VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201603-0018 CVE-2016-0830 Android of Bluetooth of btif_config.c Service disruption in (DoS) Vulnerabilities CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
btif_config.c in Bluetooth in Android 6.x before 2016-03-01 allows remote attackers to cause a denial of service (memory corruption and persistent daemon crash) by triggering a large number of configuration entries, and consequently exceeding the maximum size of a configuration file, aka internal bug 26071376. Android of Bluetooth of btif_config.c There is a service disruption ( Memory corruption and persistent daemon crash ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug 26071376 It is released as.A third party is triggered to register a large amount of settings, and as a result, the maximum size of the settings file is exceeded. ( Memory corruption and persistent daemon crash ) There is a possibility of being put into a state. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. Bluetooth is one of the Bluetooth components. A security vulnerability exists in the Bluetooth component of previous versions of GoogleNexusBuildsLMY49H
VAR-201603-0022 CVE-2016-0816 Android Vulnerabilities in arbitrary media servers that allow arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
mediaserver in Android 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to decoder/ih264d_parse_islice.c and decoder/ih264d_parse_pslice.c, aka internal bug 25928803. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in Mediaservers prior to GoogleNexusBuildsLMY49H
VAR-201603-0021 CVE-2016-0815 Android Media server libstagefright of MPEG4Extractor.cpp Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
The MPEG4Source::fragmentedRead function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 26365349. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in Mediaservers prior to GoogleNexusBuildsLMY49H
VAR-201603-0118 CVE-2016-1621 Android Media server libvpx Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in mediaservers prior to GoogleNexusBuildsLMY49H. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201603-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Chromium: Multiple vulnerabilities Date: March 12, 2016 Bugs: #555640, #559384, #561448, #563098, #565510, #567308, #567870, #568396, #572542, #574416, #575434, #576354, #576858 ID: 201603-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Background ========== Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 49.0.2623.87 >= 49.0.2623.87 Description =========== Multiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-49.0.2623.87" References ========== [ 1 ] CVE-2015-1270 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270 [ 2 ] CVE-2015-1271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271 [ 3 ] CVE-2015-1272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272 [ 4 ] CVE-2015-1273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273 [ 5 ] CVE-2015-1274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274 [ 6 ] CVE-2015-1275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275 [ 7 ] CVE-2015-1276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276 [ 8 ] CVE-2015-1277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277 [ 9 ] CVE-2015-1278 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278 [ 10 ] CVE-2015-1279 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279 [ 11 ] CVE-2015-1280 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280 [ 12 ] CVE-2015-1281 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281 [ 13 ] CVE-2015-1282 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282 [ 14 ] CVE-2015-1283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283 [ 15 ] CVE-2015-1284 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284 [ 16 ] CVE-2015-1285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285 [ 17 ] CVE-2015-1286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286 [ 18 ] CVE-2015-1287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287 [ 19 ] CVE-2015-1288 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288 [ 20 ] CVE-2015-1289 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289 [ 21 ] CVE-2015-1291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291 [ 22 ] CVE-2015-1292 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292 [ 23 ] CVE-2015-1293 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293 [ 24 ] CVE-2015-1294 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294 [ 25 ] CVE-2015-1295 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295 [ 26 ] CVE-2015-1296 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296 [ 27 ] CVE-2015-1297 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297 [ 28 ] CVE-2015-1298 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298 [ 29 ] CVE-2015-1299 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299 [ 30 ] CVE-2015-1300 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300 [ 31 ] CVE-2015-1302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302 [ 32 ] CVE-2015-1303 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303 [ 33 ] CVE-2015-1304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304 [ 34 ] CVE-2015-6755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755 [ 35 ] CVE-2015-6756 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756 [ 36 ] CVE-2015-6757 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757 [ 37 ] CVE-2015-6758 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758 [ 38 ] CVE-2015-6759 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759 [ 39 ] CVE-2015-6760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760 [ 40 ] CVE-2015-6761 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761 [ 41 ] CVE-2015-6762 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762 [ 42 ] CVE-2015-6763 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763 [ 43 ] CVE-2015-6764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764 [ 44 ] CVE-2015-6765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765 [ 45 ] CVE-2015-6766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766 [ 46 ] CVE-2015-6767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767 [ 47 ] CVE-2015-6768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768 [ 48 ] CVE-2015-6769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769 [ 49 ] CVE-2015-6770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770 [ 50 ] CVE-2015-6771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771 [ 51 ] CVE-2015-6772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772 [ 52 ] CVE-2015-6773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773 [ 53 ] CVE-2015-6774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774 [ 54 ] CVE-2015-6775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775 [ 55 ] CVE-2015-6776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776 [ 56 ] CVE-2015-6777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777 [ 57 ] CVE-2015-6778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778 [ 58 ] CVE-2015-6779 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779 [ 59 ] CVE-2015-6780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780 [ 60 ] CVE-2015-6781 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781 [ 61 ] CVE-2015-6782 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782 [ 62 ] CVE-2015-6783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783 [ 63 ] CVE-2015-6784 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784 [ 64 ] CVE-2015-6785 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785 [ 65 ] CVE-2015-6786 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786 [ 66 ] CVE-2015-6787 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787 [ 67 ] CVE-2015-6788 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788 [ 68 ] CVE-2015-6789 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789 [ 69 ] CVE-2015-6790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790 [ 70 ] CVE-2015-6791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791 [ 71 ] CVE-2015-6792 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792 [ 72 ] CVE-2015-8126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126 [ 73 ] CVE-2016-1612 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612 [ 74 ] CVE-2016-1613 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613 [ 75 ] CVE-2016-1614 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614 [ 76 ] CVE-2016-1615 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615 [ 77 ] CVE-2016-1616 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616 [ 78 ] CVE-2016-1617 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617 [ 79 ] CVE-2016-1618 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618 [ 80 ] CVE-2016-1619 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619 [ 81 ] CVE-2016-1620 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620 [ 82 ] CVE-2016-1621 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621 [ 83 ] CVE-2016-1622 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622 [ 84 ] CVE-2016-1623 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623 [ 85 ] CVE-2016-1624 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624 [ 86 ] CVE-2016-1625 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625 [ 87 ] CVE-2016-1626 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626 [ 88 ] CVE-2016-1627 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627 [ 89 ] CVE-2016-1628 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628 [ 90 ] CVE-2016-1629 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629 [ 91 ] CVE-2016-1630 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630 [ 92 ] CVE-2016-1631 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631 [ 93 ] CVE-2016-1632 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632 [ 94 ] CVE-2016-1633 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633 [ 95 ] CVE-2016-1634 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634 [ 96 ] CVE-2016-1635 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635 [ 97 ] CVE-2016-1636 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636 [ 98 ] CVE-2016-1637 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637 [ 99 ] CVE-2016-1638 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638 [ 100 ] CVE-2016-1639 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639 [ 101 ] CVE-2016-1640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640 [ 102 ] CVE-2016-1641 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201603-09 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
VAR-201603-0028 CVE-2016-1312 Cisco ASA 5500 Content Security and Control Security Services Module Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 before 6.6.1164.0 for Cisco ASA 5500 devices allows remote attackers to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka Bug ID CSCue76147. The Cisco ASA 5500 is the X-series next-generation firewall security appliance from Cisco. A security vulnerability exists in the HTTPSinspection engine of version 6.6 of the Cisco ASA 5500 before CSC-SSM 6.6.1164.0
VAR-201603-0030 CVE-2016-1325 Cisco DPC3939B and DPC3941 Vulnerabilities that can capture important information in the device management interface CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506. Cisco DPC3939B and DPC3941 Device management interfaces contain vulnerabilities that can capture important information. The Cisco DPC3939B and DPC3941 are both wireless voice network management products of Cisco. The web-basedadministration interface is one of the web-based management interfaces
VAR-201603-0031 CVE-2016-1326 Cisco DPQ3925 Denial of Service Vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
The administration interface on Cisco DPQ3925 devices with firmware r1 allows remote attackers to cause a denial of service (device restart) via a crafted HTTP request, aka Bug ID CSCup48105. Cisco DPQ3925 Device management interface has a service disruption ( Device restart ) There are vulnerabilities that are put into a state. The Cisco DPQ3925 is a wireless voice network management product from Cisco. The web-basedadministration interface is one of the web-based management interfaces
VAR-201603-0032 CVE-2016-1327 Cisco DPC2203 and EPC2203 Runs on device firmware Web Server buffer overflow vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935. The Cisco DPC2203 and EPC2203 are both modem products from Cisco
VAR-201604-0102 CVE-2016-3974 SAP NetWeaver Java AS of Configuration Wizard In XML External entity vulnerabilities CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
XML external entity (XXE) vulnerability in the Configuration Wizard in SAP NetWeaver Java AS 7.1 through 7.5 allows remote attackers to cause a denial of service, conduct SMB Relay attacks, or access arbitrary files via a crafted XML request to _tc~monitoring~webservice~web/ServerNodesWSService, aka SAP Security Note 2235994. Vendors have confirmed this vulnerability SAP Security Note 2235994 It is released as. Supplementary information : CWE Vulnerability type by CWE-611: Improper Restriction of XML External Entity Reference ('XXE') (XML Inappropriate restrictions on external entity references ) Has been identified. Attackers can exploit this issue to obtain potentially sensitive information or cause a denial-of-service condition. This may lead to further attacks
VAR-201604-0103 CVE-2016-3975 SAP NetWeaver AS Java Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to inject arbitrary web script or HTML via the navigationTarget parameter to irj/servlet/prt/portal/prteventname/XXX/prtroot/com.sapportals.navigation.testComponent.NavigationURLTester, aka SAP Security Note 2238375. Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. SAP NetWeaver 7.4 is vulnerable; other versions may also be affected
VAR-201603-0204 CVE-2016-1009 Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1007. This vulnerability CVE-2016-1007 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PDFs. The issue lies in the failure to ensure that indexes are within the bounds of an allocated buffer. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
VAR-201603-0203 CVE-2016-1008 Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerability gained in CVSS V2: 7.2
CVSS V3: 8.4
Severity: HIGH
Untrusted search path vulnerability in Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. DLL You may get permission through. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must open a malicious file.The specific flaw exists within the handling of DLL search paths. In specific situations an attacker can force Acrobat Pro DC to load an arbitrary DLL from specific locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
VAR-201603-0202 CVE-2016-1007 Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1009. This vulnerability CVE-2016-1009 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of annotation gestures. The issue lies in the failure to properly initialize the gestures property prior to using it, leading to memory corruption. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
VAR-201603-0300 CVE-2016-1988 HPE Network Automation Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1989. HP Network Automation is an automated network configuration management tool from Hewlett Packard (HP). The tool automates configuration changes, software updates, compliance audits, and tracking and control across a wide range of multi-vendor network devices. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05030906 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05030906 Version: 2 HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure of Sensitive Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. References: - CVE-2016-1988 (SSRT101974) - CVE-2016-1989 (SSRT101943) - PSRT110043 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Network Automation Software versions 9.22, 9.22.01, 9.22.02, 10.00, 10.00.01 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2016-1988 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2016-1989 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 - Hewlett Packard Enterprise thanks Jean-Baptiste Thomas of CNAMTS for reporting CVE-2016-1988 to security-alert@hpe.com - Hewlett Packard Enterprise thanks Thomas Damonneville of CNAMTS for reporting CVE-2016-1989 to security-alert@hpe.com RESOLUTION HPE has made the following mitigation information available to resolve the vulnerabilities in the impacted versions of Network Automation: - For versions 9.22, 9.22.01 and 9.22.02 - Please contact HPE Technical Support. - For versions 10.00 and 10.00.01 upgrade to 10.00.02. Upgrade instructions are available in the following Knowledge Brief: https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets earch/document/KM02017027 HISTORY Version:1 (rev.1) - 3 March 2016 Initial release Version:2 (rev.2) - 29 March 2016 Updated for CNAMTS acknowledgements Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJW+rb/AAoJEGIGBBYqRO9/l2YIALuLfcM+j7kx93G+OSfZ3B6I IU9F9YFOWKRChmfjCW1/n/29dVNWRVYmQXb1ncjBvpDUEhJ/zYCgKkd1RoJFVBbI bh7aQC7ZEoVgnXnQ0/VWwvt6Tq3fKTj1dTtblX16rNalwOgMzQOvLB0uJ+S82wuu hp4Ki2DnhxWsL4z1EoOWQYGAggk9L5LRTdWeniQqERfa8R5VvnsikiT8MmYw3IyL N8N8rOGht3aA1r4rs2Fupyv9EKzw0OePmClR3BaytJoHD6uuodQfaj463wJRhyoX zyhvRlzTrPynV5bI++kVeiMYFzArXSfvPHZyChYEXiTTv1n0jOI3W0wpmKYAosA= =xcA7 -----END PGP SIGNATURE-----
VAR-201603-0301 CVE-2016-1989 HPE Network Automation Vulnerable to arbitrary code execution CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1988. HP Network Automation is an automated network configuration management tool from Hewlett Packard (HP). The tool automates configuration changes, software updates, compliance audits, and tracking and control across a wide range of multi-vendor network devices. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n a-c05030906 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05030906 Version: 2 HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure of Sensitive Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. References: - CVE-2016-1988 (SSRT101974) - CVE-2016-1989 (SSRT101943) - PSRT110043 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Network Automation Software versions 9.22, 9.22.01, 9.22.02, 10.00, 10.00.01 BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2016-1988 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2016-1989 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 - Hewlett Packard Enterprise thanks Jean-Baptiste Thomas of CNAMTS for reporting CVE-2016-1988 to security-alert@hpe.com - Hewlett Packard Enterprise thanks Thomas Damonneville of CNAMTS for reporting CVE-2016-1989 to security-alert@hpe.com RESOLUTION HPE has made the following mitigation information available to resolve the vulnerabilities in the impacted versions of Network Automation: - For versions 9.22, 9.22.01 and 9.22.02 - Please contact HPE Technical Support. - For versions 10.00 and 10.00.01 upgrade to 10.00.02. Upgrade instructions are available in the following Knowledge Brief: https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets earch/document/KM02017027 HISTORY Version:1 (rev.1) - 3 March 2016 Initial release Version:2 (rev.2) - 29 March 2016 Updated for CNAMTS acknowledgements Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability with any HPE supported product, send Email to: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBAgAGBQJW+rb/AAoJEGIGBBYqRO9/l2YIALuLfcM+j7kx93G+OSfZ3B6I IU9F9YFOWKRChmfjCW1/n/29dVNWRVYmQXb1ncjBvpDUEhJ/zYCgKkd1RoJFVBbI bh7aQC7ZEoVgnXnQ0/VWwvt6Tq3fKTj1dTtblX16rNalwOgMzQOvLB0uJ+S82wuu hp4Ki2DnhxWsL4z1EoOWQYGAggk9L5LRTdWeniQqERfa8R5VvnsikiT8MmYw3IyL N8N8rOGht3aA1r4rs2Fupyv9EKzw0OePmClR3BaytJoHD6uuodQfaj463wJRhyoX zyhvRlzTrPynV5bI++kVeiMYFzArXSfvPHZyChYEXiTTv1n0jOI3W0wpmKYAosA= =xcA7 -----END PGP SIGNATURE-----
VAR-201603-0040 CVE-2016-2243 specific HP Commercial PC 2015 Run on Sure Start Service disruption in (DoS) Vulnerabilities CVSS V2: 5.4
CVSS V3: 7.9
Severity: HIGH
Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HP ZBook, etc. ZBook is a set of mobile workstations (high-performance mobile computers); HP EliteBook Folio 1000/800/700 Series are all commercial computer products; HP Z240 Tower/Z240 SFF/Z238 Microtower Workstation N51 are workstations (high-performance computers). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05012469 Version: 1 HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2016-02-25 Last Updated: 2016-02-26 Potential Security Impact: Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY HP has identified a potential security vulnerability with the Sure Start implementation on certain 2015 commercial platforms. This vulnerability could be exploited locally by administrator or root level privileges and if compromised, the Sure Start systems could fail to recover the BIOS. References: * CVE-2016-2243 * PSRT110027 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Commercial Notebook, Desktop, and Workstation versions See the tables in the vulnerability resolution for the impacted products. BACKGROUND For a PGP signed version of this security bulletin please write to: security-alert@hp.com For a PGP signed version of this security bulletin please write to: hp-security-alert@hp.com CVSS 2.0 Base Metrics ================================================================================ Reference Base Vector Base Score CVE-2016-2243 (AV:L/AC:L/Au:N/C:P/I:C/A:P) 6.1 ================================================================================ Information on CVSS is documented in HP Customer Notice: HPSN2008002. RESOLUTION HP has made the following product updates available for the impacted products. To acquire the firmware updates, go to http://www.hp.com 1. Select Support and then Download Drivers. 2. Enter your product name or number in the Find my product field. 3. Choose the product from the returned search. 4. Choose the operating system. 5. Under the Download Index, select BIOS, and download the BIOS version as listed in the table below. Follow the installation instructions to install the firmware update. Series Product name BIOS Version Win Softpaq ZBook HP ZBook 15 G3 & ZBook 17 G3 1.03 SP74756 ZBook HP ZBook 15u G3 1.03 SP74756 ZBook HP ZBook Studio G3 1.04 SP74757 1000 Series HP EliteBook Folio 1040 G3 1.01 SP74768 1000 Series HP EliteBook Folio 1012 x2 G2 1.1 SP74770 1000 Series HP EliteBook 840 G3 1.04 SP74748 1000 Series HP EliteBook 850 G3 1.04 SP74748 1000 Series HP EliteBook 820 G3 1.04 SP74748 700 series HP Elitebook 745 G3 1.08 SP74691 700 series HP Elitebook 755 G3 1.08 SP74691 700 series HP Elitebook 725 G3 1.08 SP74691 700 series HP mt42 Mobile Thin Client 1.05 SP74761 800 series HP EliteDesk 800 G2 TWR 2.09 SP74661 800 series HP EliteDesk 800 G2 DM 2.1 SP74666 800 series HP mp9 G2 Retail System 2.1 SP74666 800 series HP EliteDesk 800 SFF 2.09 SP74661 800 series HP EliteOne 800 G2 23-in T/NT 2.1 SP74680 700 series HP EliteDesk 705 G2 MT/SFF 2.09 SP74655 700 series HP EliteDesk 705 G2 DM 2.05 SP74677 700 series HP EliteOne 705 G2 23in AiO T/NT 2.07 SP74686 Product name BIOS Version Win Softpaq Linux Softpaq HP Z240 Tower Workstation N51 01.11 SP74759 SP74760 HP Z240 SFF Workstation N51 01.11 SP74759 SP74760 HP Z238 Microtower Workstation N51 01.11 SP74759 SP74760 System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." REVISION HISTORY Version:1 (rev.1) 10 February 2016 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send email to hpsecurityalert@hp.com Report: To report a potential security vulnerability with any HP supported product, send email to: hpsecurityalert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://support.hp.com/us/en/subscribe/ Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ secBullArchive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. PI = HP Printing and Imaging HF = HP Hardware and Firmware ST = HP Storage Software GN = HP General Software Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: hp-security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the securityalert PGP key, please send an email message as follows: To: hpsecurityalert@hp.com Subject: get key Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3, HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation N51 Copyright 2016 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJW2LawAAoJEPRuzn0I+N3ZlBQP/iZAxEvLMV62tYPB9zLr//rW 1vK8FkjwQfEuVqL4L6t1kOg8nw9jV/BEh2pYLf94J2LBhFVLJLis7wQhgLZA5ZHa L4Qu1w9QaLjRod74Un2dFXJCYe9Hdqwrk/cAGsTKOg95jaC/IMmULsxIVZoRXtdg d0k0FP2KJjh5qMfDFJSinGn0rmLuVQAzftJ1di2C9/xZ1RLGDId/znZVIrUgzsc2 ngqCVkcxT+0IvngY3vo22mbCv4woZtgR2hIV/FbMOXGOKF0Rj1pWpW5RAYy2aIir /9kT/6RA3+3HLGklROBBwsBarkoo/iUtGeXOLLMCFqn4fxmQLZv4/QqgGHhE8Dll NYwWkJjN1eCc6JsTsV0fny05kS3XDAPY3O1pSohVqgeagn4Ajn1f2FzwgQxOXQZR HPU/29jOs/UwWl5pBkhLX/DiCbIr+VxHCgRGXHKFeCFjFVW4vZcyLwF15H8jdeXq +KNGC8gNdlGeJljBfqBPebws3Iiha8yq+4AvSFI3U6VWozOgRf0WFTqO7r9fiCe9 pYubR8komb7uAzX6jGYkfjIU4Y2ya+l2YKH1snr2TELXYVv6Hf68zYzwCtxdBvGV N78pM4OcvAkurqIaW5skyjVVp2VWc5IZpN9wLmnzj8mj/75yRdbajYndH4x74gXi Mz+Ss7PPSnhjGvCLKb1P =Ftsm -----END PGP SIGNATURE-----
VAR-201603-0041 CVE-2016-2244 plural HP Vulnerability in obtaining important information in printer product firmware CVSS V2: 5.0
CVSS V3: 5.9
Severity: MEDIUM
HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors. HP LaserJetPrinters, HP LaserJetMFP and HPOfficeJetEnterprisePrinters are all printer products developed by Hewlett-Packard (HP). Security flaws exist in several HP products. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05030353 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c05030353 Version: 1 HPSBPI03546 rev.1 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise Printers, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. References: * CVE-2016-2244 (PSR-2016-0021) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Please refer to the RESOLUTION below for a list of impacted products. BACKGROUND For a PGP signed version of this security bulletin please write to: security-alert@hp.com CVSS 2.0 Base Metrics ================================================================================ Reference Base Vector Base Score CVE-2016-2244 (PSR-2016-0021) (AV:N/AC:L/Au:N/C:N/I:C/A:N) 7.8 ================================================================================ RESOLUTION HP has provided firmware updates for impacted printers as listed in the table below. To obtain the updated firmware, go to www.hp.com and follow these steps: 1. Under support, select "Download Drivers". 2. Enter the appropriate product name listed in the table below into the search field. 3. Click on "Find my product". 4. Click on the appropriate product. 5. Under "Operating Systems" select the applicable operating system from the list. 6. Select the appropriate firmware update under "Firmware", click "Download". Firmware Updates Table Affect Product (Model Affected Affected Resolution Firmware Numbers) Firmware Firmware Version (Bundle) Bundle Version HP Color LaserJet 3.6.3 2307497_543950 Enterprise M651 3.6.4 2307619_547160 2307851_000048 (CZ255A, CZ256A, CZ257A, 3.7 2307781_551200 (3.7.01) CZ258A) 3.7.1 2307884_553037 3.7.2 2307939_554654 3.6.3 2307497_543953 HP Color LaserJet 3.6.4 2307619_547145 2307851_000051 Enterprise M750 3.7 2307781_551203 (3.7.01) (D3L08A, D3L09A, D3L10A) 3.7.1 2307884_553040 3.7.2 2307939_554657 3.6.3 2307497_543947 HP Color LaserJet M680 3.6.4 2307619_547157 2307851_000059 (CZ249A, CZ250A, CA251A) 3.7 2307781_551196 (3.7.01) 3.7.1 2307884_553034 3.7.2 2307939_554651 3.6.3 2307497_543957 HP LaserJet Enterprise 500 3.6.4 2307619_547167 2307851_000056 color MFP M575dn 3.7 2307781_551207 (3.7.01) (CD644A, CD645A) 3.7.1 2307884_553044 3.7.2 2307939_554662 3.6.3 2307497_543945 HP LaserJet Enterprise 500 3.6.4 2307619_547155 2307851_000043 MFP M525f 3.7 2307781_551195 (3.7.01) (CF116A, CF117A) 3.7.1 2307884_553032 3.7.2 2307939_554649 3.6.3 2307497_543961 HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M601 3.7 2307781_551208 (3.7.01) (CE989A, CE990A) 3.7.1 2307884_553045 3.7.2 2307939_554664 3.6.3 2307497_543961 HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M602 3.7 2307781_551208 (3.7.01) (CE991A, CE992A, CE993A) 3.7.1 2307884_553045 3.7.2 2307939_554664 3.6.3 2307497_543961 HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040 M603xh 3.7 2307781_551208 (3.7.01) (CE994A, CE995A, CE996A) 3.7.1 2307884_553045 3.7.2 2307939_554664 3.6.3 2307497_543958 HP LaserJet Enterprise 700 3.6.4 2307619_547166 2307851_000055 color MFP M775 series 3.7 2307781_551206 (3.7.01) (CC522A, CC523A, CC524A) 3.7.1 2307884_553043 3.7.2 2307939_554660 3.6.3 2307497_543955 HP LaserJet Enterprise 700 3.6.4 2307619_547165 2307851_000053 M712xh 3.7 2307781_551205 (3.7.01) (CF235A, CF236A, CF238A) 3.7.1 2307884_553042 3.7.2 2307939_554659 3.6.3 2307497_543951 HP LaserJet Enterprise 800 3.6.4 2307619_547161 2307851_000049 color M855 3.7 2307781_551201 (3.7.01) (A2W77A, A2W78A, A2W79A) 3.7.1 2307884_553038 3.7.2 2307939_554655 HP LaserJet Enterprise 800 3.6.3 2307497_543946 color MFP M880 3.6.4 2307619_547156 2307851_000058 (A2W76A, A2W75A, D7P70A, 3.7 2307781_551196 (3.7.01) D7P71A) 3.7.1 2307884_553033 3.7.2 2307939_554650 3.6.3 2307497_543964 HP LaserJet Enterprise 3.6.4 2307619_547169 2307851_000057 Color 500 M551 Series 3.7 2307781_551209 (3.7.01) (CF081A,CF082A,CF083A) 3.7.1 2307884_553046 3.7.2 2307939_554665 3.6.3 2307497_543957 HP LaserJet Enterprise 3.6.4 2307619_547167 2307851_000056 Color flow MFP M575c 3.7 2307781_551207 (3.7.01) (CD646A) 3.7.1 2307884_553044 3.7.2 2307939_554662 3.6.3 2307497_543948 HP LaserJet Enterprise 3.6.4 2307619_547158 2307851_000046 flow M830z MFP 3.7 2307781_551198 (3.7.01) (CF367A) 3.7.1 2307884_553035 3.7.2 2307939_554652 3.6.3 2307497_543945 HP LaserJet Enterprise 3.6.4 2307619_547155 2307851_000043 flow MFP M525c 3.7 2307781_551195 (3.7.01) (CF118A) 3.7.1 2307884_553032 3.7.2 2307939_554649 3.6.3 2307497_543943 HP LaserJet Enterprise 3.6.4 2307619_547153 2307851_000041 Flow MFP M630z 3.7 2307781_551193 (3.7.01) (B3G85A) 3.7.1 2307884_553030 3.7.2 2307939_554647 3.6.3 2307497_543952 HP LaserJet Enterprise 3.6.4 2307619_547163 2307851_000035 M806 3.7 2307781_551202 (3.7.01) (CZ244A, CZ245A) 3.7.1 2307884_553039 3.7.2 2307939_554656 3.6.3 2307497_543943 HP LaserJet Enterprise MFP 3.6.4 2307619_547153 2307851_000041 M630 3.7 2307781_551193 (3.7.01) (J7X28A) 3.7.1 2307884_553030 3.7.2 2307939_554647 HP LaserJet Enterprise MFP 3.6.3 2307497_543954 M725 3.6.4 2307619_547164 2307851_000054 (CF066A, CF067A, CF068A, 3.7 2307781_551204 (3.7.01) CF069A) 3.7.1 2307884_553041 3.7.2 2307939_554658 3.6.3 2307497_543944 HP OfficeJet Enterprise 3.6.4 2307619_547154 2307851_000039 Color MFP X585 3.7 2307781_551194 (3.7.01) (B5L04A, B5L05A, B5L07A) 3.7.1 2307884_553031 3.7.2 2307939_554648 3.6.3 2307497_543949 HP OfficeJet Enterprise 3.6.4 2307619_547159 2307851_000047 Color X555 3.7 2307781_551199 (3.7.01) (C2S11A, C2S12A) 3.7.1 2307884_553036 3.7.2 2307939_554653 System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." REVISION HISTORY Version:1 (rev.1) ? 01 March 2016 Initial release Copyright 2016 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJW2MrgAAoJEPRuzn0I+N3Z+uMQAJ3Z2s5H1BllX7uvcKCeqSfb Y4Lcbd1rWDJiBPaej2fRR97fxVLBO9QTZKEhghTcehpIBfIjLcSR2PxaT8z0RC5C y8lTUFkU4IXXgWd58Pk21jUsFAHuQHQSpSYBQx+7/8ekturguwxlMgxjIJkWWnpU 79pUMCzCR1Q9jLaDNv4hmHCGo42L7Qn/4Kr5PQxWZ19OzdBOtNA5Kk2/DsLR6Q6u tKuBwlh+QMW9rFRenAKrfkZfyA3AeyUy/i4YR2Ghww8GXJzDoyjfFQWzdWJhs9UL LYzymXnkNe74BhthPAkyCQqbunpXOstNWYpG36uSImrNvOs6sOMWUj5saiAT1Znv MLiUMCUXZkadGwavXdWtHBUR7aDARyOPxg6F31XzcgV6bqjKzSUAYGI3WYVf6Jk3 pXrmW49no3y1luXHz6MDlTBKL09aZu9kCOpT555kH1hOu+mAMs0UBY72kDUF3839 +Mcb1R71mYGYR93jAmAXvJ51J2axlN0J7FF7o4mxowfrXPFTapqQF8s90IOhDtLk CQlSCSAD+NV0edzPy0zT77whx8GFIn5+DyEQ9tLfUq9Dl/e4DZWEKya9Q2UfTobJ tFG8VHUsXmk29rFYWk4gViO8OITq8p5A3mjmQ1R4NbQ4KbJJolHoK1PO/7VLHY5W UaJxLGryGjM699Yk6htj =zguU -----END PGP SIGNATURE-----
VAR-201603-0033 CVE-2016-1329 Cisco Nexus 3000 and Nexus 3500 Run on device Cisco NX-OS In root Privileged vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. Cisco Nexus is Cisco's line of network switches designed for data centers. This vulnerability is caused by a user account created during installation that cannot be deleted or changed. The password is also static by default. Allows an unauthenticated remote attacker to log in to the device as root and has bashshell access. NX-OS Software is a data center operating system running on it
VAR-201603-0286 CVE-2016-1357 Cisco Policy Suite of password-management administration In the component RBAC Vulnerabilities that can be bypassed CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
The password-management administration component in Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att, and 7.5.0 allows remote attackers to bypass intended RBAC restrictions and read unspecified data via unknown vectors, aka Bug ID CSCut85211. Cisco Policy Suite (CPS) is a set of next-generation policy management solutions from Cisco. This solution provides functions such as user-based business rules, real-time management of applications and network resources. A security vulnerability exists in the password-management administration component of CPS. The following versions are affected: CPS version 7.0.1.3, version 7.0.2, version 7.0.2-att, version 7.0.3-att, version 7.0.4-att, version 7.5.0
VAR-201603-0329 CVE-2015-0718 plural Cisco Nexus Device and Unified Computing System Run on Cisco NX-OS Service disruption in (DoS) Vulnerabilities CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579. Cisco NX-OS is a data center level operating system. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service on the affected device. The following products are affected: Cisco Nexus 1000V Series Switches, Nexus 3000 Series Switches, Nexus 4000 Series Switches, Nexus 5000 Series Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Unified Computing CSuting running NX-OS Software)