VARIoT IoT vulnerabilities database
| VAR-201705-3372 | CVE-2017-2308 | Juniper Networks Junos Space In XML External entity injection vulnerability |
CVSS V2: 5.0 CVSS V3: 6.5 Severity: MEDIUM |
An XML External Entity Injection vulnerability in Juniper Networks Junos Space versions prior to 16.1R1 may allow an authenticated user to read arbitrary files on the device. Juniper Junos Space is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks.
Versions prior to Juniper Junos Space 16.1R1 are vulnerable. The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle. Attackers can exploit this vulnerability to read arbitrary files on the device
| VAR-201705-3371 | CVE-2017-2307 | Juniper Networks Junos Space Cross-Site Scripting Vulnerability in Microsoft Management Interface |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A reflected cross site scripting vulnerability in the administrative interface of Juniper Networks Junos Space versions prior to 16.1R1 may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space. Juniper Junos Space is prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Versions prior to Juniper Junos Space 16.1R1 are vulnerable. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle
| VAR-201705-3370 | CVE-2017-2306 | Juniper Networks Junos Space Vulnerable to code execution on devices |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can execute code on the device. Juniper Junos Space is prone to a remote code-execution vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition.
Versions prior to Juniper Junos Space 16.1R1 are vulnerable. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle
| VAR-201705-3369 | CVE-2017-2305 | Juniper Networks Junos Space Vulnerable to privileged user creation |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
On Juniper Networks Junos Space versions prior to 16.1R1, due to an insufficient authorization check, readonly users on the Junos Space administrative web interface can create privileged users, allowing privilege escalation. Juniper Junos Space is prone to a remote privilege-escalation vulnerability.
An attacker can exploit this issue to gain elevated privileges.
Versions prior to Juniper Junos Space 16.1R1 are vulnerable. Juniper Networks Junos Space is a set of network management solutions of Juniper Networks (Juniper Networks). The solution supports automated configuration, monitoring, and troubleshooting of devices and services throughout their lifecycle
| VAR-201705-3790 | CVE-2017-9265 | Open vSwitch Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`. Open vSwitch (OvS) Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'ofputil_pull_ofp15_group_mod' function in lib/ofp-util.c file in OvS 2.7.0 version. ==========================================================================
Ubuntu Security Notice USN-3450-1
October 11, 2017
openvswitch vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Open vSwitch.
Software Description:
- openvswitch: Ethernet virtual switch
Details:
Bhargava Shastry discovered that Open vSwitch incorrectly handled certain
OFP messages. (CVE-2017-9214)
It was discovered that Open vSwitch incorrectly handled certain OpenFlow
role messages. (CVE-2017-9263)
It was discovered that Open vSwitch incorrectly handled certain malformed
packets. This issue only
affected Ubuntu 17.04. (CVE-2017-9265)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
openvswitch-common 2.6.1-0ubuntu5.1
Ubuntu 16.04 LTS:
openvswitch-common 2.5.2-0ubuntu0.16.04.2
In general, a standard system update will make all the necessary changes.
1473735 - ovs-vswitchd crashes with SIGSEGV randomly when adding/removing interfaces
6. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 03 Aug 2017 12:39:24 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openvswitch security, bug fix, and enhancement update
Advisory ID: RHSA-2017:2418-01
Product: Fast Datapath
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2418
Issue date: 2017-08-03
CVE Names: CVE-2017-9214 CVE-2017-9263 CVE-2017-9264
CVE-2017-9265
=====================================================================
1. Summary:
An update for openvswitch is now available for Fast Datapath for Red Hat
Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Channel to provide early releases to layered products - noarch, x86_64
3. Description:
Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
The following packages have been upgraded to a later upstream version:
openvswitch (2.7.2). An
attacker could use this flaw to cause a remote DoS. (CVE-2017-9214)
* In Open vSwitch (OvS), while parsing an OpenFlow role status message
there is a call to the abort() function for undefined role status reasons
in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that
may be leveraged toward a remote DoS attack by a malicious switch.
(CVE-2017-9263)
* A buffer over-read was found in the Open vSwitch (OvS) firewall
implementation. This flaw can be triggered by parsing a specially crafted
TCP, UDP, or IPv6 packet. A remote attack could use this flaw to cause a
Denial of Service (DoS). An attacker could use
this flaw to cause a Denial of Service (DoS). (CVE-2017-9265)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Channel to provide early releases to layered products:
Source:
openvswitch-2.7.2-1.git20170719.el7fdp.src.rpm
noarch:
openvswitch-test-2.7.2-1.git20170719.el7fdp.noarch.rpm
python-openvswitch-2.7.2-1.git20170719.el7fdp.noarch.rpm
x86_64:
openvswitch-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-debuginfo-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-devel-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-central-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-common-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-docker-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-host-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-vtep-2.7.2-1.git20170719.el7fdp.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-9214
https://access.redhat.com/security/cve/CVE-2017-9263
https://access.redhat.com/security/cve/CVE-2017-9264
https://access.redhat.com/security/cve/CVE-2017-9265
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFZgxmYXlSAg2UNWIIRAuzuAJ9Dngapo5j66itwFnpsvl92GKMAywCfb2Ah
V7og7GgSn4a1oFzQjIZHeXk=
=qOi+
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201705-3795 | CVE-2017-9294 | Hitachi Device Manager In RMI Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
RMI vulnerability in Hitachi Device Manager before 8.5.2-01 allows remote attackers to execute internal commands without authentication via RMI ports. Hitachi Device Manager is a set of mobile device management software from Hitachi, Japan. The software can manage multiple Hitachi storage systems through a single console and provides logical view capabilities to align storage assets with business applications
| VAR-201705-3796 | CVE-2017-9295 | Hitachi Device Manager and Replication Manager In XML External entity vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
XXE vulnerability in Hitachi Device Manager before 8.5.2-01 and Hitachi Replication Manager before 8.5.2-00 allows authenticated remote users to read arbitrary files.
Multiple Hitachi products have XML external entity information disclosure vulnerabilities.
An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks
| VAR-201705-3824 | CVE-2017-9296 | Hitachi Device Manager and Tuning Manager Open redirect vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
Open Redirect vulnerability in Hitachi Device Manager before 8.5.2-01 and Hitachi Tuning Manager before 8.5.2-00 allows remote attackers to redirect authenticated users to arbitrary web sites. Hitachi Device Manager and Replication Manager are products of Hitachi, Japan. Hitachi Device Manager is a software that manages multiple Hitachi storage systems through a single console and provides a logical view function to coordinate storage assets with business applications. Replication Manager is a software for storage area management. Multiple Hitachi Products are prone to an open-redirection vulnerability.
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible
| VAR-201705-4205 | No CVE | Hikvision's centralized monitoring application management system has S2-045 remote command execution vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Hikvision is a video-centric IoT solution and data operation service provider.
Hikvision's centralized monitoring application management system uses Apache middleware as a framework. The framework has an S2-045 remote command execution vulnerability that allows attackers to remotely execute commands to obtain server permissions, posing information leakage and operational security risks.
| VAR-201705-1387 | CVE-2016-10377 | Open vSwitch Buffer error vulnerability |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch. Open vSwitch (OvS) Contains a buffer error vulnerability.Information is acquired, information is acquired, information is altered, and service operation is interrupted (DoS) There is a possibility of being put into a state. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'miniflow_extract' function of lib/flow.c file in OvS 2.5.0 version. A remote attacker could exploit this vulnerability to bypass access control lists
| VAR-201705-4198 | No CVE | Multiple Vulnerabilities in CERIO DT-100G-N/DT-300N/CW-300N |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The CERIODT-100G-N/DT-300N/CW-300N is a wireless router product from CERIO. The CERIODT-100G-N/DT-300N/CW-300N has hard-coded and default credentials, information leaks, command injection, and backdoor vulnerabilities. Allows the restricted shell to be escaped to the root shell via the 'pekcmd' binary. Since all processes are running as root, an attacker can put the hard-coded string stored in it into the root shell. CERIO's DT-300N A4 eXtreme Power 11n 2.4Ghz 2x2 High Power Wireless Access Point with built-in 10dBi patch antennas and also supports broadband wireless routing. DT-300N A4's wireless High Power design enhances the range and stability of the device's wireless signal in office and home environments. Another key hardware function of DT-300N A4 is its PoE Bridging feature, which allows subsequent devices to be powered through DT-300N A4's LAN port. This reduces device cabling and allows for more convenient deployment. DT-300N A4 utilizes a 533Mhz high power CPU base with 11n 2x2 transmission rates of 300Mbps. This powerful device can produce high level performance across multiple rooms or large spaces such as offices, schools, businesses and residential areas. DT-300N A4 is suitable for both indoor and outdoor deployment, and utilizes an IPX6 weatherproof housing. The DT-300N A4 hardware equipped with to bundles Cerio CenOS 5.0 Software Core. CenOS 5.0 devices can use integrated management functions of Control Access Point (CAP Mode) to manage an AP network.Cerio Wireless Access Point and Router suffers fromseveral vulnerabilities including: hard-coded and defaultcredentials, information disclosure, command injection andhidden backdoors that allows escaping the restricted shellinto a root shell via the 'pekcmd' binary. Thepekcmd shell has several hidden functionalities for enablingan advanced menu and modifying MAC settings as well as easilyescapable regex function for shell characters.Tested on: Cenwell Linux 802.11bgn MIMO Wireless AP(AR9341)RALINK(R) Cen-CPE-N5H2 (Access Point)CenOS 5.0/4.0/3.0Hydra/0.1.8
| VAR-201705-3885 | CVE-2017-9243 | Aries QWR-1104 Wireless-N Router Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Aries QWR-1104 Wireless-N Router with Firmware Version WRC.253.2.0913 has XSS on the Wireless Site Survey page, exploitable with the name of an access point. Aries QWR-1104 Wireless-N Router Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AriesQWR-1104Wireless-NRouter is a home router from AriesNetwork, India. A cross-site scripting vulnerability exists in the WirelessSiteSurvey page of AriesQWR-1104Wireless-NRouter using WRC.253.2.0913 firmware. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML
| VAR-201705-3788 | CVE-2017-9263 | Open vSwitch Input validation vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. Open vSwitch (OvS) Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Open vSwitch is prone to the following multiple security vulnerabilities:
1. Multiple buffer-overflow vulnerabilities
2. A denial-of-service vulnerability
An attacker can exploit these issues to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'ofp_print_role_status_message' function of lib/ofp-print.c file in OvS 2.7.0 version. ==========================================================================
Ubuntu Security Notice USN-3450-1
October 11, 2017
openvswitch vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Open vSwitch.
Software Description:
- openvswitch: Ethernet virtual switch
Details:
Bhargava Shastry discovered that Open vSwitch incorrectly handled certain
OFP messages. (CVE-2017-9214)
It was discovered that Open vSwitch incorrectly handled certain OpenFlow
role messages. (CVE-2017-9263)
It was discovered that Open vSwitch incorrectly handled certain malformed
packets. This issue only
affected Ubuntu 17.04. (CVE-2017-9265)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
openvswitch-common 2.6.1-0ubuntu5.1
Ubuntu 16.04 LTS:
openvswitch-common 2.5.2-0ubuntu0.16.04.2
In general, a standard system update will make all the necessary changes. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 03 Aug 2017 12:39:24 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openvswitch security, bug fix, and enhancement update
Advisory ID: RHSA-2017:2418-01
Product: Fast Datapath
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2418
Issue date: 2017-08-03
CVE Names: CVE-2017-9214 CVE-2017-9263 CVE-2017-9264
CVE-2017-9265
=====================================================================
1. Summary:
An update for openvswitch is now available for Fast Datapath for Red Hat
Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Channel to provide early releases to layered products - noarch, x86_64
3. Description:
Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
The following packages have been upgraded to a later upstream version:
openvswitch (2.7.2). (BZ#1472854)
Security Fix(es):
* An unsigned int wrap around leading to a buffer over-read was found when
parsing OFPT_QUEUE_GET_CONFIG_REPLY messages in Open vSwitch (OvS). An
attacker could use this flaw to cause a remote DoS.
(CVE-2017-9263)
* A buffer over-read was found in the Open vSwitch (OvS) firewall
implementation. This flaw can be triggered by parsing a specially crafted
TCP, UDP, or IPv6 packet. A remote attack could use this flaw to cause a
Denial of Service (DoS). (CVE-2017-9264)
* A buffer over-read flaw was found in Open vSwitch (OvS) while parsing the
group mod OpenFlow messages sent from the controller. An attacker could use
this flaw to cause a Denial of Service (DoS). (CVE-2017-9265)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1456795 - CVE-2017-9214 openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function
1457327 - CVE-2017-9263 openvswitch: Invalid processing of a malicious OpenFlow role status message
1457329 - CVE-2017-9264 openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets
1457335 - CVE-2017-9265 openvswitch: Buffer over-read while parsing the group mod OpenFlow message
1472729 - /usr/lib/ocf/resource.d/ovn/ovndb-servers is missing in the openvswitch.spec file
1472854 - [fdProd] Update OVS to 2.7.2
6. Package List:
Channel to provide early releases to layered products:
Source:
openvswitch-2.7.2-1.git20170719.el7fdp.src.rpm
noarch:
openvswitch-test-2.7.2-1.git20170719.el7fdp.noarch.rpm
python-openvswitch-2.7.2-1.git20170719.el7fdp.noarch.rpm
x86_64:
openvswitch-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-debuginfo-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-devel-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-central-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-common-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-docker-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-host-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-vtep-2.7.2-1.git20170719.el7fdp.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-9214
https://access.redhat.com/security/cve/CVE-2017-9263
https://access.redhat.com/security/cve/CVE-2017-9264
https://access.redhat.com/security/cve/CVE-2017-9265
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFZgxmYXlSAg2UNWIIRAuzuAJ9Dngapo5j66itwFnpsvl92GKMAywCfb2Ah
V7og7GgSn4a1oFzQjIZHeXk=
=qOi+
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201705-3789 | CVE-2017-9264 | Open vSwitch Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely. Open vSwitch (OvS) Contains a buffer error vulnerability.Information is acquired, information is acquired, information is altered, and service operation is interrupted (DoS) There is a possibility of being put into a state. Open vSwitch is prone to the following multiple security vulnerabilities:
1. Multiple buffer-overflow vulnerabilities
2. A denial-of-service vulnerability
An attacker can exploit these issues to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts will likely result in denial-of-service conditions. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. The 'extract_l3_ipv6', 'extract_l4_tcp' and 'extract_l4_udp' functions of the lib/conntrack.c file in the firewall implementation process of OvS 2.6.1 version have security vulnerabilities. ==========================================================================
Ubuntu Security Notice USN-3450-1
October 11, 2017
openvswitch vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Open vSwitch.
Software Description:
- openvswitch: Ethernet virtual switch
Details:
Bhargava Shastry discovered that Open vSwitch incorrectly handled certain
OFP messages. (CVE-2017-9214)
It was discovered that Open vSwitch incorrectly handled certain OpenFlow
role messages. (CVE-2017-9263)
It was discovered that Open vSwitch incorrectly handled certain malformed
packets. This issue only
affected Ubuntu 17.04. (CVE-2017-9265)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
openvswitch-common 2.6.1-0ubuntu5.1
Ubuntu 16.04 LTS:
openvswitch-common 2.5.2-0ubuntu0.16.04.2
In general, a standard system update will make all the necessary changes.
1473735 - ovs-vswitchd crashes with SIGSEGV randomly when adding/removing interfaces
6. X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Thu, 03 Aug 2017 12:39:24 +0000 (UTC)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openvswitch security, bug fix, and enhancement update
Advisory ID: RHSA-2017:2418-01
Product: Fast Datapath
Advisory URL: https://access.redhat.com/errata/RHSA-2017:2418
Issue date: 2017-08-03
CVE Names: CVE-2017-9214 CVE-2017-9263 CVE-2017-9264
CVE-2017-9265
=====================================================================
1. Summary:
An update for openvswitch is now available for Fast Datapath for Red Hat
Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Channel to provide early releases to layered products - noarch, x86_64
3. Description:
Open vSwitch provides standard network bridging functions and support for
the OpenFlow protocol for remote per-flow control of traffic.
The following packages have been upgraded to a later upstream version:
openvswitch (2.7.2). (BZ#1472854)
Security Fix(es):
* An unsigned int wrap around leading to a buffer over-read was found when
parsing OFPT_QUEUE_GET_CONFIG_REPLY messages in Open vSwitch (OvS). An
attacker could use this flaw to cause a remote DoS. (CVE-2017-9214)
* In Open vSwitch (OvS), while parsing an OpenFlow role status message
there is a call to the abort() function for undefined role status reasons
in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that
may be leveraged toward a remote DoS attack by a malicious switch. A remote attack could use this flaw to cause a
Denial of Service (DoS). (CVE-2017-9264)
* A buffer over-read flaw was found in Open vSwitch (OvS) while parsing the
group mod OpenFlow messages sent from the controller. An attacker could use
this flaw to cause a Denial of Service (DoS). (CVE-2017-9265)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Channel to provide early releases to layered products:
Source:
openvswitch-2.7.2-1.git20170719.el7fdp.src.rpm
noarch:
openvswitch-test-2.7.2-1.git20170719.el7fdp.noarch.rpm
python-openvswitch-2.7.2-1.git20170719.el7fdp.noarch.rpm
x86_64:
openvswitch-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-debuginfo-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-devel-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-central-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-common-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-docker-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-host-2.7.2-1.git20170719.el7fdp.x86_64.rpm
openvswitch-ovn-vtep-2.7.2-1.git20170719.el7fdp.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-9214
https://access.redhat.com/security/cve/CVE-2017-9263
https://access.redhat.com/security/cve/CVE-2017-9264
https://access.redhat.com/security/cve/CVE-2017-9265
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFZgxmYXlSAg2UNWIIRAuzuAJ9Dngapo5j66itwFnpsvl92GKMAywCfb2Ah
V7og7GgSn4a1oFzQjIZHeXk=
=qOi+
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201705-3825 | CVE-2017-9297 | Hitachi Device Manager Open redirect vulnerability |
CVSS V2: 5.8 CVSS V3: 6.1 Severity: MEDIUM |
Open Redirect vulnerability in Hitachi Device Manager before 8.5.2-01 allows remote attackers to redirect users to arbitrary web sites. Hitachi Device Manager is a set of mobile device management software from Hitachi, Japan. The software can manage multiple Hitachi storage systems through a single console and provides logical view capabilities to align storage assets with business applications. Multiple Hitachi Products are prone to an open-redirection vulnerability.
An attacker can leverage this issue by constructing a crafted URI and enticing a user to follow it. When an unsuspecting victim follows the link, they may be redirected to an attacker-controlled site; this may aid in phishing attacks. Other attacks are possible
| VAR-201802-0729 | CVE-2017-8948 | HPE Network Node Manager i Vulnerabilities related to security functions in software |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A Remote Bypass Security Restriction vulnerability in HPE Network Node Manager i (NNMi) Software versions v10.0x, v10.1x, v10.2x was found. A cross-site scripting vulnerability
2. A security-bypass vulnerability
3. An open-redirect vulnerability
An attacker may leverage these issues to execute HTML and script code in the browser of an unsuspecting user in the context of the affected site, to bypass certain security restrictions and perform unauthorized actions; this may aid in phishing attacks. Other attacks are possible.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03745en_us
Version: 2
HPESBHF03745 rev.2 - HPE Intelligent Management Center (iMC) PLAT, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-06-27
Last Updated: 2017-06-26
Potential Security Impact: Remote: Code Execution
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in HPE Intelligent Management Center (iMC) PLAT. The vulnerabilities could be exploited remotely to allow execution of code.
References:
- CVE-2017-5816
- CVE-2017-5817
- CVE-2017-5818
- CVE-2017-5819
- CVE-2017-8948 - ZDI-CAN-4368
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Intelligent Management Center (iMC) All version prior to IMC PLAT 7.3
E0504P04 - Please refer to the RESOLUTION below for a list of impacted products.
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2017-5816
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2017-5817
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2017-5818
7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVE-2017-5819
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVE-2017-8948
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
Hewlett Packard Enterprise thanks sztivi for working with Trend Micro's Zero Day Initiative (ZDI) for reporting these vulnerabilities to security-alert@hpe.com
RESOLUTION
HPE has made the following software update available to resolve the vulnerabilities in the iMC PLAT network products listed.
+ **iMC PLAT - Version: Fixed in IMC PLAT 7.3 E0504P04**
* HP Network Products
- JD125A HP IMC Std S/W Platform w/100-node
- JD126A HP IMC Ent S/W Platform w/100-node
- JD808A HP IMC Ent Platform w/100-node License
- JD814A HP A-IMC Enterprise Edition Software DVD Media
- JD815A HP IMC Std Platform w/100-node License
- JD816A HP A-IMC Standard Edition Software DVD Media
- JF288AAE HP Network Director to Intelligent Management Center Upgrade E-LTU
- JF289AAE HP Enterprise Management System to Intelligent Management Center Upgrade E-LTU
- JF377A HP IMC Std S/W Platform w/100-node Lic
- JF377AAE HP IMC Std S/W Pltfrm w/100-node E-LTU
- JF378A HP IMC Ent S/W Platform w/200-node Lic
- JF378AAE HP IMC Ent S/W Pltfrm w/200-node E-LTU
- JG546AAE HP IMC Basic SW Platform w/50-node E-LTU
- JG548AAE HP PCM+ to IMC Bsc Upgr w/50-node E-LTU
- JG549AAE HP PCM+ to IMC Std Upgr w/200-node E-LTU
- JG747AAE HP IMC Std SW Plat w/ 50 Nodes E-LTU
- JG748AAE HP IMC Ent SW Plat w/ 50 Nodes E-LTU
- JG768AAE HP PCM+ to IMC Std Upg w/ 200-node E-LTU
- JG550AAE HPE PCM+ Mobility Manager to IMC Basic WLAN Platform Upgrade 50-node and 150-AP E-LTU
- JG590AAE HPE IMC Basic WLAN Manager Software Platform 50 Access Point E-LTU
- JG660AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
- JG766AAE HP IMC Smart Connect Virtual Appliance Edition E-LTU
- JG767AAE HP IMC Smart Connect with Wireless Manager Virtual Appliance Edition E-LTU
- JG768AAE HPE PCM+ to IMC Standard Software Platform Upgrade with 200-node E-LTU
**Note:** Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY
Version:1 (rev.1) - 11 May 2017 Initial release
Version:2 (rev.2) - 26 June 2017 Adding ZDI-CAN-4368 to Security Bulletin.
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJZUpRjAAoJELXhAxt7SZaitLkH/i5U5+yIRxFll9tO2QRDRKvN
JhFxdHfr+T0beKWeLhpcuPcN6vrPsPQ60oyeHzLuz7HhWISSeaU8qIHl44GjTgPM
nIyY515SOkAmSFANBYR5CaXSv9NxuxN//qe5MDb9sJbCHoWkrvKJ8eorX0Pi4OWC
yqlmq3b1Visj8AfVX5cYGToFLwmCgbz3Q2zUYKlNNvWSfZVY15Fk931xtimHbEZF
3uHNfOXH9CL9HhKTLyuCwmJYK2zCjNlVdICDRqO12ISzffAYl7JdMGk22EXd5BCx
fOLnkISEYINImOnqI8pBuIWLO0IH12cYBxutInnGJYsR2d9hTObEh1XO373sgmo=
=TkVL
-----END PGP SIGNATURE-----
| VAR-201705-4199 | No CVE | Remote Command Execution Vulnerability in MyFAX Network Fax Server |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
myFAX fax server, also known as myfax electronic fax machine, is an intelligent high-tech product that combines fax technology with network technology.
A remote command execution vulnerability exists in the MyFAX network fax server, allowing remote attackers to execute arbitrary commands through unspecified vectors.
| VAR-201711-1053 | CVE-2017-8700 | ASP.NET Core In Cross-Origin Resource Sharing Vulnerability that can be bypassed |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ASP.NET Core 1.0, 1.1, and 2.0 allow an attacker to bypass Cross-origin Resource Sharing (CORS) configurations and retrieve normally restricted content from a web application, aka "ASP.NET Core Information Disclosure Vulnerability". An attacker can use this vulnerability to obtain sensitive information about the target system by submitting malicious input to the affected software. Microsoft ASP.NET Core is a cross-platform open source framework of Microsoft Corporation of the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends.
ASP.NET Core 1.0, and 1.1 are vulnerable
| VAR-201706-0556 | CVE-2017-6674 | Cisco FirePOWER System software feature-license Set on the device in the management function URL Vulnerabilities that bypass the filter |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the feature-license management functionality of Cisco Firepower System Software could allow an unauthenticated, remote attacker to bypass URL filters that have been configured for an affected device. More Information: CSCvb16413. Known Affected Releases: 6.0.1 6.1.0 6.2.0 6.2.1. Known Fixed Releases: 6.2.1 6.2.0.1 6.1.0.2.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCvb16413. The vulnerability stems from the fact that URL filtering licenses can be disabled
| VAR-201711-0226 | CVE-2017-2710 | Beethoven-W09A and CRR-L09 Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
BTV-W09C229B002CUSTC229D005,BTV-W09C233B029, earlier than BTV-W09C100B006CUSTC100D002 versions, earlier than BTV-W09C128B003CUSTC128D002 versions, earlier than BTV-W09C199B002CUSTC199D002 versions, earlier than BTV-W09C209B005CUSTC209D001 versions, earlier than BTV-W09C331B002CUSTC331D001 versions, earlier than CRR-L09C432B390 versions, earlier than CRR-L09C605B355CUSTC605D003 versions have a Factory Reset Protection (FRP) bypass security vulnerability. When re-configuring the mobile phone using the factory reset protection (FRP) function, an attacker can perform some operations to update the Google account. As a result, the FRP function is bypassed. Beethoven-W09A and CRR-L09 Contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. HuaweiBeethoven-W09A and Huawei CRR-L09 are both Huawei's smartphones. There are security bypass vulnerabilities in the HuaweiBeethoven-W09A and CRR-L09 phones. Huawei Smart Phones are prone to a local security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. The Huawei Beethoven-W09A and Huawei CRR-L09 are both smartphones from the Chinese company Huawei