VARIoT IoT vulnerabilities database
| VAR-201507-0498 | CVE-2015-4268 | Cisco Identity Services Engine of Infra Admin UI Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the Infra Admin UI in Cisco Identity Services Engine (ISE) 1.2(1.198) and 1.3(0.876) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters in a (1) GET or (2) POST request, aka Bug ID CSCus16052.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug IDs CSCus16052. The platform monitors the network by collecting real-time information on the network, users and devices, and formulating and implementing corresponding policies
| VAR-201507-0536 | CVE-2015-4249 | Cisco WebEx Meeting Center Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: Medium |
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none. Cisco WebEx Meeting Center Contains a cross-site scripting vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuv01955 It is released as.By a third party (1) GET Or (2) POST Via any unspecified parameters to the request Web Script or HTML May be inserted.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuv01955. The product invites others to join the meeting via email or instant messaging (IM), enabling online product demonstrations, information sharing, and more
| VAR-202002-0776 | CVE-2014-6447 | Juniper Junos OS Cross-site scripting vulnerability in |
CVSS V2: 5.8 CVSS V3: 7.1 Severity: HIGH |
Multiple vulnerabilities exist in Juniper Junos J-Web error handling that may lead to cross site scripting (XSS) issues or crash the J-Web service (DoS). This affects Juniper Junos OS 12.1X44 before 12.1X44-D45, 12.1X46 before 12.1X46-D30, 12.1X47 before 12.1X47-D20, 12.3 before 12.3R8, 12.3X48 before 12.3X48-D10, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, 14.2 before 14.2R1, and 15.1 before 15.1R1. Juniper Junos OS Exists in a cross-site scripting vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Juniper Junos is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. Juniper Networks Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware equipment. The operating system provides a secure programming interface and Junos SDK. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code. The following products and versions are affected: Juniper Networks Junos OS 12.1X44 prior to 12.1X44-D45, 12.1X46 prior to 12.1X46-D30, 12.1X47 prior to 12.1X47-D20, 12.3 prior to 12.3R8, 12.3X48 - 12.3X48 before D10, 13.1 before 13.1R5, 13.2 before 13.2R6, 13.3 before 13.3R4, 14.1 before 14.1R3, 14.1X53 before 14.1X53-D10, 14.2R1 before 14.2 version, 15.1 version before 15.1R1
| VAR-201507-0042 | CVE-2015-5359 | Juniper Junos OS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10, 13.2 before 13.2R7, 13.3 before 13.3R5, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (NULL pointer dereference and RDP crash) via a large number of BGP-VPLS advertisements with updated BGP local preference values. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. Juniper Junos is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause an affected device to crash, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Networks Junos OS. The following versions are affected: Juniper Networks Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D10 , Version 13.2 before 13.2R7, Version 13.3 before 13.3R5, Version 14.1R3 before 14.1R3-S2, Version 14.1 before 14.1R4, Version 14.2 before 14.2R2, Version 15.1 before 15.1R1
| VAR-201507-0041 | CVE-2015-5358 | Juniper Junos OS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. Juniper Junos is prone to a remote denial-of-service vulnerability.
A remote attacker may exploit this issue to reboot the device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Networks Junos OS. The following versions are affected; Juniper Networks Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15 , 13.2 version before 13.2R7, 13.2X51 version before 13.2X51-D35, 13.2X52 version before 13.2X52-D25, 13.3 version before 13.3R6, 14.1R3 version before 14.1R3-S2, 14.1 version before 14.1R4, 14.1X53-D12 Version 14.1X53 before, Version 14.1X53 before 14.1X53-D16, Version 14.1X55 before 14.1X55-D25, Version 14.2 before 14.2R2, Version 15.1 before 15.1R1. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-15:13.tcp Security Advisory
The FreeBSD Project
Topic: Resource exhaustion due to sessions stuck in LAST_ACK state
Category: core
Module: inet
Announced: 2015-07-21
Credits: Lawrence Stewart (Netflix, Inc.),
Jonathan Looney (Juniper SIRT)
Affects: All supported versions of FreeBSD.
Corrected: 2015-07-21 23:42:17 UTC (stable/10, 10.2-PRERELEASE)
2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA1-p1)
2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA2-p1)
2015-07-21 23:42:56 UTC (releng/10.1, 10.1-RELEASE-p15)
2015-07-21 23:42:20 UTC (stable/9, 9.3-STABLE)
2015-07-21 23:42:56 UTC (releng/9.3, 9.3-RELEASE-p20)
2015-07-21 23:42:20 UTC (stable/8, 8.4-STABLE)
2015-07-21 23:42:56 UTC (releng/8.4, 8.4-RELEASE-p34)
CVE Name: CVE-2015-5358
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
The Transmission Control Protocol (TCP) of the TCP/IP protocol suite
provides a connection-oriented, reliable, sequence-preserving data
stream service.
A socket enters the LAST_ACK state when the local process closes its socket
after a FIN has already been received from the remote peer. The socket
will remain in the LAST_ACK state until the kernel has transmitted a FIN to
the remote peer and the kernel has received an acknowledgement of that FIN
from the remote peer, or all retransmits of the FIN have failed and the
connection times out.
II.
III. This may also happen in normal operation
where no intentional attack is conducted, but an attacker who can send
specifically crafted packets can trigger this more reliably.
IV. Workaround
No workaround is available, but systems that do not provide TCP based
service to untrusted networks are not vulnerable.
Note that the tcpdrop(8) utility can be used to purge connections which
have become wedged. For example, the following command can be used to
generate commands that would drop all connections whose last rcvtime is
more than 100s:
netstat -nxp tcp | \
awk '{ if (int($NF) > 100) print "tcpdrop " $4 " " $5 }'
The system administrator can then run the generated script as a temporary
measure. Please refer to the tcpdump(8) manual page for additional
information.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
[FreeBSD 10.1]
# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch
# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch.asc
# gpg --verify tcp.patch.asc
[FreeBSD 9.x and 8.x]
# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch
# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch.asc
# gpg --verify tcp-9.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r285779
releng/8.4/ r285780
stable/9/ r285779
releng/9.3/ r285780
stable/10/ r285778
releng/10.1/ r285780
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
VII. References
<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5358>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:13.tcp.asc>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.1.6 (FreeBSD)
iQIcBAEBCgAGBQJVrtnrAAoJEO1n7NZdz2rnchoQAMUV9fuXsBvQgvugFVpoe4HP
t7tTIzKKmvC3SVOQfPF6jQllVL9qbRJK9zVdFcGX0Iy07/QPKMIRIFXqiYmRwyXt
YEuZtZMHEo6w5YS/gEwSndGRFduFAfhaNZndycjA3O5nxR16cvqScDUAv0nErQGD
jJzhjbwdrT4fLg06PgLOdNwQKOPhdM1k4ZOdg7WUYDi2iQUmYpD2SOzRAx/SoDK7
N0qd7Cy7mZBLbmm1zbCGDPhvNVYCKQjPjhiZ1GhfzUQ2n9bBOGLf2K1d/N0cttFH
/MfJoi2yRlU3iJE2DOJeD0/m4sJLmTL/7sqYEP9W2939oVH0Bku/KoJG4I4rZLDl
6yoKTxtyJGxbw8N2M/ObFpCQwn56Vjf2oo1LhIdBb+T48OwSwxuwrtw4VnlUnVLo
oJ5UA1VnazoyU6AwADpHkGPEPvRF1SUXfOuIOoHiZZ6O3eHdoeD3e2HqLQhoYVCj
PMEi/k45jPnWWhwV76I65Ig02YRgzhMTSunjXLQhi44Eeavf1SxHTJpSHuVjg3zu
MDDW55yB+wJvoetwCg3IkFPfmFBmto679xywDCKVd9VYeKoFsiVE4F/APqf6hN7o
qO8etL5oXnwjNsm9Tf8vImoWrBw2gRYkSieG+Vsx4r2r5JNHKRg1AVmRdihI1ATb
canMZYhLMD6A1x5T54Ya
=UPeI
-----END PGP SIGNATURE-----
| VAR-201507-0106 | CVE-2015-5123 | Adobe Flash ActionScript 3 BitmapData memory corruption vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015. Adobe Flash Player freed memory use (use-after-free) Vulnerability exists. Adobe Flash Player for, ActionScript 3 of BitmapData Use of freed memory due to processing (use-after-free) This vulnerability can be exploited to corrupt memory. Proof-of-Concept The code is publicly available. BitmapDatahttp://help.adobe.com/en_US/FlashPlatform/reference/actionscript/3/flash/display/BitmapData.html note that, National Vulnerability Database (NVD) Then CWE-416 It is published as. CWE-416: Use After Freehttp://cwe.mitre.org/data/definitions/416.htmlA user of the product may be infected with a maliciously crafted Flash Accessing websites containing crafted content or Microsoft Office By opening a document, arbitrary code may be executed on the user's web browser.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. ActionScript 3 (AS3) is an object-oriented programming language developed by Adobe for its Flash product. (widely exploited in July 2015).
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.508"
References
==========
[ 1 ] CVE-2015-3107
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[ 2 ] CVE-2015-5122
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[ 3 ] CVE-2015-5123
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[ 4 ] CVE-2015-5124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[ 5 ] CVE-2015-5125
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[ 6 ] CVE-2015-5127
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[ 7 ] CVE-2015-5129
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[ 8 ] CVE-2015-5130
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[ 9 ] CVE-2015-5131
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-5555
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5555
[ 28 ] CVE-2015-5556
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201508-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2015:1235-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1235.html
Issue date: 2015-07-16
CVE Names: CVE-2015-5122 CVE-2015-5123
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes two security issues is now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB15-18
listed in the References section.
Two flaws were found in the way flash-plugin displayed certain SWF content.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1242216 - CVE-2015-5122 CVE-2015-5123 flash-plugin: two code execution issues in APSA15-04 / APSB15-18
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.491-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.491-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.491-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.491-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
x86_64:
flash-plugin-11.2.202.491-1.el6_6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-5122
https://access.redhat.com/security/cve/CVE-2015-5123
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb15-18.html
https://helpx.adobe.com/security/products/flash-player/apsa15-04.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVp+WCXlSAg2UNWIIRAsPvAKC4jqtQIpeXv33Wj/vKMotQ4sdPZwCgibDD
MzLG3LQTopnph72hflS2aDE=
=XzfT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04796784
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04796784
Version: 1
HPSBHF03509 rev.1 - HP ThinPro and Smart Zero Core, Remote Denial of Service,
Unauthorized Access to Data
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2015-09-14
Last Updated: 2015-09-14
Potential Security Impact: Remote Denial of Service (DoS), Unauthorized
Access to Data
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
HP has released updates to the HP ThinPro and HP Smart Zero Core operating
systems to address two vulnerabilities found in Adobe Flash Player versions
v11.x through v11.2.202.481 on Linux.
References:
CVE-2015-5122
CVE-2015-5123
SSRT102253
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Smart Zero Core v4.4
HP Smart Zero Core v5.0
HP Smart Zero Core v5.1
HP Smart Zero Core v5.2
HP ThinPro v4.4
HP ThinPro v5.0
HP ThinPro v5.1
HP ThinPro v5.2
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-5122 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
CVE-2015-5123 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has released updates to the HP ThinPro and HP Smart Zero Core operating
systems to address these Adobe Flash Player vulnerabilities.
HP ThinPro 4.4 and HP Smart Zero Core 4.4 http://ftp.hp.com/pub/tcdebian/upda
tes/4.4/service_packs/flash11.2.202.491-4.4-5.2-x86.xar
HP ThinPro 5.0 and HP Smart Zero Core 5.0 http://ftp.hp.com/pub/tcdebian/upda
tes/5.0/service_packs/flash11.2.202.491-4.4-5.2-x86.xar
HP ThinPro 5.1 and HP Smart Zero Core 5.1 http://ftp.hp.com/pub/tcdebian/upda
tes/5.1/service_packs/flash11.2.202.491-4.4-5.2-x86.xar
HP ThinPro 5.2 and HP Smart Zero Core 5.2 ( http://ftp.hp.com/pub/tcdebian/up
dates/5.2/service_packs/flash11.2.202.491-4.4-5.2-x86.xar
HISTORY
Version:1 (rev.1) - 14 September 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners
| VAR-201507-0547 | CVE-2015-4263 | Cisco Mobility service Vulnerabilities that capture important information in engine control and provisioning functions |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Control and Provisioning functionality in Cisco Mobility Services Engine (MSE) 10.0(0.1) allows remote authenticated users to obtain sensitive information by reading log files, aka Bug ID CSCut36851. Cisco Mobility Services Engine is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to gain access to sensitive information that may lead to further attacks.
This issue being tracked by Cisco Bug ID CSCut36851. The platform collects, stores and manages data from wireless clients, Cisco access points and controllers
| VAR-201507-0539 | CVE-2015-4254 | Cisco TelePresence Advanced Media Gateway Device software cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence Advanced Media Gateway devices with software 1.1(1.40) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90732. Vendors have confirmed this vulnerability Bug ID CSCuu90732 It is released as.A third party may be able to hijack the authentication of any user. A remote attacker could exploit this vulnerability to perform unauthorized operations. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90732
| VAR-201508-0526 | CVE-2014-9736 | GE Healthcare Centricity Clinical Archive Audit Trail Repository Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity Clinical Archive Audit Trail Repository has a default password of initinit for the (1) SSL key manager and (2) server keystore; (3) keystore_password for the server truststore; and atna for the (4) primary storage database and (5) archive storage database, which has unspecified impact and attack vectors. An attacker could use this vulnerability to control the device.
Remote attackers with knowledge of the default credentials may exploit these vulnerabilities to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201508-0007 | CVE-2004-2777 | GE Healthcare Centricity Image Vault Trust Management Vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Centricity Image Vault 3.x has a password of (1) gemnet for the administrator account, (2) webadmin for the webadmin administrator account of the ASACA DVD library, (3) an empty value for the gemsservice account of the Ultrasound Database, and possibly (4) gemnet2002 for the gemnet2002 account of the GEMNet license server, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value. An attacker could use this vulnerability to control the device.
Remote attackers with knowledge of the default credentials may exploit these vulnerabilities to gain unauthorized access and perform unauthorized actions. This may aid in further attacks
| VAR-201507-0524 | CVE-2015-4236 | Cisco Email Security Appliance Run on device AsyncOS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cisco AsyncOS on Email Security Appliance (ESA) devices with software 8.5.6-073, 8.5.6-074, and 9.0.0-461, when clustering is enabled, allows remote attackers to cause a denial of service (clustering and SSH outage) via a packet flood, aka Bug IDs CSCur13704 and CSCuq05636. A security vulnerability exists in Cisco AsyncOS for Cisco ESA devices.
An attacker can exploit this issue to cause an affected device to become unresponsive, resulting in a denial-of-service condition.
This issue is tracked by Cisco Bug IDs CSCur13704, CSCuq05636, CSCuv43307, and CSCuv99383. The title has been changed to better reflect the underlying components affected. The following releases are affected: Cisco ESA appliances using Release 8.5.6-073, Release 8.5.6-074, and Release 9.0.0-461 software
| VAR-201508-0008 | CVE-2010-5306 | plural GE Healthcare Optima Product vulnerabilities |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Optima CT680, CT540, CT640, and CT520 has a default password of #bigguy for the root user, which has unspecified impact and attack vectors. GE Healthcare Optima CT680, CT540, CT640, and CT520 are general computed tomography products for the medical industry. Multiple GE Healthcare Products are prone to an insecure default-password vulnerability.
Remote attackers with knowledge of the default credentials may exploit this vulnerability to gain unauthorized access and perform unauthorized actions. This may aid in further attacks. An attacker could exploit this vulnerability to take control of the device
| VAR-201508-0010 | CVE-2010-5308 | GE Healthcare Optima MR360 Vulnerabilities to gain access to |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
GE Healthcare Optima MR360 does not require authentication for the HIPAA emergency login procedure, which allows physically proximate users to gain access via an arbitrary username in the Emergency Login screen. NOTE: this might not qualify for inclusion in CVE if unauthenticated emergency access is part of the intended security policy of the product, can be controlled by the system administrator, and is not enabled by default. GE Healthcare Optima MR360 is a magnetic resonance imaging (MRI) system for the medical industry.
An attacker can exploit this issue to gain unauthorized access to the affected device. Successful exploits will result in the complete compromise of the affected device
| VAR-201507-0544 | CVE-2015-4259 | Cisco Unified Computing System C-Series Runs on server software Integrated Management Controller Vulnerabilities that bypass cryptographic protection mechanisms |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The Integrated Management Controller on Cisco Unified Computing System (UCS) C servers with software 1.5(3) and 1.6(0.16) has a default SSL certificate, which makes it easier for man-in-the-middle attackers to bypass cryptographic protection mechanisms by leveraging knowledge of a private key, aka Bug IDs CSCum56133 and CSCum56177. Vendors have confirmed this vulnerability Bug ID CSCum56133 and CSCum56177 It is released as.Man-in-the-middle attacks (man-in-the-middle attack) By using the private key information, the encryption protection mechanism may be bypassed. Cisco Unified Computing System C-Series is prone to a security-bypass vulnerability.
Successfully exploiting this issue may allow attackers to perform unauthorized actions by conducting a man-in-the-middle attack. This may lead to other attacks.
This issue is being tracked by Cisco Bug IDs CSCum56133 and CSCum56177. Integrated Management Controller (IMC) is a set of management tools used in it, which supports HTTP, SSH access, etc., and can perform operations such as starting, shutting down and restarting the server
| VAR-201507-0532 | CVE-2015-4244 | Cisco ASR 5000 and Cisco ASR 5500 Any in the implementation of software boot Linux Command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The boot implementation on Cisco ASR 5000 and 5500 devices with software 14.0 allows local users to execute arbitrary Linux commands by leveraging administrative privileges for storage of these commands in a Compact Flash (CF) file, aka Bug ID CSCuu75278. Cisco ASR 5000 and Cisco ASR 5500 The software boot implementation is optional Linux A command execution vulnerability exists. The Cisco ASR 5000 and 5500 devices are Cisco's 5000 Series wireless controller products.
A local attacker can exploit this issue to execute arbitrary commands with admin privileges. Successful exploits may compromise the affected device.
This issue being tracked by Cisco Bug ID CSCuu75278
| VAR-201507-0545 | CVE-2015-4260 | Cisco Hosted Collaboration Solution Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cisco Hosted Collaboration Solution 10.6(1) allows remote attackers to inject arbitrary web script or HTML via a crafted value in a URL, aka Bug ID CSCuu14862.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuu14862. The solution includes products such as Cisco TelePresence, Customer Collaboration (Contact Center) and Unified Communications to support customers to use collaboration technology in public cloud, private cloud and hybrid cloud models
| VAR-201507-0537 | CVE-2015-4252 | Cisco TelePresence ISDN Gateway Device software cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence ISDN Gateway devices with software 2.2(1.106) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90724. Vendors have confirmed this vulnerability Bug ID CSCuu90724 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90724. The solution provides features such as high-definition (HD) video, content sharing and encryption
| VAR-201507-0538 | CVE-2015-4253 | Cisco TelePresence Serial Gateway Device Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence Serial Gateway devices with software 1.0(1.42) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90728. Vendors have confirmed this vulnerability Bug ID CSCuu90728 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90728
| VAR-201507-0540 | CVE-2015-4255 | Cisco TelePresence IP Gateway Device Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence IP Gateway devices with software 2.0(3.34) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90734. Vendors have confirmed this vulnerability Bug ID CSCuu90734 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90734
| VAR-201507-0541 | CVE-2015-4256 | Cisco TelePresence IP VCR Device Cross-Site Request Forgery Vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability on Cisco TelePresence IP VCR devices with software 3.0(1.27) allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuu90736. Vendors have confirmed this vulnerability Bug ID CSCuu90736 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug ID CSCuu90736