VARIoT IoT vulnerabilities database

VAR-201710-0449 | CVE-2017-14493 |
dnsmasq Buffer error vulnerability
Related entries in the VARIoT exploits database: VAR-E-201710-0037, VAR-E-201710-0035, VAR-E-201710-0038, VAR-E-201710-0644, VAR-E-201710-0640, VAR-E-201710-0645 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update
Advisory ID: RHSA-2017:2836-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836
Issue date: 2017-10-02
CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493
CVE-2017-14494 CVE-2017-14495 CVE-2017-14496
=====================================================================
1. Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name
Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* A heap buffer overflow was found in dnsmasq in the code responsible for
building DNS replies.
(CVE-2017-14491)
* A heap buffer overflow was discovered in dnsmasq in the IPv6 router
advertisement (RA) handling code. This issue only affected
configurations using one of these options: enable-ra, ra-only, slaac,
ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
* An information leak was found in dnsmasq in the DHCPv6 relay code. An
attacker on the local network could send crafted DHCPv6 packets to dnsmasq
causing it to forward the contents of process memory, potentially leaking
sensitive data. (CVE-2017-14494)
* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An
attacker could send crafted DNS packets which would trigger memory
allocations which would never be freed, leading to unbounded memory
consumption and eventually a crash. This issue only affected configurations
using one of the options: add-mac, add-cpe-id, or add-subnet.
(CVE-2017-14495)
* An integer underflow flaw leading to a buffer over-read was found in
dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to
dnsmasq which would cause it to crash. This issue only affected
configurations using one of the options: add-mac, add-cpe-id, or
add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J.
Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin
Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for
reporting these issues.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies
1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code
1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code
1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code
1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code
1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64:
dnsmasq-2.76-2.el7_4.2.aarch64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64:
dnsmasq-2.76-2.el7_4.2.ppc64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le:
dnsmasq-2.76-2.el7_4.2.ppc64le.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x:
dnsmasq-2.76-2.el7_4.2.s390x.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64:
dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64:
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le:
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x:
dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-14491
https://access.redhat.com/security/cve/CVE-2017-14492
https://access.redhat.com/security/cve/CVE-2017-14493
https://access.redhat.com/security/cve/CVE-2017-14494
https://access.redhat.com/security/cve/CVE-2017-14495
https://access.redhat.com/security/cve/CVE-2017-14496
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/security/vulnerabilities/3199382
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX
SfoCV7+qG2nwqlHKLZOlhIU=
=iWfU
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
===========================================================================
Ubuntu Security Notice USN-3430-3
January 04, 2018
dnsmasq regression
===========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description:
- dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new
regression that breaks DNS resolution. This update addresses the
problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests.
(CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 requests.
(CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
dnsmasq=C2=A02.59-4ubuntu0.4
dnsmasq-base2.59-4ubuntu0.4
dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make
all the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64
3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201710-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Dnsmasq: Multiple vulnerabilities
Date: October 23, 2017
Bugs: #632692
ID: 201710-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Dnsmasq, the worst of which
may allow remote attackers to execute arbitrary code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
===========
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Dnsmasq users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
==========
[ 1 ] CVE-2017-14491
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491
[ 2 ] CVE-2017-14492
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492
[ 3 ] CVE-2017-14493
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493
[ 4 ] CVE-2017-14494
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494
[ 5 ] CVE-2017-14495
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495
[ 6 ] CVE-2017-14496
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
VAR-201710-0448 | CVE-2017-14492 |
dnsmasq Buffer error vulnerability
Related entries in the VARIoT exploits database: VAR-E-201710-0037, VAR-E-201710-0035, VAR-E-201710-0038, VAR-E-201710-0644, VAR-E-201710-0640, VAR-E-201710-0645 |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted IPv6 router advertisement request. Dnsmasq versions 2.77 and earlier contains multiple vulnerabilities. dnsmasq Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state.
Attackers can exploit these issues to execute arbitrary code within the context of the affected application, bypass the ASLR, gain sensitive information, or cause a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: dnsmasq security update
Advisory ID: RHSA-2017:2836-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2836
Issue date: 2017-10-02
CVE Names: CVE-2017-14491 CVE-2017-14492 CVE-2017-14493
CVE-2017-14494 CVE-2017-14495 CVE-2017-14496
=====================================================================
1. Summary:
An update for dnsmasq is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The dnsmasq packages contain Dnsmasq, a lightweight DNS (Domain Name
Server) forwarder and DHCP (Dynamic Host Configuration Protocol) server.
Security Fix(es):
* A heap buffer overflow was found in dnsmasq in the code responsible for
building DNS replies. This issue only affected
configurations using one of these options: enable-ra, ra-only, slaac,
ra-names, ra-advrouter, or ra-stateless. (CVE-2017-14492)
* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. (CVE-2017-14493)
* An information leak was found in dnsmasq in the DHCPv6 relay code. An
attacker on the local network could send crafted DHCPv6 packets to dnsmasq
causing it to forward the contents of process memory, potentially leaking
sensitive data. (CVE-2017-14494)
* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An
attacker could send crafted DNS packets which would trigger memory
allocations which would never be freed, leading to unbounded memory
consumption and eventually a crash. This issue only affected configurations
using one of the options: add-mac, add-cpe-id, or add-subnet.
(CVE-2017-14495)
* An integer underflow flaw leading to a buffer over-read was found in
dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to
dnsmasq which would cause it to crash. This issue only affected
configurations using one of the options: add-mac, add-cpe-id, or
add-subnet. (CVE-2017-14496)
Red Hat would like to thank Felix Wilhelm (Google Security Team), Fermin J.
Serna (Google Security Team), Gabriel Campana (Google Security Team), Kevin
Hamacher (Google Security Team), and Ron Bowes (Google Security Team) for
reporting these issues.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1495409 - CVE-2017-14491 dnsmasq: heap overflow in the code responsible for building DNS replies
1495410 - CVE-2017-14492 dnsmasq: heap overflow in the IPv6 router advertisement code
1495411 - CVE-2017-14493 dnsmasq: stack buffer overflow in the DHCPv6 code
1495412 - CVE-2017-14494 dnsmasq: information leak in the DHCPv6 relay code
1495415 - CVE-2017-14495 dnsmasq: memory exhaustion vulnerability in the EDNS0 code
1495416 - CVE-2017-14496 dnsmasq: integer underflow leading to buffer over-read in the EDNS0 code
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
aarch64:
dnsmasq-2.76-2.el7_4.2.aarch64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
ppc64:
dnsmasq-2.76-2.el7_4.2.ppc64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
ppc64le:
dnsmasq-2.76-2.el7_4.2.ppc64le.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
s390x:
dnsmasq-2.76-2.el7_4.2.s390x.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64:
dnsmasq-debuginfo-2.76-2.el7_4.2.aarch64.rpm
dnsmasq-utils-2.76-2.el7_4.2.aarch64.rpm
ppc64:
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64.rpm
dnsmasq-utils-2.76-2.el7_4.2.ppc64.rpm
ppc64le:
dnsmasq-debuginfo-2.76-2.el7_4.2.ppc64le.rpm
dnsmasq-utils-2.76-2.el7_4.2.ppc64le.rpm
s390x:
dnsmasq-debuginfo-2.76-2.el7_4.2.s390x.rpm
dnsmasq-utils-2.76-2.el7_4.2.s390x.rpm
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
dnsmasq-2.76-2.el7_4.2.src.rpm
x86_64:
dnsmasq-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
dnsmasq-debuginfo-2.76-2.el7_4.2.x86_64.rpm
dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-14491
https://access.redhat.com/security/cve/CVE-2017-14492
https://access.redhat.com/security/cve/CVE-2017-14493
https://access.redhat.com/security/cve/CVE-2017-14494
https://access.redhat.com/security/cve/CVE-2017-14495
https://access.redhat.com/security/cve/CVE-2017-14496
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/security/vulnerabilities/3199382
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFZ0opYXlSAg2UNWIIRAr0dAJ9rIL1FgNTJUf2I9jjKFFlfkCd/kwCfV+bX
SfoCV7+qG2nwqlHKLZOlhIU=
=iWfU
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
===========================================================================
Ubuntu Security Notice USN-3430-3
January 04, 2018
dnsmasq regression
===========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
USN-3430-2 introduced regression in Dnsmasq.
Software Description:
- dnsmasq: Small caching DNS proxy and DHCP/TFTP server
Details:
USN-3430-2 fixed several vulnerabilities. The update introduced a new
regression that breaks DNS resolution. This update addresses the
problem.
We apologize for the inconvenience.
Original advisory details:
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests.
(CVE-2017-14491)
Felix Wilhelm, Fermin J. (CVE-2017-14492)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 requests.
(CVE-2017-14493)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DHCPv6 packets. (CVE-2017-14494)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. A remote
attacker could use this issue to cause Dnsmasq to consume memory,
resulting in a denial of service. (CVE-2017-14495)
Felix Wilhelm, Fermin J. Serna, Gabriel Campana and Kevin Hamacher
discovered that Dnsmasq incorrectly handled DNS requests. (CVE-2017-14496)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
dnsmasq=C2=A02.59-4ubuntu0.4
dnsmasq-base2.59-4ubuntu0.4
dnsmasq-utils2.59-4ubuntu0.4
After a standard system update you need to reboot your computer to make
all the necessary changes. 7.3) - ppc64, ppc64le, s390x, x86_64
3. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201710-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Dnsmasq: Multiple vulnerabilities
Date: October 23, 2017
Bugs: #632692
ID: 201710-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Dnsmasq, the worst of which
may allow remote attackers to execute arbitrary code.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/dnsmasq < 2.78 >= 2.78
Description
===========
Multiple vulnerabilities have been discovered in Dnsmasq.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Dnsmasq users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.78"
References
==========
[ 1 ] CVE-2017-14491
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14491
[ 2 ] CVE-2017-14492
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14492
[ 3 ] CVE-2017-14493
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14493
[ 4 ] CVE-2017-14494
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14494
[ 5 ] CVE-2017-14495
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14495
[ 6 ] CVE-2017-14496
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14496
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201710-27
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
VAR-201709-0565 | CVE-2017-14515 | Tenda W15E Device buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Heap-based Buffer Overflow on Tenda W15E devices before 15.11.0.14 allows remote attackers to cause a denial of service (temporary HTTP outage and forced logout) via unspecified vectors. Tenda W15E The device contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The TendaW15E device is a dual-band wireless router from China Tenda. A heap buffer overflow vulnerability exists in the TendaW15E device, allowing remote attackers to exploit a vulnerability to submit a special request to crash an application
VAR-201709-1251 | No CVE | Shenzhen Guowei Saina Technology Co., Ltd. NSN9000i Series IPPBX System Digital Program Controlled User Switch Has Unauthorized Access Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NSN9000i series IPPBX system is a new generation of hybrid IPPBX system developed by Sina Technology based on the latest IP technology based on domestic market. This system combines the digital program-controlled subscriber switch platform developed by Senna Technology and the popular Asterisk application platform. The two systems operate seamlessly.
Shenzhen Guowei Senna Technology Co., Ltd.'s NSN9000i series IPPBX system digital program-controlled user switch has an unauthorized access vulnerability. An attacker bypasses authorization authentication and accesses sensitive directories or files to log in to the system.
VAR-201709-1246 | No CVE | Zhejiang Dahua Intelligent Operation and Maintenance Management System Has SQL Injection and Arbitrary Traversal Download Vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Zhejiang Dahua Intelligent Operation and Maintenance Platform is based on the video surveillance field of the security industry. It uses intelligent analysis, fault detection and workflow engine technologies to integrate functions such as video quality diagnostics, video inspection and equipment status detection. Circulation processing, statistical reports, and other functions that are suitable for the user's business, achieve the goals of unattended, standardized management, and quantitative assessment, thereby minimizing the labor costs of video surveillance system operation and maintenance, improving the level of operation and maintenance, and ensuring the safe and reliable operation of the system .
The Zhejiang Dahua Intelligent Operation and Maintenance Management System has SQL injection and arbitrary file traversal download vulnerabilities. Attackers can use this vulnerability to obtain arbitrary contents of the database, download arbitrary files on the server, and even upload webshells.
VAR-201709-0564 | CVE-2017-14514 | Tenda W15E Path traversal vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Directory Traversal on Tenda W15E devices before 15.11.0.14 allows remote attackers to read unencrypted files via a crafted URL. Tenda W15E The device contains a path traversal vulnerability.Information may be obtained. Tenda W15E devices is a dual-band wireless router from China Tenda Corporation
VAR-201803-0134 | CVE-2017-14461 | Dovecot Vulnerable to out-of-bounds reading |
CVSS V2: 5.5 CVSS V3: 7.1 Severity: HIGH |
A specially crafted email delivered over SMTP and passed on to Dovecot by MTA can trigger an out of bounds read resulting in potential sensitive information disclosure and denial of service. In order to trigger this vulnerability, an attacker needs to send a specially crafted email message to the server. Dovecot Contains an out-of-bounds vulnerability and an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Dovecot is an open source IMAP and POP3 mail server based on Linux/UNIX-like systems. A cross-boundary read vulnerability exists in Dovecot version 2.2.33.2. This vulnerability can be used to cause denial of service and access to sensitive information. Dovecot is prone to an information-disclosure vulnerability. Failed exploit attempts will result in a denial-of-service condition.
Dovecot 2.2.33.2 is vulnerable; other versions may also be affected. ==========================================================================
Ubuntu Security Notice USN-3587-2
April 02, 2018
dovecot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in Dovecot. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
It was discovered that Dovecot incorrectly handled parsing certain
email addresses. (CVE-2017-14461)
It was discovered that Dovecot incorrectly handled TLS SNI config
lookups. (CVE-2017-15130)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
dovecot-core 1:2.0.19-0ubuntu2.5
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3587-2
https://usn.ubuntu.com/usn/usn-3587-1
CVE-2017-14461, CVE-2017-15130
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4130-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 02, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : dovecot
CVE ID : CVE-2017-14461 CVE-2017-15130 CVE-2017-15132
Debian Bug : 888432 891819 891820
Several vulnerabilities have been discovered in the Dovecot email
server. The Common Vulnerabilities and Exposures project identifies the
following issues:
CVE-2017-14461
Aleksandar Nikolic of Cisco Talos and 'flxflndy' discovered that
Dovecot does not properly parse invalid email addresses, which may
cause a crash or leak memory contents to an attacker.
CVE-2017-15130
It was discovered that TLS SNI config lookups may lead to excessive
memory usage, causing imap-login/pop3-login VSZ limit to be reached
and the process restarted, resulting in a denial of service. Only
Dovecot configurations containing local_name { } or local { }
configuration blocks are affected.
CVE-2017-15132
It was discovered that Dovecot contains a memory leak flaw in the
login process on aborted SASL authentication.
For the oldstable distribution (jessie), these problems have been fixed
in version 1:2.2.13-12~deb8u4.
For the stable distribution (stretch), these problems have been fixed in
version 1:2.2.27-3+deb9u2.
We recommend that you upgrade your dovecot packages.
For the detailed security status of dovecot please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/dovecot
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=Yh09
-----END PGP SIGNATURE-----
VAR-201809-0043 | CVE-2017-14443 | Insteon Hub Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
An exploitable information leak vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly checks the number of GET parameters supplied, leading to an arbitrarily controlled information leak on the whole device memory. An attacker can send an authenticated HTTP request to trigger this vulnerability. Insteon Hub Contains an information disclosure vulnerability.Information may be obtained. INSTEON Hub is an INSTEON central controller product of the American INSTEON company. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home
VAR-201808-0078 | CVE-2017-14455 | Insteon Hub 2245-222 Device firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long "ak" parameter in order to exploit this vulnerability. Insteon Hub 2245-222 is an Insteon central controller device produced by Insteon Corporation of the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home. A buffer overflow vulnerability exists in the Insteon Hub 2245-222 using version 1012 firmware
VAR-201808-0084 | CVE-2017-14453 | Insteon Hub 2245-222 Device firmware buffer error vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ad_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "ad_r" parameter in order to exploit this vulnerability. Insteon Hub 2245-222 is an Insteon central controller device produced by Insteon Corporation of the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home. A buffer overflow vulnerability exists in the Insteon Hub 2245-222 using version 1012 firmware
VAR-201808-0082 | CVE-2017-14447 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 5.5 CVSS V3: 7.7 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler for the 'ad' channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. Insteon Hub The firmware contains a buffer error vulnerability.Information may be tampered with. InsteonHub is an Insteon central controller from Insteon, USA. This product can remotely control light bulbs, wall switches, air conditioners, etc. in the home. Insteon Hub is an Insteon central controller product of Insteon Company in the United States
VAR-201808-0083 | CVE-2017-14452 | Insteon Hub Firmware buffer error vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An exploitable buffer overflow vulnerability exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "c_r" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. Insteon Hub The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home
VAR-201808-0081 | CVE-2017-14446 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable stack-based buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation unsafely extracts parameters from the query string, leading to a buffer overflow on the stack. An attacker can send an HTTP GET request to trigger this vulnerability. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home
VAR-201808-0079 | CVE-2017-14444 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly handles the URL parameter during a firmware update request, leading to a buffer overflow on a global section. An attacker can send an HTTP GET request to trigger this vulnerability. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home
VAR-201808-0080 | CVE-2017-14445 | Insteon Hub Buffer error vulnerability |
CVSS V2: 8.0 CVSS V3: 9.9 Severity: CRITICAL |
An exploitable buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly handles the host parameter during a firmware update request, leading to a buffer overflow on a global section. An attacker can send an HTTP GET request to trigger this vulnerability. Insteon Hub Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Insteon Hub is an Insteon central controller product of Insteon Company in the United States. This product can remotely control light bulbs, wall switches, air conditioners, etc. in your home
VAR-201709-1243 | No CVE | Friends in War Make or Break Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Friends in War Make or Break is a foreign web application system.
Friends in War Make or Break cross-site request forgery vulnerability. An attacker could use the vulnerability to change the administrator password.
VAR-201804-0372 | CVE-2017-14459 |
Moxa AWK-3131A Operating System Command Injection Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201704-0230 |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution. Moxa AWK-3131A Is OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MoxaAWK-3131A is a wireless access device from Moxa
VAR-201709-0216 | CVE-2017-10932 | ZTE Microwave NR8000 Vulnerability related to unreliable data deserialization in series products |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
All versions prior to V12.17.20 of the ZTE Microwave NR8000 series products - NR8120, NR8120A, NR8120, NR8150, NR8250, NR8000 TR and NR8950 are the applications of C/S architecture using the Java RMI service in which the servers use the Apache Commons Collections (ACC) library that may result in Java deserialization vulnerabilities. An unauthenticated remote attacker can exploit the vulnerabilities by sending a crafted RMI request to execute arbitrary code on the target host. ZTE Microwave NR8000 Series products are vulnerable to unreliable data deserialization.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE Microwave NR8120 and others are microwave transmission solutions of China ZTE Corporation.
There are security holes in ZTE Microwave NR8000 series products.
Successfully exploiting this issue allows attackers to execute arbitrary code in the context of the affected application. The following products and versions are affected: ZTE Microwave NR8120 earlier than V12.17.20; NR8120A earlier than V12.17.20; NR8120 earlier than V12.17.20; NR8150 earlier than V12.17.20; Versions earlier than TR V12.17.20; versions earlier than NR8950 V12.17.20
VAR-201709-1333 | CVE-2017-14454 | Insteon Hub Classic buffer overflow vulnerability in |
CVSS V2: - CVSS V3: 8.5 Severity: HIGH |
Multiple exploitable buffer overflow vulnerabilities exists in the PubNub message handler for the "control" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. The `strcpy` at [18] overflows the buffer `insteon_pubnub.channel_al`, which has a size of 16 bytes. (DoS) It may be in a state
VAR-201711-1019 | CVE-2017-8204 | Huawei Honor 9 Buffer error vulnerability in smartphone software |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
The Bastet driver of Honor 9 Huawei smart phones with software of versions earlier than Stanford-AL10C00B175 has a buffer overflow vulnerability due to the lack of parameter validation. An attacker tricks a user into installing a malicious APP which has the root privilege; the APP can send a specific parameter to the driver of the smart phone, causing arbitrary code execution. Huawei Honor 9 Smartphone software contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Glory 9 is a smartphone from China's Huawei company. The Huawei Glory 9Bastet driver has a buffer overflow vulnerability. Huawei Smart Phones are prone to a remote buffer-overflow vulnerability. Failed exploit attempts will likely cause a denial-of-service condition