VARIoT IoT vulnerabilities database
| VAR-201508-0205 | CVE-2015-5368 | plural HP Run on device HP lt4112 LTE/HSPA+ Gobi 4G Vulnerability to modify data in module firmware |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows remote attackers to modify data or cause a denial of service, or execute arbitrary code, via unspecified vectors. Huawei ME906 is a mobile Internet module using M.2, which supports LTE, WCDMA, EVDO and GSM. Several Huawei ME906 products are insecurely using CRC16 for upgrade checks, allowing remote attackers to exploit vulnerabilities to bypass security restrictions and perform unauthorized operations in the context of the application. Multiple Huawei ME906 products are prone to a security vulnerability. This may aid in other attacks. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04773272
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04773272
Version: 1
HPSBHF03408 rev.1 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote
Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. The vulnerabilities
could be exploited remotely to allow execution of arbitrary code.
References:
CVE-2015-5367
CVE-2015-5368
SSRT101965
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Affected Products
HP EliteBook 820 G1
HP EliteBook 820 G2
HP EliteBook 825 G2
HP EliteBook 840 G1
HP EliteBook 840 G2
HP EliteBook 845 G1
HP EliteBook 850 G1
HP EliteBook 850 G2
HP EliteBook 855 G1
HP EliteBook 1040 G1
HP EliteBook 1040 G2
HP EliteBook Folio 9470m
HP EliteBook Revolve 810 G2
HP EliteBook Revolve 810 G3
HP ElitePad 1000 G2
HP Elite x2 1010 G2
HP ProBook 430 G1
HP ProBook 430 G2
HP ProBook 440 G0
HP ProBook 440 G1
HP ProBook 440 G2
HP ProBook 450 G0
HP ProBook 450 G1
HP ProBook 450 G2
HP ProBook 640 G1
HP ProBook 645 G1
HP ProBook 650 G1
HP ProBook 655 G1
HP ProBook x2 620 G1
HP Spectre x2 13-SMB Pro
HP ZBook 14
HP ZBook 14 G2
HP ZBook 15
HP ZBook 15 G2
HP ZBook 15u HP ZBook 17
HP Zbook 17 G2
mt41 Thin Client
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-5367 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2015-5368 (AV:N/AC:M/Au:N/C:N/I:P/A:C) 7.8
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Mickey Shkatov and Jesse Michael from the
Advanced Threat Research team at Intel Security for reporting this issue to
security-alert@hp.com.
RESOLUTION
HP has provided firmware updates to address the vulnerabilities for HP PCs
with the HP lt4112 LTE/HSPA+ Gobi 4G Module.
To acquire the firmware updates, go to hp.com
Select "Support" and then "Download Drivers"
Enter your product name or number in the "Find my product" field.
Choose the product from the returned search
Choose the operating system
Under the Download Index, select Firmware, and download the 12.500.00.15.1803
firmware or later (HP Softpaq # SP72435 or later). Follow the installation
instructions to install the firmware update.
HISTORY
Version:1 (rev.1) - 26 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAlXeOCQACgkQ4B86/C0qfVnaKACgpr0U2CGyIfHCX5LAbOL44pVk
f+oAn1yEGVjeLdq+Q2Wi+MSUjtC5SiQJ
=/02r
-----END PGP SIGNATURE-----
| VAR-201508-0204 | CVE-2015-5367 | plural HP Run on device HP lt4112 LTE/HSPA+ Gobi 4G Vulnerability gained in module firmware |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The HP lt4112 LTE/HSPA+ Gobi 4G module with firmware before 12.500.00.15.1803 on EliteBook, ElitePad, Elite, ProBook, Spectre, ZBook, and mt41 Thin Client devices allows local users to gain privileges via unspecified vectors. Huawei ME906 is a mobile Internet module using M.2, which supports LTE, WCDMA, EVDO and GSM. A variety of Huawei ME906 products contain a hash of the root account and password, allowing an attacker to exploit the vulnerability to crack the ROOT account password information. Multiple Huawei ME906 products are prone to a local information-disclosure vulnerability.
A local attacker can exploit this issue to obtain sensitive information; this may lead to further attacks. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04773272
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04773272
Version: 1
HPSBHF03408 rev.1 - HP PCs with HP lt4112 LTE/HSPA+ Gobi 4G Module, Remote
Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-08-26
Last Updated: 2015-08-26
Potential Security Impact: Remote execution of arbitrary code
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
Potential security vulnerabilities have been identified in certain HP
notebook PCs with the HP lt4112 LTE/HSPA+ Gobi 4G Module. The vulnerabilities
could be exploited remotely to allow execution of arbitrary code.
References:
CVE-2015-5367
CVE-2015-5368
SSRT101965
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
Affected Products
HP EliteBook 820 G1
HP EliteBook 820 G2
HP EliteBook 825 G2
HP EliteBook 840 G1
HP EliteBook 840 G2
HP EliteBook 845 G1
HP EliteBook 850 G1
HP EliteBook 850 G2
HP EliteBook 855 G1
HP EliteBook 1040 G1
HP EliteBook 1040 G2
HP EliteBook Folio 9470m
HP EliteBook Revolve 810 G2
HP EliteBook Revolve 810 G3
HP ElitePad 1000 G2
HP Elite x2 1010 G2
HP ProBook 430 G1
HP ProBook 430 G2
HP ProBook 440 G0
HP ProBook 440 G1
HP ProBook 440 G2
HP ProBook 450 G0
HP ProBook 450 G1
HP ProBook 450 G2
HP ProBook 640 G1
HP ProBook 645 G1
HP ProBook 650 G1
HP ProBook 655 G1
HP ProBook x2 620 G1
HP Spectre x2 13-SMB Pro
HP ZBook 14
HP ZBook 14 G2
HP ZBook 15
HP ZBook 15 G2
HP ZBook 15u HP ZBook 17
HP Zbook 17 G2
mt41 Thin Client
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-5367 (AV:L/AC:M/Au:N/C:C/I:C/A:C) 6.9
CVE-2015-5368 (AV:N/AC:M/Au:N/C:N/I:P/A:C) 7.8
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
The Hewlett-Packard Company thanks Mickey Shkatov and Jesse Michael from the
Advanced Threat Research team at Intel Security for reporting this issue to
security-alert@hp.com.
To acquire the firmware updates, go to hp.com
Select "Support" and then "Download Drivers"
Enter your product name or number in the "Find my product" field.
Choose the product from the returned search
Choose the operating system
Under the Download Index, select Firmware, and download the 12.500.00.15.1803
firmware or later (HP Softpaq # SP72435 or later). Follow the installation
instructions to install the firmware update.
HISTORY
Version:1 (rev.1) - 26 August 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iEYEARECAAYFAlXeOCQACgkQ4B86/C0qfVnaKACgpr0U2CGyIfHCX5LAbOL44pVk
f+oAn1yEGVjeLdq+Q2Wi+MSUjtC5SiQJ
=/02r
-----END PGP SIGNATURE-----
| VAR-201709-0089 | CVE-2015-7846 | plural Huawei Information disclosure vulnerability in products |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
Huawei S7700, S9700, S9300 before V200R07C00SPC500, and AR200, AR1200, AR2200, AR3200 before V200R005C20SPC200 allows attackers with physical access to the CF card to obtain sensitive information. plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Huawei S7700 is a product of China Huawei. The Huawei S7700, S9700, and S9300 are intelligent routing switches. Huawei AR200, AR1200, AR2200, and AR3200 are multi-service routers for enterprises. Multiple Huawei products are prone to a local information-disclosure vulnerability. Several Huawei products have security vulnerabilities. The following products and versions are affected: Huawei S7700 V200R005C20SPC200 previous version; S9700 V200R005C20SPC200 previous version; S9300 V200R005C20SPC200 previous version; AR200 V200R005C20SPC200 Version; AR1200 V200R005C20SPC200 Version; AR2200 V200R005C20SPC200 Version; AR3200 V200R005C20SPC200 Version
| VAR-201508-0024 | CVE-2015-5718 | Websense Content Gateway of Manager of handle_debug_network Stack-based buffer overflow vulnerability in functions |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Stack-based buffer overflow in the handle_debug_network function in the manager in Websense Content Gateway before 8.0.0 HF02 allows remote administrators to cause a denial of service (crash) via a crafted diagnostic command line request to submit_net_debug.cgi. Websense Content Gateway is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
A remote attacker may exploit this issue to execute arbitrary code in the context of the affected application. Failed attempts will likely cause a denial-of-service condition. Websense Content Gateway is a set of Web proxy platform of American Websense company. The platform provides features such as real-time content scanning and Web site classification
| VAR-201508-0171 | CVE-2015-3184 | Apache Subversion of mod_authz_svn Vulnerable to reading hidden files |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name. Apache Subversion is prone to an information-disclosure vulnerability.
Successfully exploiting this issue can allow an attacker to obtain sensitive information that may aid in launching further attacks. The system is compatible with the Concurrent Versions System (CVS). ============================================================================
Ubuntu Security Notice USN-2721-1
August 20, 2015
subversion vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Subversion.
Software Description:
- subversion: Advanced version control system
Details:
It was discovered that the Subversion mod_dav_svn module incorrectly
handled REPORT requests for a resource that does not exist. This issue only affected Ubuntu 12.04 LTS and Ubuntu
14.04 LTS. (CVE-2014-3580)
It was discovered that the Subversion mod_dav_svn module incorrectly
handled requests requiring a lookup for a virtual transaction name that
does not exist. This issue only affected Ubuntu
14.04 LTS. (CVE-2014-8108)
Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly
handled large numbers of REPORT requests. This
issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202)
Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve
modules incorrectly certain crafted parameter combinations. (CVE-2015-0248)
Ivan Zhakov discovered that the Subversion mod_dav_svn module incorrectly
handled crafted v1 HTTP protocol request sequences. (CVE-2015-0251)
C. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184)
C. Michael Pilato discovered that Subversion incorrectly handled path-based
authorization. (CVE-2015-3187)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libapache2-svn 1.8.10-5ubuntu1.1
libsvn1 1.8.10-5ubuntu1.1
subversion 1.8.10-5ubuntu1.1
Ubuntu 14.04 LTS:
libapache2-svn 1.8.8-1ubuntu3.2
libsvn1 1.8.8-1ubuntu3.2
subversion 1.8.8-1ubuntu3.2
Ubuntu 12.04 LTS:
libapache2-svn 1.6.17dfsg-3ubuntu3.5
libsvn1 1.6.17dfsg-3ubuntu3.5
subversion 1.6.17dfsg-3ubuntu3.5
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-03-21-4 Xcode 7.3
Xcode 7.3 is now available and addresses the following:
otool
Available for: OS X El Capitan v10.11 and later
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: Multiple memory corruption issues were addressed
through improved memory handling.
CVE-ID
CVE-2016-1765 : Proteas of Qihoo 360 Nirvan Team and Will Estes
(@squiffy)
subversion
Available for: OS X El Capitan v10.11 and later
Impact: A malicious server may be able to execute arbitrary code
Description: Multiple vulnerabilities existed in subversion versions
prior to 1.7.21, the most serious of which may have led to remote
code execution. These were addressed by updating subversion to
version 1.7.22. Michael Pilato, CollabNet
Xcode 7.0 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "7.3".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=9aiD
-----END PGP SIGNATURE-----
.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Subversion, Serf: Multiple Vulnerabilities
Date: October 11, 2016
Bugs: #500482, #518716, #519202, #545348, #556076, #567810,
#581448, #586046
ID: 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Subversion and Serf, the
worst of which could lead to execution of arbitrary code.
Background
==========
Subversion is a version control system intended to eventually replace
CVS. Like CVS, it has an optional client-server architecture (where the
server can be an Apache server running mod_svn, or an ssh program as in
CVS's :ext: method). In addition to supporting the features found in
CVS, Subversion also provides support for moving and copying files and
directories.
The serf library is a high performance C-based HTTP client library
built upon the Apache Portable Runtime (APR) library.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/subversion < 1.9.4 >= 1.9.4
*> 1.8.16
2 net-libs/serf < 1.3.7 >= 1.3.7
-------------------------------------------------------------------
2 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Subversion and Serf.
Please review the CVE identifiers referenced below for details
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, conduct a man-in-the-middle attack, obtain
sensitive information, or cause a Denial of Service Condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Subversion users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4"
All Serf users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7"
References
==========
[ 1 ] CVE-2014-0032
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032
[ 2 ] CVE-2014-3504
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504
[ 3 ] CVE-2014-3522
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522
[ 4 ] CVE-2014-3528
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528
[ 5 ] CVE-2015-0202
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202
[ 6 ] CVE-2015-0248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248
[ 7 ] CVE-2015-0251
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251
[ 8 ] CVE-2015-3184
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184
[ 9 ] CVE-2015-3187
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187
[ 10 ] CVE-2015-5259
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259
[ 11 ] CVE-2016-2167
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167
[ 12 ] CVE-2016-2168
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-05
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: subversion security update
Advisory ID: RHSA-2015:1742-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1742.html
Issue date: 2015-09-08
CVE Names: CVE-2015-0248 CVE-2015-0251 CVE-2015-3184
CVE-2015-3187
=====================================================================
1. Summary:
Updated subversion packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access
to Subversion repositories via HTTP.
An assertion failure flaw was found in the way the SVN server processed
certain requests with dynamically evaluated revision numbers. A remote
attacker could use this flaw to cause the SVN server (both svnserve and
httpd with the mod_dav_svn module) to crash. This could allow a user to anonymously
access files in a Subversion repository, which should only be accessible to
authenticated users. (CVE-2015-3184)
It was found that the mod_dav_svn module did not properly validate the
svn:author property of certain requests. An attacker able to create new
revisions could use this flaw to spoof the svn:author property.
(CVE-2015-0251)
It was found that when an SVN server (both svnserve and httpd with the
mod_dav_svn module) searched the history of a file or a directory, it would
disclose its location in the repository if that file or directory was not
readable (for example, if it had been moved). (CVE-2015-3187)
Red Hat would like to thank the Apache Software Foundation for reporting
these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the
original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael
Pilato of CollabNet as the original reporter of CVE-2015-3184 and
CVE-2015-3187 flaws.
All subversion users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, for the update to take effect, you must restart the httpd
daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are
serving Subversion repositories via the svn:// protocol.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1205138 - CVE-2015-0248 subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers
1205140 - CVE-2015-0251 subversion: (mod_dav_svn) spoofing svn:author property values for new revisions
1247249 - CVE-2015-3184 subversion: Mixed anonymous/authenticated path-based authz with httpd 2.4
1247252 - CVE-2015-3187 subversion: svn_repos_trace_node_locations() reveals paths hidden by authz
6. Package List:
Red Hat Enterprise Linux Client Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
ppc64:
mod_dav_svn-1.7.14-7.el7_1.1.ppc64.rpm
subversion-1.7.14-7.el7_1.1.ppc64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
mod_dav_svn-1.7.14-7.el7_1.1.s390x.rpm
subversion-1.7.14-7.el7_1.1.s390x.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-libs-1.7.14-7.el7_1.1.s390.rpm
subversion-libs-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.ael7b_1.1.src.rpm
ppc64le:
mod_dav_svn-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-libs-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
subversion-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc64.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc64.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc64.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-python-1.7.14-7.el7_1.1.ppc64.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc64.rpm
subversion-tools-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
subversion-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-devel-1.7.14-7.el7_1.1.s390.rpm
subversion-devel-1.7.14-7.el7_1.1.s390x.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390x.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390x.rpm
subversion-kde-1.7.14-7.el7_1.1.s390.rpm
subversion-kde-1.7.14-7.el7_1.1.s390x.rpm
subversion-perl-1.7.14-7.el7_1.1.s390.rpm
subversion-perl-1.7.14-7.el7_1.1.s390x.rpm
subversion-python-1.7.14-7.el7_1.1.s390x.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390x.rpm
subversion-tools-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le:
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-devel-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-gnome-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-javahl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-kde-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-perl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-python-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-ruby-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-tools-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0248
https://access.redhat.com/security/cve/CVE-2015-0251
https://access.redhat.com/security/cve/CVE-2015-3184
https://access.redhat.com/security/cve/CVE-2015-3187
https://access.redhat.com/security/updates/classification/#moderate
https://subversion.apache.org/security/CVE-2015-0248-advisory.txt
https://subversion.apache.org/security/CVE-2015-3184-advisory.txt
https://subversion.apache.org/security/CVE-2015-0251-advisory.txt
https://subversion.apache.org/security/CVE-2015-3187-advisory.txt
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV7t6+XlSAg2UNWIIRAivqAKCtV0lnW3RGFsCNsKIU9lBHeBk4UQCdE8/b
KVJwbobNcmPzKule+9U7RnM=
=F2J4
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201508-0597 | CVE-2014-7233 | GE Healthcare Precision THUNIS-800+ Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Precision THUNIS-800+ has a default password of (1) 1973 for the factory default System Utilities menu, (2) TH8740 for installation using TH8740_122_Setup.exe, (3) hrml for "Setup and Activation" using DSASetup, and (4) an empty string for Shutter Configuration, which has unspecified impact and attack vectors. NOTE: since these passwords appear to be used to access functionality during installation, this issue might not cross privilege boundaries and might not be a vulnerability. GE Healthcare Precision THUNIS-800+ (PT800+) is an integrated digital remote control multi-function X-ray machine (X-ray generating equipment) for the medical industry. There is a security vulnerability in GE Healthcare PT800+. An attacker could exploit this vulnerability to control the device.
Remote attackers with knowledge of the default credentials may exploit these vulnerabilities to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0003 | CVE-2003-1603 | GE Healthcare Discovery VH Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Discovery VH has a default password of (1) interfile for the ftpclient user of the Interfile server or (2) "2" for the LOCAL user of the FTP server for the Codonics printer, which has unspecified impact and attack vectors. GE Healthcare Discovery VH is a dual-detection gamma camera from General Electric (GE) of the United States for full-body scanning of patients in the medical industry and providing superior image quality. An attacker could exploit this vulnerability to control the device. GE Healthcare Discovery VH is prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0020 | CVE-2012-6695 | GE Healthcare Centricity PACS Vulnerability in workstation |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password of ddpadmin for the ddpadmin user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. The vulnerability stems from the ddpadmin user using 'ddpadmin' as the password. An attacker could use this vulnerability to control the device.
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device
| VAR-201508-0019 | CVE-2012-6694 | GE Healthcare Centricity PACS Workstation and Server Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1, and Server 4.0, has a password of 2charGE for the geservice account, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires it. GE Healthcare Centricity PACS is an image archiving and transmission system (PACS) for the medical industry of General Electric (GE). Workstation is a PACS workstation; Server is a PACS server. The vulnerability stems from the use of ‘2charGE’ as the password for the geservice account. An attacker could use this vulnerability to control the device.
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device
| VAR-201508-0018 | CVE-2012-6693 | GE Healthcare Centricity PACS Server vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity PACS 4.0 Server has a default password of (1) nasro for the nasro (ReadOnly) user and (2) nasrw for the nasrw (Read/Write) user, which has unspecified impact and attack vectors. GE Healthcare Centricity PACS is the company's image archiving and transmission system for the medical industry.
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device
| VAR-201508-0013 | CVE-2006-7253 | GE Healthcare Infinia II Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Infinia II has a default password of (1) infinia for the infinia user, (2) #bigguy1 for the acqservice user, (3) dont4get2 for the Administrator user, (4) #bigguy1 for the emergency user, and (5) 2Bfamous for the InfiniaAdmin user, which has unspecified impact and attack vectors. GE Healthcare Infinia II is a dual detector imaging system for the medical industry at General Electric (GE). An attacker could exploit this vulnerability to control the device
| VAR-201508-0596 | CVE-2014-7232 | GE Healthcare Discovery XR656 and XR656 G2 Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Discovery XR656 and XR656 G2 has a password of (1) 2getin for the insite user, (2) 4$xray for the xruser user, and (3) #superxr for the root user, which has unspecified impact and attack vectors. NOTE: it is not clear whether these passwords are default, hardcoded, or dependent on another system or product that requires a fixed value. (1) insite For users 2getin password (2) xruser For users 4$xray password (3) root For users #superxr password It is unknown whether this password is default, hard-coded, or dependent on other systems or products that require a fixed value.It may be subject to unspecified effects and attacks. An attacker could exploit this vulnerability to control the device. Multiple GE Healthcare products are prone to a security-bypass vulnerability. Successful exploits will result in the complete compromise of the affected device
| VAR-201508-0001 | CVE-2007-6757 | GE Healthcare Centricity DMS Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity DMS 4.2, 4.1, and 4.0 has a password of Muse!Admin for the Museadmin user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. An attacker could use this vulnerability to control the device.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0005 | CVE-2002-2445 | plural GE Healthcare Millennium Product vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Millennium MG, NC, and MyoSIGHT has a default password of (1) root.genie for the root user, (2) "service." for the service user, (3) admin.genie for the admin user, (4) reboot for the reboot user, and (5) shutdown for the shutdown user, which has unspecified impact and attack vectors. GE Healthcare Millennium MG, NC, and MyoSIGHT are all scanning cameras for the medical industry from General Electric (GE).
There are security vulnerabilities in several GE products. An attacker could use this vulnerability to control the device
| VAR-201508-0151 | CVE-2013-7404 | GE Healthcare Discovery NM 750b Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Discovery NM 750b has a password of 2getin for the insite account for (1) Telnet and (2) FTP, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. The GE Healthcare Discovery NM 750b is a high-end molecular mammography device for the medical industry at General Electric (GE). An attacker could exploit this vulnerability to control the device
| VAR-201508-0002 | CVE-2009-5143 | GE Healthcare Discovery 530C Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Discovery 530C has a password of #bigguy1 for the (1) acqservice user and (2) wsservice user of the Xeleris System, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. GE Healthcare Discovery 530C is a suite of applications for the medical industry that provide automated analysis and reporting for magnetic resonance imaging.
GE Healthcare Discovery 530C has built-in accounts. The acqservice user and the Xeleris System wsservice user ‘# bigguy1’ are used as passwords, allowing remote attackers to use these accounts to control devices.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. An attacker could exploit this vulnerability to take control of the device
| VAR-201508-0152 | CVE-2013-7405 | GE Healthcare Centricity DMS Ad Hoc Reporting Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The Ad Hoc Reporting feature in GE Healthcare Centricity DMS 4.2 has a password of Never!Mind for the Administrator user, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. GE Healthcare Centricity DMS is a cardiology clinical education data management system for the medical industry from General Electric (GE). An attacker could use this vulnerability to control the device.
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device
| VAR-201508-0004 | CVE-2001-1594 | GE Healthcare eNTEGRA P&R Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. GE Healthcare eNTEGRA P&R Uses passwords for the following and other accounts, and is vulnerable to unspecified effects and attacks. GE Healthcare eNTEGRA P & R (Processing & Review) is a medical nuclear computer system for the medical industry from General Electric (GE).
A security vulnerability exists in GE Healthcare eNTEGRA P & R. An attacker could use this vulnerability to control the device.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0006 | CVE-2002-2446 | plural GE Healthcare Millennium Product vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Millennium MG, NC, and MyoSIGHT has a password of insite.genieacq for the insite account that cannot be changed without disabling product functionality for remote InSite support, which has unspecified impact and attack vectors. GE Healthcare Millennium MG, NC and MyoSIGHT are all US Scandinavian (GE) scanning camera products for the medical industry. An attacker could exploit this vulnerability to control the device. Multiple GE Healthcare Products are prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0275 | CVE-2013-7442 | GE Healthcare Centricity PACS Workstation Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity PACS Workstation 4.0 and 4.0.1 has a password of (1) CANal1 for the Administrator user and (2) iis for the IIS user, which has unspecified impact and attack vectors related to TimbuktuPro. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires it. (1) For admin users CANal1 password (2) IIS For users iis password It is unknown whether this password is default, hard-coded, or dependent on other systems or products that require a fixed value.It may be subject to unspecified effects and attacks. An attacker could use this vulnerability to control the device.
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device