VARIoT IoT vulnerabilities database
| VAR-201602-0073 | CVE-2016-2268 | Apple iOS for Dell SecureWorks Vulnerability impersonating server in mobile application |
CVSS V2: 5.8 CVSS V3: 6.8 Severity: MEDIUM |
Dell SecureWorks app before 2.1 for iOS does not validate SSL certificates, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. Dell SecureWorks is prone to a security-bypass vulnerability because the application fails to properly validate SSL certificates.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks and bypass certain security restrictions.
Dell SecureWorks 2.0.6 and prior versions are vulnerable. The Dell SecureWorks app for iOS is a set of mobile applications based on the iOS system of Dell in the United States for accessing the security information of Dell SecureWorks. The program supports rapid response to security incidents and comments, updates, etc. on critical security incidents.
Impact
An attacker who can perform a man in the middle attack may present a
bogus SSL certificate which the application will accept silently.
Usernames, passwords and sensitive information could be captured by an
attacker without the user's knowledge.
Timeline
October 4, 2015 - Notified Dell SecureWorks via
security@secureworks.com & security@dell.com
October 6, 2015 - Dell SecureWorks responded stating that they are investigating
October 15, 2015 - Dell SecureWorks asked for steps to reproduce the
vulnerability
October 15, 2015 - Provided steps to reproduce
October 22, 2015 - Dell SecureWorks confirmed the vulnerability
October 22, 2015 - Asked for a timeline to release the new version
October 26, 2015 - Dell SecureWorks responded stating they are working
on an update but do not have a timeline
February 2, 2016 - Dell SecureWorks released version 2.1 which
resolves this vulnerability
Solution
Upgrade to version 2.1 or later
| VAR-201602-0182 | CVE-2015-8269 | Fisher-Price Smart Toy platform allows some unauthenticated web API commands |
CVSS V2: 6.5 CVSS V3: 7.5 Severity: MEDIUM |
The API on Fisher-Price Smart Toy Bear devices allows remote attackers to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number. Fisher price Smart Toy Web services for multiple API The call is not properly authenticated. Also, Smart Toy Fragile versions of toys Android OS May have been used. Fisher price Smart Toy Bear Is Wi-Fi With connection function IoT It is a toy. This toy uses the network function to provide further interaction with the child, the user. Inappropriate authentication (CWE-287) - CVE-2015-8269 Fisher price Smart Toy Has registered a user account with a predictable number. Smart Toy An attacker with one account can execute queries and commands against other accounts. An attacker can obtain information about other users, such as name, date of birth, and gender, by issuing a query. It is also possible to edit some information of other users and associate registered toys with other accounts. CWE-287: Improper Authentication http://cwe.mitre.org/data/definitions/287.html Rapid7 According to researchers, not all data in the account can be changed or retrieved and the impact is limited. Also, this researcher Smart Toy But Android 4.4 (KitKat) It is supposed to work with. At the moment, Smart Toy Latest for product Android It is unknown whether security patches have been applied. For more information, Rapid7 See the security advisory for. Rapid7 Security Advisory for https://community.rapid7.com/community/infosec/blog/2016/02/02/security-vulnerabilities-within-fisher-price-smart-toy-hereo-gps-platform Fisher price Smart Toy I will provide a Mattel, Inc. Says: "We recently learned of a security vulnerability with our Fisher-Price WiFi-connected Smart Toy Bear. We have remediated the situation and have no reason to believe that customer information was accessed by any unauthorized person. Mattel and Fisher-Price take the safety of our consumers and their personal data very seriously, which is why we act quickly to resolve potential vulnerabilities like this. We have recently been using Fisher Price Wi-Fi Connection Smart Toy Bear I learned about security vulnerabilities. This issue has already been fixed and no unauthorized access to customer information has been confirmed. Mattel At FisherPrice, we believe that the security of customers and their personal information is extremely important, and we will work to quickly resolve such vulnerabilities. "A remote attacker may obtain or change the personal information of the child or parent associated with the product. There is also the possibility of getting a toy. Fisher-Price Smart Toy is prone to an authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions like modifying private information or take ownership of the toy
| VAR-201602-0088 | CVE-2015-7916 | Sauter moduWeb Vision Web Server Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 6.5 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 allows remote authenticated users to inject arbitrary web script or HTML via a crafted query. Sauter moduWeb Vision is an embedded web-based SCADA system for HVAC. Sauter moduWeb Vision is prone to multiple security vulnerabilities:
1. Multiple information-disclosure vulnerabilities
2. Other attacks may also be possible. Vulnerabilities
---------------
CVSS 10 - INSECURE CREDENTIAL STORAGE (Pass the Hash) CVE-2015-7914
CVSS 10 - INSECURE TRANSMISSION OF CREDENTIALS CVE-2015-7915
CVSS 7.4 - CROSS-SITE SCRIPTING CVE-2015-7916
Other risk exposures
---------------
Undocumented default accounts
Note that default accounts with changeable passwords, even when those
are undocumented and do not look as user accounts neither in interface
or documentation, constitute a formal vulnerability. It is at worst a
misconfiguration.
References (Source)
---------------
This advisory:
https://www.outpost24.com/critical-scada-vulnerabilities-sauter-moduweb/
ICS CERT:
https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01
Summary of the issues
---------------
In short \x96 By obtaining access to a system using undocumented accounts,
it is possible to obtain a low privilege level.
By exploiting the fact that the cashed credentials used for the
\x93remember me\x94 function of the web application employ the same encryption
as the one used for protection of passwords included in backups, a user
can elevate privileges to administrator level.
The backups also contain other encrypted configuration information which
can further an attacker\x92s access to also affect for example email
accounts used for notifications.
By accessing the system as an administrator, an attacker can obtain
those credentials in plain text from the system as they are included in
the configuration details, protected only by the use of \x93password\x94
field-types in the forms.
In essence this constitute a pass the hash vulnerability. Just as with
https://www.outpost24.com/cve-2014-2717-attacking-the-honeywell-falcon-xlweb/
which used hashed inputs to generate secure transfer of credentials over
non encrypted connections, applying the same protection scheme to its
stored, and exposed, secrets.
Don\x92t do your own cryptography.
A bit more details, sufficient for the interested reader to recreate but
not a straight forward guide, available at the provided references.
Martin Jartelius \x96 CSO \x96 Outpost24
John Stock \x96 Technology Program Director \x96 Outpost24
| VAR-201602-0086 | CVE-2015-7914 | Sauter moduWeb Vision Certificate Insecure Storage Vulnerability |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 allows remote attackers to bypass authentication by leveraging knowledge of a password hash without knowledge of the associated password. Sauter EY-WS505F0x0 moduWeb Vision Contains a vulnerability that prevents authentication. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. Sauter moduWeb Vision is an embedded web-based SCADA system for HVAC. Multiple information-disclosure vulnerabilities
2. A cross-site scripting vulnerability
An attacker may leverage these issues to obtain potentially sensitive information, steal cookie based authentication credentials and to execute arbitrary HTML and script in the browser of an unsuspecting user in the context of the affected site. Other attacks may also be possible. Vulnerabilities
---------------
CVSS 10 - INSECURE CREDENTIAL STORAGE (Pass the Hash) CVE-2015-7914
CVSS 10 - INSECURE TRANSMISSION OF CREDENTIALS CVE-2015-7915
CVSS 7.4 - CROSS-SITE SCRIPTING CVE-2015-7916
Other risk exposures
---------------
Undocumented default accounts
Note that default accounts with changeable passwords, even when those
are undocumented and do not look as user accounts neither in interface
or documentation, constitute a formal vulnerability. It is at worst a
misconfiguration.
References (Source)
---------------
This advisory:
https://www.outpost24.com/critical-scada-vulnerabilities-sauter-moduweb/
ICS CERT:
https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01
Summary of the issues
---------------
In short \x96 By obtaining access to a system using undocumented accounts,
it is possible to obtain a low privilege level.
By exploiting the fact that the cashed credentials used for the
\x93remember me\x94 function of the web application employ the same encryption
as the one used for protection of passwords included in backups, a user
can elevate privileges to administrator level.
The backups also contain other encrypted configuration information which
can further an attacker\x92s access to also affect for example email
accounts used for notifications.
By accessing the system as an administrator, an attacker can obtain
those credentials in plain text from the system as they are included in
the configuration details, protected only by the use of \x93password\x94
field-types in the forms.
In essence this constitute a pass the hash vulnerability. Just as with
https://www.outpost24.com/cve-2014-2717-attacking-the-honeywell-falcon-xlweb/
which used hashed inputs to generate secure transfer of credentials over
non encrypted connections, applying the same protection scheme to its
stored, and exposed, secrets.
Don\x92t do your own cryptography.
A bit more details, sufficient for the interested reader to recreate but
not a straight forward guide, available at the provided references.
Martin Jartelius \x96 CSO \x96 Outpost24
John Stock \x96 Technology Program Director \x96 Outpost24
| VAR-201602-0087 | CVE-2015-7915 | Sauter moduWeb Vision Security Bypass Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network. Sauter moduWeb Vision is an embedded web-based SCADA system for HVAC. A remote attacker could exploit the vulnerability to obtain a certificate and bypass authentication. Sauter moduWeb Vision is prone to multiple security vulnerabilities:
1. Multiple information-disclosure vulnerabilities
2. A cross-site scripting vulnerability
An attacker may leverage these issues to obtain potentially sensitive information, steal cookie based authentication credentials and to execute arbitrary HTML and script in the browser of an unsuspecting user in the context of the affected site. Other attacks may also be possible. Vulnerabilities
---------------
CVSS 10 - INSECURE CREDENTIAL STORAGE (Pass the Hash) CVE-2015-7914
CVSS 10 - INSECURE TRANSMISSION OF CREDENTIALS CVE-2015-7915
CVSS 7.4 - CROSS-SITE SCRIPTING CVE-2015-7916
Other risk exposures
---------------
Undocumented default accounts
Note that default accounts with changeable passwords, even when those
are undocumented and do not look as user accounts neither in interface
or documentation, constitute a formal vulnerability. It is at worst a
misconfiguration.
References (Source)
---------------
This advisory:
https://www.outpost24.com/critical-scada-vulnerabilities-sauter-moduweb/
ICS CERT:
https://ics-cert.us-cert.gov/advisories/ICSA-16-033-01
Summary of the issues
---------------
In short \x96 By obtaining access to a system using undocumented accounts,
it is possible to obtain a low privilege level.
By exploiting the fact that the cashed credentials used for the
\x93remember me\x94 function of the web application employ the same encryption
as the one used for protection of passwords included in backups, a user
can elevate privileges to administrator level.
The backups also contain other encrypted configuration information which
can further an attacker\x92s access to also affect for example email
accounts used for notifications.
By accessing the system as an administrator, an attacker can obtain
those credentials in plain text from the system as they are included in
the configuration details, protected only by the use of \x93password\x94
field-types in the forms.
In essence this constitute a pass the hash vulnerability. Just as with
https://www.outpost24.com/cve-2014-2717-attacking-the-honeywell-falcon-xlweb/
which used hashed inputs to generate secure transfer of credentials over
non encrypted connections, applying the same protection scheme to its
stored, and exposed, secrets.
Don\x92t do your own cryptography.
A bit more details, sufficient for the interested reader to recreate but
not a straight forward guide, available at the provided references.
Martin Jartelius \x96 CSO \x96 Outpost24
John Stock \x96 Technology Program Director \x96 Outpost24
| VAR-201602-0414 | No CVE | ASUS RT-N56U HTML Injection Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ASUSRT-N56U has an HTML injection vulnerability that allows remote attackers to exploit malicious exploits to inject malicious scripts or HTML code to capture sensitive information or hijack user sessions when malicious data is viewed. ASUS RT-N56U is a wireless router product from ASUS.
An HTML injection vulnerability exists in ASUS RT-N56U. When a user browses an affected website, their browser executes any HTML or script code provided by the attacker. This could lead to attackers stealing cookie-based authentication or controlling how the site is presented to users.
Successful exploits will result in the execution of arbitrary attacker-supplied HTML and script code in the context of the affected application, potentially allowing the attacker to steal cookie-based authentication credentials or control how the page is rendered to the user. Other attacks are also possible
| VAR-201602-0048 | CVE-2016-1307 | Cisco Finesse Desktop and Unified Contact Center Express of Openfire Vulnerability to gain access rights on the server |
CVSS V2: 5.5 CVSS V3: 5.4 Severity: MEDIUM |
The Openfire server in Cisco Finesse Desktop 10.5(1) and 11.0(1) and Unified Contact Center Express 10.6(1) has a hardcoded account, which makes it easier for remote attackers to obtain access via an XMPP session, aka Bug ID CSCuw79085. Vendors have confirmed this vulnerability Bug ID CSCuw79085 It is released as.By a third party XMPP Access may be gained through a session.
Attackers can exploit this issue to gain unauthorized access to the affected application. This may allow an attacker to obtain and modify sensitive information.
This issue is being tracked by Cisco bug IDs CSCuw79085 and CSCuw86638. Cisco Finesse Desktop is a suite of next-generation agent and desktop management software for customer collaboration solutions; Unified CCX is a customer relationship management component of a unified communications solution. This component integrates agent application and self-service voice service, and provides functions such as call distribution and customer access control
| VAR-201602-0050 | CVE-2016-1309 | Cisco WebEx Meetings Server Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Cisco WebEx Meetings Server 2.5.1.5 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuy01843. Cisco WebEx Meetings Server Contains a cross-site scripting vulnerability.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug IDs CSCuy01843, CSCuy03489, CSCuy03502 and CSCuy12322. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution
| VAR-201602-0019 | CVE-2016-0861 | GE Industrial Solutions UPS SNMP/Web Vulnerability to execute arbitrary command in firmware of adapter device |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to execute arbitrary commands via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-77: Improper Neutralization of Special Elements used in a Command ( Command injection ) Has been identified. http://cwe.mitre.org/data/definitions/77.htmlAn arbitrary command may be executed by a remotely authenticated user. The GE SNMP / Web Interface adapter is a Web server used by General Electric Company to display the current information of the uninterruptible power supply. SNMP/Web Interface is prone to a command-injection vulnerability and an information-disclosure vulnerability.
Exploiting these issues could allow an attacker to gain access to potentially sensitive information and execute arbitrary commands in the context of the affected device.
Versions prior to SNMP/Web Interface 4.8 are vulnerable
| VAR-201602-0020 | CVE-2016-0862 | GE Industrial Solutions UPS SNMP/Web Vulnerability to retrieve important plain text account information in adapter device firmware |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to obtain sensitive cleartext account information via unspecified vectors. The GE SNMP / Web Interface adapter is a Web server used by General Electric Company to display the current information of the uninterruptible power supply. SNMP/Web Interface is prone to a command-injection vulnerability and an information-disclosure vulnerability.
Exploiting these issues could allow an attacker to gain access to potentially sensitive information and execute arbitrary commands in the context of the affected device.
Versions prior to SNMP/Web Interface 4.8 are vulnerable
| VAR-201602-0046 | CVE-2016-1305 | Cisco Application Policy Infrastructure Controller Enterprise Module cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) 1.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving HTML entities, aka Bug ID CSCux15511. Vendors have confirmed this vulnerability Bug ID CSCux15511 It is released as.By a third party HTML Depending on the issue with the entity, Web Script or HTML May be inserted.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug IDs CSCux15511
| VAR-201602-0047 | CVE-2016-1306 | Cisco Fog Director Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Fog Director 1.0(0) allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, aka Bug ID CSCux80466. Cisco Fog Director Contains a cross-site scripting vulnerability. When malicious data is viewed, it can obtain sensitive information or hijack user sessions. Cisco Fog Director is a set of automated management platform for centralized management of multiple applications running on the edge of the network. The platform controls application settings and lifecycles, and supports access and monitoring of large-scale IoT deployments.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by the Cisco Bug ID CSCux80466
| VAR-201604-0332 | CVE-2015-8682 | Huawei P8 Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: 6.1 Severity: MEDIUM |
The Video0 driver in Huawei P8 smartphones with software GRA-UL00 before GRA-UL00C00B350, GRA-UL10 before GRA-UL10C00B350, GRA-TL00 before GRA-TL00C01B350, GRA-CL00 before GRA-CL00C92B350, and GRA-CL10 before GRA-CL10C92B350 and Mate S smartphones with software CRR-TL00 before CRR-TL00C01B160SP01, CRR-UL00 before CRR-UL00C00B160, and CRR-CL00 before CRR-CL00C92B161 allows attackers to obtain sensitive information from stack memory or cause a denial of service (system crash) via a crafted application, which triggers an invalid memory access. HuaweiP8 is a smart phone product from China Huawei. A security vulnerability exists in the presence of HuaweiP8, allowing local attackers to exploit the vulnerability for denial of service attacks. Huawei Smart Phones are prone to a denial-of-service vulnerability.
Attackers can exploit this issue to obtain sensitive information or crash the system, resulting in a denial-of-service condition.
The following products are affected:
Huawei P8 GRA-UL00C00B230 and prior
Huawei P8 GRA-UL10C00B230 and prior
Huawei P8 GRA-TL00C01B230 and prior
Huawei P8 GRA-CL00C92B230 and prior
Huawei P8 GRA-CL10C92B230 and prior. Huawei P8 is a smartphone product of the Chinese company Huawei (Huawei). The following versions are affected: Huawei P8 GRA-UL00C00B230 and earlier, GRA-UL10C00B230 and earlier, GRA-TL00C01B230 and earlier, GRA-CL00C92B230 and earlier, GRA-CL10C92B230 and earlier
| VAR-201602-0181 | CVE-2015-8265 | Huawei Mobile WiFi E5151 and E5186 routers use insufficiently random values for DNS queries |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: MEDIUM |
Huawei Mobile WiFi E5151 routers with software before E5151s-2TCPU-V200R001B146D27SP00C00 and E5186 routers with software before V200R001B310D01SP00C00 allow DNS query packets using the static source port, which makes it easier for remote attackers to spoof responses via unspecified vectors. Huawei Mobile provided by Wi-Fi Router E5151 and E5186 Has the problem of using insufficient random values. Insufficient random value used (CWE-330) - CVE-2015-8265 Huawei E5151 and Huawei E5186 Sent from DNS The query source port number is fixed. The attacker DNS By spoofing, LAN It is possible to guide the terminal inside to a malicious server. CWE-330: Use of Insufficiently Random Values http://cwe.mitre.org/data/definitions/330.htmlBy a remote attacker DNS The response is forged, LAN May be directed to a malicious server. HuaweiE51864GLTERouter is a 4G wireless router product from China Huawei. Huawei E5186 is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. There is a security vulnerability in versions earlier than Huawei E5186 4G LTE Router V200R001B310D01SP00C00. A remote attacker could exploit this vulnerability to forge responses
| VAR-201604-0478 | CVE-2015-6360 | Cisco libSRTP Service disruption in the encryption processing function (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The encryption-processing feature in Cisco libSRTP before 1.5.3 allows remote attackers to cause a denial of service via crafted fields in SRTP packets, aka Bug ID CSCux00686. Cisco libSRTP The encryption processing function of the service disruption of service operation (DoS) There are vulnerabilities that are put into a state. Cisco libsrtp is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets.
An attacker can exploit this issue to crash the affected application, resulting in denial-of-service conditions.
The issue is fixed in libsrtp 1.5.3.
This issue being tracked by Cisco Bug IDs CSCux00686, CSCux00697, CSCux00707, CSCux00708, CSCux00711, CSCux00716, CSCux00729, CSCux00742, CSCux00745, CSCux00748, CSCux01782, CSCux01786, CSCux04317, CSCux35568 and CSCux37802. Cisco libsrtp is a library used by Cisco to implement the Secure Real-time Transport Protocol (SRTP). RTP is used for Voice over IP (VoIP) and audio and video streaming. SRTP adds privacy and authentication. A security vulnerability exists in the encryption-processing functionality of Cisco libsrtp prior to 1.5.3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: libsrtp security and bug fix update
Advisory ID: RHSA-2020:3873-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3873
Issue date: 2020-09-29
CVE Names: CVE-2013-2139 CVE-2015-6360
====================================================================
1. Summary:
An update for libsrtp is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The libsrtp package provides an implementation of the Secure Real-time
Transport Protocol (SRTP), the Universal Security Transform (UST), and a
supporting cryptographic kernel.
Security Fix(es):
* libsrtp: improper handling of CSRC count and extension header length in
RTP header (CVE-2015-6360)
* libsrtp: buffer overflow in application of crypto profiles
(CVE-2013-2139)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.9 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
970697 - CVE-2013-2139 libsrtp: buffer overflow in application of crypto profiles
1301202 - libsrtp global-buffer-overflow
1323702 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header
1323705 - CVE-2015-6360 libsrtp: improper handling of CSRC count and extension header length in RTP header [rhel-7]
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64:
libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64:
libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
ppc64:
libsrtp-1.4.4-11.20101004cvs.el7.ppc.rpm
libsrtp-1.4.4-11.20101004cvs.el7.ppc64.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm
ppc64le:
libsrtp-1.4.4-11.20101004cvs.el7.ppc64le.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm
s390x:
libsrtp-1.4.4-11.20101004cvs.el7.s390.rpm
libsrtp-1.4.4-11.20101004cvs.el7.s390x.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm
x86_64:
libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64.rpm
ppc64le:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.ppc64le.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.ppc64le.rpm
s390x:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.s390x.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.s390.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.s390x.rpm
x86_64:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
libsrtp-1.4.4-11.20101004cvs.el7.src.rpm
x86_64:
libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-debuginfo-1.4.4-11.20101004cvs.el7.x86_64.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm
libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2013-2139
https://access.redhat.com/security/cve/CVE-2015-6360
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.9_release_notes/index
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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X+yJ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3539-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 02, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : srtp
CVE ID : CVE-2015-6360
Debian Bug : 807698
Randell Jesup and the Firefox team discovered that srtp, Cisco's
reference implementation of the Secure Real-time Transport Protocol
(SRTP), does not properly handle RTP header CSRC count and extension
header length.
For the oldstable distribution (wheezy), this problem has been fixed
in version 1.4.4+20100615~dfsg-2+deb7u2.
For the stable distribution (jessie), this problem has been fixed in
version 1.4.5~20130609~dfsg-1.1+deb8u1.
We recommend that you upgrade your srtp packages
| VAR-201602-0393 | CVE-2016-0742 | nginx Service disruption in other resolvers (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. nginx is prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause denial-of-service conditions. There are security vulnerabilities in the resolver of nginx versions prior to 1.8.1 and versions 1.9.x prior to 1.9.10. These only affect nginx if
the "resolver" directive is used in a configuration file.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.1-2.2+wheezy4.
For the stable distribution (jessie), these problems have been fixed in
version 1.6.2-5+deb8u1.
For the testing distribution (stretch), these problems have been fixed
in version 1.9.10-1.
For the unstable distribution (sid), these problems have been fixed in
version 1.9.10-1.
We recommend that you upgrade your nginx packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-nginx18-nginx security update
Advisory ID: RHSA-2016:1425-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2016:1425
Issue date: 2016-07-14
CVE Names: CVE-2016-0742 CVE-2016-0746 CVE-2016-0747
CVE-2016-4450
=====================================================================
1. Summary:
An update for rh-nginx18-nginx is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
Nginx is a web and proxy server with a focus on high concurrency,
performance, and low memory usage.
The following packages have been upgraded to a newer upstream version:
rh-nginx18-nginx (1.8.1).
Security Fix(es):
* A NULL pointer dereference flaw was found in the nginx code responsible
for saving client request body to a temporary file. (CVE-2016-4450)
* It was discovered that nginx could perform an out of bound read and
dereference an invalid pointer when resolving CNAME DNS records. (CVE-2016-0742)
* A use-after-free flaw was found in the way nginx resolved certain CNAME
DNS records.
(CVE-2016-0746)
* It was discovered that nginx did not limit recursion when resolving CNAME
DNS records.
(CVE-2016-0747)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The rh-nginx18-nginx service must be restarted for this update to take
effect.
5. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2016-0742
https://access.redhat.com/security/cve/CVE-2016-0746
https://access.redhat.com/security/cve/CVE-2016-0747
https://access.redhat.com/security/cve/CVE-2016-4450
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFXhy2gXlSAg2UNWIIRAjOgAJ9QjuFMrvK50IeJq8Ky7VkefuMBUwCeM+Cp
ZhbDRXs2sdXbnakZ6oJi/K8=
=7RBd
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: nginx: Multiple vulnerabilities
Date: June 17, 2016
Bugs: #560854, #573046, #584744
ID: 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in nginx, the worst of which
may allow a remote attacker to cause a Denial of Service.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/nginx < 1.10.1 >= 1.10.1
Description
===========
Multiple vulnerabilities have been discovered in nginx. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All nginx users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/nginx-1.10.1"
References
==========
[ 1 ] CVE-2013-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587
[ 2 ] CVE-2016-0742
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742
[ 3 ] CVE-2016-0746
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746
[ 4 ] CVE-2016-0747
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747
[ 5 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
[ 6 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201606-06
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ============================================================================
Ubuntu Security Notice USN-2892-1
February 09, 2016
nginx vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in nginx.
(CVE-2016-0747)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
nginx-core 1.9.3-1ubuntu1.1
nginx-extras 1.9.3-1ubuntu1.1
nginx-full 1.9.3-1ubuntu1.1
nginx-light 1.9.3-1ubuntu1.1
Ubuntu 14.04 LTS:
nginx-core 1.4.6-1ubuntu3.4
nginx-extras 1.4.6-1ubuntu3.4
nginx-full 1.4.6-1ubuntu3.4
nginx-light 1.4.6-1ubuntu3.4
nginx-naxsi 1.4.6-1ubuntu3.4
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-09-20-4 Xcode 13
Xcode 13 addresses the following issues.
IDE Xcode Server
Available for: macOS Big Sur 11.3 and later
Impact: Multiple issues in nginx
Description: Multiple issues were addressed by updating nginx to
version 1.21.0.
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
CVE-2017-7529
CVE-2018-16843
CVE-2018-16844
CVE-2018-16845
CVE-2019-20372
Installation note:
Xcode 13 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "Xcode 13"
| VAR-201602-0392 | CVE-2016-0746 | nginx Service disruption in other resolvers (DoS) Vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. nginx is prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause denial-of-service conditions. There is a use-after-free vulnerability in the resolver of nginx versions prior to 1.8.1 and versions 1.9.x prior to 1.9.10. These only affect nginx if
the "resolver" directive is used in a configuration file.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.1-2.2+wheezy4.
For the stable distribution (jessie), these problems have been fixed in
version 1.6.2-5+deb8u1.
For the testing distribution (stretch), these problems have been fixed
in version 1.9.10-1.
For the unstable distribution (sid), these problems have been fixed in
version 1.9.10-1.
We recommend that you upgrade your nginx packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-nginx18-nginx security update
Advisory ID: RHSA-2016:1425-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2016:1425
Issue date: 2016-07-14
CVE Names: CVE-2016-0742 CVE-2016-0746 CVE-2016-0747
CVE-2016-4450
=====================================================================
1. Summary:
An update for rh-nginx18-nginx is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
Nginx is a web and proxy server with a focus on high concurrency,
performance, and low memory usage.
The following packages have been upgraded to a newer upstream version:
rh-nginx18-nginx (1.8.1).
Security Fix(es):
* A NULL pointer dereference flaw was found in the nginx code responsible
for saving client request body to a temporary file. (CVE-2016-4450)
* It was discovered that nginx could perform an out of bound read and
dereference an invalid pointer when resolving CNAME DNS records. (CVE-2016-0742)
* A use-after-free flaw was found in the way nginx resolved certain CNAME
DNS records.
(CVE-2016-0746)
* It was discovered that nginx did not limit recursion when resolving CNAME
DNS records.
(CVE-2016-0747)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The rh-nginx18-nginx service must be restarted for this update to take
effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1302587 - CVE-2016-0742 nginx: invalid pointer dereference in resolver
1302588 - CVE-2016-0746 nginx: use-after-free during CNAME response processing in resolver
1302589 - CVE-2016-0747 nginx: Insufficient limits of CNAME resolution in resolver
1341462 - CVE-2016-4450 nginx: NULL pointer dereference while writing client request body
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2016-0742
https://access.redhat.com/security/cve/CVE-2016-0746
https://access.redhat.com/security/cve/CVE-2016-0747
https://access.redhat.com/security/cve/CVE-2016-4450
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFXhy2gXlSAg2UNWIIRAjOgAJ9QjuFMrvK50IeJq8Ky7VkefuMBUwCeM+Cp
ZhbDRXs2sdXbnakZ6oJi/K8=
=7RBd
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: nginx: Multiple vulnerabilities
Date: June 17, 2016
Bugs: #560854, #573046, #584744
ID: 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in nginx, the worst of which
may allow a remote attacker to cause a Denial of Service.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/nginx < 1.10.1 >= 1.10.1
Description
===========
Multiple vulnerabilities have been discovered in nginx. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All nginx users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/nginx-1.10.1"
References
==========
[ 1 ] CVE-2013-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587
[ 2 ] CVE-2016-0742
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742
[ 3 ] CVE-2016-0746
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746
[ 4 ] CVE-2016-0747
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747
[ 5 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
[ 6 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201606-06
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ============================================================================
Ubuntu Security Notice USN-2892-1
February 09, 2016
nginx vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in nginx.
(CVE-2016-0747)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
nginx-core 1.9.3-1ubuntu1.1
nginx-extras 1.9.3-1ubuntu1.1
nginx-full 1.9.3-1ubuntu1.1
nginx-light 1.9.3-1ubuntu1.1
Ubuntu 14.04 LTS:
nginx-core 1.4.6-1ubuntu3.4
nginx-extras 1.4.6-1ubuntu3.4
nginx-full 1.4.6-1ubuntu3.4
nginx-light 1.4.6-1ubuntu3.4
nginx-naxsi 1.4.6-1ubuntu3.4
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-09-20-4 Xcode 13
Xcode 13 addresses the following issues.
IDE Xcode Server
Available for: macOS Big Sur 11.3 and later
Impact: Multiple issues in nginx
Description: Multiple issues were addressed by updating nginx to
version 1.21.0.
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
CVE-2017-7529
CVE-2018-16843
CVE-2018-16844
CVE-2018-16845
CVE-2019-20372
Installation note:
Xcode 13 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "Xcode 13"
| VAR-201602-0391 | CVE-2016-0747 | nginx Service disruption in other resolvers (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution. nginx is prone to multiple denial-of-service vulnerabilities.
Attackers can exploit these issues to cause denial-of-service conditions. There is a security vulnerability in the resolver of nginx versions prior to 1.8.1 and versions 1.9.x prior to 1.9.10. The vulnerability stems from the fact that the program does not limit CNAME resolution. These only affect nginx if
the "resolver" directive is used in a configuration file.
For the oldstable distribution (wheezy), these problems have been fixed
in version 1.2.1-2.2+wheezy4.
For the stable distribution (jessie), these problems have been fixed in
version 1.6.2-5+deb8u1.
For the testing distribution (stretch), these problems have been fixed
in version 1.9.10-1.
For the unstable distribution (sid), these problems have been fixed in
version 1.9.10-1.
We recommend that you upgrade your nginx packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: rh-nginx18-nginx security update
Advisory ID: RHSA-2016:1425-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2016:1425
Issue date: 2016-07-14
CVE Names: CVE-2016-0742 CVE-2016-0746 CVE-2016-0747
CVE-2016-4450
=====================================================================
1. Summary:
An update for rh-nginx18-nginx is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
Nginx is a web and proxy server with a focus on high concurrency,
performance, and low memory usage.
The following packages have been upgraded to a newer upstream version:
rh-nginx18-nginx (1.8.1).
Security Fix(es):
* A NULL pointer dereference flaw was found in the nginx code responsible
for saving client request body to a temporary file. A remote attacker could
send a specially crafted request that would cause nginx worker process to
crash. (CVE-2016-4450)
* It was discovered that nginx could perform an out of bound read and
dereference an invalid pointer when resolving CNAME DNS records. An
attacker able to manipulate DNS responses received by nginx could use this
flaw to cause a worker process to crash if nginx enabled the resolver in
its configuration. (CVE-2016-0742)
* A use-after-free flaw was found in the way nginx resolved certain CNAME
DNS records.
(CVE-2016-0746)
* It was discovered that nginx did not limit recursion when resolving CNAME
DNS records.
(CVE-2016-0747)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The rh-nginx18-nginx service must be restarted for this update to take
effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1302587 - CVE-2016-0742 nginx: invalid pointer dereference in resolver
1302588 - CVE-2016-0746 nginx: use-after-free during CNAME response processing in resolver
1302589 - CVE-2016-0747 nginx: Insufficient limits of CNAME resolution in resolver
1341462 - CVE-2016-4450 nginx: NULL pointer dereference while writing client request body
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm
x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2016-0742
https://access.redhat.com/security/cve/CVE-2016-0746
https://access.redhat.com/security/cve/CVE-2016-0747
https://access.redhat.com/security/cve/CVE-2016-4450
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFXhy2gXlSAg2UNWIIRAjOgAJ9QjuFMrvK50IeJq8Ky7VkefuMBUwCeM+Cp
ZhbDRXs2sdXbnakZ6oJi/K8=
=7RBd
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: nginx: Multiple vulnerabilities
Date: June 17, 2016
Bugs: #560854, #573046, #584744
ID: 201606-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in nginx, the worst of which
may allow a remote attacker to cause a Denial of Service.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/nginx < 1.10.1 >= 1.10.1
Description
===========
Multiple vulnerabilities have been discovered in nginx. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All nginx users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/nginx-1.10.1"
References
==========
[ 1 ] CVE-2013-3587
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3587
[ 2 ] CVE-2016-0742
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0742
[ 3 ] CVE-2016-0746
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0746
[ 4 ] CVE-2016-0747
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0747
[ 5 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
[ 6 ] CVE-2016-4450
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4450
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201606-06
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ============================================================================
Ubuntu Security Notice USN-2892-1
February 09, 2016
nginx vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in nginx.
(CVE-2016-0747)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
nginx-core 1.9.3-1ubuntu1.1
nginx-extras 1.9.3-1ubuntu1.1
nginx-full 1.9.3-1ubuntu1.1
nginx-light 1.9.3-1ubuntu1.1
Ubuntu 14.04 LTS:
nginx-core 1.4.6-1ubuntu3.4
nginx-extras 1.4.6-1ubuntu3.4
nginx-full 1.4.6-1ubuntu3.4
nginx-light 1.4.6-1ubuntu3.4
nginx-naxsi 1.4.6-1ubuntu3.4
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-09-20-4 Xcode 13
Xcode 13 addresses the following issues.
IDE Xcode Server
Available for: macOS Big Sur 11.3 and later
Impact: Multiple issues in nginx
Description: Multiple issues were addressed by updating nginx to
version 1.21.0.
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
CVE-2017-7529
CVE-2018-16843
CVE-2018-16844
CVE-2018-16845
CVE-2019-20372
Installation note:
Xcode 13 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "Xcode 13"
| VAR-201601-0046 | CVE-2016-1304 | Cisco Unity Connection Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Unity Connection 10.5(2.3009) allows remote attackers to inject arbitrary web script or HTML via a crafted value, aka Bug ID CSCux82596.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by the Cisco Bug ID CSCux82596. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free"
| VAR-201601-0059 | CVE-2015-7923 | Westermo Industrial switches Hardcoded Certificate Vulnerability |
CVSS V2: 9.3 CVSS V3: 9.0 Severity: CRITICAL |
Westermo WeOS before 4.19.0 uses the same SSL private key across different customers' installations, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by leveraging knowledge of a key. WestermoIndustrialSwitches is an industrial Ethernet switch from Westermo, Sweden. A security vulnerability exists in WestermoIndustrialswitches that allows remote attackers to exploit the vulnerability to perform man-in-the-middle attacks without unauthorized access to the device. Westermo Industrial switches are prone to a hard-coded certificate key vulnerability.
Successful exploits will allow attackers to read and modify traffic that is intercepted and decrypted.
Versions prior to Note- WeOS 4.19.0 are vulnerable