VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201811-0516 CVE-2018-19417 Contiki-NG Buffer error vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
An issue was discovered in the MQTT server in Contiki-NG before 4.2. The function parse_publish_vhdr() that parses MQTT PUBLISH messages with a variable length header uses memcpy to input data into a fixed size buffer. The allocated buffer can fit only MQTT_MAX_TOPIC_LENGTH (default 64) bytes, and a length check is missing. This could lead to Remote Code Execution via a stack-smashing attack (overwriting the function return address). Contiki-NG does not separate the MQTT server from other servers and the OS modules, so access to all memory regions is possible. Contiki-NG Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Contiki-NG is an open source cross-platform operating system for the next generation of IoT devices. MQTT Server is one of the message queue transfer servers. Contiki-NG MQTT servers prior to 4.2 have a stack-based buffer overflow vulnerability. An attacker could use this vulnerability to execute code
VAR-201811-0766 CVE-2018-19387 Tmux denial of service vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. Tmux is an open source terminal multiplexer. There is a security hole in the \342\200\230format_cb_pane_tabs\342\200\231 function of the format.c file in tmux 2.7 to 2.8. An attacker could exploit the vulnerability to cause a denial of service (null pointer reverse reference and application crash)
VAR-201812-0621 CVE-2018-3950 TP-Link TL-R600VPN Buffer error vulnerability CVSS V2: 6.5
CVSS V3: 8.8
Severity: HIGH
An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability. TP-Link TL-R600VPN Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TP-LinkTL-R600VPN is an enterprise router of China TP-LINK. HTTPServer is one of the HTTP servers. A buffer overflow vulnerability exists in HTTPServer in TP-LinkTL-R600VPNHWv3FRNv1.3.0 and HWv2FRNv1.2.3
VAR-201812-0620 CVE-2018-3949 TP-Link TL-R600VPN Path traversal vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability. TP-Link TL-R600VPN Contains a path traversal vulnerability.Information may be obtained. TP-LinkTL-R600VPN is an enterprise router of China TP-LINK
VAR-201812-0622 CVE-2018-3951 TP-Link TL-R600VPN HTTP Server Buffer error vulnerability CVSS V2: 6.5
CVSS V3: 7.2
Severity: HIGH
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. TP-Link TL-R600VPN HTTP Server Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. TP-LinkTL-R600VPN is an enterprise router of China TP-LINK. HTTPServer is one of the HTTP servers. A buffer overflow vulnerability exists in HTTPServer in TP-LinkTL-R600VPNHWv3FRNv1.3.0
VAR-201811-0236 CVE-2018-11067 Dell EMC Avamar Server and EMC Integrated Data Protection Appliance Open redirect vulnerability CVSS V2: 5.8
CVSS V3: 6.1
Severity: MEDIUM
Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites. SAP NetWeaver is prone to open-redirection vulnerability An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible. Dell EMC Avamar Server is a suite of fully virtualized backup and recovery software for servers. The following products and versions are affected: Dell EMC Avamar Server Version 7.2.0, Version 7.2.1, Version 7.3.0, Version 7.3.1, Version 7.4.0, Version 7.4.1, Version 7.5.0, Version 7.5.1 , Version 18.1; EMC IDPA Version 2.0, Version 2.1, Version 2.2. Credits: Dell EMC would like to thank Jarrod Farncomb of TSS (https://www.dtss.com.au/) for reporting these vulnerabilities. Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0029 Severity: Critical Synopsis: vSphere Data Protection (VDP) updates address multiple security issues. Issue date: 2018-11-20 Updated on: 2018-11-20 (Initial Advisory) CVE number: CVE-2018-11066, CVE-2018-11067, CVE-2018-11076, CVE-2018-11077 1. Summary vSphere Data Protection (VDP) updates address multiple security issues. 2. Relevant Products vSphere Data Protection (VDP). 3. Problem Description a. Remote code execution vulnerability. VDP contains a remote code execution vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11066 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Critical 6.1.10 None VDP 6.0.x VA Critical 6.0.9 None b. Open redirection vulnerability. VDP contains an open redirection vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11067 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.10 None VDP 6.0.x VA Important 6.0.9 None c. Information exposure vulnerability. VDP contains an information exposure vulnerability. VDP Java management console's SSL/TLS private key may be leaked in the VDP Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11076 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.9 None VDP 6.0.x VA Important 6.0.9 None d. Command injection vulnerability. The 'getlogs' troubleshooting utility in VDP contains an OS command injection vulnerability. A malicious admin user may potentially be able to execute arbitrary commands under root privilege. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11077 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Moderate 6.1.10 None VDP 6.0.x VA Moderate 6.0.9 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Data Protection 6.1.10 Downloads and Documentation: https://my.vmware.com/group/vmware/details?productId=491 &downloadGroup=VDP6110 https://www.vmware.com/support/pubs/vdr_pubs.html vSphere Data Protection 6.0.9 Downloads and Documentation: https://my.vmware.com/web/vmware/details?productId=491 &downloadGroup=VDP60_9 https://www.vmware.com/support/pubs/vdr_pubs.html 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11067 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11076 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11077 - - ------------------------------------------------------------------------- 6. Change log 2018-11-20 VMSA-2018-0029 Initial security advisory in conjunction with the release of VMware vSphere Data Protection 6.1.10 on 2018-11-20 - - ------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFb9EH6DEcm8Vbi9kMRAm01AJ95gjr0/RR7uEkqUOpgt0tJadv8LgCfVk78 uNuYj2zthluNsnPjltdQNTQ= =UYUq -----END PGP SIGNATURE-----
VAR-201811-0237 CVE-2018-11076 Dell EMC Avamar Server and EMC Integrated Data Protection Appliance Vulnerable to information disclosure CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0 and 7.4.1 and Dell EMC Integrated Data Protection Appliance (IDPA) 2.0 are affected by an information exposure vulnerability. Avamar Java management console's SSL/TLS private key may be leaked in the Avamar Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users. VMware vSphere Data Protection is prone to an OS command-injection vulnerability. An attacker may exploit this issue to inject and execute arbitrary commands within the context of the affected application; this may aid in further attacks. Dell EMC Avamar Server is a suite of fully virtualized backup and recovery software for servers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0029 Severity: Critical Synopsis: vSphere Data Protection (VDP) updates address multiple security issues. Issue date: 2018-11-20 Updated on: 2018-11-20 (Initial Advisory) CVE number: CVE-2018-11066, CVE-2018-11067, CVE-2018-11076, CVE-2018-11077 1. Summary vSphere Data Protection (VDP) updates address multiple security issues. 2. Relevant Products vSphere Data Protection (VDP). VDP is based on Dell EMC Avamar Virtual Edition. 3. Problem Description a. Remote code execution vulnerability. VDP contains a remote code execution vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11066 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Critical 6.1.10 None VDP 6.0.x VA Critical 6.0.9 None b. Open redirection vulnerability. VDP contains an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11067 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.10 None VDP 6.0.x VA Important 6.0.9 None c. Information exposure vulnerability. VDP contains an information exposure vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11076 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.9 None VDP 6.0.x VA Important 6.0.9 None d. Command injection vulnerability. The 'getlogs' troubleshooting utility in VDP contains an OS command injection vulnerability. A malicious admin user may potentially be able to execute arbitrary commands under root privilege. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11077 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Moderate 6.1.10 None VDP 6.0.x VA Moderate 6.0.9 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Data Protection 6.1.10 Downloads and Documentation: https://my.vmware.com/group/vmware/details?productId=491 &downloadGroup=VDP6110 https://www.vmware.com/support/pubs/vdr_pubs.html vSphere Data Protection 6.0.9 Downloads and Documentation: https://my.vmware.com/web/vmware/details?productId=491 &downloadGroup=VDP60_9 https://www.vmware.com/support/pubs/vdr_pubs.html 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11067 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11076 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11077 - - ------------------------------------------------------------------------- 6. Change log 2018-11-20 VMSA-2018-0029 Initial security advisory in conjunction with the release of VMware vSphere Data Protection 6.1.10 on 2018-11-20 - - ------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFb9EH6DEcm8Vbi9kMRAm01AJ95gjr0/RR7uEkqUOpgt0tJadv8LgCfVk78 uNuYj2zthluNsnPjltdQNTQ= =UYUq -----END PGP SIGNATURE----- . For affected IDPA releases, install the appropriate hotfix on the Avamar server directly. Dell EMC recommends all customers apply the hotfix at the earliest opportunity. Refer to KB Article 513978 for instructions on applying the hotfix. Please note that applying the hotfix will restart the Management Console Service, It is recommended to stop backups before applying this hotfix, or install this hotfix during maintenance window. Credits: Dell EMC would like to thank TSS (https://www.dtss.com.au/) for reporting these vulnerabilities. a Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply
VAR-201811-0235 CVE-2018-11066 Dell EMC Avamar Server and EMC Integrated Data Protection Appliance Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Dell EMC Avamar Client Manager in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1, 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 contain a Remote Code Execution vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to execute arbitrary commands on the server. VMware vSphere Data Protection is prone to a remote code-execution vulnerability. Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. Failed exploits will result in denial-of-service conditions. Dell EMC Avamar Server is a suite of fully virtualized backup and recovery software for servers. The following products and versions are affected: Dell EMC Avamar Server Version 7.2.0, Version 7.2.1, Version 7.3.0, Version 7.3.1, Version 7.4.0, Version 7.4.1, Version 7.5.0, Version 7.5.1 , Version 18.1; EMC IDPA Version 2.0, Version 2.1, Version 2.2. Credits: Dell EMC would like to thank Jarrod Farncomb of TSS (https://www.dtss.com.au/) for reporting these vulnerabilities. Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of bus iness profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0029 Severity: Critical Synopsis: vSphere Data Protection (VDP) updates address multiple security issues. Issue date: 2018-11-20 Updated on: 2018-11-20 (Initial Advisory) CVE number: CVE-2018-11066, CVE-2018-11067, CVE-2018-11076, CVE-2018-11077 1. Summary vSphere Data Protection (VDP) updates address multiple security issues. 2. VDP is based on Dell EMC Avamar Virtual Edition. 3. Problem Description a. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11066 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Critical 6.1.10 None VDP 6.0.x VA Critical 6.0.9 None b. Open redirection vulnerability. VDP contains an open redirection vulnerability. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11067 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.10 None VDP 6.0.x VA Important 6.0.9 None c. Information exposure vulnerability. VDP contains an information exposure vulnerability. VDP Java management console's SSL/TLS private key may be leaked in the VDP Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11076 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.9 None VDP 6.0.x VA Important 6.0.9 None d. Command injection vulnerability. The 'getlogs' troubleshooting utility in VDP contains an OS command injection vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11077 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Moderate 6.1.10 None VDP 6.0.x VA Moderate 6.0.9 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. vSphere Data Protection 6.1.10 Downloads and Documentation: https://my.vmware.com/group/vmware/details?productId=491 &downloadGroup=VDP6110 https://www.vmware.com/support/pubs/vdr_pubs.html vSphere Data Protection 6.0.9 Downloads and Documentation: https://my.vmware.com/web/vmware/details?productId=491 &downloadGroup=VDP60_9 https://www.vmware.com/support/pubs/vdr_pubs.html 5. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11067 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11076 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11077 - - ------------------------------------------------------------------------- 6. Change log 2018-11-20 VMSA-2018-0029 Initial security advisory in conjunction with the release of VMware vSphere Data Protection 6.1.10 on 2018-11-20 - - ------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFb9EH6DEcm8Vbi9kMRAm01AJ95gjr0/RR7uEkqUOpgt0tJadv8LgCfVk78 uNuYj2zthluNsnPjltdQNTQ= =UYUq -----END PGP SIGNATURE-----
VAR-201811-0232 CVE-2018-11077 Dell EMC Avamar Server and EMC Integrated Data Protection Appliance In OS Command injection vulnerability CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
'getlogs' utility in Dell EMC Avamar Server versions 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.5.1 and 18.1 and Dell EMC Integrated Data Protection Appliance (IDPA) versions 2.0, 2.1 and 2.2 is affected by an OS command injection vulnerability. A malicious Avamar admin user may potentially be able to execute arbitrary commands under root privilege. VMware vSphere Data Protection is prone to an information-disclosure vulnerability. An attacker can exploit this issue to perform man-in-the-middle attacks to obtain sensitive information, and perform unauthorized actions. Successful exploits will lead to other attacks. Dell EMC Avamar Server is a suite of fully virtualized backup and recovery software for servers. The following products and versions are affected: Dell EMC Avamar Server Version 7.2.0, Version 7.2.1, Version 7.3.0, Version 7.3.1, Version 7.4.0, Version 7.4.1, Version 7.5.0, Version 7.5.1 , Version 18.1; EMC IDPA Version 2.0, Version 2.1, Version 2.2. For affected IDPA releases, install the appropriate hotfix on the Avamar server directly. Dell EMC recommends all customers apply the hotfix at the earliest opportunity. Refer to KB Article 526331 for instructions on applying the hotfix. Please note that applying the hotfix does not require a system reboot or shutdown. Credits: Dell EMC would like to thank TSS (https://www.dtss.com.au/) for reporting these vulnerabilities. a Severity Rating For an explanation of Severity Ratings, refer to Dell EMC Knowledgebase article 468307 (https://support.emc.com/kb/468307). Dell EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Legal Information Read and use the information in this Dell EMC Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this advisory, contact Dell EMC Technical Support (https://support.emc.com/servicecenter/contactEMC/). Dell EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. Dell EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall Dell EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Dell EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2018-0029 Severity: Critical Synopsis: vSphere Data Protection (VDP) updates address multiple security issues. Issue date: 2018-11-20 Updated on: 2018-11-20 (Initial Advisory) CVE number: CVE-2018-11066, CVE-2018-11067, CVE-2018-11076, CVE-2018-11077 1. Summary vSphere Data Protection (VDP) updates address multiple security issues. 2. VDP is based on Dell EMC Avamar Virtual Edition. 3. Problem Description a. Remote code execution vulnerability. VDP contains a remote code execution vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11066 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Critical 6.1.10 None VDP 6.0.x VA Critical 6.0.9 None b. Open redirection vulnerability. VDP contains an open redirection vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability to redirect application users to arbitrary web URLs by tricking the victim users to click on maliciously crafted links. The vulnerability could be used to conduct phishing attacks that cause users to unknowingly visit malicious sites. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11067 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.10 None VDP 6.0.x VA Important 6.0.9 None c. Information exposure vulnerability. VDP contains an information exposure vulnerability. VDP Java management console's SSL/TLS private key may be leaked in the VDP Java management client package. The private key could potentially be used by an unauthenticated attacker on the same data-link layer to initiate a MITM attack on management console users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11076 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Important 6.1.9 None VDP 6.0.x VA Important 6.0.9 None d. Command injection vulnerability. The 'getlogs' troubleshooting utility in VDP contains an OS command injection vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-11077 to this issue. Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Mitigation/ Product Version on Severity Apply Patch Workaround ========== ========= ======= ======== ================ ========== VDP 6.1.x VA Moderate 6.1.10 None VDP 6.0.x VA Moderate 6.0.9 None 4. Solution Please review the patch/release notes for your product and version and verify the checksum of your downloaded file. References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11067 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11076 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11077 - - ------------------------------------------------------------------------- 6. Change log 2018-11-20 VMSA-2018-0029 Initial security advisory in conjunction with the release of VMware vSphere Data Protection 6.1.10 on 2018-11-20 - - ------------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce at lists.vmware.com bugtraq at securityfocus.com fulldisclosure at seclists.org E-mail: security at vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2018 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: Encryption Desktop 10.4.1 (Build 490) Charset: utf-8 wj8DBQFb9EH6DEcm8Vbi9kMRAm01AJ95gjr0/RR7uEkqUOpgt0tJadv8LgCfVk78 uNuYj2zthluNsnPjltdQNTQ= =UYUq -----END PGP SIGNATURE-----
VAR-201811-0679 CVE-2018-19326 Zyxel VMG1312-B10D Path traversal vulnerability in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd. Zyxel VMG1312-B10D The device contains a path traversal vulnerability.Information may be obtained. ZyxelVMG1312-B10D is a wireless gateway device from ZyXEL Technology. A directory traversal vulnerability exists in versions of ZyxelVMG1312-B10D5.13 (AAXA.8) prior to C0. An attacker can exploit this vulnerability to access arbitrary files with the \342\200\230../\342\200\231 directory traversal sequence
VAR-201811-0717 CVE-2018-18756 Local Server Buffer error vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Local Server 1.0.9 has a Buffer Overflow via crafted data on Port 4008. Local Server Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. LocalServer is a web server based on the Windows platform. A buffer overflow vulnerability exists in the LocalServer version 1.0.9. An attacker could exploit the vulnerability with specially crafted data to cause a denial of service
VAR-201811-0981 CVE-2018-7363 ZTE ZXHN F670 Vulnerabilities related to certificate and password management in products CVSS V2: 3.3
CVSS V3: 8.8
Severity: HIGH
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper authorization vulnerability. Since appviahttp service has no authorization delay, an attacker can be allowed to brute force account credentials. ZTE ZXHN F670 The product contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE ZXHNF670 is an ITU-TG.984 and ITU-Tg.988 compatible Optical Network Terminal (ONT) designed for high-end home users
VAR-201811-0980 CVE-2018-7362 ZTE ZXHN F670 Access control vulnerabilities in products CVSS V2: 9.0
CVSS V3: 8.8
Severity: HIGH
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper access control vulnerability, which may allows an unauthorized user to perform unauthorized operations on the router. ZTE ZXHN F670 The product contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE ZXHNF670 is an ITU-TG.984 and ITU-Tg.988 compatible Optical Network Terminal (ONT) designed for high-end home users
VAR-201811-0978 CVE-2018-7360 ZTE ZXHN F670 Information Disclosure Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by information exposure vulnerability, which may allow an unauthenticated attacker to get the GPON SN information via appviahttp service. ZTE ZXHN F670 Contains an information disclosure vulnerability.Information may be obtained. ZTEZXHNF670 is a modem from China ZTE Corporation (ZTE)
VAR-201811-0502 CVE-2018-9073 Lenovo Chassis Management Module Vulnerabilities related to the use of hard-coded credentials CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Lenovo Chassis Management Module (CMM) prior to version 2.0.0 utilizes a hardcoded encryption key to protect certain secrets. Possession of the key can allow an attacker that has already compromised the server to decrypt these secrets. The LenovoChassisManagementModule (CMM) is a hot-swappable LenovoFlexSystem module that can be used to configure and manage all installed LenovoFlexSystem components
VAR-201811-0500 CVE-2018-9071 Lenovo Chassis Management Module Vulnerable to information disclosure CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
Lenovo Chassis Management Module (CMM) prior to version 2.0.0 allows unauthenticated users to retrieve information related to the current authentication configuration settings. Exposed settings relate to password lengths, expiration, and lockout configuration. The LenovoChassisManagementModule (CMM) is a hot-swappable LenovoFlexSystem module that can be used to configure and manage all installed LenovoFlexSystem components
VAR-201811-0991 No CVE Kuwait text display screen configuration software KEC330 has a denial of service vulnerability CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Kewei text display screen configuration software KEC330 is an intelligent small human-machine interface that replaces traditional panel controllers. There is a denial of service vulnerability in the Kewei text display screen configuration software KEC330. An attacker can cause a program to crash by constructing a malformed configuration file (KECX file), and if successfully exploited, can cause arbitrary code execution
VAR-201811-0990 No CVE Denial of Service Vulnerability in IOCS of Kuwei Text Display All-in-One Screen Configuration Software CVSS V2: 4.9
CVSS V3: -
Severity: MEDIUM
Kewei text display integrated screen configuration software IOCS is a programming software. There is a denial of service vulnerability in the IOCS, the screen configuration software of the Kuwait text display integrated machine. An attacker can cause a program to crash by constructing a malformed ICOS format, and if successfully exploited, can cause arbitrary code execution
VAR-201811-0718 CVE-2018-18759 Modbus Slave Buffer error vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Modbus Slave 7.0.0 in modbus tools has a Buffer Overflow. Modbus Slave Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Modbus Slave is a device simulator for PLCs, mainly used for PLC programming. An attacker could exploit the vulnerability to cause a denial of service
VAR-201811-0505 CVE-2018-9085 plural Lenovo and IBM System x Vulnerabilities related to access control in server products CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
A write protection lock bit was left unset after boot on an older generation of Lenovo and IBM System x servers, potentially allowing an attacker with administrator access to modify the subset of flash memory containing Intel Server Platform Services (SPS) and the system Flash Descriptors. plural Lenovo and IBM System x Server products contain vulnerabilities related to access control.Information may be tampered with. Lenovo System x is a server of China Lenovo (Lenovo). IBM System x is a server of IBM Corporation in the United States. Security flaws exist in Lenovo and IBM System x servers. Attackers can exploit this vulnerability to crash the system