. WinSCP
3.1. Upgrade to WinSCP 5.14 or later
Similar or prior work
---------------------
1. CVE-2000-0992 - scp overwrites arbitrary files
References
----------
1. https://www.jeffgeerling.com/blog/brief-history-ssh-and-remote-access
Credits
-------
The vulnerability was discovered by Harry Sintonen / F-Secure Corporation.
Timeline
--------
2018.08.08 initial discovery of vulnerabilities #1 and #2
2018.08.09 reported vulnerabilities #1 and #2 to OpenSSH
2018.08.10 OpenSSH acknowledged the vulnerabilities
2018.08.14 discovered & reported vulnerability #3 to OpenSSH
2018.08.15 discovered & reported vulnerability #4 to OpenSSH
2018.08.30 reported PSCP vulnerabilities (#3 and #4) to PuTTY developers
2018.08.31 reported WinSCP vulnerability (#2) to WinSCP developers
2018.09.04 WinSCP developers reported the vulnerability #2 fixed
2018.11.12 requested a status update from OpenSSH
2018.11.16 OpenSSH fixed vulnerability #1
2019.01.07 requested a status update from OpenSSH
2019.01.08 requested CVE assignments from MITRE
2019.01.10 received CVE assignments from MITRE
2019.01.11 public disclosure of the advisory
2019.01.14 added a warning about the potential issues caused by the patch
. All the vulnerabilities
are in found in the scp client implementing the SCP protocol.
The check added in this version can lead to regression if the client and
the server have differences in wildcard expansion rules. If the server is
trusted for that purpose, the check can be disabled with a new -T option to
the scp client.
For the stable distribution (stretch), these problems have been fixed in
version 1:7.4p1-10+deb9u5.
For the detailed security status of openssh please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssh
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEE8vi34Qgfo83x35gF3rYcyPpXRFsFAlxe0w0ACgkQ3rYcyPpX
RFs85AgA0GrSHO4Qf5FVsE3oXa+nMkZ4U6pbOA9dHotX54DEyNuIJrOsOv01cFxQ
t2Z6uDkZptmHZT4uSWg2xIgMvpkGo9906ziZfHc0LTuHl8j++7cCDIDGZBm/iZaX
ueQfl85gHDpte41JvUtpSBAwk1Bic7ltLUPDIGEiq6nQboxHIzsU7ULVb1l0wNxF
sEFDPWGBS01HTa+QWgQaG/wbEhMRDcVz1Ck7dqpT2soQRohDWxU01j14q1EKe9O9
GHiWECvFSHBkkI/v8lNfSWnOWYa/+Aknri0CpjPc/bqh2Yx9rgp/Q5+FJ/FxJjmC
bHFd+tbxB1LxEO96zKguYpPIzw7Kcw==
=5Fd8
-----END PGP SIGNATURE-----
| VAR-201901-1623 | CVE-2019-0088 | Windows for Intel(R) System Support Utility Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient path checking in Intel(R) System Support Utility for Windows before 2.5.0.15 may allow an authenticated user to potentially enable an escalation of privilege via local access. Windows for Intel(R) System Support Utility Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel System Support Utility for Windows is a Windows platform-based system support utility developed by Intel Corporation. This program is mainly used to identify the hardware model, operating system version and software installed on the computer. A security vulnerability exists in versions earlier than 2.5.0.15 of the Windows-based Intel System Support Utility. A local attacker could exploit this vulnerability to elevate privileges
| VAR-201901-0741 | CVE-2018-0637 | NEC Aterm HC100RC Operating System Command Injection Vulnerability (CNVD-2019-01109) |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via export.cgi encKey parameter. The NECAtermHC100RC is a network camera from NEC. An operating system command injection vulnerability exists in NECAtermHC100RC using firmware version 1.0.1 and earlier
| VAR-201903-0011 | CVE-2019-3497 | Wifi-soft UniBox controller Command injection vulnerability in devices |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on Wifi-soft UniBox controller 0.x through 2.x devices. The tools/ping Ping feature of the Diagnostic Tools component is vulnerable to Remote Command Execution, allowing an attacker to execute arbitrary system commands on the server with root user privileges. Authentication for accessing this component can be bypassed by using Hard coded credentials. Wifi-soft UniBox controller The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data. Attackers can exploit this vulnerability to execute illegal commands. Hello all,
I would like to inform you about the Remote Command & Code Injection
vulnerabilities found in Wifi-soft's Unibox Controllers.
Name: Remote Code Injection in Wifi-soft's Unibox Controllers
Affected Software: Unibox Controller
Affected Versions: 0.x - 2.x
Homepage: https://wifi-soft.com/unibox-controller/
Vulnerability: Remote Code Injection
Severity: Critical
Status: Not Fixed
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
CVE-ID Reference: CVE-2019-3495
Name: Remote Command Injection in Wifi-soft's Unibox Controllers
Affected Software: Unibox Controller
Affected Versions: 0.x - 2.x
Homepage: https://wifi-soft.com/unibox-controller/
Vulnerability: Remote Command Injection
Severity: Critical
Status: Not Fixed
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
CVE-ID Reference: CVE-2019-3497
Name: Remote Command Injection in Wifi-soft's Unibox Controllers
Affected Software: Unibox Controller
Affected Versions: 3.x
Homepage: https://wifi-soft.com/unibox-controller/
Vulnerability: Remote Command Injection
Severity: Critical
Status: Not Fixed
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8)
CVE-ID Reference: CVE-2019-3496
I have posted all the technical details, POCs and root-cause analysis here:
https://sahildhar.github.io/blogpost/Multiple-RCE-Vulnerabilties-in-Unibox-Controller-0.x-3.x/
Best Regards,
*Sahil Dhar *
Information Security Consultant
+91 9821544985
<http://goog_555023787>
[image:
https://www.offensive-security.com/information-security-certifications/osce-offensive-security-certified-expert/]
<https://www.offensive-security.com/information-security-certifications/osce-offensive-security-certified-expert/>
| VAR-201901-0594 | CVE-2018-15463 | Cisco Identity Services Engine Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information. Other attacks are also possible.
This issue being tracked by Cisco Bug ID's CSCvm71860 and CSCvm79609. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-201901-0602 | CVE-2018-15453 | Cisco Email Security Appliance Input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 8.6 Severity: HIGH |
A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device. The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA. Cisco Email Security Appliance (ESA) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AsyncOSSoftware is the operating system used in it. The vulnerability stems from the failure of the program to properly validate the S/MIME signed message.
This issue is being tracked by Cisco Bug ID CSCvk73786. AsyncOS Software is a set of operating systems running on it. input verification