VARIoT IoT vulnerabilities database
| VAR-201803-1769 | CVE-2018-6530 | plural D-Link In product OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter. plural D-Link The product includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-880L and others are all wireless router products of D-Link. An operating system command injection vulnerability exists in the soap.cgi file in several D-Link products. A remote attacker can exploit this vulnerability to execute arbitrary operating system commands with the help of the \342\200\230service\342\200\231 parameter. The following products and versions are affected: DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and earlier; DIR-868L DIR868LA1_FW112b04 and earlier; DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and earlier; DIR-860L and earlier DIR410b_
| VAR-201803-1768 | CVE-2018-6529 | plural D-Link Product cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
XSS vulnerability in htdocs/webinc/js/bsc_sms_inbox.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted Treturn parameter to soap.cgi. D-Link DIR-868L , DIR-865L ,and DIR-860L Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-868L and others are all wireless router products of D-Link. A cross-site scripting vulnerability exists in the htdocs/webinc/js/bsc_sms_inbox.php file in D-LinkDIR-868L, DIR-865L, and DIR-860L. D-Link DIR-868L, etc. The following products and versions are affected: D-Link DIR-868L DIR868LA1_FW112b04 and earlier; DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and earlier; DIR-860L DIR860LA1_FW110b04 and earlier
| VAR-201803-1766 | CVE-2018-6527 | plural D-Link Product cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
XSS vulnerability in htdocs/webinc/js/adv_parent_ctrl_map.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted deviceid parameter to soap.cgi. D-Link DIR-868L , DIR-865L ,and DIR-860L Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-868L, DIR-865L and DIR-860L are all D-Link wireless router products. A cross-site scripting vulnerability exists in the htdocs/webinc/js/adv_parent_ctrl_map.php file in D-LinkDIR-868L, DIR-865L, and DIR-860L. The following products and versions are affected: D-Link DIR-868L DIR868LA1_FW112b04 and earlier; DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and earlier; DIR-860L DIR860LA1_FW110b04 and earlier
| VAR-201803-1767 | CVE-2018-6528 | plural D-Link Product cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
XSS vulnerability in htdocs/webinc/body/bsc_sms_send.php in D-Link DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to read a cookie via a crafted receiver parameter to soap.cgi. D-Link DIR-868L , DIR-865L ,and DIR-860L Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-868L and others are all wireless router products of D-Link. A cross-site scripting vulnerability exists in the htdocs/webinc/body/bsc_sms_send.php file in D-LinkDIR-868L, DIR-865L, and DIR-860L. D-Link DIR-868L, etc. The following products and versions are affected: D-Link DIR-868L DIR868LA1_FW112b04 and earlier; DIR-865L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and earlier; DIR-860L DIR860LA1_FW110b04 and earlier
| VAR-201803-1356 | CVE-2017-6284 | NVIDIA Security Engine Vulnerable to information disclosure |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
NVIDIA Security Engine contains a vulnerability in the Deterministic Random Bit Generator (DRBG) where the DRBG does not properly initialize and store or transmits sensitive data using a weakened encryption scheme that is unable to protect sensitive data which may lead to information disclosure.This issue is rated as moderate. NVIDIA Security Engine Contains information disclosure vulnerabilities and cryptographic strength vulnerabilities.Information may be obtained. NVIDIASHIELDTV is a game console device from NVIDIA. SecurityEngine is one of the security engines. DeterministicRandomBitGenerator (DRBG) is one of the deterministic random bit generators. A security vulnerability exists in SecurityEngine's DRBG in NVIDIASHIELDTVSE 6.2 and earlier. An attacker could exploit this vulnerability to obtain sensitive information
| VAR-201803-2108 | CVE-2018-6809 | Citrix NetScaler ADC and NetScaler Gateway Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
NetScaler ADC 10.5, 11.0, 11.1, and 12.0, and NetScaler Gateway 10.5, 11.0, 11.1, and 12.0 allow remote attackers to gain privilege on a target system. Citrix NetScaler ADC and NetScaler Gateway Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway (formerly known as Citrix Access Gateway Enterprise Edition) are both products of Citrix Systems. NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. Security vulnerabilities exist in Citrix NetScaler ADC and NetScaler Gateway. The following products and versions are affected: Citrix NetScaler ADC Release 10.5, Release 11.0, Release 11.1, Release 12.0; NetScaler Gateway Release 10.5, Release 11.0, Release 11.1, Release 12.0
| VAR-201803-0124 | CVE-2017-14191 | Fortinet FortiWeb Access control vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under "Signed Security Mode", allows attacker to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie. Fortinet FortiWeb Contains an access control vulnerability.Information may be tampered with. Fortinet Fortiweb is prone to an access-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks.
FortiWeb 5.6.0 and prior are vulnerable; other versions may also be affected. Fortinet FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc., to ensure the security of web applications and protect sensitive database content. An access control error vulnerability exists in Fortinet FortiWeb 5.6.0 and earlier versions
| VAR-201803-2290 | CVE-2018-7698 | D-Link mydlink+ Vulnerabilities in certificate and password management |
CVSS V2: 4.3 CVSS V3: 8.1 Severity: HIGH |
An issue was discovered in D-Link mydlink+ 3.8.5 build 259 for DCS-933L 1.05.04 and DCS-934L 1.05.04 devices. The mydlink+ app sends the username and password for connected D-Link cameras (such as DCS-933L and DCS-934L) unencrypted from the app to the camera, allowing attackers to obtain these credentials and gain control of the camera including the ability to view the camera's stream and make changes without the user's knowledge. D-Link mydlink+ Contains a vulnerability related to certificate and password management.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-LinkDCS-933L and DCS-934L are D-Link's network camera products. Mydlink+ is an application for remote access to camera devices such as the DCS-933L and DCS-934L. A security vulnerability exists in the D-LinkDCS-933L1.05.04 release and the mydlink+3.8.5build259 release in the DCS-934L1.05.04 release. The vulnerability is caused by the program not encrypting the username and password when they are sent from the application to the camera. An attacker could exploit the vulnerability to obtain credentials and control the camera. Encrypt it
| VAR-201803-2274 | CVE-2018-7654 | 3CX Device Path Traversal Vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
On 3CX 15.5.6354.2 devices, the parameter "file" in the request "/api/RecordingList/download?file=" allows full access to files on the server via path traversal. 3CX The device contains a path traversal vulnerability.Information may be obtained. 3CXdevices is an IP telephony device from 3CX Corporation of the United States
| VAR-201803-1087 | CVE-2017-15130 | dovecot Resource management vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A denial of service flaw was found in dovecot before 2.2.34. An attacker able to generate random SNI server names could exploit TLS SNI configuration lookups, leading to excessive memory usage and the process to restart. dovecot Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Dovecot is an open source IMAP and POP3 mail server based on Linux/UNIX-like systems. ==========================================================================
Ubuntu Security Notice USN-3587-2
April 02, 2018
dovecot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in Dovecot. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that Dovecot incorrectly handled parsing certain
email addresses. (CVE-2017-14461)
It was discovered that Dovecot incorrectly handled TLS SNI config
lookups. A remote attacker could possibly use this issue to cause
Dovecot to crash, resulting in a denial of service. (CVE-2017-15130)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
dovecot-core 1:2.0.19-0ubuntu2.5
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3587-2
https://usn.ubuntu.com/usn/usn-3587-1
CVE-2017-14461, CVE-2017-15130
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4130-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 02, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dovecot
CVE ID : CVE-2017-14461 CVE-2017-15130 CVE-2017-15132
Debian Bug : 888432 891819 891820
Several vulnerabilities have been discovered in the Dovecot email
server. The Common Vulnerabilities and Exposures project identifies the
following issues:
CVE-2017-14461
Aleksandar Nikolic of Cisco Talos and 'flxflndy' discovered that
Dovecot does not properly parse invalid email addresses, which may
cause a crash or leak memory contents to an attacker. Only
Dovecot configurations containing local_name { } or local { }
configuration blocks are affected.
CVE-2017-15132
It was discovered that Dovecot contains a memory leak flaw in the
login process on aborted SASL authentication.
For the oldstable distribution (jessie), these problems have been fixed
in version 1:2.2.13-12~deb8u4.
For the stable distribution (stretch), these problems have been fixed in
version 1:2.2.27-3+deb9u2.
We recommend that you upgrade your dovecot packages.
For the detailed security status of dovecot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dovecot
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Yh09
-----END PGP SIGNATURE-----
| VAR-201803-1810 | CVE-2018-5476 | Delta Electronics Delta Industrial Automation DOPSoft Heap Buffer Overflow Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: MEDIUM |
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation DOPSoft, Version 4.00.01 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dop or .dpb files may allow an attacker to remotely execute arbitrary code. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Delta Industrial Automation DOPSoft. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of the BackgroundMacro structure in a DPA file. An attacker can leverage this vulnerability to execute code under the context of the current process
| VAR-201803-2367 | No CVE | Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01924) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or information leakage.
| VAR-201803-2364 | No CVE | Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01920) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or process information leakage.
| VAR-201803-2363 | No CVE | Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01917) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or process information leakage.
| VAR-201803-2358 | No CVE | Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01919) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker could use this vulnerability to cause a denial of service or process information leakage.
| VAR-201803-2359 | No CVE | Cross-Border Access Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01921) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The mpeg4dec.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker could use this vulnerability to cause a denial of service or process information leakage.
| VAR-201803-2351 | No CVE | Memory corruption vulnerability exists in Zhejiang Dahua Play Library SDK |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
Dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has a memory corruption vulnerability. An attacker can use this vulnerability to cause a denial of service attack or arbitrary code execution.
| VAR-201803-2357 | No CVE | Denial of Service Vulnerability in Zhejiang Dahua Play Library SDK (CNVD-2018-01922) |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The dhplay.dll in the Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has a denial of service vulnerability. An attacker can use this vulnerability to cause a denial of service attack.
| VAR-201803-2362 | No CVE | There is cross-border Access Vulnerability (CNVD-2018-01923) Zhejiang Dahua player SDK library |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Play Library SDK is developed based on Dahua's proprietary stream encapsulation protocol. It is a development kit for network hard disk video recorders, network video servers, network cameras, network domes, smart devices and other products.
The dhplay.dll in Zhejiang Dahua Play Library SDK_Win32_V3.39.1_20171130 version has an out-of-bounds access vulnerability. An attacker can use this vulnerability to cause a denial of service or information leakage.
| VAR-201803-1847 | CVE-2018-7227 | Schneider Electric Pelco Sarix Professional Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker. Schneider Electric Pelco Sarix Professional Contains an information disclosure vulnerability.Information may be obtained. SchneiderElectricPelcoSarixProfessional is a video surveillance device from Schneider Electric, France. A security vulnerability exists in SchneiderElectricPelcoSarixProfessional with firmware prior to 3.25.67. An attacker could exploit this vulnerability to obtain sensitive information. Information obtained may aid in further attacks