VARIoT IoT vulnerabilities database
| VAR-201812-0393 | CVE-2018-1667 | IBM DataPower Gateway Vulnerable to cross-site scripting |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
IBM DataPower Gateway 7.6.0.0 through 7.6.0.10, 7.5.2.0 through 7.5.2.17, 7.5.1.0 through 7.5.1.17, 7.5.0.0 through 7.5.0.18, and 7.7.0.0 through 7.7.1.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 144893. Vendors have confirmed this vulnerability IBM X-Force ID: 144893 It is released as.Information may be obtained and information may be altered. A security weakness
2.
An attacker may leverage these issues to obtain sensitive information or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks and obtain sensitive information. IBM DataPower Gateways is a set of security and integration platforms designed for mobile, cloud, application programming interface (API), network, service-oriented architecture (SOA), B2B and cloud workloads from IBM Corporation of the United States, which can utilize dedicated gateways The platform secures, integrates and optimizes access across channels. Version 0.0 to version 7.5.0.18
| VAR-201812-0454 | CVE-2018-11459 | plural SINUMERIK Vulnerabilities related to authorization, authority, and access control in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker could modify a user-writeable configuration file so that after reboot or manual initiation the system reloads the modified configuration file and attacker-controlled code is executed with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected system. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. A security hole exists in the Siemens SINUMERIK CNC Controller. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0455 | CVE-2018-11460 | plural SINUMERIK Access control vulnerabilities in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker with elevated user privileges (manufact) could modify a CRAMFS archive so that after reboot the system loads the modified CRAMFS file and attacker-controlled code is executed with root privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires elevated user privileges (manufact) but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. A security hole exists in the Siemens SINUMERIK CNC Controller. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0416 | CVE-2018-1665 | IBM DataPower Gateway Vulnerabilities related to cryptographic strength |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
IBM DataPower Gateway 7.6.0.0 through 7.6.0.10, 7.5.2.0 through 7.5.2.17, 7.5.1.0 through 7.5.1.17, 7.5.0.0 through 7.5.0.18, and 7.7.0.0 through 7.7.1.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 144891. IBM DataPower Gateway Contains a cryptographic strength vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 144891 It is released as.Information may be obtained. IBM DataPower Gateways is prone to the following vulnerabilities:
1. A security weakness
2. A cross-site scripting vulnerability.
An attacker may leverage these issues to obtain sensitive information or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. IBM DataPower Gateways is a set of security and integration platforms designed for mobile, cloud, application programming interface (API), network, service-oriented architecture (SOA), B2B and cloud workloads from IBM Corporation of the United States, which can utilize dedicated gateways The platform secures, integrates and optimizes access across channels. 0.0 version to 7.7.1.3 version
| VAR-201812-0461 | CVE-2018-11466 | plural SINUMERIK Access control vulnerabilities in products |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). Specially crafted network packets sent to port 102/tcp (ISO-TSAP) could allow a remote attacker to either cause a Denial-of-Service condition of the integrated software firewall or allow to execute code in the context of the software firewall. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 102/tcp. Successful exploitation requires no user privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. Security vulnerabilities exist in several Siemens products. And integrity. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0460 | CVE-2018-11465 | plural SINUMERIK Product out-of-bounds vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker could use ioctl calls to do out of bounds reads, arbitrary writes, or execute code in kernel mode. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. Security vulnerabilities exist in several Siemens products. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0458 | CVE-2018-11463 | plural SINUMERIK Product buffer error vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A buffer overflow in the service command application could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \302\240The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. A stack-based buffer overflow vulnerability exists in several Siemens products. Siemens SINUMERIK Controllers is prone to the following security vulnerabilities:
1. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0459 | CVE-2018-11464 | SINUMERIK 828D and SINUMERIK 840D sl Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.3 CVSS V3: 3.7 Severity: LOW |
A vulnerability has been identified in SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). The integrated VNC server on port 5900/tcp of the affected products could allow a remote attacker to cause a Denial-of-Service condition of the VNC server. Please note that this vulnerability is only exploitable if port 5900/tcp is manually opened in the firewall configuration of network port X130. The security vulnerability could be exploited by an attacker with network access to the affected devices and port. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise availability of the VNC server. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 828D and SINUMERIK 840D sl Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. Security vulnerabilities exist in several Siemens products. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0457 | CVE-2018-11462 | plural SINUMERIK Vulnerabilities related to authorization, authority, and access control in products |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). By sending a specially crafted authentication request to the affected systems a remote attacker could escalate his privileges to an elevated user account but not to root. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no privileges and no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. Permission access control vulnerabilities exist in several Siemens products. Siemens SINUMERIK Controllers is prone to the following security vulnerabilities:
1. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-0456 | CVE-2018-11461 | plural SINUMERIK Vulnerabilities related to authorization, authority, and access control in products |
CVSS V2: 4.6 CVSS V3: 6.6 Severity: MEDIUM |
A vulnerability has been identified in SINUMERIK 808D V4.7 (All versions), SINUMERIK 808D V4.8 (All versions), SINUMERIK 828D V4.7 (All versions < V4.7 SP6 HF1), SINUMERIK 840D sl V4.7 (All versions < V4.7 SP6 HF5), SINUMERIK 840D sl V4.8 (All versions < V4.8 SP3). A local attacker with user privileges could use the service command application for privilege escalation to an elevated user but not root. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise confidentiality, integrity and availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. SINUMERIK 808D , SINUMERIK 828D , SINUMERIK 840D sl Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Siemens SINUMERIK 808D is a CNC machine system controller from Siemens AG. A Permission Access Control Vulnerability exists in the Siemens SINUMERIK CNC Controller. Siemens SINUMERIK Controllers is prone to the following security vulnerabilities:
1. A heap based buffer-overflow vulnerability.
2. An integer overflow vulnerability.
3. A security bypass vulnerability.
4. An arbitrary code execution vulnerability.
5. Multiple privilege escalation vulnerabilities.
6. A stack based buffer-overflow vulnerability.
7. A buffer-overflow vulnerability.
8. Multiple denial-of-service vulnerabilities
Attackers can exploit these issues to execute arbitrary code within the context of affected device, gain host privileges and perform unauthorized actions, to modify or destroy data without having proper authorization to do so, to bypass security restrictions or cause a denial-of-service condition. Siemens SINUMERIK 808D, etc
| VAR-201812-1085 | CVE-2018-6703 | McAfee Agent Uses freed memory vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Use After Free in Remote logging (which is disabled by default) in McAfee McAfee Agent (MA) 5.x prior to 5.6.0 allows remote unauthenticated attackers to cause a Denial of Service and potentially a remote code execution via a specially crafted HTTP header sent to the logging service. McAfee Agent (MA) Contains a vulnerability in the use of freed memory.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. McAfee Agent is prone to a remote code-execution vulnerability.
Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application or cause denial-of-service conditions.
McAfee Agent versions 5.5.x and 5.0.x are vulnerable
| VAR-201812-0566 | CVE-2018-2503 | SAP NetWeaver AS Java keystore Authorization vulnerabilities in services |
CVSS V2: 3.3 CVSS V3: 7.4 Severity: HIGH |
By default, the SAP NetWeaver AS Java keystore service does not sufficiently restrict the access to resources that should be protected. This has been fixed in SAP NetWeaver AS Java (ServerCore versions 7.11, 7.20, 7.30, 7.31, 7.40, 7.50). SAP NetWeaver is prone to an information disclosure vulnerability.
An attacker can exploit this issue to gain sensitive information, that may aid in further attacks.
NetWeaver 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 are vulnerable
| VAR-201812-0571 | CVE-2018-2492 | SAP NetWeaver AS Java Input validation vulnerability |
CVSS V2: 5.5 CVSS V3: 7.1 Severity: HIGH |
SAML 2.0 functionality in SAP NetWeaver AS Java, does not sufficiently validate XML documents received from an untrusted source. This is fixed in versions 7.2, 7.30, 7.31, 7.40 and 7.50. SAP NetWeaver AS Java Contains an input validation vulnerability.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. SAP NetWeaver AS Java is prone to an XML External Entity injection vulnerability.
Attackers can exploit this issue to gain access to sensitive information or cause denial-of-service conditions
| VAR-201812-1038 | CVE-2018-20057 | D-Link DIR-619L Rev.B and DIR-605L Rev.B In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. goform/formSysCmd allows remote authenticated users to execute arbitrary OS commands via the sysCmd POST parameter. D-Link DIR-619L Rev.B and DIR-605L Rev.B Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-619LRev.B and DIR-605LRev.B are both router products of D-Link. There is a security vulnerability in /bin/boa in D-LinkDIR-619LRev.B2.06B1 and DIR-605LRev.B2.12B1
| VAR-201812-1037 | CVE-2018-20056 | D-Link DIR-619L Rev.B and DIR-605L Rev.B Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in /bin/boa on D-Link DIR-619L Rev.B 2.06B1 and DIR-605L Rev.B 2.12B1 devices. There is a stack-based buffer overflow allowing remote attackers to execute arbitrary code without authentication via the goform/formLanguageChange currTime parameter. D-Link DIR-619L Rev.B and DIR-605L Rev.B Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-619LRev.B and DIR-605LRev.B are both router products of D-Link. A stack buffer overflow vulnerability exists in /bin/boa in D-LinkDIR-619LRev.B2.06B1 and DIR-605LRev.B2.12B1
| VAR-201812-1080 | CVE-2018-20050 | Jooan JA-Q1H Wi-Fi camera Data processing vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Mishandling of an empty string on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via the ONVIF GetStreamUri method and GetVideoEncoderConfigurationOptions method. Jooan JA-Q1H Wi-Fi camera Firmware contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Jooan JA-Q1H Wi-Fi Camera is a network camera product of China Jooan Technology Company
| VAR-201812-1081 | CVE-2018-20051 | Jooan JA-Q1H Wi-Fi camera Data processing vulnerability in firmware |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Mishandling of '>' on the Jooan JA-Q1H Wi-Fi camera with firmware 21.0.0.91 allows remote attackers to cause a denial of service (crash and reboot) via certain ONVIF methods such as CreateUsers, SetImagingSettings, GetStreamUri, and so on. Jooan JA-Q1H Wi-Fi camera Firmware contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Jooan JA-Q1H Wi-Fi Camera is a network camera product of China Jooan Technology Company. There is a security vulnerability in the Jooan JA-Q1H Wi-Fi Camera with firmware version 21.0.0.91, the vulnerability stems from the fact that the program does not handle the '&' character correctly
| VAR-201901-1644 | CVE-2018-20748 | LibVNC Vulnerable to out-of-bounds writing |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete. LibVNC Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. LibVNCServer is prone to a local heap-based buffer-overflow vulnerability.
Attackers can exploit these issues to execute arbitrary code within the context of the user running the affected application. Failed attempts will likely cause a denial-of-service condition.
Note: This issue is the result of an incomplete fix for issue CVE-2018-20019 described in 106821 (LibVNCServer CVE-2018-20019 Multiple Heap Buffer Overflow Vulnerabilities).
Software Description:
- libvncserver: vnc server library
Details:
It was discovered that LibVNCServer incorrectly handled certain operations. =========================================================================
Ubuntu Security Notice USN-4587-1
October 20, 2020
italc vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in iTALC.
Software Description:
- italc: didact tool which allows teachers to view and control computer labs
Details:
Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors
and didn't check malloc return values.
(CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055)
Josef Gajdusek discovered that iTALC had heap-based buffer overflow
vulnerabilities. (CVE-2018-15127,
CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023,
CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750, CVE-2018-7225,
CVE-2019-15681)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
italc-client 1:2.0.2+dfsg1-4ubuntu0.1
italc-master 1:2.0.2+dfsg1-4ubuntu0.1
libitalccore 1:2.0.2+dfsg1-4ubuntu0.1
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4587-1
CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054,
CVE-2014-6055, CVE-2016-9941, CVE-2016-9942, CVE-2018-15127,
CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022,
CVE-2018-20023, CVE-2018-20024, CVE-2018-20748, CVE-2018-20749,
CVE-2018-20750, CVE-2018-7225, CVE-2019-15681
Package Information:
https://launchpad.net/ubuntu/+source/italc/1:2.0.2+dfsg1-4ubuntu0.1
| VAR-201812-0907 | CVE-2018-19240 | TRENDnet TV-IP110WN and TV-IP121WN Device buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Buffer overflow in network.cgi on TRENDnet TV-IP110WN V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64 and TV-IP121WN V1.2.2 build 28 devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (without authentication). TRENDnet TV-IP110WN and TV-IP121WN The device contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TRENDnetTV-IP110WN is a wireless internet surveillance camera. The TRENDnetTV-IP121WN is a network camera solution for surveillance. A buffer overflow vulnerability exists in TRENDnetTV-IP110WN and TV-IP121WN. ###########################################
Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer
Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
###########################################
Multiple vulnerabilties including Command Injection, Buffer Overflow and
Reflective XSS vulnerabilties were found in the following TRENDnet devices:
Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP
IP-Cameras: TV-IP110WN, TV-IP121WN
These were found using our dynamic analysis tool for embedded devices.
The POC's will be made available upon the public
release of our tool. A more detailed breakdown is presented
below on a per vulnerability basis:-
Command Injection
------------------
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: `start_arpping` function in `timer` binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the `start_arpping` function of the
`timer binary`, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The `start_arpping` function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
`arpping` utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
`IP:192.168.10.1 Port: 80` allows a user to modify the first three
values `dhcpd_start`,
`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration
webpage available at
`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
`apply.cgi` binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check. This makes the subroutine vulnerable to BoF and can be exploited
without authentication
x-----------x
Products:
- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)
- TV-IP121WN (V1.2.2 build 28)
Module affected: `watch.cgi`
A BoF vulnerability exists in the `watch.cgi` binary and how it handles
the `url` parameter. An attacker can deliver its payload using a POST request
in the `url` parameter to trigger the BoF vulnerability without authentication.
Reflective XSS
---------------
Products:
- TEW-632BRP (1.010B32)
- TEW-673GRU (v1.00b40)
- TEW-634GRU (v1.01B14)
Module affected: `login.cgi`
`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
------------------
The vulnerabilities had been notified to the vendor 12/03.
The vendor replied on 12/05 that since the products had reached their
end-of-life no future development or firmware updates
would be provided for these devices
| VAR-201812-0909 | CVE-2018-19242 | TRENDnet TEW-632BRP and TEW-673GRU Buffer error vulnerability in device |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication). TRENDnet TEW-632BRP and TEW-673GRU The device contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. TRENDnetTEW-632BRP is a router. The TRENDnetTEW-673GRU is a dual-band green router. A buffer overflow vulnerability exists in TRENDnetTEW-632BRP and TEW-673GRU. ###########################################
Vulnerabilities found in TRENDnet devices
Authors:Prashast Srivastava, Mathias Payer
Howard Shrobe, Hamed Okhravi
Author contact: https://github.com/prashast/
###########################################
Multiple vulnerabilties including Command Injection, Buffer Overflow and
Reflective XSS vulnerabilties were found in the following TRENDnet devices:
Routers: TEW-634GRU, TEW-673GRU, TEW-632BRP
IP-Cameras: TV-IP110WN, TV-IP121WN
These were found using our dynamic analysis tool for embedded devices.
The POC's will be made available upon the public
release of our tool. A more detailed breakdown is presented
below on a per vulnerability basis:-
Command Injection
------------------
CVE-ID: CVE-2018-19239
Product: TEW-673GRU
Module affected: `start_arpping` function in `timer` binary
Firmware version: v1.00b40
TRENDnet TEW-673GRU v1.00b40 devices have an OS command injection
vulnerability in the `start_arpping` function of the
`timer binary`, which allows remote attackers to execute
arbitrary commands via three parameters (dhcpd_start, dhcpd_end, and
lan_ipaddr)
passed to the apply.cgi binary through a POST request. Exploiting the
vulnerability
requires a user to be authenticated with the router with
administrative credentials.
The `start_arpping` function reads the following values from the NVRAM
namely: dhcpd_start,
dhcpd_end, lan_ipaddr, lan_bridge and lan_eth. These values are then
passed to the
`arpping` utility without any sort of sanity checks.
Out of these values, the outward facing configuration webserver(httpd)
running at
`IP:192.168.10.1 Port: 80` allows a user to modify the first three
values `dhcpd_start`,
`dhcpd_end`, `lan_ipaddr` via the LAN and DHCP server configuration
webpage available at
`http://192.168.10.1/lan.asp` by making a POST request to `apply.cgi`
binary with the
appropriate parameters.
We have observed that the by directly making a POST request to the
`apply.cgi` binary
with the values of the above mentioned three parameters containing
Command Injection
based payloads, it is possible to execute arbitrary commands on the
router with root
privileges. A sub-routine respondAsp is called that
copies a user-controlled parameter into a stack variable using strcpy
without any
bounds check. This makes the subroutine vulnerable to BoF and can be exploited
without authentication
x-----------x
Products:
- TV-IP110WN (V1.2.2 build 68, V1.2.2.65, and V1.2.2 build 64)
- TV-IP121WN (V1.2.2 build 28)
Module affected: `watch.cgi`
A BoF vulnerability exists in the `watch.cgi` binary and how it handles
the `url` parameter.
Reflective XSS
---------------
Products:
- TEW-632BRP (1.010B32)
- TEW-673GRU (v1.00b40)
- TEW-634GRU (v1.01B14)
Module affected: `login.cgi`
`Login.cgi` in TRENDNet TEW-632BRP, TEW-673GRU and TEW-634GRU has a
reflected XSS
vulnerability that does not require any authentication.
Vendor Disclosure
------------------
The vulnerabilities had been notified to the vendor 12/03.
The vendor replied on 12/05 that since the products had reached their
end-of-life no future development or firmware updates
would be provided for these devices