VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201610-0301 CVE-2016-6386 Cisco IOS XE Software IP Fragment Reassembly Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS XE 3.1 through 3.17 and 16.1 on 64-bit platforms allows remote attackers to cause a denial of service (data-structure corruption and device reload) via fragmented IPv4 packets, aka Bug ID CSCux66005. Cisco IOSXESoftware is an operating system developed by Cisco Systems for its network devices. A denial of service vulnerability exists in the IPFragmentReassembly feature in Cisco IOSXESoftware. A remote attacker could exploit the vulnerability by sending a specially crafted IPv4 segmentation packet, causing the device to be overloaded, resulting in a denial of service. Cisco IOS XE Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to restart, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCux66005
VAR-201610-0264 CVE-2016-6392 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.1 through 3.9 allow remote attackers to cause a denial of service (device restart) via a crafted IPv4 Multicast Source Discovery Protocol (MSDP) Source-Active (SA) message, aka Bug ID CSCud36767. Cisco IOS and IOS XE There is a service disruption ( Reboot device ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS/IOSXESoftware has a denial of service vulnerability in the multicast subsystem. An unauthenticated remote attacker exploiting this vulnerability could cause the affected device to be overloaded. This vulnerability is located in both IPv4MSDP and IPv6PIM. These issues are being tracked by Cisco Bug IDs CSCud36767 and CSCuy16399
VAR-201610-0267 CVE-2016-6416 Cisco AsyncOS File Transfer Protocol Denial of Service Vulnerability CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
The FTP service in Cisco AsyncOS on Email Security Appliance (ESA) devices 9.6.0-000 through 9.9.6-026, Web Security Appliance (WSA) devices 9.0.0-162 through 9.5.0-444, and Content Security Management Appliance (SMA) devices allows remote attackers to cause a denial of service via a flood of FTP traffic, aka Bug IDs CSCuz82907, CSCuz84330, and CSCuz86065. Vendors have confirmed this vulnerability Bug ID CSCuz82907 , CSCuz84330 and CSCuz86065 It is released as.A large amount by a third party FTP Service disruption through traffic (DoS) There is a possibility of being put into a state. CiscoAsyncOSonEmailSecurityAppliance (ESA) and so on are products of Cisco. Cisco ESA is a set of email security appliances. Cisco AsyncOS is a set of operating systems used in these products. A denial of service vulnerability exists in the CiscoAsyncOSFileTransferProtocol service. A remote attacker could exploit the vulnerability by sending an FTP data stream to a local FTP service to cause a denial of service. An attacker can exploit this issue to cause denial-of-service condition. This issue is being tracked by Cisco bug IDs CSCuz82907, CSCuz84330 and CSCuz86065. The following products are affected: Cisco ESA versions 9.6.0-000 to 9.9.6-026, Content SMA, WSA versions 9.0.0-162 to 9.5.0-444
VAR-201610-0268 CVE-2016-6417 Cisco FireSIGHT system Software and Firepower Management Center Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
Cross-site request forgery (CSRF) vulnerability in Cisco FireSIGHT System Software 4.10.2 through 6.1.0 and Firepower Management Center allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCva21636. Vendors have confirmed this vulnerability Bug ID CSCva21636 It is released as.A third party may be able to hijack the authentication of any user. An attacker can exploit this issue to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible. This issue is being tracked by Cisco Bug ID CSCva21636
VAR-201610-0269 CVE-2016-6418 Cisco Videoscape Distribution Suite Service Manager Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Cisco Videoscape Distribution Suite Service Manager (VDS-SM) 3.0 through 3.4.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCva14552. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCva14552. The tool provides real-time configuration, management, analysis and monitoring functions
VAR-201610-0350 CVE-2016-5892 IBM Multi-Enterprise Integration Gateway and B2B Advanced Communications Cross-Site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in IBM 10x, as used in Multi-Enterprise Integration Gateway 1.x through 1.0.0.1 and B2B Advanced Communications before 1.0.0.5_2, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. IBMMEIG is a cross-enterprise integrated communications gateway product. IBMB2BAdvanced Communications is a B2B advanced communications product. A 10x cross-site scripting vulnerability exists in IBMMEIG 1.0 to 1.0.0.1 and B2BAdvancedCommunications 1.0.0.2 to 1.0.0.5_1. This vulnerability could be exploited by a remote attacker to inject arbitrary JavaScript code into the WebUI. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201610-0270 CVE-2016-6419 Cisco FirePOWER Management Center In SQL Injection vulnerability CVSS V2: 6.0
CVSS V3: 7.5
Severity: HIGH
SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCur25485. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. This issue is being tracked by Cisco Bug ID CSCur25485
VAR-201610-0271 CVE-2016-6420 Cisco FirePOWER Management Center of FireSIGHT system Vulnerabilities that can bypass authentication checks in software CVSS V2: 6.8
CVSS V3: 6.5
Severity: MEDIUM
Cisco FireSIGHT System Software 4.10.3 through 5.4.0 in Firepower Management Center allows remote authenticated users to bypass authorization checks and gain privileges via a crafted HTTP request, aka Bug ID CSCur25467. An attacker can exploit this issue to gain elevated privileges on an affected device. This issue is being tracked by Cisco Bug ID CSCur25467
VAR-201610-0302 CVE-2016-6378 Cisco IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS XE 3.1 through 3.17 and 16.1 through 16.2 allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets that require NAT, aka Bug ID CSCuw85853. Cisco IOSXE is an operating system developed by Cisco Systems for its network devices. NetworkAddressTranslation (NAT) is one of the network address translation functions. A denial of service vulnerability exists in the implementation of the NAT feature in Cisco IOSXESoftware. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuw85853
VAR-201610-0298 CVE-2016-6382 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS 15.2 through 15.6 and IOS XE 3.6 through 3.17 and 16.1 allow remote attackers to cause a denial of service (device restart) via a malformed IPv6 Protocol Independent Multicast (PIM) register packet, aka Bug ID CSCuy16399. Cisco IOS and IOS XE There is a service disruption ( Reboot device ) There are vulnerabilities that are put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS/IOSXESoftware has a denial of service vulnerability in the multicast subsystem. An unauthenticated remote attacker exploiting this vulnerability could cause the affected device to be overloaded. This vulnerability is located in both IPv4MSDP and IPv6PIM. These issues are being tracked by Cisco Bug IDs CSCud36767 and CSCuy16399
VAR-201610-0304 CVE-2016-6391 Cisco IOS Common Industrial Protocol Denial of service vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS 12.2 and 15.0 through 15.3 allows remote attackers to cause a denial of service (traffic-processing outage) via a crafted series of Common Industrial Protocol (CIP) requests, aka Bug ID CSCur69036. Cisco IOS There is a service disruption ( Stop traffic processing ) There are vulnerabilities that are put into a state. Cisco IOS is an operating system developed by Cisco Systems for its network devices. CommonIndustrialProtocol (CIP) is one of the industrial protocols for industrial automation applications. A remote attacker can request the vulnerability to cause the switch to stop processing the data stream by submitting CIP information, causing a denial of service (reboot). An attacker can exploit this issue to cause denial-of-service conditions. This issue is being tracked by Cisco Bug ID CSCur69036
VAR-201610-0299 CVE-2016-6384 Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco IOS 12.2 through 12.4 and 15.0 through 15.6 and IOS XE 3.1 through 3.17 and 16.2 allow remote attackers to cause a denial of service (device reload) via crafted fields in an H.323 message, aka Bug ID CSCux04257. Both Cisco IOS and IOSXESoftware are operating systems developed by Cisco for its network devices. The vulnerability stems from a program failing to properly validate fields in the H.323 protocol suite. A remote attacker could exploit the vulnerability by accessing an invalid memory area to cause a denial of service (restart and crash). An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCux04257
VAR-201610-0128 CVE-2016-5700 F5 BIG-IP Vulnerability to change system settings in system virtual server CVSS V2: 9.3
CVSS V3: 9.8
Severity: CRITICAL
Virtual servers in F5 BIG-IP systems 11.5.0, 11.5.1 before HF11, 11.5.2, 11.5.3, 11.5.4 before HF2, 11.6.0 before HF8, 11.6.1 before HF1, 12.0.0 before HF4, and 12.1.0 before HF2, when configured with the HTTP Explicit Proxy functionality or SOCKS profile, allow remote attackers to modify the system configuration, read system files, and possibly execute arbitrary code via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlA third party may change system settings, read system files, and execute arbitrary code. Multiple F5 BIG-IP Products are prone to a remote command-execution vulnerability. An attacker can execute arbitrary system commands within the context of the affected application. F5 BIG-IP is an all-in-one network device integrated with network traffic management, application security management, load balancing and other functions from F5 Corporation of the United States. The following versions are affected: F5 BIG-IP System version 11.5.0, version 11.5.1 before HF11, version 11.5.2, version 11.5.3, version 11.5.4 before HF2, version 11.6.0 before HF8, HF1 Version 11.6.1 before, Version 12.0.0 before HF4, Version 12.1.0 before HF2
VAR-201609-0440 CVE-2016-4386 HP Network Automation Local Security Bypass Vulnerability CVSS V2: 6.9
CVSS V3: 7.8
Severity: HIGH
HPE Network Automation Software 10.10 allows local users to write to arbitrary files via unspecified vectors. HP Network Automation is an automated network configuration management tool from Hewlett Packard (HP). The tool automates configuration changes, software updates, compliance audits, and tracking and control across a wide range of multi-vendor network devices. A local security bypass vulnerability exists in HP Network Automation 10.10. An attacker could exploit the vulnerability to bypass security restrictions and perform unauthorized operations. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05281739 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05281739 Version: 1 HPSBGN03650 rev.1 - HPE Network Automation Software, Local Arbitrary File Modification NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The vulnerability could be locally exploited to allow arbitrary file modification. References: CVE-2016-4386 PSRT110063 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Network Automation Software v10.10 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-4386 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N 6.6 (AV:L/AC:L/Au:N/C:C/I:C/A:N) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has made the following mitigation information available to resolve the vulnerability for the impacted versions of HPE Network Automation Software: https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facetse arch/document/KM02413825?lang=en&cc=us&hpappid 2392_SSO_PRO_HPE HISTORY Version:1 (rev.1) - 28 September 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJX7BdgAAoJEGIGBBYqRO9/HOIIAIelNeLzbEVyRx9KLp6MJ+9f oBfrEiEJzZ1lvR8RhD60q4UMuZK17TZWDLDQTd+j386SSBqau9frsXjhnrcfOaoY MXjbP0K3VtJ5szcS0Kprj3KeZmyKNrJmXg1pBFcSulzsJvO8/f/FLccLrYzgcTsy jMhIe/rLmSUGNpNeVN+SmllOWhyvODXoGO9Adh5sMZzRkqlfiXE19vic6W6L9i4e 0gK3nzj8XTB5qsjSsSfddvScrRDUH4zWCKRfLaZM9xGcQLTFaTFhUAeiW73cJnK1 +8LKRA5y5cDiLsa57rg4vAOkOjb7+dtkgKxAYGWiGihwy7zmLg8yIhITHqSwDik= =+wEG -----END PGP SIGNATURE-----
VAR-201610-0210 CVE-2016-8280 Huawei eSight Vulnerable to directory traversal CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Directory traversal vulnerability in Huawei eSight before V300R003C20SPC005 allows remote authenticated users to read arbitrary files via unspecified vectors. Multiple Huawei Products are prone to an directory-traversal vulnerability. This may aid in further attacks. Huawei eSight is a new generation of overall operation and maintenance management solution for enterprise basic network, unified communication, telepresence conferencing, video surveillance and data center developed by Huawei in China. This solution supports unified monitoring and configuration management for multi-vendor and multi-type equipment, and monitors and analyzes network and service quality. There is a path traversal vulnerability in Huawei eSight V300R002C00, V300R003C10, and V300R003C20. The vulnerability is caused by the program not fully verifying the path. Remote attackers can exploit this vulnerability to download unauthorized files, resulting in information disclosure
VAR-201612-0004 CVE-2016-2246 HP ThinPro Vulnerable to access restrictions CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
HP ThinPro 4.4 through 6.1 mishandles the keyboard layout control panel and virtual keyboard application, which allows local users to bypass intended access restrictions and gain privileges via unspecified vectors. HPThinPro is a thin client device from Hewlett Packard (HP). An attacker could exploit the vulnerability to gain unauthorized access to HP client devices and elevation of privileges. HP ThinPro is prone to local privilege-escalation vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the root privileges
VAR-201704-0125 CVE-2016-5312 Symantec Messaging Gateway of charting Directory traversal vulnerability in components CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Directory traversal vulnerability in the charting component in Symantec Messaging Gateway before 10.6.2 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the sn parameter to brightmail/servlet/com.ve.kavachart.servlet.ChartStream. Symantec Messaging Gateway is prone to a directory-traversal vulnerability. An attackers can use specially crafted requests with directory-traversal sequences ('../') to read arbitrary files in the context of the application. This may aid in further attacks. Symantec Messaging Gateway is a spam filter that integrates anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies from Symantec. Charting is one of the charting components
VAR-201609-0481 CVE-2016-7052 OpenSSL of crypto/x509/x509_vfy.c Service disruption in (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. OpenSSL is prone to denial-of-service vulnerability. An attacker may exploit this issue to crash the affected application, resulting in a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201612-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 07, 2016 Bugs: #581234, #585142, #585276, #591454, #592068, #592074, #592082, #594500, #595186 ID: 201612-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL, the worst of which allows attackers to conduct a time based side-channel attack. Background ========== OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/openssl < 1.0.2j >= 1.0.2j Description =========== Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers and the International Association for Cryptologic Research's (IACR) paper, "Make Sure DSA Signing Exponentiations Really are Constant-Time" for further details. Additionally, a time based side-channel attack may allow a local attacker to recover a private DSA key. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenSSL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2j" References ========== [ 1 ] CVE-2016-2105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2105 [ 2 ] CVE-2016-2106 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2106 [ 3 ] CVE-2016-2107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2107 [ 4 ] CVE-2016-2108 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2108 [ 5 ] CVE-2016-2109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2109 [ 6 ] CVE-2016-2176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2176 [ 7 ] CVE-2016-2177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2177 [ 8 ] CVE-2016-2178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2178 [ 9 ] CVE-2016-2180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2180 [ 10 ] CVE-2016-2183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2183 [ 11 ] CVE-2016-6304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6304 [ 12 ] CVE-2016-6305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6305 [ 13 ] CVE-2016-6306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6306 [ 14 ] CVE-2016-7052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7052 [ 15 ] Make Sure DSA Signing Exponentiations Really are Constant-Time http://eprint.iacr.org/2016/594.pdf Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201612-16 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] openssl (SSA:2016-270-01) New openssl packages are available for Slackware 14.2 and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.2j-i586-1_slack14.2.txz: Upgraded. This update fixes a security issue: Missing CRL sanity check (CVE-2016-7052) For more information, see: https://www.openssl.org/news/secadv/20160926.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052 (* Security fix *) patches/packages/openssl-solibs-1.0.2j-i586-1_slack14.2.txz: Upgraded. +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-1.0.2j-i586-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-solibs-1.0.2j-i586-1_slack14.2.txz Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-1.0.2j-x86_64-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-solibs-1.0.2j-x86_64-1_slack14.2.txz Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.2j-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.2j-i586-1.txz Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.2j-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.2j-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.2 packages: cf3e90f91b35ee96f5a900e5f2ec8fd5 openssl-1.0.2j-i586-1_slack14.2.txz 31cc46351fdd4c487f75abdbfcd696e7 openssl-solibs-1.0.2j-i586-1_slack14.2.txz Slackware x86_64 14.2 packages: 333fd278752b5f04a805aeabd77f28c4 openssl-1.0.2j-x86_64-1_slack14.2.txz 6b25daf23b1cfc59351308b9c11e830a openssl-solibs-1.0.2j-x86_64-1_slack14.2.txz Slackware -current packages: 98337bdfe00f04be784953fee5c023ca a/openssl-solibs-1.0.2j-i586-1.txz 3cd05a7ed655e7f51f652a31b9b908e7 n/openssl-1.0.2j-i586-1.txz Slackware x86_64 -current packages: 6907d9a091ace959d8f04aa92cd7e5f6 a/openssl-solibs-1.0.2j-x86_64-1.txz 4017d82d5c4c370ab6850a5d623d321a n/openssl-1.0.2j-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the packages as root: # upgradepkg openssl-1.0.2j-i586-1_slack14.2.txz openssl-solibs-1.0.2j-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- iEYEARECAAYFAlfpZcsACgkQakRjwEAQIjPMMACbB1R3zcPgLf11KPr1jtmRE7PN BvgAnjd81wwT0k1DTOieELSStonzadsk =AuZJ -----END PGP SIGNATURE-----
VAR-201609-0352 CVE-2016-6309 OpenSSL of statem/statem.c Service disruption in (DoS) Vulnerabilities CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. OpenSSL is prone to a remote code execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions
VAR-201609-0567 CVE-2016-6826 Huawei AnyMail Service disruption in (DoS) Vulnerabilities CVSS V2: 7.1
CVSS V3: 6.5
Severity: MEDIUM
Huawei AnyMail before 2.6.0301.0060 allows remote attackers to cause a denial of service (application crash) via a crafted compressed email attachment. Huawei AnyMail There is a service disruption ( Application crash ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. Huawei AnyMail is a set of mobile mail application platform of China Huawei (Huawei). Security vulnerabilities exist in Huawei AnyMail versions 2.5.0501.0190 and 2.5.0301.0190