VARIoT IoT vulnerabilities database
| VAR-201702-0322 | CVE-2016-4661 | Apple OS X of ntfs Service disruption in components (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ntfs" component, which misparses disk images and allows attackers to cause a denial of service via a crafted app. Apple macOS is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, gain elevated privileges and perform unauthorized actions. This may aid in other attacks. NTFS is one of the file systems. An attacker could exploit this vulnerability with an application to cause a denial of service. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-2 macOS Sierra 10.12.1
macOS Sierra 10.12.1 is now available and addresses the following:
AppleGraphicsControl
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed through improved
lock state checking.
CVE-2016-4662: Apple
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through
improved locking.
CVE-2016-4678: daybreaker@Minionz working with Trend Micro's Zero Day
Initiative
ATS
Available for: macOS Sierra 10.12
Impact: Processing a maliciously crafted font file may lead to
arbitrary code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4667: Simmon Huang of alipay,
Thelongestusernameofall@gmail.com Moony Li of Trend Micro, @Flyic
ATS
Available for: macOS Sierra 10.12
Impact: A local user may be able to execute arbitrary code with
additional privileges
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team
CFNetwork Proxies
Available for: macOS Sierra 10.12
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
CoreGraphics
Available for: macOS Sierra 10.12
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: macOS Sierra 10.12
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: macOS Sierra 10.12
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
ImageIO
Available for: OS X El Capitan v10.11.6
Impact: Parsing a maliciously crafted PDF may lead to arbitrary code
execution
Description: An out-of-bounds write was addressed through improved
bounds checking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin
(@fuzzerDOTcn)
ImageIO
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the
disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image
parsing. This issue was addressed through improved bounds checking.
CVE-2016-4682: Ke Liu of Tencent's Xuanwu Lab
libarchive
Available for: macOS Sierra 10.12
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6,
and macOS Sierra 10.12
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions. This
issue was addressed through improved validation.
CVE-2016-4661: Recurity Labs on behalf of BSI (German Federal Office
for Information Security)
NVIDIA Graphics Drivers
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: An application may be able to cause a denial of service
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2016-4663: Apple
System Boot
Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6,
and macOS Sierra 10.12
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
macOS Sierra 10.12.1 may be obtained
from the Mac App Store or Apple's Software Downloads web site:
https://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=eHH+
-----END PGP SIGNATURE-----
| VAR-201702-0329 | CVE-2016-4669 | plural Apple Vulnerability in the kernel component of a product that allows arbitrary code execution in privileged contexts |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (MIG code mishandling and system crash) via unspecified vectors. Apple macOS, watchOS, iOS and tvOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges, obtain sensitive information and overwrite arbitrary files. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to iOS 10.1, watchOS 3.1, macOS 10.12.1 and tvOS 10.0.1 are vulnerable. Apple iOS is an operating system developed for mobile devices; watchOS is an operating system for smart watches.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
CVE-2016-4662: Apple
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through
improved locking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin
(@fuzzerDOTcn)
ImageIO
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the
disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image
parsing. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-1 iOS 10.1
iOS 10.1 is now available and addresses the following:
CFNetwork Proxies
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to maintain access to the Address
Book after access is revoked in Settings
Description: An access control issue in the Address Book was
addressed through improved file-link validation.
CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
CoreGraphics
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2016-4677: An anonymous researcher working with Trend Micro's
Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "10.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=vxwr
-----END PGP SIGNATURE-----
| VAR-201702-0326 | CVE-2016-4665 | plural Apple Product Sandbox Profile Component Vulnerability to Read Audio Recording Directory Metadata |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Sandbox Profiles" component, which allows attackers to read audio-recording metadata via a crafted app. Apple iOS, WatchOS and tvOS are prone to multiple information-disclosure vulnerabilities.
Successful exploits will allow attackers to obtain sensitive information that may aid in further attacks. in the United States. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; watchOS is a smart watch operating system. Sandbox Profiles is one of the Sandbox (Sandbox) components. An information disclosure vulnerability exists in the Sandbox Profiles component of several Apple products. The following products and versions are affected: Apple iOS prior to 10.1, tvOS prior to 10.0.1, watchOS prior to 3.1.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-1 iOS 10.1
iOS 10.1 is now available and addresses the following:
CFNetwork Proxies
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to maintain access to the Address
Book after access is revoked in Settings
Description: An access control issue in the Address Book was
addressed through improved file-link validation.
CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
CoreGraphics
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2016-4677: An anonymous researcher working with Trend Micro's
Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "10.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=vxwr
-----END PGP SIGNATURE-----
| VAR-201702-0334 | CVE-2016-4675 | plural Apple Product libxpc Component vulnerable to arbitrary code execution in privileged context |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "libxpc" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app. Apple macOS, watchOS, iOS and tvOS are prone to multiple security vulnerabilities. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to iOS 10.1, watchOS 3.1, macOS 10.12.1 and tvOS 10.0.1 are vulnerable. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; watchOS is a smart watch operating system. libxpc is an open source implementation of one of the Apple XPC libraries.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
CVE-2016-4662: Apple
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through
improved locking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin
(@fuzzerDOTcn)
ImageIO
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the
disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image
parsing. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-1 iOS 10.1
iOS 10.1 is now available and addresses the following:
CFNetwork Proxies
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to maintain access to the Address
Book after access is revoked in Settings
Description: An access control issue in the Address Book was
addressed through improved file-link validation.
CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
CoreGraphics
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2016-4677: An anonymous researcher working with Trend Micro's
Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "10.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJYDlqUAAoJEIOj74w0bLRGj64P/1A9yH47yTZLjBHdmy+eoz/d
5AZSnF/cyDeyeTb+Z8ELzVJMsucpJy7Xyv32IxvgSji8IplKkinw66j7mErs1/YY
q/IQCD8NM6IOZVcgiL/aUDFWtxmAUHwRftAk36RTaglMoeWx23I36NFN7xbhWUL5
EyMXoQzNUHQ38bReQqpXEEwydMin1iFPed0207714PnmfvM7o5LGRBRjjJ1gOQLq
HSNKfay/L1hSFZFkwkjqgvbelRzhvDr4eqEFriBf39u8a8uLAG92fuV9QMoF7p7q
paXwZk4fWMlHi8Xr3fg2gaW0MjSMrz6oJwOpZRdPKwLl2IW7fMuk+oIBPcRVl8m/
yxZxZlq4DpCjnp0mfNRx9YuVWwCKNjqtzYj1hirhL654jkTW+1cO1rvewVFOPPIs
MEYoSecYN09g7aBer0tPE4GcekMW0cEV4rzQI/0Jy+lIfdFwSjmz1GdZnpPMIwZl
RmI/Eda0O9OkwNbqU+E+6DdCL2r/cCflj3QwNxEDtYNgCPuz7tlwVBqqkewVVYH2
AqQtNQZEXeRDS04ncQgrhoXnTfcnM1TRaOzuy58/sJfk707TV9NZiahMiEbqUxhe
fahnRE4YUFpvwJZFegNKztUrdeNe56YAhBTksDNA49rpY4TgN8x5G2byt5txr7xV
m7KJFe1t8NabLisqOrHI
=vxwr
-----END PGP SIGNATURE-----
| VAR-201702-0332 | CVE-2016-4673 | plural Apple Product CoreGraphics Vulnerability in arbitrary code execution in components |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "CoreGraphics" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG file. Apple macOS, watchOS, iOS and tvOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges, obtain sensitive information and overwrite arbitrary files. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to iOS 10.1, watchOS 3.1, macOS 10.12.1 and tvOS 10.0.1 are vulnerable. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; watchOS is a smart watch operating system. CoreGraphics is an iOS built-in drawing framework component.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
CVE-2016-4662: Apple
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through
improved locking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin
(@fuzzerDOTcn)
ImageIO
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the
disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image
parsing. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-1 iOS 10.1
iOS 10.1 is now available and addresses the following:
CFNetwork Proxies
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to maintain access to the Address
Book after access is revoked in Settings
Description: An access control issue in the Address Book was
addressed through improved file-link validation.
CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
CoreGraphics
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2016-4677: An anonymous researcher working with Trend Micro's
Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "10.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJYDlqUAAoJEIOj74w0bLRGj64P/1A9yH47yTZLjBHdmy+eoz/d
5AZSnF/cyDeyeTb+Z8ELzVJMsucpJy7Xyv32IxvgSji8IplKkinw66j7mErs1/YY
q/IQCD8NM6IOZVcgiL/aUDFWtxmAUHwRftAk36RTaglMoeWx23I36NFN7xbhWUL5
EyMXoQzNUHQ38bReQqpXEEwydMin1iFPed0207714PnmfvM7o5LGRBRjjJ1gOQLq
HSNKfay/L1hSFZFkwkjqgvbelRzhvDr4eqEFriBf39u8a8uLAG92fuV9QMoF7p7q
paXwZk4fWMlHi8Xr3fg2gaW0MjSMrz6oJwOpZRdPKwLl2IW7fMuk+oIBPcRVl8m/
yxZxZlq4DpCjnp0mfNRx9YuVWwCKNjqtzYj1hirhL654jkTW+1cO1rvewVFOPPIs
MEYoSecYN09g7aBer0tPE4GcekMW0cEV4rzQI/0Jy+lIfdFwSjmz1GdZnpPMIwZl
RmI/Eda0O9OkwNbqU+E+6DdCL2r/cCflj3QwNxEDtYNgCPuz7tlwVBqqkewVVYH2
AqQtNQZEXeRDS04ncQgrhoXnTfcnM1TRaOzuy58/sJfk707TV9NZiahMiEbqUxhe
fahnRE4YUFpvwJZFegNKztUrdeNe56YAhBTksDNA49rpY4TgN8x5G2byt5txr7xV
m7KJFe1t8NabLisqOrHI
=vxwr
-----END PGP SIGNATURE-----
| VAR-201702-0321 | CVE-2016-4660 | plural Apple Product FontParser Vulnerabilities that can capture important information in components |
CVSS V2: 5.8 CVSS V3: 7.1 Severity: HIGH |
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "FontParser" component. It allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted font. Apple macOS, watchOS, iOS and tvOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with elevated privileges, obtain sensitive information and overwrite arbitrary files. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to iOS 10.1, watchOS 3.1, macOS 10.12.1 and tvOS 10.0.1 are vulnerable. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; watchOS is a smart watch operating system. FontParser is one of the font parsing components.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
CVE-2016-4662: Apple
AppleSMC
Available for: macOS Sierra 10.12
Impact: A local user may be able to elevate privileges
Description: A null pointer dereference was addressed through
improved locking.
CVE-2016-4671: Ke Liu of Tencent's Xuanwu Lab, Juwei Lin
(@fuzzerDOTcn)
ImageIO
Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6
Impact: Processing a maliciously crafted image may result in the
disclosure of process memory
Description: An out-of-bounds read issue existed in the SGI image
parsing. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-1 iOS 10.1
iOS 10.1 is now available and addresses the following:
CFNetwork Proxies
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
leak sensitive user information
Description: A phishing issue existed in the handling of proxy
credentials. This issue was addressed by removing unsolicited proxy
password authentication prompts.
CVE-2016-7579: Jerry Decime
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to maintain access to the Address
Book after access is revoked in Settings
Description: An access control issue in the Address Book was
addressed through improved file-link validation.
CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
CoreGraphics
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FaceTime
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An attacker in a privileged network position may be able to
cause a relayed call to continue transmitting audio while appearing
as if the call terminated
Description: User interface inconsistencies existed in the handling
of relayed calls. These issues were addressed through improved
FaceTime display logic.
CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com
FontParser
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later,
iPod touch 6th generation and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2016-4677: An anonymous researcher working with Trend Micro's
Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "10.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJYDlqUAAoJEIOj74w0bLRGj64P/1A9yH47yTZLjBHdmy+eoz/d
5AZSnF/cyDeyeTb+Z8ELzVJMsucpJy7Xyv32IxvgSji8IplKkinw66j7mErs1/YY
q/IQCD8NM6IOZVcgiL/aUDFWtxmAUHwRftAk36RTaglMoeWx23I36NFN7xbhWUL5
EyMXoQzNUHQ38bReQqpXEEwydMin1iFPed0207714PnmfvM7o5LGRBRjjJ1gOQLq
HSNKfay/L1hSFZFkwkjqgvbelRzhvDr4eqEFriBf39u8a8uLAG92fuV9QMoF7p7q
paXwZk4fWMlHi8Xr3fg2gaW0MjSMrz6oJwOpZRdPKwLl2IW7fMuk+oIBPcRVl8m/
yxZxZlq4DpCjnp0mfNRx9YuVWwCKNjqtzYj1hirhL654jkTW+1cO1rvewVFOPPIs
MEYoSecYN09g7aBer0tPE4GcekMW0cEV4rzQI/0Jy+lIfdFwSjmz1GdZnpPMIwZl
RmI/Eda0O9OkwNbqU+E+6DdCL2r/cCflj3QwNxEDtYNgCPuz7tlwVBqqkewVVYH2
AqQtNQZEXeRDS04ncQgrhoXnTfcnM1TRaOzuy58/sJfk707TV9NZiahMiEbqUxhe
fahnRE4YUFpvwJZFegNKztUrdeNe56YAhBTksDNA49rpY4TgN8x5G2byt5txr7xV
m7KJFe1t8NabLisqOrHI
=vxwr
-----END PGP SIGNATURE-----
| VAR-201610-0723 | No CVE | China Science and Technology Ocean 3GLive Multimedia Gateway Has Unauthorized Access Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Zhongke Dayang 3GLive Multimedia is based on 3G network technology and provides a brand new live broadcast method.
There is an unauthorized access vulnerability in the Zhongke Ocean 3GLive multimedia gateway. Unauthorized attackers can use the vulnerability to access / monitor? Lan = 1 to directly enter the background.
| VAR-201702-0292 | CVE-2016-7987 | Siemens SICAM For SM-2558 Expansion module ETA4 Service operation interruption in firmware (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 extension module for: SICAM AK, SICAM TM 1703, SICAM BC 1703, and SICAM AK 3. Specially crafted packets sent to Port 2404/TCP could cause the affected device to go into defect mode. A cold start might be required to recover the system, a Denial-of-Service Vulnerability. Siemens SICAM For SM-2558 Expansion module ETA4 Firmware disrupts service operation (DoS) There are vulnerabilities that are put into a state.Port crafted packets 2404/TCP Is sent to defect Mode and denial of service (DoS) There is a possibility of being put into a state. The Siemenssm-2558 and sm-2556 communication modules are Fast Ethernet communication interface units for LAN/WAN. A denial of service vulnerability exists in the Siemens SICAMRTU device.
Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users. Siemens SICAM AK, etc. are all products of German Siemens (Siemens). Siemens SICAM AK is a power monitoring system. SICAM TM 1703 is an automation module for use in SICAM RTU remote terminal units
| VAR-201610-0716 | No CVE | SQL injection vulnerability exists in vigocam network camera login system |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Domain High Tech (Hangzhou) Co., Ltd. is a network camera manufacturer. There is a SQL injection vulnerability in the vigocam network camera login system. Allows an attacker to exploit a vulnerability to obtain database sensitive information.
| VAR-201807-0049 | CVE-2016-6551 | Intellian Satellite TV t-Series and v-Series firmware contains insecure default credentials |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device. Intellian Satellite TV t-Series and Satellite Communications v-Series The common authentication information is set in. Certificate and password management (CWE-255) - CVE-2016-6551 Intellian Satellite TV t-Series and Satellite Communications v-Series By default, the authentication information "ftp/ftp" Or "intellian:12345678" Is set.A remote attacker may gain access to the device with administrator privileges.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. t-Series and v-Series are T-Series and V-Series antennas among them
| VAR-201807-0052 | CVE-2016-6554 | Synology NAS servers contain insecure default credentials |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Synology Made of multiple NAS The server has authentication information common to all devices. Certificate and password management (CWE-255) - CVE-2016-6554 Synology Made of NAS server Is DS107 , DS116 and DS213 By default, the authentication information "guest:( No password )" and "admin:( No password )" Is set.A remote third party could access the device with administrator privileges. Multiple Synology DiskStation products are prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks.
The following products are affected:
Synology DiskStation DS107 running firmware versions 3.1-1639 and prior.
Synology DiskStation DS116 running firmware versions prior to 5.2-5644-1.
Synology DiskStation DS213 running firmware versions prior to 5.2-5644-1. Synology DiskStation DS107 and others are network storage servers (NAS) of Synology. A trust management vulnerability exists in several Synology products due to the use of non-random default credentials (guest: (blank) and admin: (blank))
| VAR-201807-0051 | CVE-2016-6553 | Nuuo NT-4040 firmware contains insecure default credentials |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Nuuo NT-4040 Titan, firmware NT-4040_01.07.0000.0015_1120, uses non-random default credentials of: admin:admin and localdisplay:111111. A remote network attacker can gain privileged access to a vulnerable device. NUUO Titan NVR NT-4040 The common authentication information is set in. Nuuo NT-4040 Titan is prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. NUUO NT-4040 Titan is a compatible stand-alone network video recorder from NUUO
| VAR-201807-0050 | CVE-2016-6552 | Green Packet DX-350 contains insecure default credentials |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device. This may aid in further attacks
| VAR-201702-0295 | CVE-2016-8346 | Moxa EDR-810 Vulnerability with elevated privileges in industrial secure routers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Moxa EDR-810 Industrial Secure Router. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access configuration and log files (PRIVILEGE ESCALATION). The MoxaEDR-810 router has a remote privilege escalation vulnerability that can be exploited by an attacker to gain unauthorized access.
Versions prior to Moxa EDR-810 3.13 are vulnerable
| VAR-201610-0229 | CVE-2016-2848 | ISC BIND 9 Service operation interruption (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via malformed options data in an OPT resource record. ISC BIND 9 There is a service disruption (DoS) Vulnerabilities exist. ISC BIND With a packet containing specially crafted option information assertion failture ( Violation of representation ) There is a vulnerability that causes it. ISC Then 2013 Year 5 We are addressing this vulnerability in a version released in January (#3548) ,Current ISC Version of BIND Is not affected by this vulnerability. #3548 There is a possibility that this vulnerability has not been corrected for products that have been imported and maintained independently prior to the patch application.By processing crafted packets, assertion failure ( Violation of representation ) May cause the product to terminate abnormally. Both authoritative servers and cache servers are affected by this vulnerability.
An attacker can exploit this issue to cause denial-of-service condition.
NOTE: This BID is being retired as it is a duplicate of BID 93814 (ISC BIND CVE-2016-2848 Remote Denial of Service Vulnerability).
===========================================================================
Ubuntu Security Notice USN-3108-1
October 21, 2016
bind9 vulnerability
===========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Bind could be made to crash if it received specially crafted network
traffic.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.18
In general, a standard system update will make all the necessary changes.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: bind security update
Advisory ID: RHSA-2016:2099-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-2099.html
Issue date: 2016-10-25
CVE Names: CVE-2016-2776 CVE-2016-2848
=====================================================================
1. Summary:
An update for bind is now available for Red Hat Enterprise Linux 6.2
Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update
Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat
Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise
Linux 6.6 Extended Update Support, and Red Hat Enterprise Linux 6.7
Extended Update Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux HPC Node EUS (v. 6.6) - x86_64
Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6) - x86_64
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64
Red Hat Enterprise Linux Server AUS (v. 6.2) - x86_64
Red Hat Enterprise Linux Server AUS (v. 6.4) - x86_64
Red Hat Enterprise Linux Server AUS (v. 6.5) - x86_64
Red Hat Enterprise Linux Server EUS (v. 6.6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64
Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64
Red Hat Enterprise Linux Server TUS (v. 6.5) - x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* A denial of service flaw was found in the way BIND constructed a response
to a query that met certain criteria. A remote attacker could use this flaw
to make named exit unexpectedly with an assertion failure via a specially
crafted DNS request packet. (CVE-2016-2776)
* A denial of service flaw was found in the way BIND handled packets with
malformed options.
(CVE-2016-2848)
Red Hat would like to thank ISC for reporting CVE-2016-2776.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
1378380 - CVE-2016-2776 bind: assertion failure in buffer.c while building responses to a specifically constructed request
1385450 - CVE-2016-2848 bind: assertion failure triggered by a packet with malformed options
6. Package List:
Red Hat Enterprise Linux HPC Node EUS (v. 6.6):
Source:
bind-9.8.2-0.30.rc1.el6_6.6.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.7):
Source:
bind-9.8.2-0.37.rc1.el6_7.8.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-utils-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6):
x86_64:
bind-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):
x86_64:
bind-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-chroot-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-sdb-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.2):
Source:
bind-9.7.3-8.P3.el6_2.5.src.rpm
x86_64:
bind-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-chroot-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-debuginfo-9.7.3-8.P3.el6_2.5.i686.rpm
bind-debuginfo-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-libs-9.7.3-8.P3.el6_2.5.i686.rpm
bind-libs-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-utils-9.7.3-8.P3.el6_2.5.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.4):
Source:
bind-9.8.2-0.17.rc1.el6_4.9.src.rpm
x86_64:
bind-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-chroot-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-debuginfo-9.8.2-0.17.rc1.el6_4.9.i686.rpm
bind-debuginfo-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-libs-9.8.2-0.17.rc1.el6_4.9.i686.rpm
bind-libs-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-utils-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.5):
Source:
bind-9.8.2-0.23.rc1.el6_5.4.src.rpm
x86_64:
bind-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-chroot-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-libs-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-libs-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-utils-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 6.5):
Source:
bind-9.8.2-0.23.rc1.el6_5.4.src.rpm
x86_64:
bind-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-chroot-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-libs-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-libs-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-utils-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
bind-9.8.2-0.30.rc1.el6_6.6.src.rpm
i386:
bind-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.6.i686.rpm
ppc64:
bind-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.ppc.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.ppc.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
s390x:
bind-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.s390.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.s390.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
x86_64:
bind-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
bind-9.8.2-0.37.rc1.el6_7.8.src.rpm
i386:
bind-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-chroot-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-utils-9.8.2-0.37.rc1.el6_7.8.i686.rpm
ppc64:
bind-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-chroot-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.ppc.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.ppc.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-utils-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
s390x:
bind-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-chroot-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.s390.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.s390.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-utils-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
x86_64:
bind-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-chroot-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-libs-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-utils-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.2):
Source:
bind-9.7.3-8.P3.el6_2.5.src.rpm
x86_64:
bind-debuginfo-9.7.3-8.P3.el6_2.5.i686.rpm
bind-debuginfo-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-devel-9.7.3-8.P3.el6_2.5.i686.rpm
bind-devel-9.7.3-8.P3.el6_2.5.x86_64.rpm
bind-sdb-9.7.3-8.P3.el6_2.5.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.4):
Source:
bind-9.8.2-0.17.rc1.el6_4.9.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.17.rc1.el6_4.9.i686.rpm
bind-debuginfo-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-devel-9.8.2-0.17.rc1.el6_4.9.i686.rpm
bind-devel-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
bind-sdb-9.8.2-0.17.rc1.el6_4.9.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.5):
Source:
bind-9.8.2-0.23.rc1.el6_5.4.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-devel-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-devel-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-sdb-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 6.5):
Source:
bind-9.8.2-0.23.rc1.el6_5.4.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-debuginfo-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-devel-9.8.2-0.23.rc1.el6_5.4.i686.rpm
bind-devel-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
bind-sdb-9.8.2-0.23.rc1.el6_5.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.6):
i386:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.6.i686.rpm
ppc64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.ppc.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.ppc.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.6.ppc64.rpm
s390x:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.s390.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.s390.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.6.s390x.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.6.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.7):
i386:
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-sdb-9.8.2-0.37.rc1.el6_7.8.i686.rpm
ppc64:
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.ppc.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.ppc.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
bind-sdb-9.8.2-0.37.rc1.el6_7.8.ppc64.rpm
s390x:
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.s390.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.s390.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
bind-sdb-9.8.2-0.37.rc1.el6_7.8.s390x.rpm
x86_64:
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-debuginfo-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.i686.rpm
bind-devel-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
bind-sdb-9.8.2-0.37.rc1.el6_7.8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2016-2776
https://access.redhat.com/security/cve/CVE-2016-2848
https://access.redhat.com/security/updates/classification/#important
https://kb.isc.org/article/AA-01419
https://kb.isc.org/article/AA-01433
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFYDyhNXlSAg2UNWIIRAg3OAKCZJF8wxwppm2XilkPQDl9JCxgrhACgguzk
k0FTD0rt6WeBXIEha9Bfv4s=
=miy+
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 6) - i386, x86_64
3.
(CVE-2016-2848)
4
| VAR-201610-0281 | CVE-2016-6432 | Cisco ASA Software identity Service operation interruption in firewall function (DoS) Vulnerabilities |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
A vulnerability in the Identity Firewall feature of Cisco ASA Software before 9.6(2.1) could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to a buffer overflow in the affected code area. An attacker could exploit this vulnerability by sending a crafted NetBIOS packet in response to a NetBIOS probe sent by the ASA software. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the affected system. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects systems configured in routed and transparent firewall mode and in single or multiple context mode. This vulnerability can be triggered by IPv4 traffic. Cisco Adaptive Security Appliance products are prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
This issue being tracked by Cisco Bug ID CSCvb19843.
Cisco ASA Software running on the following products are affected:
Cisco ASA 5500 Series Adaptive Security Appliances
Cisco ASA 5500-X Series Next-Generation Firewalls
Cisco Catalyst 6500 Series/7600 Series ASA Services Module
Cisco ASA 1000V Cloud Firewall
Cisco Adaptive Security Virtual Appliance (ASAv)
Cisco ASA for Firepower 9300 Series
Cisco ASA for Firepower 4100 Series
Cisco ISA 3000 Industrial Security Appliance. The platform provides features such as highly secure access to data and network resources
| VAR-201610-0280 | CVE-2016-6431 | Cisco ASA Service disruption in the local CA function of the software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the local Certificate Authority (CA) feature of Cisco ASA Software before 9.6(1.5) could allow an unauthenticated, remote attacker to cause a reload of the affected system. The vulnerability is due to improper handling of crafted packets during the enrollment operation. An attacker could exploit this vulnerability by sending a crafted enrollment request to the affected system. An exploit could allow the attacker to cause the reload of the affected system. Note: Only HTTPS packets directed to the Cisco ASA interface, where the local CA is allowing user enrollment, can be used to trigger this vulnerability. This vulnerability affects systems configured in routed firewall mode and in single or multiple context mode. Vendors have confirmed this vulnerability Bug ID CSCuz47295 It is released as.Service disruption by a third party ( Reload system ) There is a possibility of being put into a state.
This issue is being tracked by Cisco Bug ID CSCuz47295. The platform provides features such as highly secure access to data and network resources
| VAR-201610-0288 | CVE-2016-6439 | Cisco Firepower System software HTTP Denial of service in restructuring packet detection engine (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the detection engine reassembly of HTTP packets for Cisco Firepower System Software before 6.0.1 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the Snort process unexpectedly restarting. The vulnerability is due to improper handling of an HTTP packet stream. An attacker could exploit this vulnerability by sending a crafted HTTP packet stream to the detection engine on the targeted device. An exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. Vendors have confirmed this vulnerability Bug ID CSCux61630 It is released as.Service disruption by a third party (DoS) There is a possibility of being put into a state. Multiple Cisco Products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to cause denial-of-service condition.
This issue is being tracked by Cisco bug ID CSCux61630. Cisco Firepower System Software is a next-generation firewall product (NGFW) of Cisco (Cisco). The following products running Cisco Firepower System Software Releases 5.4.1.5, 6.0, and 6.0.0.1 are affected: Cisco Adaptive Security Appliance 5500-X Series with FirePOWER Services, Advanced Malware Protection for Networks, 7000 Series Appliances, Advanced Malware Protection for Networks, 8000 Series Appliances , Firepower 4100 Series Security Appliances , FirePOWER 7000 Series Appliances , FirePOWER 8000 Series Appliances , Firepower 9300 Series Security Appliances , FirePOWER Threat Defense for Integrated Services Routers , Sourcefire 3D System Appliances , Virtual Next-Generation Intrusion Prevention System for VMware
| VAR-201610-0292 | CVE-2016-6444 | Cisco Meeting Server Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
A vulnerability in Cisco Meeting Server could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack against a Web Bridge user. More Information: CSCvb03308. Known Affected Releases: 1.8, 1.9, 2.0.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCvb03308
| VAR-201610-0294 | CVE-2016-6446 | Cisco Meeting Server of Web Bridge Vulnerabilities in reading memory from connected servers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in Web Bridge for Cisco Meeting Server could allow an unauthenticated, remote attacker to retrieve memory from a connected server. More Information: CSCvb03308. Known Affected Releases: 1.8, 1.9, 2.0. Vendors have confirmed this vulnerability Bug ID CSCvb03308 It is released as.A third party could read the memory from the connected server.
An attacker can exploit this issue to obtain sensitive information that may aid in further attacks.
This issue is being tracked by Cisco bug ID CSCvb03308