VARIoT IoT vulnerabilities database
| VAR-201505-0319 | CVE-2015-3912 | Huawei E355s Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Huawei E355s Mobile WiFi with firmware before 22.158.45.02.625 and WEBUI before 13.100.04.01.625 allows remote attackers to obtain sensitive configuration information by sniffing the network or sending unspecified commands. Huawei E355s is a wireless shared device of China's Huawei company. Huawei E355s has an information disclosure vulnerability. An attacker could exploit this vulnerability to obtain sensitive information. Huawei E355s is prone to an information-disclosure vulnerability. Security vulnerabilities exist in Huawei E355s Mobile WiFi and WEBUI versions earlier than 13.100.04.01.625 using firmware versions earlier than 22.158.45.02.625
| VAR-201505-0339 | CVE-2015-1188 | Swisscom Centro Grande DSL Router firmware HNDS Vulnerability to access the management function in the certificate verification function of the service |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The certificate verification functions in the HNDS service in Swisscom Centro Grande (ADB) DSL routers with firmware before 6.14.00 allows remote attackers to access the management functions via unknown vectors. The Swisscom Centro Grande DSL Router is a router device. Swisscom Centro Grande is prone to a remote authentication-bypass vulnerability.
Product
-------
Firmwares up to version 6.12.02 are affected. Furthermore, this vulnerability
combined with other vulnerabilities allow to completely compromise the
Centro Grande (ADB) routers. Available Proof-of-Concept code enables a remote
root shell on a victim's router.
Remediation
-----------
Update the firmware to version 6.14.00. The current version can be verified
through the web management interface, under Settings => Router => Firmware
section. The version 6.14.00 should be installed. If it is not the case, the
update can be forced cliking on the button labeled "Check for upgrade".
Alternatively, the firmware can be downloaded from the following page:
https://www.swisscom.ch/en/residential/help/device/internet-router/centro-grande.html
Swisscom customers may call the Swisscom-Hotline 0800 800 800
Acknowledgments
---------------
Ivan Almuina from Hacking Corporation S\xe0rl (http://hackingcorp.ch/) for the
discovery, the notification and for helping us to fix the vulnerability.
Milestones
----------
Sep 23th 2014 Vulnerability reported to Swisscom CSIRT
Jan 7th 2015 CVE ID requested at MITRE
Jan 18th 2015 CVE ID 2015-1188 assigned by MITRE
Apr 29th 2015 Public Release of Advisory
| VAR-201505-0130 | CVE-2015-0712 | Cisco ASR 5000 Run on device StarOS of session-manager Service disruption in services (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The session-manager service in Cisco StarOS 12.0, 12.2(300), 14.0, and 14.0(600) on ASR 5000 devices allows remote attackers to cause a denial of service (service reload and packet loss) via malformed HTTP packets, aka Bug ID CSCud14217. The Cisco ASR 5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). Cisco StarOS is the operating system on its devices. Cisco ASR 5000 Series Software is prone to a remote denial-of-service vulnerability.
An attacker may exploit this issue to cause a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCud14217. The following releases are affected: Cisco StarOS Release 12.0, Release 12.2(300), Release 14.0, Release 14.0(600)
| VAR-201504-0621 | No CVE | Samsung Galaxy S5 Fingerprint Data Disclosure Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Samsung Galaxy S5 is a Samsung 4G smartphone product. There is a security hole in the implementation of Samsung Galaxy S5 authentication through user fingerprint information. Allows an attacker to exploit a vulnerability to run a program as root on a mobile device to read fingerprint sensors and steal fingerprint information at any time.
| VAR-201505-0084 | CVE-2015-3153 | cURL and libcurl Vulnerability in which important information is obtained in default settings |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents. cURL/libcURL is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks.
Versions prior to cURL/libcURL 7.42.1 are vulnerable. Both Haxx curl and libcurl are products of the Swedish company Haxx. curl is a set of file transfer tools that use URL syntax to work on the command line. libcurl is a free, open source client-side URL transfer library. ============================================================================
Ubuntu Security Notice USN-2591-1
April 30, 2015
curl vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Paras Sethia discovered that curl could incorrectly re-use NTLM HTTP
credentials when subsequently connecting to the same host over HTTP.
(CVE-2015-3143)
Hanno B=C3=B6ck discovered that curl incorrectly handled zero-length host names.
If a user or automated system were tricked into using a specially crafted
host name, an attacker could possibly use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.10 and Ubuntu 15.04.
(CVE-2015-3144)
Hanno B=C3=B6ck discovered that curl incorrectly handled cookie path elements.
If a user or automated system were tricked into parsing a specially crafted
cookie, an attacker could possibly use this issue to cause curl to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04.
(CVE-2015-3145)
Isaac Boukris discovered that when using Negotiate authenticated
connections, curl could incorrectly authenticate the entire connection and
not just specific HTTP requests. This
issue only affected Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-3153)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libcurl3 7.38.0-3ubuntu2.2
libcurl3-gnutls 7.38.0-3ubuntu2.2
libcurl3-nss 7.38.0-3ubuntu2.2
Ubuntu 14.10:
libcurl3 7.37.1-1ubuntu3.4
libcurl3-gnutls 7.37.1-1ubuntu3.4
libcurl3-nss 7.37.1-1ubuntu3.4
Ubuntu 14.04 LTS:
libcurl3 7.35.0-1ubuntu2.5
libcurl3-gnutls 7.35.0-1ubuntu2.5
libcurl3-nss 7.35.0-1ubuntu2.5
Ubuntu 12.04 LTS:
libcurl3 7.22.0-3ubuntu4.14
libcurl3-gnutls 7.22.0-3ubuntu4.14
libcurl3-nss 7.22.0-3ubuntu4.14
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2591-1
CVE-2015-3143, CVE-2015-3144, CVE-2015-3145, CVE-2015-3148,
CVE-2015-3153
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.38.0-3ubuntu2.2
https://launchpad.net/ubuntu/+source/curl/7.37.1-1ubuntu3.4
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.5
https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.14
.
For the stable distribution (jessie), this problem has been fixed in
version 7.38.0-4+deb8u2.
For the testing distribution (stretch), this problem will be fixed in
version 7.42.1-1.
For the unstable distribution (sid), this problem has been fixed in
version 7.42.1-1.
We recommend that you upgrade your curl packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJVQRUAAAoJEK+lG9bN5XPL2EoP/R4lDm9GEKBSvQBeSGLn7y2Z
GWY5olgtUd5s4/zJ+E+McGMyhYf6Fj2lnec/7SMT7Unk2nwZJb0G1Zi8STMu0FKV
OGwqbZwMeac1rvR80U1vrTOmOTNFiu2xEGa4cGf7Pw4u+dOCtBDXSiKhAxGljfxf
C6ooSfrMw1+UgHMuOcWqXkOO2bfbrm+vRlq8pAZMMhbMvbqUUeRaJ5T0+n2J8rXw
bUOtjNXdJ2S64Ci+2VSNfvrIHoFzPVKFcUq/w3WwmXORtWVtrbKA07DoNknLNbvb
OhYB4kqS3SmHzHvKoggBJ+CUFQatp8b8PwZwxoBuZTNG4BtUoXogAbATcWiNxlIJ
1+tw0uTtorUH8Shcg3twa6jAimiTyx2mrFXkcDTvkPWsiidvviaRjaKKh1vk6jQX
PraF0+qqF0xFmeZiM4jMySF+O2PCdZVqTD6cdDOpvtCl+nnaHNTM9aOflJ2u/sy9
Mt7mFiEvOm56fKcwmmB8SQIc6jsvLSN86UELvBgxxUw5+Pg7QFnc25Ax01FcKNd5
FWWllwQHhvlWtWn/sj1nw8N1VnrzhG8TAn5pWccrwD5zbWT86/IgZVK2j1euase8
jbTEFetajJYE0XBeD0aXhGxO0h+0rp7pjHRlPbbREFQf5MqaB6LURPoSyCfWdxkN
Tn26Gc16Uz/NwnNfmCxT
=5rwp
-----END PGP SIGNATURE-----
| VAR-201504-0287 | CVE-2015-0708 | Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Cisco IOS 15.4S, 15.4SN, and 15.5S and IOS XE 3.13S and 3.14S allow remote attackers to cause a denial of service (device crash) by including an IA_NA option in a DHCPv6 Solicit message on the local network, aka Bug ID CSCur29956. Both Cisco IOS and IOS-XE are operating systems developed by Cisco for its network devices.
This issue is being tracked by Cisco Bug ID CSCur29956
| VAR-201504-0288 | CVE-2015-0709 | Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cisco IOS 15.5S and IOS XE allow remote authenticated users to cause a denial of service (device crash) by leveraging knowledge of the RADIUS secret and sending crafted RADIUS packets, aka Bug ID CSCur21348. Cisco IOS and IOS XE There is a service disruption ( Device crash ) There are vulnerabilities that are put into a state. Both Cisco IOS and IOS-XE are operating systems developed by Cisco for its network devices. A security vulnerability exists in Cisco IOS 15.5S and IOS-XE that caused the program to fail to process RADIUS packets correctly. A remote attacker could exploit the vulnerability to cause a denial of service (device crash).
This issue is being tracked by Cisco Bug ID CSCur21348
| VAR-201504-0289 | CVE-2015-0710 | Cisco IOS XE Overlay Transport Virtualization Denial of Service Vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
The Overlay Transport Virtualization (OTV) implementation in Cisco IOS XE 3.10S allows remote attackers to cause a denial of service (device reload) via a series of packets that are considered oversized and trigger improper fragmentation handling, aka Bug IDs CSCup37676 and CSCup30335. Cisco IOS XE is an operating system developed by Cisco Systems for its network devices. A remote attacker could exploit the vulnerability to cause a denial of service (device reload).
This issue is being tracked by Cisco Bug ID's CSCup37676 and CSCup30335
| VAR-201504-0290 | CVE-2015-0711 | Cisco ASR 5000 Series StarOS Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The hamgr service in the IPv6 Proxy Mobile (PM) implementation in Cisco StarOS 18.1.0.59776 on ASR 5000 devices allows remote attackers to cause a denial of service (service reload and call-processing outage) via malformed PM packets, aka Bug ID CSCut94711. Vendors have confirmed this vulnerability Bug ID CSCut94711 It is released as.Malformed by a third party PM Service disruption via packets ( Reload services and stop call processing ) There is a possibility of being put into a state. The Cisco ASR 5000 Series is a 5000 series wireless controller product from Cisco. StarOS is a virtualized operating system that dynamically allocates resources for mobile services and networks running in the 5000 Series wireless controller products.
Successful exploitation of the issue will cause the device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCut94711
| VAR-201504-0624 | No CVE | ZYXEL P-660HN-T1H_IPv6 Remote Configuration Editor / Web Server Denial of Service Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
ZYXEL P-660HN-T1H_IPv6 is a wireless router device. A denial of service vulnerability exists in ZYXEL P-660HN-T1H_IPv6. Since ZYXEL Embedded fails to properly check for cookies and credentials in the POST method, an attacker can change the settings and methods back view page; initiate a denial of service attack.
| VAR-201505-0074 | CVE-2015-0961 | Barracuda Web Filter insecurely performs SSL inspection |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Barracuda Web Filter before 8.1.0.005, when SSL Inspection is enabled, does not verify X.509 certificates from upstream SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. Supplementary information : CWE Vulnerability type by CWE-295: Improper Certificate Validation ( Incorrect certificate validation ) Has been identified. http://cwe.mitre.org/data/definitions/295.htmlMan-in-the-middle attacks (man-in-the-middle attack) May masquerade as a server through a crafted certificate and retrieve important information. Barracuda Web Filter is prone to multiple security-bypass vulnerabilities.
Successfully exploiting these issues allow attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. The gateway supports content filtering, advanced policies, and network threat protection
| VAR-201505-0075 | CVE-2015-0962 | Barracuda Web Filter insecurely performs SSL inspection |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship. Supplementary information : CWE Vulnerability type by CWE-18: Source Code ( Source code ) Has been identified. http://cwe.mitre.org/data/definitions/18.htmlBy using the trust relationship of the certificate by a third party, SSL Man-in-the-middle attacks on sessions (man-in-the-middle attack) May be executed. Barracuda Web Filter is prone to multiple security-bypass vulnerabilities.
Successfully exploiting these issues allow attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. The gateway supports content filtering, advanced policies, and network threat protection. There is a security vulnerability in Barracuda Networks Web Filter 7.x version and 8.x version before 8.1.0.005
| VAR-201505-0272 | CVE-2014-8383 |
InFocus IN3128HD Vulnerability to bypass authentication in projector firmware
Related entries in the VARIoT exploits database: VAR-E-201504-0293 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The InFocus IN3128HD projector with firmware 0.26 allows remote attackers to bypass authentication via a direct request to main.html. Supplementary information : CWE Vulnerability types by CWE-306: Missing Authentication for Critical Function ( Lack of authentication for critical functions ) Has been identified. The InFocus IN3128HD projector is a projector product used in the education industry. InFocus IN3128HD is prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access. This may aid in further attacks.
InFocus IN3128HD running firmware version 0.26 is vulnerable
| VAR-201505-0273 | CVE-2014-8384 |
InFocus IN3128HD In projector firmware DHCP Server and device IP Vulnerability whose settings are changed
Related entries in the VARIoT exploits database: VAR-E-201504-0293 |
CVSS V2: 9.4 CVSS V3: - Severity: HIGH |
The InFocus IN3128HD projector with firmware 0.26 does not restrict access to cgi-bin/webctrl.cgi.elf, which allows remote attackers to modify the DHCP server and device IP configuration, reboot the device, change the device name, and have other unspecified impact via a crafted request. Supplementary information : CWE Vulnerability type by CWE-306: Missing Authentication for Critical Function ( Lack of authentication for critical functions ) Has been identified. may cause unspecified effects. The InFocus IN3128HD projector is a projector product used by the InFocus company in the education industry. There is a security hole in the InFocus IN3128HD projector with firmware version 0.26. The program failed to restrict access to the cgi-bin/webctrl.cgi.elf file.
An attacker can exploit this issue to bypass the authentication process and gain unauthorized access to the system. Successfully exploiting this issue may lead to further attacks.
InFocus IN3128HD 0.26 is vulnerable
| VAR-201504-0446 | CVE-2015-3459 | Hospira Lifecare PCA In infusion pumps root Privileged vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The communication module on the Hospira LifeCare PCA Infusion System before 7.0 does not require authentication for root TELNET sessions, which allows remote attackers to modify the pump configuration via unspecified commands. Hospira Lifecare PCA Infusion Pump is prone to a remote authentication-bypass vulnerability.
An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may aid in further attacks. Remote attackers can use TCP port 23 to exploit this vulnerability to gain root privileges
| VAR-201504-0585 | No CVE | ASUS RT-G32 Router Cross-Site Scripting Vulnerability and Cross-Site Request Forgery Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
ASUS RT-G32 Router is a wireless router product from ASUS.
Cross-site scripting vulnerabilities and cross-site request forgery vulnerabilities exist in ASUS RT-G32 routers using firmware version 2.0.2.6 and 2.0.3.2. When a user browses an affected website, their browser executes arbitrary script code provided by the attacker. This could lead to attackers stealing cookie-based authentication and performing unauthorized operations. Other attacks may also be possible
| VAR-201504-0302 | CVE-2015-2115 | HP Capture and Route Software Vulnerability in which important information is obtained |
CVSS V2: 2.7 CVSS V3: - Severity: LOW |
Unspecified vulnerability in HP Capture and Route Software (HPCR) 1.3 before Patch 7, 1.3 FP1 before Patch 1, and 1.4 before Patch 1 allows remote authenticated users to obtain sensitive information via unknown vectors.
An attacker can exploit this issue to gain access to sensitive information from the application; this may lead to further attacks. The solution provides functions such as file finding, distribution, and tracking, and supports record retention, document security, and privacy. There are security holes in HPCR. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04633710
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04633710
Version: 1
HPSBPI03315 rev.1 - HP Capture and Route Software, Remote Information
Disclosure
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible. The vulnerability could be exploited remotely resulting in
information disclosure.
References:
CVE-2015-2115
SSRT102023
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Go to
https://h20566.www2.hp.com/hpsc/swd/public/detail?swItemId=co-146674-1
2. Select "Download" to download the HPCR 1_4 Patch 1 file.
- HPCR 1.3 or HPCR 1.3 FP1
1. Go to either:
- ftp://cr1_3:h}PV3he=@h2.usa.hp.com
- https://h2.usa.hp.com/hprc
Enter the following credentials (Case sensitive):
Login: cr1_3
Password: h}PV3he=
2. Select the appropriate patch version for HPCR 1.3 (HPCR 1_3 Patch 7)
or HPCR 1.3 FP1 (HPCR 1_3 FP1 Patch 1).
3. Save the selected zip file using your web browsers instructions.
HISTORY
Version:1 (rev.1) - 24 April 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlU6fL4ACgkQ4B86/C0qfVncUwCgr2hJ+M0X80YS1+p8pFFC5ywb
q0wAnjbue9wu92giSxJwcoBMelcfkYq7
=+bok
-----END PGP SIGNATURE-----
| VAR-201505-0274 | CVE-2014-8361 | Multiple vulnerabilities in multiple ELECOM products |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: Medium |
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request, as exploited in the wild through 2023. The following multiple vulnerabilities exist in multiple products provided by ELECOM CORPORATION. ・ Inadequate access restrictions (CWE-284) - CVE-2021-20643 -Script injection on the management screen (CWE-74) - CVE-2021-20644 ・ Retractable cross-site scripting (CWE-79) - CVE-2021-20645 ・ Cross-site request forgery (CWE-352) - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ OS Command injection (CWE-78) - CVE-2021-20648 -Insufficient verification of server certificate (CWE-295) - CVE-2021-20649 ・ UPnP Via OS Command injection (CWE-78) - CVE-2014-8361 CVE-2021-20643 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Institute of Information Security Yuasa Laboratory Nagakawa ( Ishibashi ) Australia Mr CVE-2021-20644 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Sato Rei Mr CVE-2021-20645, CVE-2021-20646 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Mitsui Bussan Secure Direction Co., Ltd. Tetsuyuki Ogawa Mr CVE-2021-20647, CVE-2021-20648, CVE-2021-20649 These vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr CVE-2021-20650 This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Hiroshi Watanabe Mr CVE-2014-8361 The following person indicates that the product is vulnerable to IPA Report to JPCERT/CC Coordinated with the developer. Reporter : Cyber Defense Institute, Inc. Satoru Nagaoka Mr., National Institute of Information and Communications Technology Makita Daisuke Mr., National Institute of Information and Communications Technology Woods Yoshiki MrThe expected impact depends on each vulnerability, but it may be affected as follows. -The management password of the product is changed by processing the request crafted by a remote third party. - CVE-2021-20643 ・ Crafted SSID Is displayed on the management screen, and any script is executed on the user's web browser. - CVE-2021-20644 -Any script is executed on the web browser of the user who is logged in to the product. - CVE-2021-20645 -When a user logged in to the management screen of the product accesses a specially crafted page, an arbitrary request is executed, and as a result, the settings of the product are changed unintentionally. telnet Daemon is started - CVE-2021-20646, CVE-2021-20647, CVE-2021-20650 ・ Any third party who can access the product OS Command is executed - CVE-2021-20648 ・ Man-in-the-middle attack (man-in-the-middle attack) The communication response has been tampered with, resulting in arbitrary in the product. OS Command is executed - CVE-2021-20649 ・ With the product UPnP Is valid, any by a third party who has access to the product OS Command is executed - CVE-2014-8361. Provided by Buffalo Co., Ltd. WSR-300HP is wireless LAN It's a router. Authentication is not required to exploit this vulnerability.The specific flaw exists within the miniigd SOAP service. The issue lies in the handling of the NewInternalClient requests due to a failure to sanitize user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Failed exploit attempts will result in a denial-of-service condition. Realtek SDK is a set of SDK development kit developed by Realtek
| VAR-201504-0478 | CVE-2015-3415 | SQLite of vdbe.c of sqlite3VdbeExec Service disruption in functions (DoS) Vulnerabilities |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. SQLite is an open source embedded relational database management system based on C language developed by American software developer D.Richard Hipp. The system has the characteristics of independence, isolation, and cross-platform. There is a security vulnerability in the 'sqlite3VdbeExec' function in the vdbe.c file of versions prior to SQLite 3.8.9. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201507-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: SQLite: Multiple vulnerabilities
Date: July 07, 2015
Bugs: #546626
ID: 201507-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in SQLite, allowing
context-dependent attackers to cause a Denial of Service condition.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-db/sqlite < 3.8.9 >= 3.8.9
Description
===========
Multiple vulnerabilities have been discovered in SQLite. Please review
the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All SQLite users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-db/sqlite-3.8.9"
References
==========
[ 1 ] CVE-2015-3414
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3414
[ 2 ] CVE-2015-3415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3415
[ 3 ] CVE-2015-3416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3416
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201507-05
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: sqlite security update
Advisory ID: RHSA-2015:1635-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1635.html
Issue date: 2015-08-17
CVE Names: CVE-2015-3414 CVE-2015-3415 CVE-2015-3416
=====================================================================
1. Summary:
An updated sqlite package that fixes three security issues is now available
for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
3. Description:
SQLite is a C library that implements an SQL database engine. A large
subset of SQL92 is supported. A complete database is stored in a single
disk file. The API is designed for convenience and ease of use.
Applications that link against SQLite can enjoy the power and flexibility
of an SQL database without the administrative hassles of supporting a
separate database server.
A flaw was found in the way SQLite handled dequoting of collation-sequence
names. A local attacker could submit a specially crafted COLLATE statement
that would crash the SQLite process, or have other unspecified impacts.
(CVE-2015-3414)
It was found that SQLite's sqlite3VdbeExec() function did not properly
implement comparison operators. A local attacker could submit a specially
crafted CHECK statement that would crash the SQLite process, or have other
unspecified impacts. (CVE-2015-3415)
It was found that SQLite's sqlite3VXPrintf() function did not properly
handle precision and width values during floating-point conversions.
A local attacker could submit a specially crafted SELECT statement that
would crash the SQLite process, or have other unspecified impacts.
(CVE-2015-3416)
All sqlite users are advised to upgrade to this updated package, which
contains backported patches to correct these issues.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1212353 - CVE-2015-3414 sqlite: use of uninitialized memory when parsing collation sequences in src/where.c
1212356 - CVE-2015-3415 sqlite: invalid free() in src/vdbe.c
1212357 - CVE-2015-3416 sqlite: stack buffer overflow in src/printf.c
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
sqlite-3.7.17-6.el7_1.1.src.rpm
x86_64:
sqlite-3.7.17-6.el7_1.1.i686.rpm
sqlite-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch:
sqlite-doc-3.7.17-6.el7_1.1.noarch.rpm
x86_64:
lemon-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-devel-3.7.17-6.el7_1.1.i686.rpm
sqlite-devel-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-tcl-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
sqlite-3.7.17-6.el7_1.1.src.rpm
x86_64:
sqlite-3.7.17-6.el7_1.1.i686.rpm
sqlite-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch:
sqlite-doc-3.7.17-6.el7_1.1.noarch.rpm
x86_64:
lemon-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-devel-3.7.17-6.el7_1.1.i686.rpm
sqlite-devel-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-tcl-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
sqlite-3.7.17-6.el7_1.1.src.rpm
ppc64:
sqlite-3.7.17-6.el7_1.1.ppc.rpm
sqlite-3.7.17-6.el7_1.1.ppc64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.ppc.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.ppc64.rpm
sqlite-devel-3.7.17-6.el7_1.1.ppc.rpm
sqlite-devel-3.7.17-6.el7_1.1.ppc64.rpm
s390x:
sqlite-3.7.17-6.el7_1.1.s390.rpm
sqlite-3.7.17-6.el7_1.1.s390x.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.s390.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.s390x.rpm
sqlite-devel-3.7.17-6.el7_1.1.s390.rpm
sqlite-devel-3.7.17-6.el7_1.1.s390x.rpm
x86_64:
sqlite-3.7.17-6.el7_1.1.i686.rpm
sqlite-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-devel-3.7.17-6.el7_1.1.i686.rpm
sqlite-devel-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
sqlite-3.7.17-6.ael7b_1.1.src.rpm
ppc64le:
sqlite-3.7.17-6.ael7b_1.1.ppc64le.rpm
sqlite-debuginfo-3.7.17-6.ael7b_1.1.ppc64le.rpm
sqlite-devel-3.7.17-6.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch:
sqlite-doc-3.7.17-6.el7_1.1.noarch.rpm
ppc64:
lemon-3.7.17-6.el7_1.1.ppc64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.ppc64.rpm
sqlite-tcl-3.7.17-6.el7_1.1.ppc64.rpm
s390x:
lemon-3.7.17-6.el7_1.1.s390x.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.s390x.rpm
sqlite-tcl-3.7.17-6.el7_1.1.s390x.rpm
x86_64:
lemon-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-tcl-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch:
sqlite-doc-3.7.17-6.ael7b_1.1.noarch.rpm
ppc64le:
lemon-3.7.17-6.ael7b_1.1.ppc64le.rpm
sqlite-debuginfo-3.7.17-6.ael7b_1.1.ppc64le.rpm
sqlite-tcl-3.7.17-6.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
sqlite-3.7.17-6.el7_1.1.src.rpm
x86_64:
sqlite-3.7.17-6.el7_1.1.i686.rpm
sqlite-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.i686.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-devel-3.7.17-6.el7_1.1.i686.rpm
sqlite-devel-3.7.17-6.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch:
sqlite-doc-3.7.17-6.el7_1.1.noarch.rpm
x86_64:
lemon-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-debuginfo-3.7.17-6.el7_1.1.x86_64.rpm
sqlite-tcl-3.7.17-6.el7_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-3414
https://access.redhat.com/security/cve/CVE-2015-3415
https://access.redhat.com/security/cve/CVE-2015-3416
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV0c4vXlSAg2UNWIIRAk8jAJ9ya3aROVTX8RDQ+RlCcls0ddR6CACfaeH9
Q91hN45yeXgVnmom/HYSQRU=
=814S
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ============================================================================
Ubuntu Security Notice USN-2698-1
July 30, 2015
sqlite3 vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
SQLite could be made to crash or run programs if it processed specially
crafted queries.
An attacker could use this issue to cause applications using SQLite to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS. An attacker could use this issue to cause
applications using SQLite to crash, resulting in a denial of service, or
possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS
and Ubuntu 15.04. An attacker could use this issue to cause applications using
SQLite to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 15.04. An attacker could use
this issue to cause applications using SQLite to crash, resulting in a
denial of service, or possibly execute arbitrary code. (CVE-2015-3416)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libsqlite3-0 3.8.7.4-1ubuntu0.1
Ubuntu 14.04 LTS:
libsqlite3-0 3.8.2-1ubuntu2.1
Ubuntu 12.04 LTS:
libsqlite3-0 3.7.9-2ubuntu1.2
In general, a standard system update will make all the necessary changes.
For the stable distribution (jessie), these problems have been fixed in
version 3.8.7.1-1+deb8u1.
For the testing distribution (stretch), these problems have been fixed in
version 3.8.9-1.
For the unstable distribution (sid), these problems have been fixed in
version 3.8.9-1.
We recommend that you upgrade your sqlite3 packages. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2017-03-28-2 Additional information for
APPLE-SA-2017-03-22-1 iTunes for Windows 12.6
iTunes for Windows 12.6 addresses the following:
APNs Server
Available for: Windows 7 and later
Impact: An attacker in a privileged network position can track a
user's activity
Description: A client certificate was sent in plaintext. This issue
was addressed through improved certificate handling.
CVE-2017-2383: Matthias Wachs and Quirin Scheitle of Technical
University Munich (TUM)
Entry added March 28, 2017
iTunes
Available for: Windows 7 and later
Impact: Multiple issues in SQLite
Description: Multiple issues existed in SQLite. These issues were
addressed by updating SQLite to version 3.15.2.
CVE-2013-7443
CVE-2015-3414
CVE-2015-3415
CVE-2015-3416
CVE-2015-3717
CVE-2015-6607
CVE-2016-6153
iTunes
Available for: Windows 7 and later
Impact: Multiple issues in expat
Description: Multiple issues existed in expat. These issues were
addressed by updating expat to version 2.2.0.
CVE-2009-3270
CVE-2009-3560
CVE-2009-3720
CVE-2012-1147
CVE-2012-1148
CVE-2012-6702
CVE-2015-1283
CVE-2016-0718
CVE-2016-4472
CVE-2016-5300
libxslt
Available for: Windows 7 and later
Impact: Multiple vulnerabilities in libxslt
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2017-5029: Holger Fuhrmannek
Entry added March 28, 2017
WebKit
Available for: Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed through
improved memory handling.
CVE-2017-2463: Kai Kang (4B5F5F4B) of Tencent's Xuanwu Lab
(tencent.com) working with Trend Micro's Zero Day Initiative
Entry added March 28, 2017
WebKit
Available for: Windows 7 and later
Impact: Processing maliciously crafted web content may exfiltrate
data cross-origin
Description: A validation issue existed in element handling. This
issue was addressed through improved validation.
CVE-2017-2479: lokihardt of Google Project Zero
CVE-2017-2480: lokihardt of Google Project Zero
Entry added March 28, 2017
Installation note:
iTunes for Windows 12.6 may be obtained from:
https://www.apple.com/itunes/download/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=hPjT
-----END PGP SIGNATURE-----
| VAR-201504-0102 | CVE-2015-1151 | Apple OS X Server of Wiki On the server Activity and People Vulnerabilities that circumvent restrictions on the page |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Wiki Server in Apple OS X Server before 4.1 allows remote attackers to bypass intended restrictions on Activity and People pages by connecting from an iPad client. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified.
Attackers can leverage this issue to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. The software enables file sharing, meeting scheduling, website hosting, network remote access, and more. Wiki Server is one of the web-based services that provides functions such as wikis, blogs, calendars, and contacts