VARIoT IoT vulnerabilities database
| VAR-201507-0505 | CVE-2015-4275 | Cisco ASR 5000 Runs on device software Packet Data Network Gateway Service disruption in components (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Packet Data Network Gateway (aka PGW) component on Cisco ASR 5000 devices with software 18.0.0.59167 and 18.0.0.59211 allows remote attackers to cause a denial of service via a malformed header in a GTPv2 packet, aka Bug ID CSCut11534. Vendors have confirmed this vulnerability Bug ID CSCut11534 It is released as.By a third party GTPv2 Denial of service via malformed headers in packets (DoS) There is a possibility of being put into a state. The Cisco ASR 5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE).
An attacker can exploit this issue to cause the GTPv2 service on an affected device to become unresponsive, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCut11534. Cisco ASR 5000 Series is the 5000 series wireless controller products of Cisco (Cisco)
| VAR-201507-0506 | CVE-2015-4276 | Cisco WebEx Meetings Server Vulnerable to arbitrary code execution |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Cisco WebEx Meetings Server 2.5MR1 allows remote authenticated users to execute arbitrary code via a crafted command parameter, aka Bug ID CSCus56138.
An attacker can exploit this issue to execute arbitrary code on the affected system. This may aid in further attacks.
This issue being tracked by Cisco Bug ID CSCus56138. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution. There is a security vulnerability in CWMS 2.5MR1 version
| VAR-201507-0507 | CVE-2015-4278 | Cisco E Email Security Service disruption in appliance device software (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cisco Email Security Appliance (ESA) devices with software 8.5.6-106 and 9.5.0-201 allow remote attackers to cause a denial of service (per-domain e-mail reception outage) by placing malformed DMARC policy data in DNS TXT records for a domain, aka Bug ID CSCuv14806. Cisco Email Security Appliance is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause the affected application to stop receiving email messages, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCuv14806. The appliance offers spam protection, email encryption, data loss prevention, and more
| VAR-201507-0047 | CVE-2015-5386 | Siemens SICAM MIC Authentication Bypass Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Siemens SICAM MIC devices with firmware before 2404 allow remote attackers to bypass authentication and obtain administrative access via unspecified HTTP requests. Siemens SICAM MIC is an energy automation modular remote control unit belonging to the SICAM RTU product family. Siemens SICAM MIC is prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks.
Versions prior to Siemens SICAM MIC 2404 are vulnerable. The equipment is mainly used in the energy industry
| VAR-201507-0549 | CVE-2015-4267 | Cisco Identity Services Engine of Web Cross-site request forgery vulnerability in framework |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco Identity Services Engine (ISE) 1.2(0.793), 1.3(0.876), 1.4(0.109), 2.0(0.147), and 2.0(0.169) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCus09940. Vendors have confirmed this vulnerability Bug ID CSCus09940 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCus09940. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies. The following releases are affected: Cisco ISE Release 1.2(0.793), Release 1.3(0.876), Release 1.4(0.109), Release 2.0(0.147)
| VAR-201507-0503 | CVE-2015-4273 | Cisco ASR 5000 Device software Packet Data Network Gateway Service disruption in components (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Packet Data Network Gateway (aka PGW) component on Cisco ASR 5000 devices with software 15.0(912), 15.0(935), and 15.0(938) allows remote attackers to cause a denial of service (Session Manager outage) via malformed fields in an IP packet, aka Bug ID CSCut38476. The Cisco ASR 5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). Cisco Packet Data Network Gateway is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause the Session Manager service on an affected device to become unresponsive, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCut38476. Cisco ASR 5000 Series is the 5000 series wireless controller products of Cisco (Cisco). The following releases are affected: Cisco ASR 5000 devices using Release 15.0(912), Release 15.0(935), and Release 15.0(938) software
| VAR-201508-0030 | CVE-2015-5965 | Fortinet FortiOS of SSL-VPN Vulnerability in function forgery of encrypted content |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The SSL-VPN feature in Fortinet FortiOS before 4.3.13 only checks the first byte of the TLS MAC in finished messages, which makes it easier for remote attackers to spoof encrypted content via a crafted MAC field. Fortinet FortiOS is prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks.
Fortinet FortiOS 4.3.12 and prior versions are vulnerable. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
Date: August 15, 2015
Bugs: #554882, #557342
ID: 201508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-plugins/adobe-flash < 11.2.202.508 >= 11.2.202.508
Description
===========
Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201507-0059 | CVE-2015-0253 | Apache HTTP Server of server/protocol.c Inside read_request_line Service disruption in functions (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Apache HTTP Server is prone to a remote denial-of-service vulnerability.
Successful exploits may allow an attacker to cause an affected application to crash, resulting in a denial-of-service condition. The server is fast, reliable and extensible through a simple API. The vulnerability is caused by the fact that the program does not initialize the structure members. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: httpd24-httpd security update
Advisory ID: RHSA-2015:1666-01
Product: Red Hat Software Collections
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1666.html
Issue date: 2015-08-24
CVE Names: CVE-2015-0228 CVE-2015-0253 CVE-2015-3183
CVE-2015-3185
=====================================================================
1. Summary:
Updated httpd24-httpd packages that fix multiple security issues are now
available for Red Hat Software Collections 2.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
The httpd packages provide the Apache HTTP Server, a powerful, efficient,
and extensible web server.
Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could use
these flaws to create a specially crafted request, which httpd would decode
differently from an HTTP proxy software in front of it, possibly leading to
HTTP request smuggling attacks. (CVE-2015-3183)
It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module using
this API function could consequently allow access that should have been
denied. (CVE-2015-3185)
Note: This update introduces new a new API function,
ap_some_authn_required(), which correctly indicates if a request is
authenticated. External httpd modules using the old API function should be
modified to use the new one to completely resolve this issue.
A denial of service flaw was found in the way the mod_lua httpd module
processed certain WebSocket Ping requests. A remote attacker could send a
specially crafted WebSocket Ping packet that would cause the httpd child
process to crash. A remote attacker could possibly use this flaw to
crash the httpd child process using a request that triggers a certain HTTP
error. (CVE-2015-0253)
All httpd24-httpd users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, the httpd24-httpd service will be restarted
automatically.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1202988 - CVE-2015-0228 httpd: Possible mod_lua crash due to websocket bug
1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser
1243888 - CVE-2015-3185 httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
1243891 - CVE-2015-0253 httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0228
https://access.redhat.com/security/cve/CVE-2015-0253
https://access.redhat.com/security/cve/CVE-2015-3183
https://access.redhat.com/security/cve/CVE-2015-3185
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV22bPXlSAg2UNWIIRAmm2AKCI6AByn1Zlj/2R8aLKFD4hZno5VgCfcx8H
y5DWl0MjeqKeAOHiddwyDdU=
=yzQP
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-4 OS X Server 5.0.3
OS X Server 5.0.3 is now available and addresses the following:
apache
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in Apache, the most serious of
which may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in Apache versions
prior to 2.4.16. These issues were addressed by updating Apache to
version 2.4.16.
CVE-ID
CVE-2013-5704
CVE-2014-3581
CVE-2014-3583
CVE-2014-8109
CVE-2015-0228
CVE-2015-0253
CVE-2015-3183
CVE-2015-3185
BIND
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in BIND, the most severe of which
may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in BIND versions prior
to 9.9.7. These issues were addressed by updating BIND to version
9.9.7.
CVE-ID
CVE-2014-8500
CVE-2015-1349
PostgreSQL
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in PostgreSQL, the most serious of
which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in PostgreSQL versions
prior to 9.3.9. These issues were addressed by updating PostgreSQL to
version 9.3.9.
CVE-ID
CVE-2014-0067
CVE-2014-8161
CVE-2015-0241
CVE-2015-0242
CVE-2015-0243
CVE-2015-0244
CVE-2015-3165
CVE-2015-3166
CVE-2015-3167
Wiki Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple XML security issues in Wiki Server
Description: Multiple XML vulnerabilities existed in Wiki Server
based on Twisted. This issue was addressed by removing Twisted.
CVE-ID
CVE-2015-5911 : Zachary Jones of WhiteHat Security Threat Research
Center
OS X Server 5.0.3 may be obtained from the Mac App Store.
Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/httpd-2.4.16-i486-1_slack14.1.txz: Upgraded.
This update fixes the following security issues:
* CVE-2015-0253: Fix a crash with ErrorDocument 400 pointing to a local
URL-path with the INCLUDES filter active, introduced in 2.4.11.
* CVE-2015-3183: core: Fix chunk header parsing defect. Remove
apr_brigade_flatten(), buffering and duplicated code from the HTTP_IN
filter, parse chunks in a single pass with zero copy. Limit accepted
chunk-size to 2^63-1 and be strict about chunk-ext authorized characters.
* CVE-2015-3185: Replacement of ap_some_auth_required (unusable in Apache
httpd 2.4) with new ap_some_authn_required and ap_force_authn hook.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0253
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/httpd-2.4.16-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/httpd-2.4.16-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/httpd-2.4.16-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/httpd-2.4.16-x86_64-1_slack14.1.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/httpd-2.4.16-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/httpd-2.4.16-x86_64-1.txz
MD5 signatures:
+-------------+
Slackware 14.0 package:
d78c9925e69ba6ce14d67fb67245981b httpd-2.4.16-i486-1_slack14.0.txz
Slackware x86_64 14.0 package:
1370e3c7e135bf07b65e73049099a942 httpd-2.4.16-x86_64-1_slack14.0.txz
Slackware 14.1 package:
ea116c45bba8c80f59cfe0394a8f87fa httpd-2.4.16-i486-1_slack14.1.txz
Slackware x86_64 14.1 package:
8b5b1caa1fa203b07b529f77834fac16 httpd-2.4.16-x86_64-1_slack14.1.txz
Slackware -current package:
01ccb961f17bd14c1d157892af4c9f1d n/httpd-2.4.16-i586-1.txz
Slackware x86_64 -current package:
70a6644de3585007861e57cf08608843 n/httpd-2.4.16-x86_64-1.txz
Installation instructions:
+------------------------+
Upgrade the package as root:
# upgradepkg httpd-2.4.16-i486-1_slack14.1.txz
Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address
| VAR-201507-0017 | CVE-2015-3185 | Apache HTTP Server Permission Licensing and Access Control Issue Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior. Apache HTTP Server is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks. The server is fast, reliable and extensible through a simple API. The vulnerability stems from the fact that when the program does not require authentication, the Require directive will still be used for authorization settings and in displayed in the configuration. 7) - x86_64
3. ============================================================================
Ubuntu Security Notice USN-2686-1
July 27, 2015
apache2 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the Apache HTTP server. This issue only affected Ubuntu
14.04 LTS and Ubuntu 15.04. (CVE-2015-3185)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
apache2.2-bin 2.4.10-9ubuntu1.1
Ubuntu 14.04 LTS:
apache2.2-bin 2.4.7-1ubuntu4.5
Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.10
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: httpd24-httpd security update
Advisory ID: RHSA-2015:1666-01
Product: Red Hat Software Collections
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1666.html
Issue date: 2015-08-24
CVE Names: CVE-2015-0228 CVE-2015-0253 CVE-2015-3183
CVE-2015-3185
=====================================================================
1. Summary:
Updated httpd24-httpd packages that fix multiple security issues are now
available for Red Hat Software Collections 2.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3.
Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could use
these flaws to create a specially crafted request, which httpd would decode
differently from an HTTP proxy software in front of it, possibly leading to
HTTP request smuggling attacks. (CVE-2015-3183)
It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module using
this API function could consequently allow access that should have been
denied. (CVE-2015-3185)
Note: This update introduces new a new API function,
ap_some_authn_required(), which correctly indicates if a request is
authenticated. External httpd modules using the old API function should be
modified to use the new one to completely resolve this issue.
A denial of service flaw was found in the way the mod_lua httpd module
processed certain WebSocket Ping requests. A remote attacker could send a
specially crafted WebSocket Ping packet that would cause the httpd child
process to crash. (CVE-2015-0228)
A NULL pointer dereference flaw was found in the way httpd generated
certain error responses. A remote attacker could possibly use this flaw to
crash the httpd child process using a request that triggers a certain HTTP
error. (CVE-2015-0253)
All httpd24-httpd users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
the updated packages, the httpd24-httpd service will be restarted
automatically.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1202988 - CVE-2015-0228 httpd: Possible mod_lua crash due to websocket bug
1243887 - CVE-2015-3183 httpd: HTTP request smuggling attack against chunked request parser
1243888 - CVE-2015-3185 httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4
1243891 - CVE-2015-0253 httpd: NULL pointer dereference crash with ErrorDocument 400 pointing to a local URL-path
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.5):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
httpd24-httpd-2.4.12-4.el6.2.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-4.el6.2.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-devel-2.4.12-4.el6.2.x86_64.rpm
httpd24-httpd-tools-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ldap-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_session-2.4.12-4.el6.2.x86_64.rpm
httpd24-mod_ssl-2.4.12-4.el6.2.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
httpd24-httpd-2.4.12-6.el7.1.src.rpm
noarch:
httpd24-httpd-manual-2.4.12-6.el7.1.noarch.rpm
x86_64:
httpd24-httpd-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-debuginfo-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-devel-2.4.12-6.el7.1.x86_64.rpm
httpd24-httpd-tools-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ldap-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_proxy_html-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_session-2.4.12-6.el7.1.x86_64.rpm
httpd24-mod_ssl-2.4.12-6.el7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0228
https://access.redhat.com/security/cve/CVE-2015-0253
https://access.redhat.com/security/cve/CVE-2015-3183
https://access.redhat.com/security/cve/CVE-2015-3185
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV22bPXlSAg2UNWIIRAmm2AKCI6AByn1Zlj/2R8aLKFD4hZno5VgCfcx8H
y5DWl0MjeqKeAOHiddwyDdU=
=yzQP
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. In some configurations, apache2 would
fail to start with a spurious error message about the certificate chain.
This update fixes this problem. For reference, the text of the original
advisory follows:
Several vulnerabilities have been found in the Apache HTTPD server. A malicious client could force the
server to misinterpret the request length, allowing cache poisoning
or credential hijacking if an intermediary proxy is in use.
CVE-2015-3185
A design error in the "ap_some_auth_required" function renders the
API unusuable in apache2 2.4.x.
The fix backports the new "ap_some_authn_required" API from 2.4.16.
This issue does not affect the oldstable distribution (wheezy).
In addition, the updated package for the oldstable distribution (wheezy)
removes a limitation of the Diffie-Hellman (DH) parameters to 1024 bits.
This limitation may potentially allow an attacker with very large
computing resources, like a nation-state, to break DH key exchange by
precomputation. The updated apache2 package also allows to configure
custom DH parameters. More information is contained in the
changelog.Debian.gz file.
These improvements were already present in the stable, testing, and
unstable distributions.
For the oldstable distribution (wheezy), this problem has been fixed
in version 2.2.22-13+deb7u6.
The other distributions were not affected by the regression.
We recommend that you upgrade your apache2 packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-4 OS X Server 5.0.3
OS X Server 5.0.3 is now available and addresses the following:
apache
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in Apache, the most serious of
which may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in Apache versions
prior to 2.4.16. These issues were addressed by updating Apache to
version 2.4.16.
CVE-ID
CVE-2013-5704
CVE-2014-3581
CVE-2014-3583
CVE-2014-8109
CVE-2015-0228
CVE-2015-0253
CVE-2015-3183
CVE-2015-3185
BIND
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in BIND, the most severe of which
may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in BIND versions prior
to 9.9.7. These issues were addressed by updating BIND to version
9.9.7.
CVE-ID
CVE-2014-8500
CVE-2015-1349
PostgreSQL
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in PostgreSQL, the most serious of
which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in PostgreSQL versions
prior to 9.3.9. These issues were addressed by updating PostgreSQL to
version 9.3.9.
CVE-ID
CVE-2014-0067
CVE-2014-8161
CVE-2015-0241
CVE-2015-0242
CVE-2015-0243
CVE-2015-0244
CVE-2015-3165
CVE-2015-3166
CVE-2015-3167
Wiki Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple XML security issues in Wiki Server
Description: Multiple XML vulnerabilities existed in Wiki Server
based on Twisted. This issue was addressed by removing Twisted.
CVE-ID
CVE-2015-5911 : Zachary Jones of WhiteHat Security Threat Research
Center
OS X Server 5.0.3 may be obtained from the Mac App Store. This software, such as Apache HTTP Server, is
common to multiple JBoss middleware products, and is packaged under Red Hat
JBoss Core Services to allow for faster distribution of updates, and for a
more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23
Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache
HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are
documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was discovered that the httpd's mod_auth_digest module did not
properly initialize memory before using it when processing certain headers
related to digest authentication. (CVE-2015-3185)
* A flaw was found in the way the DES/3DES cipher was used as part of the
TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to
recover some plaintext data by capturing large amounts of encrypted traffic
between TLS/SSL server and client if the communication used a DES/3DES
based ciphersuite. Upstream
acknowledges Karthikeyan Bhargavan (Inria) and GaA<<tan Leurent (Inria) as
the original reporters of CVE-2016-2183. For the update to take effect, all services linked to the
OpenSSL library must be restarted, or the system rebooted. JIRA issues fixed (https://issues.jboss.org/):
JBCS-329 - Unable to load large CRL openssl problem
JBCS-337 - Errata for httpd 2.4.23 SP2 RHEL 6
7
| VAR-201507-0496 | CVE-2015-4458 | Cisco Adaptive Security Appliance Included with software and other products Cavium Cryptographic module firmware TLS In the implementation of TLS Vulnerability impersonating content |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The TLS implementation in the Cavium cryptographic-module firmware, as distributed with Cisco Adaptive Security Appliance (ASA) Software 9.1(5.21) and other products, does not verify the MAC field, which allows man-in-the-middle attackers to spoof TLS content by modifying packets, aka Bug ID CSCuu52976. Vendors have confirmed this vulnerability Bug ID CSCuu52976 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) By changing the packet, TLS The content may be forged. Cisco Adaptive Security Appliance is prone to a remote security-bypass vulnerability.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCuu52976
| VAR-201507-0499 | CVE-2015-4269 | Cisco Unified Communications Manager of Tomcat Service disruption in the throttling function (DoS) Vulnerabilities |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Tomcat throttling feature in Cisco Unified Communications Manager 10.5(1.99995.9) allows remote authenticated users to cause a denial of service (management outage) by sending many requests, aka Bug ID CSCuu99709. Cisco Unified Communications Manager (CUCM, Unified CM, CallManager) is a call processing component in a unified communication system of Cisco (Cisco). This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. There is a security vulnerability in the Tomcat service flow limiting mechanism of CUCM 10.5 (1.99995.9). A remote attacker can exploit this vulnerability by sending multiple requests to make the Management page display slow or unresponsive, resulting in a denial of service
| VAR-201507-0548 | CVE-2015-4266 | Cisco Identity Services Engine of Web Click-jacking attack vulnerability in the interface |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The web interface in Cisco Identity Services Engine (ISE) 1.1(4.1), 1.3(106.146), and 1.3(120.135) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCut04556. In this case, " Cross frame scripting (XFS)" Vulnerability related to the problem. Cisco Identity Services Engine Software is prone to a cross-frame scripting vulnerability.
Successful exploits will allow attackers to bypass the same-origin policy and perform unauthorized actions; other attacks are possible.
This issue is being tracked by Cisco Bug ID CSCut04556. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies. Cisco ISE versions 1.1(4.1), 1.3(106.146), and 1.3(120.135) have a security vulnerability in the web interface
| VAR-201507-0501 | CVE-2015-4271 | Cisco TelePresence Integrator C Run on device TelePresence TC Vulnerabilities that bypass software authentication |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Cisco TelePresence TC before 7.3.4 on Integrator C devices allows remote attackers to bypass authentication via vectors involving multiple request parameters, aka Bug ID CSCuv00604. Vendors have confirmed this vulnerability Bug ID CSCuv00604 It is released as. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlA third party may bypass authentication due to problems with multiple request parameters.
An attacker can exploit this issue to bypass the authentication mechanism on an affected device. This may lead to further attacks
| VAR-201507-0500 | CVE-2015-4270 | Cisco FireSIGHT system Software cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Cisco FireSIGHT System Software 5.3.1.5 and 6.0.0 allow remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug IDs CSCuv22557, CSCuv22583, CSCuv22632, CSCuv22641, CSCuv22650, CSCuv22662, CSCuv22697, and CSCuv22702. Cisco FireSIGHT system The software contains a cross-site scripting vulnerability. Vendors have confirmed this vulnerability CSCuv22557 , CSCuv22583 , CSCuv22632 , CSCuv22641 , CSCuv22650 , CSCuv22662 , CSCuv22697 ,and CSCuv22702 It is released as.Skillfully crafted by a third party URL Through any Web Script or HTML May be inserted. Cisco FireSIGHT System Software is a set of management center software of Cisco (Cisco), which supports centralized management of the network security and operation functions of Cisco ASA and Cisco FirePOWER network security devices using FirePOWER Services
| VAR-201507-0502 | CVE-2015-4272 | Cisco Unified Communications Manager of ccmivr Page cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the ccmivr page in Cisco Unified Communications Manager (formerly CallManager) 10.5(2.10000.5) allow remote attackers to inject arbitrary web script or HTML via a crafted parameter, aka Bug ID CSCut19580. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
| VAR-201507-0303 | CVE-2015-2620 | Oracle MySQL of MySQL Server In Server : Security : Privileges Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
The vulnerability can be exploited over the 'MySQL Protocol' protocol. The 'Server : Security : Privileges' sub component is affected.
This vulnerability affects the following supported versions:
5.5.43 and earlier, 5.6.23 and earlier. The database system has the characteristics of high performance, low cost and good reliability. Remote attackers can use this vulnerability to read data, affecting data confidentiality. ============================================================================
Ubuntu Security Notice USN-2674-1
July 21, 2015
mysql-5.5, mysql-5.6 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in MySQL.
MySQL has been updated to 5.5.44 in Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and
Ubuntu 14.10.
In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.
Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-44.html
http://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-25.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
mysql-server-5.6 5.6.25-0ubuntu0.15.04.1
Ubuntu 14.10:
mysql-server-5.5 5.5.44-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
mysql-server-5.5 5.5.44-0ubuntu0.14.04.1
Ubuntu 12.04 LTS:
mysql-server-5.5 5.5.44-0ubuntu0.12.04.1
In general, a standard system update will make all the necessary changes.
For the stable distribution (jessie), these problems have been fixed in
version 5.5.44-0+deb8u1. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: mariadb security update
Advisory ID: RHSA-2015:1665-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1665.html
Issue date: 2015-08-24
CVE Names: CVE-2015-0433 CVE-2015-0441 CVE-2015-0499
CVE-2015-0501 CVE-2015-0505 CVE-2015-2568
CVE-2015-2571 CVE-2015-2573 CVE-2015-2582
CVE-2015-2620 CVE-2015-2643 CVE-2015-2648
CVE-2015-3152 CVE-2015-4737 CVE-2015-4752
CVE-2015-4757
=====================================================================
1. Summary:
Updated mariadb packages that fix several security issues are now available
for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
MariaDB is a multi-user, multi-threaded SQL database server that is binary
compatible with MySQL.
It was found that the MySQL client library permitted but did not require
a client to use SSL/TLS when establishing a secure connection to a MySQL
server using the "--ssl" option. A man-in-the-middle attacker
could use this flaw to strip the SSL/TLS protection from a connection
between a client and a server. (CVE-2015-3152)
This update fixes several vulnerabilities in the MariaDB database server.
Information about these flaws can be found on the Oracle Critical Patch
Update Advisory page, listed in the References section. (CVE-2015-0501,
CVE-2015-2568, CVE-2015-0499, CVE-2015-2571, CVE-2015-0433, CVE-2015-0441,
CVE-2015-0505, CVE-2015-2573, CVE-2015-2582, CVE-2015-2620, CVE-2015-2643,
CVE-2015-2648, CVE-2015-4737, CVE-2015-4752, CVE-2015-4757)
These updated packages upgrade MariaDB to version 5.5.44. Refer to the
MariaDB Release Notes listed in the References section for a complete list
of changes.
All MariaDB users should upgrade to these updated packages, which correct
these issues. After installing this update, the MariaDB server daemon
(mysqld) will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1212758 - CVE-2015-0501 mysql: unspecified vulnerability related to Server:Compiling (CPU April 2015)
1212763 - CVE-2015-2568 mysql: unspecified vulnerability related to Server:Security:Privileges (CPU April 2015)
1212768 - CVE-2015-0499 mysql: unspecified vulnerability related to Server:Federated (CPU April 2015)
1212772 - CVE-2015-2571 mysql: unspecified vulnerability related to Server:Optimizer (CPU April 2015)
1212776 - CVE-2015-0433 mysql: unspecified vulnerability related to Server:InnoDB:DML (CPU April 2015)
1212777 - CVE-2015-0441 mysql: unspecified vulnerability related to Server:Security:Encryption (CPU April 2015)
1212780 - CVE-2015-0505 mysql: unspecified vulnerability related to Server:DDL (CPU April 2015)
1212783 - CVE-2015-2573 mysql: unspecified vulnerability related to Server:DDL (CPU April 2015)
1217506 - CVE-2015-3152 mysql: use of SSL/TLS can not be enforced in mysql client library (oCERT-2015-003, BACKRONYM)
1244768 - CVE-2015-2582 mysql: unspecified vulnerability related to Server:GIS (CPU July 2015)
1244771 - CVE-2015-2620 mysql: unspecified vulnerability related to Server:Security:Privileges (CPU July 2015)
1244774 - CVE-2015-2643 mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015)
1244775 - CVE-2015-2648 mysql: unspecified vulnerability related to Server:DML (CPU July 2015)
1244778 - CVE-2015-4737 mysql: unspecified vulnerability related to Server:Pluggable Auth (CPU July 2015)
1244779 - CVE-2015-4752 mysql: unspecified vulnerability related to Server:I_S (CPU July 2015)
1244781 - CVE-2015-4757 mysql: unspecified vulnerability related to Server:Optimizer (CPU July 2015)
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
mariadb-5.5.44-1.el7_1.src.rpm
x86_64:
mariadb-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-libs-5.5.44-1.el7_1.i686.rpm
mariadb-libs-5.5.44-1.el7_1.x86_64.rpm
mariadb-server-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
mariadb-bench-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-devel-5.5.44-1.el7_1.i686.rpm
mariadb-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-test-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
mariadb-5.5.44-1.el7_1.src.rpm
x86_64:
mariadb-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-libs-5.5.44-1.el7_1.i686.rpm
mariadb-libs-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
mariadb-bench-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-devel-5.5.44-1.el7_1.i686.rpm
mariadb-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-server-5.5.44-1.el7_1.x86_64.rpm
mariadb-test-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
mariadb-5.5.44-1.el7_1.src.rpm
ppc64:
mariadb-5.5.44-1.el7_1.ppc64.rpm
mariadb-bench-5.5.44-1.el7_1.ppc64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.ppc.rpm
mariadb-debuginfo-5.5.44-1.el7_1.ppc64.rpm
mariadb-devel-5.5.44-1.el7_1.ppc.rpm
mariadb-devel-5.5.44-1.el7_1.ppc64.rpm
mariadb-libs-5.5.44-1.el7_1.ppc.rpm
mariadb-libs-5.5.44-1.el7_1.ppc64.rpm
mariadb-server-5.5.44-1.el7_1.ppc64.rpm
mariadb-test-5.5.44-1.el7_1.ppc64.rpm
s390x:
mariadb-5.5.44-1.el7_1.s390x.rpm
mariadb-bench-5.5.44-1.el7_1.s390x.rpm
mariadb-debuginfo-5.5.44-1.el7_1.s390.rpm
mariadb-debuginfo-5.5.44-1.el7_1.s390x.rpm
mariadb-devel-5.5.44-1.el7_1.s390.rpm
mariadb-devel-5.5.44-1.el7_1.s390x.rpm
mariadb-libs-5.5.44-1.el7_1.s390.rpm
mariadb-libs-5.5.44-1.el7_1.s390x.rpm
mariadb-server-5.5.44-1.el7_1.s390x.rpm
mariadb-test-5.5.44-1.el7_1.s390x.rpm
x86_64:
mariadb-5.5.44-1.el7_1.x86_64.rpm
mariadb-bench-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-devel-5.5.44-1.el7_1.i686.rpm
mariadb-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-libs-5.5.44-1.el7_1.i686.rpm
mariadb-libs-5.5.44-1.el7_1.x86_64.rpm
mariadb-server-5.5.44-1.el7_1.x86_64.rpm
mariadb-test-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
mariadb-5.5.44-1.ael7b_1.src.rpm
ppc64le:
mariadb-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-bench-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-debuginfo-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-devel-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-libs-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-server-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-test-5.5.44-1.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
mariadb-debuginfo-5.5.44-1.el7_1.ppc.rpm
mariadb-debuginfo-5.5.44-1.el7_1.ppc64.rpm
mariadb-embedded-5.5.44-1.el7_1.ppc.rpm
mariadb-embedded-5.5.44-1.el7_1.ppc64.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.ppc.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.ppc64.rpm
s390x:
mariadb-debuginfo-5.5.44-1.el7_1.s390.rpm
mariadb-debuginfo-5.5.44-1.el7_1.s390x.rpm
mariadb-embedded-5.5.44-1.el7_1.s390.rpm
mariadb-embedded-5.5.44-1.el7_1.s390x.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.s390.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.s390x.rpm
x86_64:
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le:
mariadb-debuginfo-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-embedded-5.5.44-1.ael7b_1.ppc64le.rpm
mariadb-embedded-devel-5.5.44-1.ael7b_1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
mariadb-5.5.44-1.el7_1.src.rpm
x86_64:
mariadb-5.5.44-1.el7_1.x86_64.rpm
mariadb-bench-5.5.44-1.el7_1.x86_64.rpm
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-devel-5.5.44-1.el7_1.i686.rpm
mariadb-devel-5.5.44-1.el7_1.x86_64.rpm
mariadb-libs-5.5.44-1.el7_1.i686.rpm
mariadb-libs-5.5.44-1.el7_1.x86_64.rpm
mariadb-server-5.5.44-1.el7_1.x86_64.rpm
mariadb-test-5.5.44-1.el7_1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
mariadb-debuginfo-5.5.44-1.el7_1.i686.rpm
mariadb-debuginfo-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-5.5.44-1.el7_1.x86_64.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.i686.rpm
mariadb-embedded-devel-5.5.44-1.el7_1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0433
https://access.redhat.com/security/cve/CVE-2015-0441
https://access.redhat.com/security/cve/CVE-2015-0499
https://access.redhat.com/security/cve/CVE-2015-0501
https://access.redhat.com/security/cve/CVE-2015-0505
https://access.redhat.com/security/cve/CVE-2015-2568
https://access.redhat.com/security/cve/CVE-2015-2571
https://access.redhat.com/security/cve/CVE-2015-2573
https://access.redhat.com/security/cve/CVE-2015-2582
https://access.redhat.com/security/cve/CVE-2015-2620
https://access.redhat.com/security/cve/CVE-2015-2643
https://access.redhat.com/security/cve/CVE-2015-2648
https://access.redhat.com/security/cve/CVE-2015-3152
https://access.redhat.com/security/cve/CVE-2015-4737
https://access.redhat.com/security/cve/CVE-2015-4752
https://access.redhat.com/security/cve/CVE-2015-4757
https://access.redhat.com/security/updates/classification/#moderate
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html#AppendixMSQL
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixMSQL
https://mariadb.com/kb/en/mariadb/mariadb-5544-release-notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV228TXlSAg2UNWIIRAm1mAJ0bzbWNcno0Sy/+xCRBh61u0Og5LQCfYvOB
tzK/FpD+vNcUAhqnRuiFgiM=
=BpLD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201706-0165 | CVE-2015-5473 | Samsung SyncThru FileUploadController Directory Traversal Remote Code Execution Vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: HIGH |
Multiple directory traversal vulnerabilities in Samsung SyncThru 6 before 1.0 allow remote attackers to delete arbitrary files via unspecified parameters to (1) upload/updateDriver or (2) upload/addDriver or to execute arbitrary code with SYSTEM privileges via unspecified parameters to (3) uploadCloning.html, (4) fileupload.html, (5) uploadFirmware.html, or (6) upload/driver. By default, authentication is not required to exploit this vulnerability. The specific flaw exists within the FileUploadController servlet exposed by uploadFirmware.html. The issue lies in the failure to sanitize the path of files uploaded, allowing for them to be placed anywhere on the server. An attacker can leverage this vulnerability to execute arbitrary code as SYSTEM. An attacker could use this to create denial-of-service condition. Samsung SyncThru is a printer management software from South Korea's Samsung. A directory traversal vulnerability exists in Samsung SyncThru
| VAR-201508-0372 | CVE-2015-4029 | Electric Sheep Fencing Pfsense WebGUI Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the WebGUI in pfSense before 2.2.3 allows remote attackers to inject arbitrary web script or HTML via the zone parameter in a del action to services_captiveportal_zones.php. Electric Sheep Fencing pfsense is a free and open source FreeBSD-based firewall and router software from Electric Sheep Fencing. Electric Sheep Fencing pfSense A cross-site scripting vulnerability exists in WebGUI versions prior to 2.2.3.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
| VAR-201507-0045 | CVE-2015-5363 | Juniper Networks Junos SRX Series SRX Network Security Daemon Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The SRX Network Security Daemon (nsd) in Juniper SRX Series services gateways with Junos 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 allows remote DNS servers to cause a denial of service (crash) via a crafted DNS response. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. Juniper Networks SRX Series services gateways with Junos are Juniper Networks' SRX Series gateway devices running the Junos operating system. The SRX Network Security Daemon (nsd) is one of the network security daemons. Juniper Junos is prone to a remote denial-of-service vulnerability.
Successful exploits may allow the attacker to crash the system; denying service to legitimate users. The following versions are affected: Junos 12.1X44 prior to 12.1X44-D50, 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, 12.3X48 prior to 12.3X48-D15
| VAR-201507-0639 | CVE-2015-3007 | Juniper SRX Series service gateway Junos OS Vulnerabilities in which administrator privileges are obtained |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The Juniper SRX Series services gateways with Junos OS 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, and 12.3X48 before 12.3X48-D15 do not properly implement the "set system ports console insecure" feature, which allows physically proximate attackers to gain administrative privileges by leveraging access to the console port. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. The Juniper SRX Series is Juniper Networks' SRX series of devices running the Junos operating system. Juniper Junos is prone to a local security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions. The following releases are affected: Junos OS 12.1X46 prior to 12.1X46-D35, 12.1X47 prior to 12.1X47-D25, and 12.3X48 prior to 12.3X48-D15