VARIoT IoT vulnerabilities database
| VAR-201603-0018 | CVE-2016-0830 | Android of Bluetooth of btif_config.c Service disruption in (DoS) Vulnerabilities |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
btif_config.c in Bluetooth in Android 6.x before 2016-03-01 allows remote attackers to cause a denial of service (memory corruption and persistent daemon crash) by triggering a large number of configuration entries, and consequently exceeding the maximum size of a configuration file, aka internal bug 26071376. Android of Bluetooth of btif_config.c There is a service disruption ( Memory corruption and persistent daemon crash ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug 26071376 It is released as.A third party is triggered to register a large amount of settings, and as a result, the maximum size of the settings file is exceeded. ( Memory corruption and persistent daemon crash ) There is a possibility of being put into a state. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. Bluetooth is one of the Bluetooth components. A security vulnerability exists in the Bluetooth component of previous versions of GoogleNexusBuildsLMY49H
| VAR-201603-0022 | CVE-2016-0816 | Android Vulnerabilities in arbitrary media servers that allow arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
mediaserver in Android 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to decoder/ih264d_parse_islice.c and decoder/ih264d_parse_pslice.c, aka internal bug 25928803. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in Mediaservers prior to GoogleNexusBuildsLMY49H
| VAR-201603-0021 | CVE-2016-0815 | Android Media server libstagefright of MPEG4Extractor.cpp Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
The MPEG4Source::fragmentedRead function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.x before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 26365349. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in Mediaservers prior to GoogleNexusBuildsLMY49H
| VAR-201603-0118 | CVE-2016-1621 | Android Media server libvpx Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
libvpx in mediaserver in Android 4.x before 4.4.4, 5.x before 5.1.1 LMY49H, and 6.0 before 2016-03-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, related to libwebm/mkvparser.cpp and other files, aka internal bug 23452792. GoogleNexus is a series of smart devices based on the Android operating system developed by Google Inc. of the United States, including mobile phones and tablets. The smart device is powered by Google and licensed to partner hardware vendors for manufacturing. A security vulnerability exists in mediaservers prior to GoogleNexusBuildsLMY49H. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201603-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Chromium: Multiple vulnerabilities
Date: March 12, 2016
Bugs: #555640, #559384, #561448, #563098, #565510, #567308,
#567870, #568396, #572542, #574416, #575434, #576354, #576858
ID: 201603-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in the Chromium web browser,
the worst of which allows remote attackers to execute arbitrary code.
Background
==========
Chromium is an open-source browser project that aims to build a safer,
faster, and more stable way for all users to experience the web.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 49.0.2623.87 >= 49.0.2623.87
Description
===========
Multiple vulnerabilities have been discovered in the Chromium web
browser. Please review the CVE identifiers referenced below for
details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-49.0.2623.87"
References
==========
[ 1 ] CVE-2015-1270
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1270
[ 2 ] CVE-2015-1271
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1271
[ 3 ] CVE-2015-1272
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1272
[ 4 ] CVE-2015-1273
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1273
[ 5 ] CVE-2015-1274
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1274
[ 6 ] CVE-2015-1275
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1275
[ 7 ] CVE-2015-1276
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1276
[ 8 ] CVE-2015-1277
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1277
[ 9 ] CVE-2015-1278
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1278
[ 10 ] CVE-2015-1279
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1279
[ 11 ] CVE-2015-1280
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1280
[ 12 ] CVE-2015-1281
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1281
[ 13 ] CVE-2015-1282
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1282
[ 14 ] CVE-2015-1283
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1283
[ 15 ] CVE-2015-1284
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1284
[ 16 ] CVE-2015-1285
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1285
[ 17 ] CVE-2015-1286
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1286
[ 18 ] CVE-2015-1287
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1287
[ 19 ] CVE-2015-1288
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1288
[ 20 ] CVE-2015-1289
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1289
[ 21 ] CVE-2015-1291
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1291
[ 22 ] CVE-2015-1292
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1292
[ 23 ] CVE-2015-1293
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1293
[ 24 ] CVE-2015-1294
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1294
[ 25 ] CVE-2015-1295
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1295
[ 26 ] CVE-2015-1296
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1296
[ 27 ] CVE-2015-1297
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1297
[ 28 ] CVE-2015-1298
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1298
[ 29 ] CVE-2015-1299
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1299
[ 30 ] CVE-2015-1300
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1300
[ 31 ] CVE-2015-1302
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1302
[ 32 ] CVE-2015-1303
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1303
[ 33 ] CVE-2015-1304
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1304
[ 34 ] CVE-2015-6755
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6755
[ 35 ] CVE-2015-6756
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6756
[ 36 ] CVE-2015-6757
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6757
[ 37 ] CVE-2015-6758
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6758
[ 38 ] CVE-2015-6759
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6759
[ 39 ] CVE-2015-6760
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6760
[ 40 ] CVE-2015-6761
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6761
[ 41 ] CVE-2015-6762
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6762
[ 42 ] CVE-2015-6763
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6763
[ 43 ] CVE-2015-6764
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6764
[ 44 ] CVE-2015-6765
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6765
[ 45 ] CVE-2015-6766
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6766
[ 46 ] CVE-2015-6767
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6767
[ 47 ] CVE-2015-6768
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6768
[ 48 ] CVE-2015-6769
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6769
[ 49 ] CVE-2015-6770
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6770
[ 50 ] CVE-2015-6771
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6771
[ 51 ] CVE-2015-6772
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6772
[ 52 ] CVE-2015-6773
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6773
[ 53 ] CVE-2015-6774
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6774
[ 54 ] CVE-2015-6775
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6775
[ 55 ] CVE-2015-6776
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6776
[ 56 ] CVE-2015-6777
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6777
[ 57 ] CVE-2015-6778
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6778
[ 58 ] CVE-2015-6779
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6779
[ 59 ] CVE-2015-6780
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6780
[ 60 ] CVE-2015-6781
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6781
[ 61 ] CVE-2015-6782
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6782
[ 62 ] CVE-2015-6783
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6783
[ 63 ] CVE-2015-6784
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6784
[ 64 ] CVE-2015-6785
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6785
[ 65 ] CVE-2015-6786
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6786
[ 66 ] CVE-2015-6787
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6787
[ 67 ] CVE-2015-6788
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6788
[ 68 ] CVE-2015-6789
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6789
[ 69 ] CVE-2015-6790
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6790
[ 70 ] CVE-2015-6791
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6791
[ 71 ] CVE-2015-6792
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6792
[ 72 ] CVE-2015-8126
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8126
[ 73 ] CVE-2016-1612
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1612
[ 74 ] CVE-2016-1613
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1613
[ 75 ] CVE-2016-1614
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1614
[ 76 ] CVE-2016-1615
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1615
[ 77 ] CVE-2016-1616
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1616
[ 78 ] CVE-2016-1617
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1617
[ 79 ] CVE-2016-1618
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1618
[ 80 ] CVE-2016-1619
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1619
[ 81 ] CVE-2016-1620
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1620
[ 82 ] CVE-2016-1621
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1621
[ 83 ] CVE-2016-1622
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1622
[ 84 ] CVE-2016-1623
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1623
[ 85 ] CVE-2016-1624
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1624
[ 86 ] CVE-2016-1625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1625
[ 87 ] CVE-2016-1626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1626
[ 88 ] CVE-2016-1627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1627
[ 89 ] CVE-2016-1628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1628
[ 90 ] CVE-2016-1629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1629
[ 91 ] CVE-2016-1630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1630
[ 92 ] CVE-2016-1631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1631
[ 93 ] CVE-2016-1632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1632
[ 94 ] CVE-2016-1633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1633
[ 95 ] CVE-2016-1634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1634
[ 96 ] CVE-2016-1635
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1635
[ 97 ] CVE-2016-1636
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1636
[ 98 ] CVE-2016-1637
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1637
[ 99 ] CVE-2016-1638
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1638
[ 100 ] CVE-2016-1639
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1639
[ 101 ] CVE-2016-1640
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1640
[ 102 ] CVE-2016-1641
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1641
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201603-09
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201603-0028 | CVE-2016-1312 | Cisco ASA 5500 Content Security and Control Security Services Module Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The HTTPS inspection engine in the Content Security and Control Security Services Module (CSC-SSM) 6.6 before 6.6.1164.0 for Cisco ASA 5500 devices allows remote attackers to cause a denial of service (memory consumption or device reload) via a flood of HTTPS packets, aka Bug ID CSCue76147. The Cisco ASA 5500 is the X-series next-generation firewall security appliance from Cisco. A security vulnerability exists in the HTTPSinspection engine of version 6.6 of the Cisco ASA 5500 before CSC-SSM 6.6.1164.0
| VAR-201603-0030 | CVE-2016-1325 | Cisco DPC3939B and DPC3941 Vulnerabilities that can capture important information in the device management interface |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote attackers to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506. Cisco DPC3939B and DPC3941 Device management interfaces contain vulnerabilities that can capture important information. The Cisco DPC3939B and DPC3941 are both wireless voice network management products of Cisco. The web-basedadministration interface is one of the web-based management interfaces
| VAR-201603-0031 | CVE-2016-1326 | Cisco DPQ3925 Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The administration interface on Cisco DPQ3925 devices with firmware r1 allows remote attackers to cause a denial of service (device restart) via a crafted HTTP request, aka Bug ID CSCup48105. Cisco DPQ3925 Device management interface has a service disruption ( Device restart ) There are vulnerabilities that are put into a state. The Cisco DPQ3925 is a wireless voice network management product from Cisco. The web-basedadministration interface is one of the web-based management interfaces
| VAR-201603-0032 | CVE-2016-1327 | Cisco DPC2203 and EPC2203 Runs on device firmware Web Server buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935. The Cisco DPC2203 and EPC2203 are both modem products from Cisco
| VAR-201604-0102 | CVE-2016-3974 | SAP NetWeaver Java AS of Configuration Wizard In XML External entity vulnerabilities |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
XML external entity (XXE) vulnerability in the Configuration Wizard in SAP NetWeaver Java AS 7.1 through 7.5 allows remote attackers to cause a denial of service, conduct SMB Relay attacks, or access arbitrary files via a crafted XML request to _tc~monitoring~webservice~web/ServerNodesWSService, aka SAP Security Note 2235994. Vendors have confirmed this vulnerability SAP Security Note 2235994 It is released as. Supplementary information : CWE Vulnerability type by CWE-611: Improper Restriction of XML External Entity Reference ('XXE') (XML Inappropriate restrictions on external entity references ) Has been identified.
Attackers can exploit this issue to obtain potentially sensitive information or cause a denial-of-service condition. This may lead to further attacks
| VAR-201604-0103 | CVE-2016-3975 | SAP NetWeaver AS Java Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to inject arbitrary web script or HTML via the navigationTarget parameter to irj/servlet/prt/portal/prteventname/XXX/prtroot/com.sapportals.navigation.testComponent.NavigationURLTester, aka SAP Security Note 2238375.
Remote attackers can exploit this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
SAP NetWeaver 7.4 is vulnerable; other versions may also be affected
| VAR-201603-0204 | CVE-2016-1009 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1007. This vulnerability CVE-2016-1007 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PDFs. The issue lies in the failure to ensure that indexes are within the bounds of an allocated buffer. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
| VAR-201603-0203 | CVE-2016-1008 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerability gained in |
CVSS V2: 7.2 CVSS V3: 8.4 Severity: HIGH |
Untrusted search path vulnerability in Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. DLL You may get permission through. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must open a malicious file.The specific flaw exists within the handling of DLL search paths. In specific situations an attacker can force Acrobat Pro DC to load an arbitrary DLL from specific locations. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
| VAR-201603-0202 | CVE-2016-1007 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.006.30121, and Acrobat and Acrobat Reader DC Continuous before 15.010.20060 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1009. This vulnerability CVE-2016-1009 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of annotation gestures. The issue lies in the failure to properly initialize the gestures property prior to using it, leading to memory corruption. Adobe Acrobat DC, etc. are all products of Adobe (Adobe) in the United States. Acrobat DC is a desktop PDF solution; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A security vulnerability exists in several Adobe products due to the program not properly initializing gesture properties
| VAR-201603-0300 | CVE-2016-1988 | HPE Network Automation Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1989. HP Network Automation is an automated network configuration management tool from Hewlett Packard (HP). The tool automates configuration changes, software updates, compliance audits, and tracking and control across a wide range of multi-vendor network devices. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05030906
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05030906
Version: 2
HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure
of Sensitive Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
References:
- CVE-2016-1988 (SSRT101974)
- CVE-2016-1989 (SSRT101943)
- PSRT110043
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Automation Software versions 9.22, 9.22.01, 9.22.02, 10.00,
10.00.01
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2016-1988 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
CVE-2016-1989 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
- Hewlett Packard Enterprise thanks Jean-Baptiste Thomas of CNAMTS for
reporting CVE-2016-1988 to security-alert@hpe.com
- Hewlett Packard Enterprise thanks Thomas Damonneville of CNAMTS for
reporting CVE-2016-1989 to security-alert@hpe.com
RESOLUTION
HPE has made the following mitigation information available to resolve the
vulnerabilities in the impacted versions of Network Automation:
- For versions 9.22, 9.22.01 and 9.22.02 - Please contact HPE Technical
Support.
- For versions 10.00 and 10.00.01 upgrade to 10.00.02.
Upgrade instructions are available in the following Knowledge Brief:
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets
earch/document/KM02017027
HISTORY
Version:1 (rev.1) - 3 March 2016 Initial release
Version:2 (rev.2) - 29 March 2016 Updated for CNAMTS acknowledgements
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJW+rb/AAoJEGIGBBYqRO9/l2YIALuLfcM+j7kx93G+OSfZ3B6I
IU9F9YFOWKRChmfjCW1/n/29dVNWRVYmQXb1ncjBvpDUEhJ/zYCgKkd1RoJFVBbI
bh7aQC7ZEoVgnXnQ0/VWwvt6Tq3fKTj1dTtblX16rNalwOgMzQOvLB0uJ+S82wuu
hp4Ki2DnhxWsL4z1EoOWQYGAggk9L5LRTdWeniQqERfa8R5VvnsikiT8MmYw3IyL
N8N8rOGht3aA1r4rs2Fupyv9EKzw0OePmClR3BaytJoHD6uuodQfaj463wJRhyoX
zyhvRlzTrPynV5bI++kVeiMYFzArXSfvPHZyChYEXiTTv1n0jOI3W0wpmKYAosA=
=xcA7
-----END PGP SIGNATURE-----
| VAR-201603-0301 | CVE-2016-1989 | HPE Network Automation Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
HPE Network Automation 9.22 through 9.22.02 and 10.x before 10.00.02 allows remote attackers to execute arbitrary code or obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-1988. HP Network Automation is an automated network configuration management tool from Hewlett Packard (HP). The tool automates configuration changes, software updates, compliance audits, and tracking and control across a wide range of multi-vendor network devices. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n
a-c05030906
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05030906
Version: 2
HPSBGN03444 rev.2 - HPE Network Automation, Remote Code Execution, Disclosure
of Sensitive Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
References:
- CVE-2016-1988 (SSRT101974)
- CVE-2016-1989 (SSRT101943)
- PSRT110043
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Network Automation Software versions 9.22, 9.22.01, 9.22.02, 10.00,
10.00.01
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2016-1988 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
CVE-2016-1989 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
- Hewlett Packard Enterprise thanks Jean-Baptiste Thomas of CNAMTS for
reporting CVE-2016-1988 to security-alert@hpe.com
- Hewlett Packard Enterprise thanks Thomas Damonneville of CNAMTS for
reporting CVE-2016-1989 to security-alert@hpe.com
RESOLUTION
HPE has made the following mitigation information available to resolve the
vulnerabilities in the impacted versions of Network Automation:
- For versions 9.22, 9.22.01 and 9.22.02 - Please contact HPE Technical
Support.
- For versions 10.00 and 10.00.01 upgrade to 10.00.02.
Upgrade instructions are available in the following Knowledge Brief:
https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facets
earch/document/KM02017027
HISTORY
Version:1 (rev.1) - 3 March 2016 Initial release
Version:2 (rev.2) - 29 March 2016 Updated for CNAMTS acknowledgements
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability with any HPE supported
product, send Email to: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJW+rb/AAoJEGIGBBYqRO9/l2YIALuLfcM+j7kx93G+OSfZ3B6I
IU9F9YFOWKRChmfjCW1/n/29dVNWRVYmQXb1ncjBvpDUEhJ/zYCgKkd1RoJFVBbI
bh7aQC7ZEoVgnXnQ0/VWwvt6Tq3fKTj1dTtblX16rNalwOgMzQOvLB0uJ+S82wuu
hp4Ki2DnhxWsL4z1EoOWQYGAggk9L5LRTdWeniQqERfa8R5VvnsikiT8MmYw3IyL
N8N8rOGht3aA1r4rs2Fupyv9EKzw0OePmClR3BaytJoHD6uuodQfaj463wJRhyoX
zyhvRlzTrPynV5bI++kVeiMYFzArXSfvPHZyChYEXiTTv1n0jOI3W0wpmKYAosA=
=xcA7
-----END PGP SIGNATURE-----
| VAR-201603-0040 | CVE-2016-2243 | specific HP Commercial PC 2015 Run on Sure Start Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.4 CVSS V3: 7.9 Severity: HIGH |
Sure Start on HP Commercial PCs 2015 allows local users to cause a denial of service (BIOS recovery failure) by leveraging administrative access. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. HP ZBook, etc. ZBook is a set of mobile workstations (high-performance mobile computers); HP EliteBook Folio 1000/800/700 Series are all commercial computer products; HP Z240 Tower/Z240 SFF/Z238 Microtower Workstation N51 are workstations (high-performance computers). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05012469
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05012469
Version: 1
HPSBHF03439 rev.1 - HP Commercial PCs with Sure Start, Local Denial of Service
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.
Release Date: 2016-02-25
Last Updated: 2016-02-26
Potential Security Impact: Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
HP has identified a potential security vulnerability with the Sure Start
implementation on certain 2015 commercial platforms. This vulnerability could
be exploited locally by administrator or root level privileges and if
compromised, the Sure Start systems could fail to recover the BIOS.
References:
* CVE-2016-2243
* PSRT110027
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Commercial Notebook, Desktop, and Workstation versions See the tables in the
vulnerability resolution for the impacted products.
BACKGROUND
For a PGP signed version of this security bulletin please write to:
security-alert@hp.com
For a PGP signed version of this security bulletin please write to:
hp-security-alert@hp.com
CVSS 2.0 Base Metrics
================================================================================
Reference Base Vector Base Score
CVE-2016-2243 (AV:L/AC:L/Au:N/C:P/I:C/A:P) 6.1
================================================================================
Information on CVSS is documented in HP Customer Notice: HPSN2008002.
RESOLUTION
HP has made the following product updates available for the impacted products.
To acquire the firmware updates, go to http://www.hp.com
1. Select Support and then Download Drivers.
2. Enter your product name or number in the Find my product field.
3. Choose the product from the returned search.
4. Choose the operating system.
5. Under the Download Index, select BIOS, and download the BIOS version as
listed in the table below. Follow the installation instructions to install
the firmware update.
Series Product name BIOS Version Win Softpaq
ZBook HP ZBook 15 G3 & ZBook 17 G3 1.03 SP74756
ZBook HP ZBook 15u G3 1.03 SP74756
ZBook HP ZBook Studio G3 1.04 SP74757
1000 Series HP EliteBook Folio 1040 G3 1.01 SP74768
1000 Series HP EliteBook Folio 1012 x2 G2 1.1 SP74770
1000 Series HP EliteBook 840 G3 1.04 SP74748
1000 Series HP EliteBook 850 G3 1.04 SP74748
1000 Series HP EliteBook 820 G3 1.04 SP74748
700 series HP Elitebook 745 G3 1.08 SP74691
700 series HP Elitebook 755 G3 1.08 SP74691
700 series HP Elitebook 725 G3 1.08 SP74691
700 series HP mt42 Mobile Thin Client 1.05 SP74761
800 series HP EliteDesk 800 G2 TWR 2.09 SP74661
800 series HP EliteDesk 800 G2 DM 2.1 SP74666
800 series HP mp9 G2 Retail System 2.1 SP74666
800 series HP EliteDesk 800 SFF 2.09 SP74661
800 series HP EliteOne 800 G2 23-in T/NT 2.1 SP74680
700 series HP EliteDesk 705 G2 MT/SFF 2.09 SP74655
700 series HP EliteDesk 705 G2 DM 2.05 SP74677
700 series HP EliteOne 705 G2 23in AiO T/NT 2.07 SP74686
Product name BIOS Version Win Softpaq Linux Softpaq
HP Z240 Tower Workstation N51 01.11 SP74759 SP74760
HP Z240 SFF Workstation N51 01.11 SP74759 SP74760
HP Z238 Microtower Workstation N51 01.11 SP74759 SP74760
System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current secure
solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the
attention of users of the affected HP products the important security
information contained in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual situations and take
appropriate action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law, HP
disclaims all warranties, either express or implied, including the warranties
of merchantability and fitness for a particular purpose, title and
non-infringement."
REVISION HISTORY
Version:1 (rev.1) 10 February 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send email to hpsecurityalert@hp.com
Report: To report a potential security vulnerability with any HP supported
product, send email to: hpsecurityalert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email: http://support.hp.com/us/en/subscribe/
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
secBullArchive
Software Product Category: The Software Product Category is represented in the
title by the two characters following HPSB.
PI = HP Printing and Imaging
HF = HP Hardware and Firmware
ST = HP Storage Software
GN = HP General Software
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: hp-security-alert@hp.com It is strongly recommended
that security related information being communicated to HP be encrypted using
PGP, especially exploit information.
To get the securityalert PGP key, please send an email message as follows:
To: hpsecurityalert@hp.com
Subject: get key
Products: HP ZBook 15 G3 & ZBook 17 G3, HP ZBook 15u G3, HP ZBook Studio G3, HP
EliteBook Folio 1040 G3, HP EliteBook Folio 1012 x2 G2, HP EliteBook 840 G3, HP
EliteBook 850 G3, HP EliteBook 820 G3, H Elitebook 745 G3, HP Elitebook 755 G3,
HP Elitebook 725 G3, HP mt42 Mobile Thin Client, HP EliteDesk 8, HP Z240 Tower
Workstation N51, HP Z240 SFF Workstation N51, HP Z238 Microtower Workstation
N51
Copyright 2016 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or its
affiliates, subcontractors or suppliers will be liable for incidental,special
or consequential damages including downtime cost; lost profits;damages relating
to the procurement of substitute products or services; or damages for loss of
data, or software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard Company in the
United States and other countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=Ftsm
-----END PGP SIGNATURE-----
| VAR-201603-0041 | CVE-2016-2244 | plural HP Vulnerability in obtaining important information in printer product firmware |
CVSS V2: 5.0 CVSS V3: 5.9 Severity: MEDIUM |
HP LaserJet printers and MFPs and OfficeJet Enterprise printers with firmware before 3.7.01 allow remote attackers to obtain sensitive information via unspecified vectors. HP LaserJetPrinters, HP LaserJetMFP and HPOfficeJetEnterprisePrinters are all printer products developed by Hewlett-Packard (HP). Security flaws exist in several HP products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20565.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c05030353
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05030353
Version: 1
HPSBPI03546 rev.1 - HP LaserJet Printers and MFPs, HP OfficeJet Enterprise
Printers, Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon
as possible.
References:
* CVE-2016-2244 (PSR-2016-0021)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Please refer to the RESOLUTION below for a list of impacted products.
BACKGROUND
For a PGP signed version of this security bulletin please write to:
security-alert@hp.com
CVSS 2.0 Base Metrics
================================================================================
Reference Base Vector Base Score
CVE-2016-2244 (PSR-2016-0021) (AV:N/AC:L/Au:N/C:N/I:C/A:N) 7.8
================================================================================
RESOLUTION
HP has provided firmware updates for impacted printers as listed in the table
below. To obtain the updated firmware, go to www.hp.com and follow these steps:
1. Under support, select "Download Drivers".
2. Enter the appropriate product name listed in the table below into the
search field.
3. Click on "Find my product".
4. Click on the appropriate product.
5. Under "Operating Systems" select the applicable operating system from the
list.
6. Select the appropriate firmware update under "Firmware", click "Download".
Firmware Updates Table
Affect Product (Model Affected Affected Resolution Firmware
Numbers) Firmware Firmware Version (Bundle)
Bundle Version
HP Color LaserJet 3.6.3 2307497_543950
Enterprise M651 3.6.4 2307619_547160 2307851_000048
(CZ255A, CZ256A, CZ257A, 3.7 2307781_551200 (3.7.01)
CZ258A) 3.7.1 2307884_553037
3.7.2 2307939_554654
3.6.3 2307497_543953
HP Color LaserJet 3.6.4 2307619_547145 2307851_000051
Enterprise M750 3.7 2307781_551203 (3.7.01)
(D3L08A, D3L09A, D3L10A) 3.7.1 2307884_553040
3.7.2 2307939_554657
3.6.3 2307497_543947
HP Color LaserJet M680 3.6.4 2307619_547157 2307851_000059
(CZ249A, CZ250A, CA251A) 3.7 2307781_551196 (3.7.01)
3.7.1 2307884_553034
3.7.2 2307939_554651
3.6.3 2307497_543957
HP LaserJet Enterprise 500 3.6.4 2307619_547167 2307851_000056
color MFP M575dn 3.7 2307781_551207 (3.7.01)
(CD644A, CD645A) 3.7.1 2307884_553044
3.7.2 2307939_554662
3.6.3 2307497_543945
HP LaserJet Enterprise 500 3.6.4 2307619_547155 2307851_000043
MFP M525f 3.7 2307781_551195 (3.7.01)
(CF116A, CF117A) 3.7.1 2307884_553032
3.7.2 2307939_554649
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040
M601 3.7 2307781_551208 (3.7.01)
(CE989A, CE990A) 3.7.1 2307884_553045
3.7.2 2307939_554664
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040
M602 3.7 2307781_551208 (3.7.01)
(CE991A, CE992A, CE993A) 3.7.1 2307884_553045
3.7.2 2307939_554664
3.6.3 2307497_543961
HP LaserJet Enterprise 600 3.6.4 2307619_547168 2307851_000040
M603xh 3.7 2307781_551208 (3.7.01)
(CE994A, CE995A, CE996A) 3.7.1 2307884_553045
3.7.2 2307939_554664
3.6.3 2307497_543958
HP LaserJet Enterprise 700 3.6.4 2307619_547166 2307851_000055
color MFP M775 series 3.7 2307781_551206 (3.7.01)
(CC522A, CC523A, CC524A) 3.7.1 2307884_553043
3.7.2 2307939_554660
3.6.3 2307497_543955
HP LaserJet Enterprise 700 3.6.4 2307619_547165 2307851_000053
M712xh 3.7 2307781_551205 (3.7.01)
(CF235A, CF236A, CF238A) 3.7.1 2307884_553042
3.7.2 2307939_554659
3.6.3 2307497_543951
HP LaserJet Enterprise 800 3.6.4 2307619_547161 2307851_000049
color M855 3.7 2307781_551201 (3.7.01)
(A2W77A, A2W78A, A2W79A) 3.7.1 2307884_553038
3.7.2 2307939_554655
HP LaserJet Enterprise 800 3.6.3 2307497_543946
color MFP M880 3.6.4 2307619_547156 2307851_000058
(A2W76A, A2W75A, D7P70A, 3.7 2307781_551196 (3.7.01)
D7P71A) 3.7.1 2307884_553033
3.7.2 2307939_554650
3.6.3 2307497_543964
HP LaserJet Enterprise 3.6.4 2307619_547169 2307851_000057
Color 500 M551 Series 3.7 2307781_551209 (3.7.01)
(CF081A,CF082A,CF083A) 3.7.1 2307884_553046
3.7.2 2307939_554665
3.6.3 2307497_543957
HP LaserJet Enterprise 3.6.4 2307619_547167 2307851_000056
Color flow MFP M575c 3.7 2307781_551207 (3.7.01)
(CD646A) 3.7.1 2307884_553044
3.7.2 2307939_554662
3.6.3 2307497_543948
HP LaserJet Enterprise 3.6.4 2307619_547158 2307851_000046
flow M830z MFP 3.7 2307781_551198 (3.7.01)
(CF367A) 3.7.1 2307884_553035
3.7.2 2307939_554652
3.6.3 2307497_543945
HP LaserJet Enterprise 3.6.4 2307619_547155 2307851_000043
flow MFP M525c 3.7 2307781_551195 (3.7.01)
(CF118A) 3.7.1 2307884_553032
3.7.2 2307939_554649
3.6.3 2307497_543943
HP LaserJet Enterprise 3.6.4 2307619_547153 2307851_000041
Flow MFP M630z 3.7 2307781_551193 (3.7.01)
(B3G85A) 3.7.1 2307884_553030
3.7.2 2307939_554647
3.6.3 2307497_543952
HP LaserJet Enterprise 3.6.4 2307619_547163 2307851_000035
M806 3.7 2307781_551202 (3.7.01)
(CZ244A, CZ245A) 3.7.1 2307884_553039
3.7.2 2307939_554656
3.6.3 2307497_543943
HP LaserJet Enterprise MFP 3.6.4 2307619_547153 2307851_000041
M630 3.7 2307781_551193 (3.7.01)
(J7X28A) 3.7.1 2307884_553030
3.7.2 2307939_554647
HP LaserJet Enterprise MFP 3.6.3 2307497_543954
M725 3.6.4 2307619_547164 2307851_000054
(CF066A, CF067A, CF068A, 3.7 2307781_551204 (3.7.01)
CF069A) 3.7.1 2307884_553041
3.7.2 2307939_554658
3.6.3 2307497_543944
HP OfficeJet Enterprise 3.6.4 2307619_547154 2307851_000039
Color MFP X585 3.7 2307781_551194 (3.7.01)
(B5L04A, B5L05A, B5L07A) 3.7.1 2307884_553031
3.7.2 2307939_554648
3.6.3 2307497_543949
HP OfficeJet Enterprise 3.6.4 2307619_547159 2307851_000047
Color X555 3.7 2307781_551199 (3.7.01)
(C2S11A, C2S12A) 3.7.1 2307884_553036
3.7.2 2307939_554653
System management and security procedures must be reviewed frequently to
maintain system integrity. HP is continually reviewing and enhancing the
security features of software products to provide customers with current secure
solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the
attention of users of the affected HP products the important security
information contained in this Bulletin. HP recommends that all users determine
the applicability of this information to their individual situations and take
appropriate action. HP does not warrant that this information is necessarily
accurate or complete for all user situations and, consequently, HP will not be
responsible for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law, HP
disclaims all warranties, either express or implied, including the warranties
of merchantability and fitness for a particular purpose, title and
non-infringement."
REVISION HISTORY
Version:1 (rev.1) ? 01 March 2016 Initial release
Copyright 2016 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or its
affiliates, subcontractors or suppliers will be liable for incidental,special
or consequential damages including downtime cost; lost profits;damages relating
to the procurement of substitute products or services; or damages for loss of
data, or software restoration. The information in this document is subject to
change without notice. Hewlett-Packard Company and the names of Hewlett-Packard
products referenced herein are trademarks of Hewlett-Packard Company in the
United States and other countries. Other product and company names mentioned
herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=zguU
-----END PGP SIGNATURE-----
| VAR-201603-0033 | CVE-2016-1329 | Cisco Nexus 3000 and Nexus 3500 Run on device Cisco NX-OS In root Privileged vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Cisco NX-OS 6.0(2)U6(1) through 6.0(2)U6(5) on Nexus 3000 devices and 6.0(2)A6(1) through 6.0(2)A6(5) and 6.0(2)A7(1) on Nexus 3500 devices has hardcoded credentials, which allows remote attackers to obtain root privileges via a (1) TELNET or (2) SSH session, aka Bug ID CSCuy25800. Cisco Nexus is Cisco's line of network switches designed for data centers. This vulnerability is caused by a user account created during installation that cannot be deleted or changed. The password is also static by default. Allows an unauthenticated remote attacker to log in to the device as root and has bashshell access. NX-OS Software is a data center operating system running on it
| VAR-201603-0286 | CVE-2016-1357 | Cisco Policy Suite of password-management administration In the component RBAC Vulnerabilities that can be bypassed |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The password-management administration component in Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att, and 7.5.0 allows remote attackers to bypass intended RBAC restrictions and read unspecified data via unknown vectors, aka Bug ID CSCut85211. Cisco Policy Suite (CPS) is a set of next-generation policy management solutions from Cisco. This solution provides functions such as user-based business rules, real-time management of applications and network resources. A security vulnerability exists in the password-management administration component of CPS. The following versions are affected: CPS version 7.0.1.3, version 7.0.2, version 7.0.2-att, version 7.0.3-att, version 7.0.4-att, version 7.5.0
| VAR-201603-0329 | CVE-2015-0718 | plural Cisco Nexus Device and Unified Computing System Run on Cisco NX-OS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Cisco NX-OS 4.0 through 6.1 on Nexus 1000V 3000, 4000, 5000, 6000, and 7000 devices and Unified Computing System (UCS) platforms allows remote attackers to cause a denial of service (TCP stack reload) by sending crafted TCP packets to a device that has a TIME_WAIT TCP session, aka Bug ID CSCub70579. Cisco NX-OS is a data center level operating system. An unauthenticated remote attacker exploiting this vulnerability could result in a denial of service on the affected device. The following products are affected: Cisco Nexus 1000V Series Switches, Nexus 3000 Series Switches, Nexus 4000 Series Switches, Nexus 5000 Series Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Unified Computing CSuting running NX-OS Software)