VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201506-0182 CVE-2015-4655 Synology DiskStation Manager Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in Synology DiskStation Manager (DSM) before 5.2-5565 Update 1 allows remote attackers to inject arbitrary web script or HTML via the "compound" parameter to entry.cgi. Synology DiskStation Manager is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Synology DiskStation Manager 5.2-5565 is vulnerable. Synology DiskStation Manager (DSM) is an operating system developed by Synology for network storage servers (NAS). The operating system can manage data, documents, photos, music and other information
VAR-201506-0202 CVE-2014-0999 Sendio Vulnerability in which important information is obtained

Related entries in the VARIoT exploits database: VAR-E-201505-0082
CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header. Sendio ESP (Email Security Platform) is a network device that provides anti-spam and anti-virus solutions for enterprises in Sendio, USA. A security vulnerability exists in versions prior to Sendio ESP 7.2.4. Because there is a session identifier in the message. Sendio ESP is prone to multiple information-disclosure vulnerabilities. Attackers can exploit these issues to obtain sensitive information that may lead to further attacks
VAR-201506-0332 CVE-2014-8391 Sendio ESP Information Disclosure Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201505-0082
CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
The Web interface in Sendio before 7.2.4 does not properly handle sessions, which allows remote authenticated users to obtain sensitive information from other users' sessions via a large number of requests. Sendio ESP (Email Security Platform) is a network device that provides anti-spam and anti-virus solutions for enterprises in Sendio, USA. A security vulnerability exists in the web interface of Sendio ESP prior to 7.2.4. The program failed to process the session correctly. Sendio ESP is prone to multiple information-disclosure vulnerabilities
VAR-201505-0192 CVE-2015-0750 Cisco Hosted Collaboration Solution Management Web An arbitrary command execution vulnerability in the interface CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
The administrative web interface in Cisco Hosted Collaboration Solution (HCS) 10.6(1) and earlier allows remote authenticated users to execute arbitrary commands via crafted input to unspecified fields, aka Bug ID CSCut02786. An attacker can exploit this issue to execute system commands on the affected device. This issue being tracked by Cisco Bug ID CSCut02786. The solution includes products such as Cisco TelePresence, Customer Collaboration (Contact Center) and Unified Communications to support customers to use collaboration technology in public cloud, private cloud and hybrid cloud models
VAR-201505-0497 No CVE There are many common remote code execution vulnerabilities in Bohua Net Dragon Information Security Appliance CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
There are several remote code execution vulnerabilities in the Bohua Net Dragon Information Security Appliance. An attacker can exploit the vulnerability to gain remote control of the web server host.
VAR-202002-0797 CVE-2015-0749 Cisco Unified Communications Manager Cross-site scripting vulnerability in CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
A vulnerability in Cisco Unified Communications Manager could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on the affected software. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information. This issue is being tracked by Cisco Bug ID CSCut66725. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution
VAR-201505-0062 CVE-2015-3165 PostgreSQL Memory double free vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence. PostgreSQL Has a deficiency in freeing up memory twice, causing service disruption ( crash ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-415: Double Free ( Double release ) Has been identified. PostgreSQL is prone to a remote denial-of-service vulnerability. Attackers can exploit this issue to crash the application, denying service to legitimate users. The system supports most SQL standards and provides many other features, such as foreign keys, triggers, views, etc. The following versions are affected: PostgreSQL prior to 9.0.20, 9.1.x prior to 9.1.16, 9.2.x prior to 9.2.11, 9.3.x prior to 9.3.7, 9.4 prior to 9.4.2. x version. CVE-2015-3166 (Information exposure) The replacement implementation of snprintf() failed to check for errors reported by the underlying system library calls; the main case that might be missed is out-of-memory situations. In the worst case this might lead to information exposure. Fix by using a one-size-fits-all message. For the stable distribution (jessie), these problems have been fixed in version 9.4.2-0+deb8u1. For the testing distribution (stretch), these problems will be fixed soon. For the unstable distribution (sid), these problems have been fixed in version 9.4.2-1. We recommend that you upgrade your postgresql-9.4 packages. ============================================================================ Ubuntu Security Notice USN-2621-1 May 25, 2015 postgresql-9.1, postgresql-9.3, postgresql-9.4 vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in PostgreSQL. (CVE-2015-3167) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: postgresql-9.4 9.4.2-0ubuntu0.15.04 Ubuntu 14.10: postgresql-9.4 9.4.2-0ubuntu0.14.10 Ubuntu 14.04 LTS: postgresql-9.3 9.3.7-0ubuntu0.14.04 Ubuntu 12.04 LTS: postgresql-9.1 9.1.16-0ubuntu0.12.04 This update uses a new upstream release, which includes additional bug fixes. In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: postgresql security update Advisory ID: RHSA-2015:1194-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1194.html Issue date: 2015-06-29 CVE Names: CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 ===================================================================== 1. Summary: Updated postgresql packages that fix three security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: PostgreSQL is an advanced object-relational database management system (DBMS). A double-free flaw was found in the connection handling. An unauthenticated attacker could exploit this flaw to crash the PostgreSQL back end by disconnecting at approximately the same time as the authentication time out is triggered. (CVE-2015-3165) It was discovered that PostgreSQL did not properly check the return values of certain standard library functions. If the system is in a state that would cause the standard library functions to fail, for example memory exhaustion, an authenticated user could exploit this flaw to disclose partial memory contents or cause the GSSAPI authentication to use an incorrect keytab file. (CVE-2015-3166) It was discovered that the pgcrypto module could return different error messages when decrypting certain data with an incorrect key. This can help an authenticated user to launch a possible cryptographic attack, although no suitable attack is currently known. (CVE-2015-3167) Red Hat would like to thank the PostgreSQL project for reporting these issues. Upstream acknowledges Benkocs Norbert Attila as the original reporter of CVE-2015-3165 and Noah Misch as the original reporter of CVE-2015-3166 and CVE-2015-3167. All PostgreSQL users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. If the postgresql service is running, it will be automatically restarted after installing this update. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1221537 - CVE-2015-3165 postgresql: double-free after authentication timeout 1221539 - CVE-2015-3166 postgresql: unanticipated errors from the standard library 1221541 - CVE-2015-3167 postgresql: pgcrypto has multiple error messages for decryption with an incorrect key. 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm ppc64: postgresql-8.4.20-3.el6_6.ppc.rpm postgresql-8.4.20-3.el6_6.ppc64.rpm postgresql-contrib-8.4.20-3.el6_6.ppc64.rpm postgresql-debuginfo-8.4.20-3.el6_6.ppc.rpm postgresql-debuginfo-8.4.20-3.el6_6.ppc64.rpm postgresql-devel-8.4.20-3.el6_6.ppc.rpm postgresql-devel-8.4.20-3.el6_6.ppc64.rpm postgresql-docs-8.4.20-3.el6_6.ppc64.rpm postgresql-libs-8.4.20-3.el6_6.ppc.rpm postgresql-libs-8.4.20-3.el6_6.ppc64.rpm postgresql-plperl-8.4.20-3.el6_6.ppc64.rpm postgresql-plpython-8.4.20-3.el6_6.ppc64.rpm postgresql-pltcl-8.4.20-3.el6_6.ppc64.rpm postgresql-server-8.4.20-3.el6_6.ppc64.rpm postgresql-test-8.4.20-3.el6_6.ppc64.rpm s390x: postgresql-8.4.20-3.el6_6.s390.rpm postgresql-8.4.20-3.el6_6.s390x.rpm postgresql-contrib-8.4.20-3.el6_6.s390x.rpm postgresql-debuginfo-8.4.20-3.el6_6.s390.rpm postgresql-debuginfo-8.4.20-3.el6_6.s390x.rpm postgresql-devel-8.4.20-3.el6_6.s390.rpm postgresql-devel-8.4.20-3.el6_6.s390x.rpm postgresql-docs-8.4.20-3.el6_6.s390x.rpm postgresql-libs-8.4.20-3.el6_6.s390.rpm postgresql-libs-8.4.20-3.el6_6.s390x.rpm postgresql-plperl-8.4.20-3.el6_6.s390x.rpm postgresql-plpython-8.4.20-3.el6_6.s390x.rpm postgresql-pltcl-8.4.20-3.el6_6.s390x.rpm postgresql-server-8.4.20-3.el6_6.s390x.rpm postgresql-test-8.4.20-3.el6_6.s390x.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: postgresql-8.4.20-3.el6_6.src.rpm i386: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-contrib-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-docs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-plperl-8.4.20-3.el6_6.i686.rpm postgresql-plpython-8.4.20-3.el6_6.i686.rpm postgresql-pltcl-8.4.20-3.el6_6.i686.rpm postgresql-server-8.4.20-3.el6_6.i686.rpm postgresql-test-8.4.20-3.el6_6.i686.rpm x86_64: postgresql-8.4.20-3.el6_6.i686.rpm postgresql-8.4.20-3.el6_6.x86_64.rpm postgresql-contrib-8.4.20-3.el6_6.x86_64.rpm postgresql-debuginfo-8.4.20-3.el6_6.i686.rpm postgresql-debuginfo-8.4.20-3.el6_6.x86_64.rpm postgresql-devel-8.4.20-3.el6_6.i686.rpm postgresql-devel-8.4.20-3.el6_6.x86_64.rpm postgresql-docs-8.4.20-3.el6_6.x86_64.rpm postgresql-libs-8.4.20-3.el6_6.i686.rpm postgresql-libs-8.4.20-3.el6_6.x86_64.rpm postgresql-plperl-8.4.20-3.el6_6.x86_64.rpm postgresql-plpython-8.4.20-3.el6_6.x86_64.rpm postgresql-pltcl-8.4.20-3.el6_6.x86_64.rpm postgresql-server-8.4.20-3.el6_6.x86_64.rpm postgresql-test-8.4.20-3.el6_6.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm ppc64: postgresql-9.2.13-1.el7_1.ppc.rpm postgresql-9.2.13-1.el7_1.ppc64.rpm postgresql-contrib-9.2.13-1.el7_1.ppc64.rpm postgresql-debuginfo-9.2.13-1.el7_1.ppc.rpm postgresql-debuginfo-9.2.13-1.el7_1.ppc64.rpm postgresql-devel-9.2.13-1.el7_1.ppc.rpm postgresql-devel-9.2.13-1.el7_1.ppc64.rpm postgresql-docs-9.2.13-1.el7_1.ppc64.rpm postgresql-libs-9.2.13-1.el7_1.ppc.rpm postgresql-libs-9.2.13-1.el7_1.ppc64.rpm postgresql-plperl-9.2.13-1.el7_1.ppc64.rpm postgresql-plpython-9.2.13-1.el7_1.ppc64.rpm postgresql-pltcl-9.2.13-1.el7_1.ppc64.rpm postgresql-server-9.2.13-1.el7_1.ppc64.rpm postgresql-test-9.2.13-1.el7_1.ppc64.rpm s390x: postgresql-9.2.13-1.el7_1.s390.rpm postgresql-9.2.13-1.el7_1.s390x.rpm postgresql-contrib-9.2.13-1.el7_1.s390x.rpm postgresql-debuginfo-9.2.13-1.el7_1.s390.rpm postgresql-debuginfo-9.2.13-1.el7_1.s390x.rpm postgresql-devel-9.2.13-1.el7_1.s390.rpm postgresql-devel-9.2.13-1.el7_1.s390x.rpm postgresql-docs-9.2.13-1.el7_1.s390x.rpm postgresql-libs-9.2.13-1.el7_1.s390.rpm postgresql-libs-9.2.13-1.el7_1.s390x.rpm postgresql-plperl-9.2.13-1.el7_1.s390x.rpm postgresql-plpython-9.2.13-1.el7_1.s390x.rpm postgresql-pltcl-9.2.13-1.el7_1.s390x.rpm postgresql-server-9.2.13-1.el7_1.s390x.rpm postgresql-test-9.2.13-1.el7_1.s390x.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: postgresql-9.2.13-1.ael7b_1.src.rpm ppc64le: postgresql-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-contrib-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-debuginfo-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-devel-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-docs-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-libs-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-plperl-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-plpython-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-pltcl-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-server-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-test-9.2.13-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: postgresql-debuginfo-9.2.13-1.el7_1.ppc64.rpm postgresql-upgrade-9.2.13-1.el7_1.ppc64.rpm s390x: postgresql-debuginfo-9.2.13-1.el7_1.s390x.rpm postgresql-upgrade-9.2.13-1.el7_1.s390x.rpm x86_64: postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64le: postgresql-debuginfo-9.2.13-1.ael7b_1.ppc64le.rpm postgresql-upgrade-9.2.13-1.ael7b_1.ppc64le.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: postgresql-9.2.13-1.el7_1.src.rpm x86_64: postgresql-9.2.13-1.el7_1.i686.rpm postgresql-9.2.13-1.el7_1.x86_64.rpm postgresql-contrib-9.2.13-1.el7_1.x86_64.rpm postgresql-debuginfo-9.2.13-1.el7_1.i686.rpm postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-devel-9.2.13-1.el7_1.i686.rpm postgresql-devel-9.2.13-1.el7_1.x86_64.rpm postgresql-docs-9.2.13-1.el7_1.x86_64.rpm postgresql-libs-9.2.13-1.el7_1.i686.rpm postgresql-libs-9.2.13-1.el7_1.x86_64.rpm postgresql-plperl-9.2.13-1.el7_1.x86_64.rpm postgresql-plpython-9.2.13-1.el7_1.x86_64.rpm postgresql-pltcl-9.2.13-1.el7_1.x86_64.rpm postgresql-server-9.2.13-1.el7_1.x86_64.rpm postgresql-test-9.2.13-1.el7_1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: postgresql-debuginfo-9.2.13-1.el7_1.x86_64.rpm postgresql-upgrade-9.2.13-1.el7_1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3165 https://access.redhat.com/security/cve/CVE-2015-3166 https://access.redhat.com/security/cve/CVE-2015-3167 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFVkXYEXlSAg2UNWIIRAqPyAJ4+oNPb8x+Rv86xVfq+hr0l7wvbBgCgrstj JLgqt0VKrW96edx3scvrmV0= =I50/ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-09-16-4 OS X Server 5.0.3 OS X Server 5.0.3 is now available and addresses the following: apache Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities in Apache, the most serious of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.16. These issues were addressed by updating Apache to version 2.4.16. CVE-ID CVE-2013-5704 CVE-2014-3581 CVE-2014-3583 CVE-2014-8109 CVE-2015-0228 CVE-2015-0253 CVE-2015-3183 CVE-2015-3185 BIND Available for: OS X Yosemite v10.10.4 or later Impact: Multiple vulnerabilities in BIND, the most severe of which may allow a remote attacker to cause a denial of service Description: Multiple vulnerabilities existed in BIND versions prior to 9.9.7. These issues were addressed by updating BIND to version 9.9.7. These issues were addressed by updating PostgreSQL to version 9.3.9. CVE-ID CVE-2014-0067 CVE-2014-8161 CVE-2015-0241 CVE-2015-0242 CVE-2015-0243 CVE-2015-0244 CVE-2015-3165 CVE-2015-3166 CVE-2015-3167 Wiki Server Available for: OS X Yosemite v10.10.4 or later Impact: Multiple XML security issues in Wiki Server Description: Multiple XML vulnerabilities existed in Wiki Server based on Twisted. This issue was addressed by removing Twisted. CVE-ID CVE-2015-5911 : Zachary Jones of WhiteHat Security Threat Research Center OS X Server 5.0.3 may be obtained from the Mac App Store. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201507-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: PostgreSQL: Multiple vulnerabilities Date: July 18, 2015 Bugs: #539018, #550172 ID: 201507-20 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in execution of arbitrary code or privilege escalation. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-db/postgresql < 9.4.3 *>= 9.0.21 *>= 9.1.17 *>= 9.2.12 *>= 9.3.8 >= 9.4.3 Description =========== Multiple vulnerabilities have been discovered in PostgreSQL. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition or escalate privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All PostgreSQL 9.0.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.0.21" All PostgreSQL 9.1.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.1.17" All PostgreSQL 9.2.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.2.12" All PostgreSQL 9.3.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.3.8" All PostgreSQL 9.4.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.3" References ========== [ 1 ] CVE-2014-8161 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8161 [ 2 ] CVE-2015-0241 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0241 [ 3 ] CVE-2015-0242 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0242 [ 4 ] CVE-2015-0243 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0243 [ 5 ] CVE-2015-0244 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0244 [ 6 ] CVE-2015-3165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3165 [ 7 ] CVE-2015-3166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3166 [ 8 ] CVE-2015-3167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3167 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201507-20 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2015 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5
VAR-201903-0646 CVE-2015-1014 Schneider Electric OFS Vulnerabilities in uncontrolled search path elements CVSS V2: 4.4
CVSS V3: 7.3
Severity: HIGH
A successful exploit of these vulnerabilities requires the local user to load a crafted DLL file in the system directory on servers running Schneider Electric OFS v3.5 with version v7.40 of SCADA Expert Vijeo Citect/CitectSCADA, OFS v3.5 with version v7.30 of Vijeo Citect/CitectSCADA, and OFS v3.5 with version v7.20 of Vijeo Citect/CitectSCADA.. If the application attempts to open that file, the application could crash or allow the attacker to execute arbitrary code. Schneider Electric recommends vulnerable users upgrade the OFS to V3.5 and install the latest service pack (SP 6 or newer) for their associated version. Schneider Electric OFS Contains a vulnerability related to uncontrolled search path elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Schneider Electric OPC Factory Server (OFS) is a data communication editing software. The software supports important information access, open page design, transparent architecture and interoperability, etc., to enable users to obtain good processes and communication effects. Schneider Electric OFS has security vulnerabilities in loading DLLs, allowing remote attackers to use the vulnerabilities to submit special files and load them to execute arbitrary code
VAR-201506-0328 CVE-2015-4160 SAP ASE Database Platform In SQL Injection vulnerability CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
SQL injection vulnerability in SAP ASE Database Platform allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Notes: 2152278. SAP Sybase Adaptive Server Enterprise is a relational database management system. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
VAR-201505-0190 CVE-2015-0746 Cisco Access Control Server of REST API Denial of service in Japan (DoS) Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022. Vendors report this vulnerability Bug ID CSCut62022 Published as. Supplementary information : CWE Vulnerability types by CWE-254: Security Features ( Security features ) Has been identified. http://cwe.mitre.org/data/definitions/254.htmlDenial of service due to many requests sent by third parties (API Stop ) May be in a state. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. The solution supports certification revocation list (CRL), device access permission setting and user profile verification, etc
VAR-201505-0070 CVE-2015-1008 Emerson AMS Device Manager In SQL Injection vulnerability CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
SQL injection vulnerability in Emerson AMS Device Manager before 13 allows remote authenticated users to gain privileges via malformed input. Emerson Electric AMS Device Manager is a set of fixed asset management software. The software provides predictive diagnostics, device configuration management and more. The attacker can submit the malformed input to the affected software. This vulnerability can be used to access the application and its data files with administrator privileges. An authenticated attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
VAR-201708-0200 CVE-2015-3206 python-kerberos Vulnerabilities in authentication CVSS V2: 6.8
CVSS V3: 8.1
Severity: HIGH
The checkPassword function in python-kerberos does not authenticate the KDC it attempts to communicate with, which allows remote attackers to cause a denial of service (bad response), or have other unspecified impact by performing a man-in-the-middle attack. python-kerberos Contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. python-kerberos is prone to an information disclosure vulnerability. Attackers can exploit this issue to disclose potentially sensitive information through man-in-the-middle attacks. This may aid in further attacks. python-kerberos is a plug-in for authenticating the Kerberos network protocol (computer network authorization protocol) in the open source cloud technology OpenStack client. There is a security vulnerability in the 'checkPassword' function in python-kerberos
VAR-201505-0472 No CVE ZTE AC3633R Authentication Bypass Vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
ZTE AC3633R is a wireless modem product of China ZTE Corporation. An authentication bypass vulnerability and remote code execution vulnerability exist in ZTE AC3633R. An attacker could use these vulnerabilities to gain unauthorized access to an affected device and execute arbitrary code in the context of the affected device. It may also cause a denial of service. Failed exploit attempts may result in a denial-of-service condition
VAR-201505-0491 No CVE Hikvision DS-7108HWI-SH XML External Entity Injection Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Hikvision DS-7108HWI-SH is a digital video recorder product of China Hikvision. Hikvision DS-7108HWI-SH has an XML external entity injection vulnerability. An attacker could use this vulnerability to obtain potentially sensitive information or cause a denial of service. This may lead to further attacks
VAR-201505-0185 CVE-2015-0741 Cisco Prime Central for Hosted Collaboration Solution Vulnerable to cross-site request forgery CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596. Vendors have confirmed this vulnerability Bug ID CSCut04596 It is released as.A third party may be able to hijack the authentication of any user. Exploiting these issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible. These issues are being tracked by Cisco bug ID's CSCut04596, CSCuw95626 and CSCva27600. The platform provides functions such as secure access authentication and real-time fault analysis
VAR-201505-0186 CVE-2015-0742 Cisco Adaptive Security Appliance Software Protocol Independent Multicast Service disruption in applications (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registration, which allows remote attackers to cause a denial of service (forwarding outage) via a crafted multicast packet, aka Bug ID CSCus74398. Vendors have confirmed this vulnerability Bug ID CSCus74398 It is released as. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlDenial of service operation via a specially crafted multicast packet by a third party ( Transfer stop ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to trigger a denial-of condition, denying service to legitimate users. Protocol Independent Multicast (PIM) application is a collection of multicast routing protocols. The vulnerability stems from the program not properly implementing the multicast-forwarding registration function. The following releases are affected: Cisco ASA Software Release 9.2(0.0), Release 9.2(0.104), Release 9.2(3.1), Release 9.2(3.4), Release 9.3(1.105), Release 9.3(2.100), Release 9.4(0.115), 100.13(0.21) version, 100.13(20.3) version, 100.13(21.9) version, 100.14(1.1) version
VAR-201710-0154 CVE-2015-4421 Huawei Mate 7 Smartphone buffer error vulnerability CVSS V2: 7.6
CVSS V3: 7.5
Severity: HIGH
The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input. Huawei Mate 7 (Mate7-TL10) Smartphones contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei Mate 7 is a smartphone developed by Huawei in China. Huawei Mate 7 Smartphone is prone to multiple local privilege escalation vulnerabilities. The tzdriver module is one of the driver modules
VAR-201710-0155 CVE-2015-4422 Huawei Mate 7 Smartphone buffer error vulnerability CVSS V2: 7.6
CVSS V3: 7.0
Severity: HIGH
The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application. Huawei Mate 7 (Mate7-TL10) Smartphones contain a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei Mate 7 is a smartphone developed by Huawei in China. A security vulnerability exists on the Huawei Mate 7 TEEOS module, allowing local attackers to exploit the vulnerability to increase privileges. Huawei Mate 7 Smartphone is prone to multiple local privilege escalation vulnerabilities. TEEOS module is one of the TEEOS modules. Attackers can use this vulnerability to cause denial of service (TEEOS crash) or implant and execute malicious code in TEEOS by obtaining the root privilege of the Android system and passing an abnormal address to TEEOS
VAR-201505-0408 CVE-2015-3036 KCodes NetUSB kernel driver is vulnerable to buffer overflow

Related entries in the VARIoT exploits database: VAR-E-201505-0187, VAR-E-201505-0188
CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Stack-based buffer overflow in the run_init_sbus function in the KCodes NetUSB module for the Linux kernel, as used in certain NETGEAR products, TP-LINK products, and other products, allows remote attackers to execute arbitrary code by providing a long computer name in a session on TCP port 20005. KCodes NetUSB is vulnerable to a buffer overflow via the network that may result in a denial of service or code execution. KCodes NetUSB The kernel driver contains a buffer overflow vulnerability. KCodes NetUSB Is Linux Connected to base embedded devices (home router products, etc.) USB Share devices on the network "USB over IP" To realize the function, Linux Kernel module. Buffer overflow (CWE-120) - CVE-2015-3036 http://cwe.mitre.org/data/definitions/120.html The client NetUSB The data to send when connecting to the server NetUSB A buffer overflow can occur because the kernel driver does not validate properly. For more information SEC Consult Please check the advisory for. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt In addition, National Vulnerability Database (NVD) Then CWE-119 It is published as CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer ( Buffer error ) http://cwe.mitre.org/data/definitions/119.htmlAn attacker on the local network caused a buffer overflow, resulting in a denial of service operation (DoS) An attacker may be able to attack or execute arbitrary code. Depending on the default settings of the device, a remote attack may be possible. KCodes NetUSB is prone to a buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. SEC Consult Vulnerability Lab Security Advisory < 20150519-0 > ======================================================================= title: Kernel Stack Buffer Overflow product: KCodes NetUSB vulnerable version: see Vulnerable / tested versions fixed version: see Solution CVE number: CVE-2015-3036, VU#177092 impact: Critical homepage: http://www.kcodes.com/ found: 2015-02-23 by: Stefan Viehböck (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Berlin - Frankfurt/Main - Montreal - Singapore Vienna (HQ) - Vilnius - Zurich https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "The world's premier technology provider of mobile printing, audio and video communication, file sharing, and USB applications for iPhones, iPads, smart phones and tablets (Android and Windows), MacBooks, and Ultrabooks." Source: http://www.kcodes.com/ Vulnerability overview/description: ----------------------------------- NetUSB suffers from a remotely exploitable kernel stack buffer overflow. Because of insufficient input validation, an overly long computer name can be used to overflow the "computer name" kernel stack buffer. This results in memory corruption which can be turned into arbitrary remote code execution. Furthermore, a more detailed summary of this advisory has been published at our blog: http://blog.sec-consult.com Proof of concept: ----------------- Below is an excerpt from the vulnerable run_init_sbus() function (pseudo code): int computername_len; char computername_buf[64]; // connection initiation, handshake len = ks_recv(sock, &computername_len, 4, 0); // ... len = ks_recv(sock, computername_buf, computername_len, 0); // boom! A proof of concept "netusb_bof.py" has been developed which exploits the vulnerability. The PoC DoS exploit will not be published as many vendors did not patch the vulnerability yet. Example use that results in denial-of-service (kernel memory corruption that results in a device reboot): ./netusb_bof.py 192.168.1.1 20005 500 Vulnerable / tested versions: ----------------------------- The vulnerability has been verified to exist in most recent firmware versions of the following devives: TP-Link TL-WDR4300 V1 TP-Link WR1043ND v2 NETGEAR WNDR4500 Furthermore we've identified NetUSB in the most recent firmware version of the following products (list is not necessarily complete!): D-Link DIR-615 C NETGEAR AC1450 NETGEAR CENTRIA (WNDR4700/4720) NETGEAR D6100 NETGEAR D6200 NETGEAR D6300 NETGEAR D6400 NETGEAR DC112A NETGEAR DC112A (Zain) NETGEAR DGND4000 NETGEAR EX6200 NETGEAR EX7000 NETGEAR JNR3000 NETGEAR JNR3210 NETGEAR JR6150 NETGEAR LG6100D NETGEAR PR2000 NETGEAR R6050 NETGEAR R6100 NETGEAR R6200 NETGEAR R6200v2 NETGEAR R6220 NETGEAR R6250 NETGEAR R6300v1 NETGEAR R6300v2 NETGEAR R6700 NETGEAR R7000 NETGEAR R7500 NETGEAR R7900 NETGEAR R8000 NETGEAR WN3500RP NETGEAR WNDR3700v5 NETGEAR WNDR4300 NETGEAR WNDR4300v2 NETGEAR WNDR4500 NETGEAR WNDR4500v2 NETGEAR WNDR4500v3 NETGEAR XAU2511 NETGEAR XAUB2511 TP-LINK Archer C2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer C20 V1.0 (Not affected) TP-LINK Archer C20i V1.0 (Fix planned before 2015/05/25) TP-LINK Archer C5 V1.2 (Fix planned before 2015/05/22) TP-LINK Archer C5 V2.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C7 V2.0 (Fix already released) TP-LINK Archer C8 V1.0 (Fix planned before 2015/05/30) TP-LINK Archer C9 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D2 V1.0 (Fix planned before 2015/05/22) TP-LINK Archer D5 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer D7B V1.0 (Fix planned before 2015/05/31) TP-LINK Archer D9 V1.0 (Fix planned before 2015/05/25) TP-LINK Archer VR200v V1.0 (Fix already released) TP-LINK TD-VG3511 V1.0 (End-Of-Life) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-VG3631 V1.0 (Fix planned before 2015/05/31) TP-LINK TD-W1042ND V1.0 (End-Of-Life) TP-LINK TD-W1043ND V1.0 (End-Of-Life) TP-LINK TD-W8968 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V2.0 (Fix planned before 2015/05/30) TP-LINK TD-W8968 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8970 V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8970 V3.0 (Fix already released) TP-LINK TD-W8970B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W8980 V3.0 (Fix planned before 2015/05/25) TP-LINK TD-W8980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-W9980 V1.0 (Fix already released) TP-LINK TD-W9980B V1.0 (Fix planned before 2015/05/30) TP-LINK TD-WDR4900 V1.0 (End-Of-Life) TP-LINK TL-WR1043ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1043ND V3.0 (Fix planned before 2015/05/30) TP-LINK TL-WR1045ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR3500 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR3600 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR4300 V1.0 (Fix planned before 2015/05/22) TP-LINK TL-WR842ND V2.0 (Fix planned before 2015/05/30) TP-LINK TL-WR842ND V1.0 (End-Of-Life) TP-LINK TX-VG1530(GPON) V1.0 (Fix planned before 2015/05/31) Trendnet TE100-MFP1 (v1.0R) Trendnet TEW-632BRP (A1.0R) Trendnet TEW-632BRP (A1.1R/A1.2R) Trendnet TEW-632BRP (A1.1R/A1.2R/A1.3R) Trendnet TEW-634GRU (v1.0R) Trendnet TEW-652BRP (V1.0R) Trendnet TEW-673GRU (v1.0R) Trendnet TEW-811DRU (v1.0R) Trendnet TEW-812DRU (v1.0R) Trendnet TEW-812DRU (v2.xR) Trendnet TEW-813DRU (v1.0R) Trendnet TEW-818DRU (v1.0R) Trendnet TEW-823DRU (v1.0R) Trendnet TEW-MFP1 (v1.0R) Zyxel NBG-419N v2 Zyxel NBG4615 v2 Zyxel NBG5615 Zyxel NBG5715 Based on information embedded in KCodes drivers we believe the following vendors are affected: Allnet Ambir Technology AMIT Asante Atlantis Corega Digitus D-Link EDIMAX Encore Electronics Engenius Etop Hardlink Hawking IOGEAR LevelOne Longshine NETGEAR PCI PROLiNK Sitecom Taifa TP-LINK TRENDnet Western Digital ZyXEL Vendor contact timeline: ------------------------ 2015-02-28: Contacting vendor through support@kcodes.com 2015-03-04: No response, contacting various KCodes addresses found on the web. 2015-03-05: Vendor responds, requests more information. 2015-03-05: Providing advisory and proof of concept exploit. 2015-03-16: No response, requesting status update. 2015-03-16: Vendor responds, asks about fix verification(?) 2015-03-16: Requesting clarification about fixing status and information about next steps. Proposing conference call dates. 2015-03-19: No response, informing that notification of CERT/CC and selected vendors will start shortly. Requesting clarification about fixing status and information about next steps again. 2015-03-19: Vendor responds, confirms conference call date (2015-03-25). No further information provided. 2015-03-19: Providing advisory and proof of concept exploit to TP-LINK and NETGEAR. 2015-03-25: Vendor cancels conference call on short notice (sudden week-long business trip). 2015-03-26: Asking for support of CERT/CC regarding vendor coordination. 2015-03 - 2015-05: Coordination between CERT & vendors, NETGEAR and TP-LINK 2015-05-13: Notifying German CERT-Bund and Austrian CERT.at 2015-05-19: Coordinated release of security advisory Solution: --------- TP-LINK has started releasing fixed firmware. The status of affected products can be found in the affected product list above. For additional information also see CERT/CC vulnerability notice: http://www.kb.cert.org/vuls/id/177092 Workaround: ----------- Sometimes NetUSB can be disabled via the web interface, but at least on NETGEAR devices this does not mitigate the vulnerability. NETGEAR told us, that there is no workaround available, the TCP port can't be firewalled nor is there a way to disable the service on their devices. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/Career.htm Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/About/Contact.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF Stefan Viehböck / @2015
VAR-201505-0238 CVE-2015-4047 IPsec-Tools Denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests. Supplementary information : CWE Vulnerability type by CWE-476: NULL Pointer Dereference (NULL Pointer dereference ) Has been identified. IPsec-Tools is a user-space implementation of different IPSec. It is ported from KAME's libipsec, setkey and racoon, and supports various BSD systems. A remote attacker could use this vulnerability to cause a program to deny legitimate users. IPsec-Tools is prone to a denial-of-service vulnerability caused by a NULL-pointer dereference error. A security vulnerability exists in the racoon/gssapi.c file of IPsec-Tools version 0.8.2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3272-1 security@debian.org http://www.debian.org/security/ Salvatore Bonaccorso May 23, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ipsec-tools CVE ID : CVE-2015-4047 Debian Bug : 785778 Javantea discovered a NULL pointer dereference flaw in racoon, the Internet Key Exchange daemon of ipsec-tools. For the oldstable distribution (wheezy), this problem has been fixed in version 1:0.8.0-14+deb7u1. For the stable distribution (jessie), this problem has been fixed in version 1:0.8.2+20140711-2+deb8u1. For the testing distribution (stretch) and the unstable distribution (sid), this problem will be fixed soon. We recommend that you upgrade your ipsec-tools packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVYJAbAAoJEAVMuPMTQ89E5RUP/j3MueAGYFpUSwLT3P+kHrSS pxdL5RBqQSXytrcejPyFkaKuva9juPLznlkeXGC5QsTRV/ROAq7ZAVWeIH2qD3X0 BPtF4vILr+5kSrDYbd0dSTx8Wl4Ykk678JSzFQ3lHdzK+4703X5YzT0/YJJaBbEh lWb2QuoDw8eHOGHpGJkRVZYp9nOTllZUmj2IasDFB9IQgQxnAoMmAaQ47MrOYhk3 R+UO9A5eYX1Rs4hiTu0+hhfkYG+DbrtN5uAh205SgLoOHf3lEAhRXifJiBMtKO72 tWsXSZ4Tks89hg6++DSIdsH4l6i56bolHid9DOD4/ivnZzB61k0XjCb8Qn/g850h 0Kxge2kmuQZk2VvomzddWAQLaij6fHSZqgZsL37L46158UJE9Q199oshK+3Mbzoc dq2VbwClQKYcGSBB+AoxwXGVd4JLMGDQxbDKGELlGF4JROfSmMtYbhKpVNnm9+32 o/dqr3BHqLf297uUzsTer92Vc5pfYZEU1lMo1KjleNSRjeWBo91IqsNODrxr6rXw L0ewYQBSRKx9Vg8SRviNCE/muVN+u2HULNZytoiEaI3GXrPbAqjdOi3yVP+PSYEr hISRrhZgGQgADT1gBExBnbSf2C7R00M7jRHhpRdVsqETpMlb2LgKEiCBFRYSMMw5 LCzQhezRPnKq4umUHL0n =Ksk8 -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2623-1 June 01, 2015 ipsec-tools vulnerability ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: ipsec-tools could be made to crash if it received specially crafted network traffic. Software Description: - ipsec-tools: IPsec tools for Linux Details: It was discovered that racoon, the ipsec-tools IKE daemon, incorrectly handled certain UDP packets. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: racoon 1:0.8.0-9ubuntu1.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2623-1 CVE-2015-4047 Package Information: https://launchpad.net/ubuntu/+source/ipsec-tools/1:0.8.0-9ubuntu1.1