VARIoT IoT vulnerabilities database
| VAR-201504-0270 | CVE-2015-0690 | Cisco Wireless LAN Controller HTML Help System Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the HTML help system on Cisco Wireless LAN Controller (WLC) devices before 8.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCun95178.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCun95178
| VAR-201504-0269 | CVE-2015-0688 | Embedded Services Processor Have a module ASR 1000 Runs on series devices Cisco IOS XE Denial of service in Japan (DoS) Vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco IOS XE 3.10.2S on an ASR 1000 device with an Embedded Services Processor (ESP) module, when NAT is enabled, allows remote attackers to cause a denial of service (module crash) via malformed H.323 packets, aka Bug ID CSCup21070. Cisco ASR is an integrated services router solution from Cisco that uses the IOS XR Software module operating system to provide carrier-class reliability. A denial of service vulnerability exists in the Cisco ASR 1000 appliance, allowing remote attackers to exploit the vulnerability to initiate a denial of service attack through the H323 protocol packet.
Attackers can exploit this issue to crash the affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCup21070
| VAR-201504-0064 | CVE-2015-0248 | Subversion of mod_dav_svn and svnserve Service disruption at the server (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers. Apache Subversion is prone to multiple denial-of-service vulnerabilities.
An attacker may exploit these issues to crash the affected application, resulting in a denial-of-service condition. The system is compatible with the Concurrent Versions System (CVS). A security vulnerability exists in the mod_dav_svn and svnserve servers of Subversion versions 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11. ============================================================================
Ubuntu Security Notice USN-2721-1
August 20, 2015
subversion vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Subversion.
Software Description:
- subversion: Advanced version control system
Details:
It was discovered that the Subversion mod_dav_svn module incorrectly
handled REPORT requests for a resource that does not exist. This issue only affected Ubuntu 12.04 LTS and Ubuntu
14.04 LTS. (CVE-2014-3580)
It was discovered that the Subversion mod_dav_svn module incorrectly
handled requests requiring a lookup for a virtual transaction name that
does not exist. This issue only affected Ubuntu
14.04 LTS. (CVE-2014-8108)
Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly
handled large numbers of REPORT requests. This
issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202)
Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve
modules incorrectly certain crafted parameter combinations. (CVE-2015-0248)
Ivan Zhakov discovered that the Subversion mod_dav_svn module incorrectly
handled crafted v1 HTTP protocol request sequences. (CVE-2015-0251)
C. A remote attacker could use this
issue to read hidden files via the path name. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184)
C. Michael Pilato discovered that Subversion incorrectly handled path-based
authorization. A remote attacker could use this issue to obtain sensitive
path information. (CVE-2015-3187)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libapache2-svn 1.8.10-5ubuntu1.1
libsvn1 1.8.10-5ubuntu1.1
subversion 1.8.10-5ubuntu1.1
Ubuntu 14.04 LTS:
libapache2-svn 1.8.8-1ubuntu3.2
libsvn1 1.8.8-1ubuntu3.2
subversion 1.8.8-1ubuntu3.2
Ubuntu 12.04 LTS:
libapache2-svn 1.6.17dfsg-3ubuntu3.5
libsvn1 1.6.17dfsg-3ubuntu3.5
subversion 1.6.17dfsg-3ubuntu3.5
In general, a standard system update will make all the necessary changes.
The updated packages have been upgraded to the 1.7.20 and 1.8.13
versions where these security flaws has been fixed. The verification
of md5 checksums and GPG signatures is performed automatically for you. 6) - i386, noarch, x86_64
3.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Subversion, Serf: Multiple Vulnerabilities
Date: October 11, 2016
Bugs: #500482, #518716, #519202, #545348, #556076, #567810,
#581448, #586046
ID: 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Subversion and Serf, the
worst of which could lead to execution of arbitrary code.
Background
==========
Subversion is a version control system intended to eventually replace
CVS. Like CVS, it has an optional client-server architecture (where the
server can be an Apache server running mod_svn, or an ssh program as in
CVS's :ext: method). In addition to supporting the features found in
CVS, Subversion also provides support for moving and copying files and
directories.
The serf library is a high performance C-based HTTP client library
built upon the Apache Portable Runtime (APR) library.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/subversion < 1.9.4 >= 1.9.4
*> 1.8.16
2 net-libs/serf < 1.3.7 >= 1.3.7
-------------------------------------------------------------------
2 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Subversion and Serf.
Please review the CVE identifiers referenced below for details
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, conduct a man-in-the-middle attack, obtain
sensitive information, or cause a Denial of Service Condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Subversion users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4"
All Serf users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7"
References
==========
[ 1 ] CVE-2014-0032
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032
[ 2 ] CVE-2014-3504
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504
[ 3 ] CVE-2014-3522
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522
[ 4 ] CVE-2014-3528
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528
[ 5 ] CVE-2015-0202
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202
[ 6 ] CVE-2015-0248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248
[ 7 ] CVE-2015-0251
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251
[ 8 ] CVE-2015-3184
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184
[ 9 ] CVE-2015-3187
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187
[ 10 ] CVE-2015-5259
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259
[ 11 ] CVE-2016-2167
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167
[ 12 ] CVE-2016-2168
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-05
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in the apache configuration.
CVE-ID
CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server
Available for: OS X Yosemite 10.10 or later
Impact: An attacker may be able to access restricted parts of the
filesystem
Description: A comparison issue existed in the node.js send module
prior to version 0.8.4. This issue was addressed by upgrading to
version 0.12.3.
CVE-ID
CVE-2014-6394 : Ilya Kantor
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilties in OpenSSL
Description: Multiple vulnerabilties existed in the node.js OpenSSL
module prior to version 1.0.1j. These issues were addressed by
updating openssl to version 1.0.1j.
CVE-ID
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker with a privileged network position may be able
to inspect traffic to Xcode Server
Description: Connections to Xcode Server may have been made without
encryption. This issue was addressed through improved network
connection logic.
CVE-ID
CVE-2015-5910 : an anonymous researcher
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Build notifications may be sent to unintended recipients
Description: An access issue existed in the handling of repository
email lists. This issue was addressed through improved validation.
CVE-ID
CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of
Anchorfree
subversion
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities existed in svn versions prior to
1.7.19
Description: Multiple vulnerabilities existed in svn versions prior
to 1.7.19. These issues were addressed by updating svn to version
1.7.20.
CVE-ID
CVE-2015-0248
CVE-2015-0251
Xcode 7.0 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "7.0".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=SGgX
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: subversion security update
Advisory ID: RHSA-2015:1742-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1742.html
Issue date: 2015-09-08
CVE Names: CVE-2015-0248 CVE-2015-0251 CVE-2015-3184
CVE-2015-3187
=====================================================================
1. Summary:
Updated subversion packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access
to Subversion repositories via HTTP. A remote
attacker could use this flaw to cause the SVN server (both svnserve and
httpd with the mod_dav_svn module) to crash. (CVE-2015-0248)
It was found that the mod_authz_svn module did not properly restrict
anonymous access to Subversion repositories under certain configurations
when used with Apache httpd 2.4.x. This could allow a user to anonymously
access files in a Subversion repository, which should only be accessible to
authenticated users. (CVE-2015-3184)
It was found that the mod_dav_svn module did not properly validate the
svn:author property of certain requests. An attacker able to create new
revisions could use this flaw to spoof the svn:author property.
(CVE-2015-0251)
It was found that when an SVN server (both svnserve and httpd with the
mod_dav_svn module) searched the history of a file or a directory, it would
disclose its location in the repository if that file or directory was not
readable (for example, if it had been moved). (CVE-2015-3187)
Red Hat would like to thank the Apache Software Foundation for reporting
these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the
original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael
Pilato of CollabNet as the original reporter of CVE-2015-3184 and
CVE-2015-3187 flaws.
All subversion users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, for the update to take effect, you must restart the httpd
daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are
serving Subversion repositories via the svn:// protocol.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Client Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
ppc64:
mod_dav_svn-1.7.14-7.el7_1.1.ppc64.rpm
subversion-1.7.14-7.el7_1.1.ppc64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
mod_dav_svn-1.7.14-7.el7_1.1.s390x.rpm
subversion-1.7.14-7.el7_1.1.s390x.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-libs-1.7.14-7.el7_1.1.s390.rpm
subversion-libs-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.ael7b_1.1.src.rpm
ppc64le:
mod_dav_svn-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-libs-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
subversion-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc64.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc64.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc64.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-python-1.7.14-7.el7_1.1.ppc64.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc64.rpm
subversion-tools-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
subversion-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-devel-1.7.14-7.el7_1.1.s390.rpm
subversion-devel-1.7.14-7.el7_1.1.s390x.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390x.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390x.rpm
subversion-kde-1.7.14-7.el7_1.1.s390.rpm
subversion-kde-1.7.14-7.el7_1.1.s390x.rpm
subversion-perl-1.7.14-7.el7_1.1.s390.rpm
subversion-perl-1.7.14-7.el7_1.1.s390x.rpm
subversion-python-1.7.14-7.el7_1.1.s390x.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390x.rpm
subversion-tools-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le:
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-devel-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-gnome-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-javahl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-kde-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-perl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-python-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-ruby-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-tools-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0248
https://access.redhat.com/security/cve/CVE-2015-0251
https://access.redhat.com/security/cve/CVE-2015-3184
https://access.redhat.com/security/cve/CVE-2015-3187
https://access.redhat.com/security/updates/classification/#moderate
https://subversion.apache.org/security/CVE-2015-0248-advisory.txt
https://subversion.apache.org/security/CVE-2015-3184-advisory.txt
https://subversion.apache.org/security/CVE-2015-0251-advisory.txt
https://subversion.apache.org/security/CVE-2015-3187-advisory.txt
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV7t6+XlSAg2UNWIIRAivqAKCtV0lnW3RGFsCNsKIU9lBHeBk4UQCdE8/b
KVJwbobNcmPzKule+9U7RnM=
=F2J4
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201504-0060 | CVE-2015-0251 | Subversion mod_dav_svn Server security vulnerability |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences. Apache Subversion is prone to a security-bypass vulnerability.
Successful exploits will allow an attacker to bypass certain security restrictions and perform unauthorized actions.
For the stable distribution (wheezy), these problems have been fixed in
version 1.6.17dfsg-4+deb7u9.
For the upcoming stable distribution (jessie), these problems have been
fixed in version 1.8.10-6.
For the unstable distribution (sid), these problems have been fixed in
version 1.8.10-6. ============================================================================
Ubuntu Security Notice USN-2721-1
August 20, 2015
subversion vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Subversion.
Software Description:
- subversion: Advanced version control system
Details:
It was discovered that the Subversion mod_dav_svn module incorrectly
handled REPORT requests for a resource that does not exist. This issue only affected Ubuntu 12.04 LTS and Ubuntu
14.04 LTS. (CVE-2014-3580)
It was discovered that the Subversion mod_dav_svn module incorrectly
handled requests requiring a lookup for a virtual transaction name that
does not exist. This issue only affected Ubuntu
14.04 LTS. (CVE-2014-8108)
Evgeny Kotkov discovered that the Subversion mod_dav_svn module incorrectly
handled large numbers of REPORT requests. This
issue only affected Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-0202)
Evgeny Kotkov discovered that the Subversion mod_dav_svn and svnserve
modules incorrectly certain crafted parameter combinations. (CVE-2015-0251)
C. A remote attacker could use this
issue to read hidden files via the path name. This issue only affected
Ubuntu 14.04 LTS and Ubuntu 15.04. (CVE-2015-3184)
C. Michael Pilato discovered that Subversion incorrectly handled path-based
authorization. A remote attacker could use this issue to obtain sensitive
path information. (CVE-2015-3187)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libapache2-svn 1.8.10-5ubuntu1.1
libsvn1 1.8.10-5ubuntu1.1
subversion 1.8.10-5ubuntu1.1
Ubuntu 14.04 LTS:
libapache2-svn 1.8.8-1ubuntu3.2
libsvn1 1.8.8-1ubuntu3.2
subversion 1.8.8-1ubuntu3.2
Ubuntu 12.04 LTS:
libapache2-svn 1.6.17dfsg-3ubuntu3.5
libsvn1 1.6.17dfsg-3ubuntu3.5
subversion 1.6.17dfsg-3ubuntu3.5
In general, a standard system update will make all the necessary changes.
The updated packages have been upgraded to the 1.7.20 and 1.8.13
versions where these security flaws has been fixed. The verification
of md5 checksums and GPG signatures is performed automatically for you. 6) - i386, noarch, x86_64
3.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Subversion, Serf: Multiple Vulnerabilities
Date: October 11, 2016
Bugs: #500482, #518716, #519202, #545348, #556076, #567810,
#581448, #586046
ID: 201610-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Subversion and Serf, the
worst of which could lead to execution of arbitrary code.
Background
==========
Subversion is a version control system intended to eventually replace
CVS. Like CVS, it has an optional client-server architecture (where the
server can be an Apache server running mod_svn, or an ssh program as in
CVS's :ext: method). In addition to supporting the features found in
CVS, Subversion also provides support for moving and copying files and
directories.
The serf library is a high performance C-based HTTP client library
built upon the Apache Portable Runtime (APR) library.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/subversion < 1.9.4 >= 1.9.4
*> 1.8.16
2 net-libs/serf < 1.3.7 >= 1.3.7
-------------------------------------------------------------------
2 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Subversion and Serf.
Please review the CVE identifiers referenced below for details
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, conduct a man-in-the-middle attack, obtain
sensitive information, or cause a Denial of Service Condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Subversion users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.4"
All Serf users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/serf-1.3.7"
References
==========
[ 1 ] CVE-2014-0032
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0032
[ 2 ] CVE-2014-3504
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3504
[ 3 ] CVE-2014-3522
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3522
[ 4 ] CVE-2014-3528
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3528
[ 5 ] CVE-2015-0202
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0202
[ 6 ] CVE-2015-0248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0248
[ 7 ] CVE-2015-0251
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0251
[ 8 ] CVE-2015-3184
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3184
[ 9 ] CVE-2015-3187
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3187
[ 10 ] CVE-2015-5259
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5259
[ 11 ] CVE-2016-2167
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2167
[ 12 ] CVE-2016-2168
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2168
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-05
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Summary:
========
Subversion's mod_dav_svn server allows setting arbitrary svn:author
property values when committing new revisions. This can be accomplished
using a specially crafted sequence of requests. An evil-doer can fake
svn:author values on his commits. However, as authorization rules are
applied to the evil-doer's true username, forged svn:author values can
only happen on commits that touch the paths the evil-doer has write
access to.
Doing so does not grant any additional access and does not circumvent the
standard Apache authentication or authorization mechanisms. Still, an
ability to spoof svn:author property values can impact data integrity in
environments that rely on these values.
There are no known instances of the problem being exploited in the wild,
but an exploit has been tested.
Known vulnerable:
=================
Subversion HTTPD servers 1.5.0 through 1.7.19 (inclusive)
Subversion HTTPD servers 1.8.0 through 1.8.11 (inclusive)
Known fixed:
============
Subversion 1.7.20
Subversion 1.8.13
svnserve (any version) is not vulnerable
Subversion 1.8.12 was not publicly released.
Details:
========
The Subversion http://-based protocol used for communicating with
a Subversion mod_dav_svn server has two versions, v1 and v2. When a commit happens, the
client sends a sequence of requests (POST, PUT, MERGE, etc.) that depend
on the negotiated protocol version.
Usually, a server uses the name of the authenticated user as the svn:author
value for a new revision. In this case, the server will use an arbitrary value
coming from the client instead of the svn:author value originating from
the authentication mechanism.
An attacker needs to have commit access to the repository to exploit the
vulnerability. The ability to spoof svn:author property values can impact
data integrity in environments that expect the values to denote the actual
commit author. The real ID of the author could still be determined using
server access logs. However, it is also possible that a spoofed change
could go in unnoticed.
Subversion's repository hooks might see the real ID of the author or the
forged value, depending on the hook type and the hook contents:
- A start-commit hook will see the real username in the USER argument
- A start-commit hook will see the real username when performing
'svnlook propget --revprop -t TXN_NAME'
- A pre-commit hook will see the forged username when performing
'svnlook propget --revprop -t TXN_NAME'
- A post-commit hook will see the forged username when performing
'svnlook propget --revprop -r REV'
Unfortunately, no special configuration is required and all mod_dav_svn
servers are vulnerable.
New Subversion packages can be found at:
http://subversion.apache.org/packages.html
No workaround is available.
References:
===========
CVE-2015-0251 (Subversion)
Reported by:
============
Bruno Luiz, d4t
Patches:
========
Patch against 1.7.19:
[[[
Index: subversion/mod_dav_svn/deadprops.c
===================================================================
--- subversion/mod_dav_svn/deadprops.c (revision 1660122)
+++ subversion/mod_dav_svn/deadprops.c (working copy)
@@ -160,6 +160,23 @@ get_value(dav_db *db, const dav_prop_name *name, s
}
+static svn_error_t *
+change_txn_prop(svn_fs_txn_t *txn,
+ const char *propname,
+ const svn_string_t *value,
+ apr_pool_t *scratch_pool)
+{
+ if (strcmp(propname, SVN_PROP_REVISION_AUTHOR) == 0)
+ return svn_error_create(SVN_ERR_RA_DAV_REQUEST_FAILED, NULL,
+ "Attempted to modify 'svn:author' property "
+ "on a transaction");
+
+ SVN_ERR(svn_repos_fs_change_txn_prop(txn, propname, value, scratch_pool));
+
+ return SVN_NO_ERROR;
+}
+
+
static dav_error *
save_value(dav_db *db, const dav_prop_name *name,
const svn_string_t *const *old_value_p,
@@ -210,9 +227,8 @@ save_value(dav_db *db, const dav_prop_name *name,
{
if (db->resource->working)
{
- serr = svn_repos_fs_change_txn_prop(resource->info->root.txn,
- propname, value,
- subpool);
+ serr = change_txn_prop(resource->info->root.txn, propname,
+ value, subpool);
}
else
{
@@ -251,8 +267,8 @@ save_value(dav_db *db, const dav_prop_name *name,
}
else if (resource->info->restype == DAV_SVN_RESTYPE_TXN_COLLECTION)
{
- serr = svn_repos_fs_change_txn_prop(resource->info->root.txn,
- propname, value, subpool);
+ serr = change_txn_prop(resource->info->root.txn, propname,
+ value, subpool);
}
else
{
@@ -561,8 +577,8 @@ db_remove(dav_db *db, const dav_prop_name *name)
/* Working Baseline or Working (Version) Resource */
if (db->resource->baselined)
if (db->resource->working)
- serr = svn_repos_fs_change_txn_prop(db->resource->info->root.txn,
- propname, NULL, subpool);
+ serr = change_txn_prop(db->resource->info->root.txn, propname,
+ NULL, subpool);
else
/* ### VIOLATING deltaV: you can't proppatch a baseline, it's
not a working resource! But this is how we currently
]]]
Patch against 1.8.11:
[[[
Index: subversion/mod_dav_svn/deadprops.c
===================================================================
--- subversion/mod_dav_svn/deadprops.c (revision 1660122)
+++ subversion/mod_dav_svn/deadprops.c (working copy)
@@ -163,6 +163,23 @@ get_value(dav_db *db, const dav_prop_name *name, s
}
+static svn_error_t *
+change_txn_prop(svn_fs_txn_t *txn,
+ const char *propname,
+ const svn_string_t *value,
+ apr_pool_t *scratch_pool)
+{
+ if (strcmp(propname, SVN_PROP_REVISION_AUTHOR) == 0)
+ return svn_error_create(SVN_ERR_RA_DAV_REQUEST_FAILED, NULL,
+ "Attempted to modify 'svn:author' property "
+ "on a transaction");
+
+ SVN_ERR(svn_repos_fs_change_txn_prop(txn, propname, value, scratch_pool));
+
+ return SVN_NO_ERROR;
+}
+
+
static dav_error *
save_value(dav_db *db, const dav_prop_name *name,
const svn_string_t *const *old_value_p,
@@ -213,9 +230,8 @@ save_value(dav_db *db, const dav_prop_name *name,
{
if (resource->working)
{
- serr = svn_repos_fs_change_txn_prop(resource->info->root.txn,
- propname, value,
- subpool);
+ serr = change_txn_prop(resource->info->root.txn, propname,
+ value, subpool);
}
else
{
@@ -254,8 +270,8 @@ save_value(dav_db *db, const dav_prop_name *name,
}
else if (resource->info->restype == DAV_SVN_RESTYPE_TXN_COLLECTION)
{
- serr = svn_repos_fs_change_txn_prop(resource->info->root.txn,
- propname, value, subpool);
+ serr = change_txn_prop(resource->info->root.txn, propname,
+ value, subpool);
}
else
{
@@ -560,8 +576,8 @@ db_remove(dav_db *db, const dav_prop_name *name)
/* Working Baseline or Working (Version) Resource */
if (db->resource->baselined)
if (db->resource->working)
- serr = svn_repos_fs_change_txn_prop(db->resource->info->root.txn,
- propname, NULL, subpool);
+ serr = change_txn_prop(db->resource->info->root.txn, propname,
+ NULL, subpool);
else
/* ### VIOLATING deltaV: you can't proppatch a baseline, it's
not a working resource! But this is how we currently
]]]
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in the apache configuration.
CVE-ID
CVE-2015-3185 : Branko Aibej of the Apache Software Foundation
IDE Xcode Server
Available for: OS X Yosemite 10.10 or later
Impact: An attacker may be able to access restricted parts of the
filesystem
Description: A comparison issue existed in the node.js send module
prior to version 0.8.4. This issue was addressed by upgrading to
version 0.12.3.
CVE-ID
CVE-2014-6394 : Ilya Kantor
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilties in OpenSSL
Description: Multiple vulnerabilties existed in the node.js OpenSSL
module prior to version 1.0.1j. These issues were addressed by
updating openssl to version 1.0.1j.
CVE-ID
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker with a privileged network position may be able
to inspect traffic to Xcode Server
Description: Connections to Xcode Server may have been made without
encryption. This issue was addressed through improved network
connection logic.
CVE-ID
CVE-2015-5910 : an anonymous researcher
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Build notifications may be sent to unintended recipients
Description: An access issue existed in the handling of repository
email lists. This issue was addressed through improved validation.
CVE-ID
CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of
Anchorfree
subversion
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities existed in svn versions prior to
1.7.19
Description: Multiple vulnerabilities existed in svn versions prior
to 1.7.19. These issues were addressed by updating svn to version
1.7.20.
CVE-ID
CVE-2015-0248
CVE-2015-0251
Xcode 7.0 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "7.0".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
iQIcBAEBCAAGBQJV+axlAAoJEBcWfLTuOo7tzuMQAJhCQaeClT0rDozh+WlKgM6f
X86xFeXLJ1gjlPKH183Bvm2gTW0m5kQuoNK1grarMB+rEeb8mPsOczwrIJisxVlr
5zkW/7JktHcsBU5vUa4j4T/CEJjp92VPZ4ub3k3eQOrhinn4E86uKcMxrYoQOAE0
YFMSDaPBFy+LIJ08ROB/AH8fkGJMLRCRAp43IGgzNuxCDx9jzW97m1dh86mR1CxP
GdhWRvN7T5YqXyJTw6pZbEHtVXjty8appe2ScvHByCRxa4gZq+/JinHInLjaB4p7
3o58rAWh7lDhcEi3HqkIu0YW6fLslPydCHTI4cH1PCHTuevNjjvK34IqMbD0jG/t
tO+vQFhwXpD5chsSB2oP2zLOWAJ7BA5uwvArkJhGKKzQ5DEI0soLBWG7Koe3RitO
HokIMyx0r+sf4YD+OP4RVPU9bU4FpayXZnECmHzWmK2vguihbIzjxq+Knvx7aiF9
js1Qn0DxT2puVYdhixtkvYKT7r8XRjI8MPLEwS+tX1Yg1Lqhz2G1MR6mO9iBW56L
g5deOuCVc56qeaobuUK0clvdFYtyd5jIXgh0zspZ4ssCbbdCOTZUQaG1mBGkIf3R
JgWTX8ny1Fdk9om3dmZVWUCzzqxJR/tm5M7kjGc425ZGaoBRWLga1VIjNz7MEfKS
YMBNmqt6weEewNqyDMnX
=SGgX
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: subversion security update
Advisory ID: RHSA-2015:1742-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1742.html
Issue date: 2015-09-08
CVE Names: CVE-2015-0248 CVE-2015-0251 CVE-2015-3184
CVE-2015-3187
=====================================================================
1. Summary:
Updated subversion packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
Subversion (SVN) is a concurrent version control system which enables one
or more users to collaborate in developing and maintaining a hierarchy of
files and directories while keeping a history of all changes. The
mod_dav_svn module is used with the Apache HTTP Server to allow access
to Subversion repositories via HTTP.
An assertion failure flaw was found in the way the SVN server processed
certain requests with dynamically evaluated revision numbers. A remote
attacker could use this flaw to cause the SVN server (both svnserve and
httpd with the mod_dav_svn module) to crash. (CVE-2015-0248)
It was found that the mod_authz_svn module did not properly restrict
anonymous access to Subversion repositories under certain configurations
when used with Apache httpd 2.4.x. This could allow a user to anonymously
access files in a Subversion repository, which should only be accessible to
authenticated users. (CVE-2015-3184)
It was found that the mod_dav_svn module did not properly validate the
svn:author property of certain requests. An attacker able to create new
revisions could use this flaw to spoof the svn:author property.
(CVE-2015-0251)
It was found that when an SVN server (both svnserve and httpd with the
mod_dav_svn module) searched the history of a file or a directory, it would
disclose its location in the repository if that file or directory was not
readable (for example, if it had been moved). (CVE-2015-3187)
Red Hat would like to thank the Apache Software Foundation for reporting
these issues. Upstream acknowledges Evgeny Kotkov of VisualSVN as the
original reporter of CVE-2015-0248 and CVE-2015-0251, and C. Michael
Pilato of CollabNet as the original reporter of CVE-2015-3184 and
CVE-2015-3187 flaws.
All subversion users should upgrade to these updated packages, which
contain backported patches to correct these issues. After installing the
updated packages, for the update to take effect, you must restart the httpd
daemon, if you are using mod_dav_svn, and the svnserve daemon, if you are
serving Subversion repositories via the svn:// protocol.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1205138 - CVE-2015-0248 subversion: (mod_dav_svn) remote denial of service with certain requests with dynamically evaluated revision numbers
1205140 - CVE-2015-0251 subversion: (mod_dav_svn) spoofing svn:author property values for new revisions
1247249 - CVE-2015-3184 subversion: Mixed anonymous/authenticated path-based authz with httpd 2.4
1247252 - CVE-2015-3187 subversion: svn_repos_trace_node_locations() reveals paths hidden by authz
6. Package List:
Red Hat Enterprise Linux Client Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
ppc64:
mod_dav_svn-1.7.14-7.el7_1.1.ppc64.rpm
subversion-1.7.14-7.el7_1.1.ppc64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc.rpm
subversion-libs-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
mod_dav_svn-1.7.14-7.el7_1.1.s390x.rpm
subversion-1.7.14-7.el7_1.1.s390x.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-libs-1.7.14-7.el7_1.1.s390.rpm
subversion-libs-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
subversion-1.7.14-7.ael7b_1.1.src.rpm
ppc64le:
mod_dav_svn-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-libs-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
subversion-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.ppc64.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc.rpm
subversion-devel-1.7.14-7.el7_1.1.ppc64.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc.rpm
subversion-gnome-1.7.14-7.el7_1.1.ppc64.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc.rpm
subversion-javahl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc.rpm
subversion-kde-1.7.14-7.el7_1.1.ppc64.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc.rpm
subversion-perl-1.7.14-7.el7_1.1.ppc64.rpm
subversion-python-1.7.14-7.el7_1.1.ppc64.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc.rpm
subversion-ruby-1.7.14-7.el7_1.1.ppc64.rpm
subversion-tools-1.7.14-7.el7_1.1.ppc64.rpm
s390x:
subversion-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.s390x.rpm
subversion-devel-1.7.14-7.el7_1.1.s390.rpm
subversion-devel-1.7.14-7.el7_1.1.s390x.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390.rpm
subversion-gnome-1.7.14-7.el7_1.1.s390x.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390.rpm
subversion-javahl-1.7.14-7.el7_1.1.s390x.rpm
subversion-kde-1.7.14-7.el7_1.1.s390.rpm
subversion-kde-1.7.14-7.el7_1.1.s390x.rpm
subversion-perl-1.7.14-7.el7_1.1.s390.rpm
subversion-perl-1.7.14-7.el7_1.1.s390x.rpm
subversion-python-1.7.14-7.el7_1.1.s390x.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390.rpm
subversion-ruby-1.7.14-7.el7_1.1.s390x.rpm
subversion-tools-1.7.14-7.el7_1.1.s390x.rpm
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le:
subversion-debuginfo-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-devel-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-gnome-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-javahl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-kde-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-perl-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-python-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-ruby-1.7.14-7.ael7b_1.1.ppc64le.rpm
subversion-tools-1.7.14-7.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
subversion-1.7.14-7.el7_1.1.src.rpm
x86_64:
mod_dav_svn-1.7.14-7.el7_1.1.x86_64.rpm
subversion-1.7.14-7.el7_1.1.x86_64.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-libs-1.7.14-7.el7_1.1.i686.rpm
subversion-libs-1.7.14-7.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
subversion-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.i686.rpm
subversion-debuginfo-1.7.14-7.el7_1.1.x86_64.rpm
subversion-devel-1.7.14-7.el7_1.1.i686.rpm
subversion-devel-1.7.14-7.el7_1.1.x86_64.rpm
subversion-gnome-1.7.14-7.el7_1.1.i686.rpm
subversion-gnome-1.7.14-7.el7_1.1.x86_64.rpm
subversion-javahl-1.7.14-7.el7_1.1.i686.rpm
subversion-javahl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-kde-1.7.14-7.el7_1.1.i686.rpm
subversion-kde-1.7.14-7.el7_1.1.x86_64.rpm
subversion-perl-1.7.14-7.el7_1.1.i686.rpm
subversion-perl-1.7.14-7.el7_1.1.x86_64.rpm
subversion-python-1.7.14-7.el7_1.1.x86_64.rpm
subversion-ruby-1.7.14-7.el7_1.1.i686.rpm
subversion-ruby-1.7.14-7.el7_1.1.x86_64.rpm
subversion-tools-1.7.14-7.el7_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-0248
https://access.redhat.com/security/cve/CVE-2015-0251
https://access.redhat.com/security/cve/CVE-2015-3184
https://access.redhat.com/security/cve/CVE-2015-3187
https://access.redhat.com/security/updates/classification/#moderate
https://subversion.apache.org/security/CVE-2015-0248-advisory.txt
https://subversion.apache.org/security/CVE-2015-3184-advisory.txt
https://subversion.apache.org/security/CVE-2015-0251-advisory.txt
https://subversion.apache.org/security/CVE-2015-3187-advisory.txt
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFV7t6+XlSAg2UNWIIRAivqAKCtV0lnW3RGFsCNsKIU9lBHeBk4UQCdE8/b
KVJwbobNcmPzKule+9U7RnM=
=F2J4
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201504-0448 | CVE-2015-3320 | Lenovo USB Enhanced Performance Keyboard Vulnerability in obtaining key input information in software |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Lenovo USB Enhanced Performance Keyboard software before 2.0.2.2 includes active debugging code in SKHOOKS.DLL, which allows local users to obtain keypress information by accessing debug output. Lenovo USB Enhanced Performance Keyboard is an enhanced USB keyboard from Lenovo. Information obtained may lead to further attacks
| VAR-201504-0378 | CVE-2015-1893 | IBM WebSphere DataPower XC10 Vulnerability in the appliance to hijack arbitrary user sessions |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
The IBM WebSphere DataPower XC10 appliance 2.1 before 2.1.0.3 allows remote attackers to hijack the sessions of arbitrary users, and consequently obtain sensitive information or modify data, via unspecified vectors. IBM WebSphere DataPower XC10 Appliance is prone to a session-hijacking vulnerability.
An attacker can leverage this issue to gain unauthorized access to the affected application.
IBM WebSphere DataPower XC10 Appliance 2.1 is vulnerable. The platform enables distributed caching of data with little to no change to existing applications
| VAR-201504-0268 | CVE-2015-0687 | Catalyst 4500 Run on device Cisco IOS of SNMP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 6.3 CVSS V3: - Severity: MEDIUM |
The SNMP implementation in Cisco IOS 15.1(2)SG4 on Catalyst 4500 devices, when single-switch Virtual Switching System (VSS) is configured, allows remote authenticated users to cause a denial of service (device crash) by performing SNMP polling, aka Bug ID CSCuq04574. The Cisco Catalyst 4500 E-Series is the next-generation, high-performance extension of the widely deployed Cisco Catalyst 4500 Series Ethernet Modular Switch.
An attacker can exploit this issue to cause a vulnerable device to crash, triggering a denial-of-service condition.
This issue is tracked by Cisco Bug ID CSCuq04574
| VAR-201504-0267 | CVE-2015-0686 | Nexus 9000 Run on device Cisco NX-OS of SNMP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 6.3 CVSS V3: - Severity: MEDIUM |
The SNMP implementation in Cisco NX-OS 6.1(2)I2(3) on Nexus 9000 devices, when a Reset High Availability (HA) policy is configured, allows remote authenticated users to cause a denial of service (device reload) via unspecified vectors, aka Bug ID CSCuq92240. Vendors have confirmed this vulnerability Bug ID CSCuq92240 It is released as.Service disruption by remotely authenticated user ( Device reload ) There is a possibility of being put into a state. The Cisco Nexus 9000 switch provides the foundation for an application-centric infrastructure that delivers scalability, performance, and energy efficiency. Cisco NX-OS Software for Nexus 9000 Series is prone to a remote denial-of-service vulnerability.
An attacker can leverage this issue to cause an affected device to reload unexpectedly; denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCuq92240
| VAR-201504-0262 | CVE-2015-0666 | Cisco Prime Data Center Network Manager of fmserver Directory traversal vulnerability in servlets |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Directory traversal vulnerability in the fmserver servlet in Cisco Prime Data Center Network Manager (DCNM) before 7.1(1) allows remote attackers to read arbitrary files via a crafted pathname, aka Bug ID CSCus00241. Authentication is not required to exploit this vulnerability.The specific flaw exists within the fmserver servlet which is vulnerable to a directory traversal. An attacker can also bypass webapp authentication because the application writes access tokens to the filesystem, which can be read. Information harvested may aid in launching further attacks.
This issue is being tracked by Cisco Bug ID CSCus00241. The manager provides multi-protocol management of the network and provides troubleshooting capabilities for switch health and performance
| VAR-201504-0227 | CVE-2015-2815 | SAP Kernel of NetWeaver Dispatcher of C_SAPGPARAM Buffer overflow vulnerability in functions |
CVSS V2: 6.5 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the C_SAPGPARAM function in the NetWeaver Dispatcher in SAP KERNEL 7.00 (7000.52.12.34966) and 7.40 (7400.12.21.30308) allows remote authenticated users to cause a denial of service or possibly execute arbitrary code via unspecified vectors, aka SAP Security Note 2063369. SAP Kernel of NetWeaver Dispatcher of C_SAPGPARAM The function contains a buffer overflow vulnerability. SAP NetWeaver is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer.
Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition. ERPSCAN Research Advisory [ERPSCAN-15-003] SAP NetWeaver Dispatcher
Buffer Overflow - RCE, DoS
Application: SAP NetWeaver Dispatcher
Versions Affected: SAP NetWeaver Dispatcher, probably others
Vendor URL: http://SAP.com
Bugs: RCE
Sent: 25.08.14
Reported: 25.08.14
Vendor response: 25.08.14
Date of Public Advisory: 15.02.2015
Reference: SAP Security Note 2063369
Author: George Nosenko (ERPScan)
Description
1. ADVISORY INFORMATION
Title: SAP NetWeaver Dispatcher
Advisory ID: [ERPSCAN-05-003]
Risk: Hight
Advisory URL:
http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/
Date published: 18.06.2015
Vendors contacted: SAP
2. VULNERABILITY INFORMATION
Class: Buffer overflow [CWE-119], [CWE-20]
Impact: Allows an unauthorized attacker to execute remote code
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2015-2815
3. It can also lead to denial of
service.
4. VULNERABLE PACKAGES
• SAP KERNEL 7.00 32BIT, disp+work.exe (7000.52.12.34966)
• SAP KERNEL 7.40 64BIT, disp+work.exe (7400.12.21.30308)
Other versions are probably affected too, but they were not checked.
5. SOLUTIONS AND WORKAROUNDS
To correct this vulnerability, install SAP Security Note 2063369.
6. AUTHOR
George Nosenko (ERPScan)
7. It can also lead to denial of
service.
8. REPORT TIMELINE
Sent: 25.08.2014
Reported: 25.08.2014
Vendor response: 26.08.2014
Date of Public Advisory: 18.06.2015
9. REFERENCES
http://erpscan.com/advisories/erpscan-15-003-sapkernel-c_sapgparam-rce-dos/
10. ABOUT ERPScan Research
The company’s expertise is based on the research subdivision of ERPScan,
which is engaged in vulnerability research and analysis of critical
enterprise applications. It has achieved multiple acknowledgments from
the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware,
HP for discovering more than 400 vulnerabilities in their solutions (200
of them just in SAP!).
ERPScan researchers are proud to have exposed new types of
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated
for the best server-side vulnerability at BlackHat 2013.
ERPScan experts have been invited to speak, present, and train at 60+
prime international security conferences in 25+ countries across the
continents. These include BlackHat, RSA, HITB, and private SAP trainings
in several Fortune 2000 companies.
ERPScan researchers lead the project EAS-SEC, which is focused on
enterprise application security research and awareness. They have
published 3 exhaustive annual award-winning surveys about SAP security.
ERPScan experts have been interviewed by leading media resources and
featured in specialized info-sec publications worldwide. These include
Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,
Heise, and Chinabyte, to name a few.
We have highly qualified experts in staff with experience in many
different fields of security, from web applications and mobile/embedded
to reverse engineering and ICS/SCADA systems, accumulating their
experience to conduct the best SAP security research.
11. ABOUT ERPScan
ERPScan is one of the most respected and credible Business Application
Security providers. Founded in 2010, the company operates globally.
Named an Emerging vendor in Security by CRN and distinguished by more
than 25 other awards, ERPScan is the leading SAP SE partner in
discovering and resolving security vulnerabilities. ERPScan consultants
work with SAP SE in Walldorf to improve the security of their latest
solutions.
ERPScan’s primary mission is to close the gap between technical and
business security. We provide solutions to secure ERP systems and
business-critical applications from both cyber attacks and internal
fraud. Our clients are usually large enterprises, Fortune 2000
companies, and managed service providers whose requirements are to
actively monitor and manage the security of vast SAP landscapes on a
global scale.
Our flagship product is ERPScan Security Monitoring Suite for SAP. This
multi award-winning innovative software is the only solution on the
market certified by SAP SE covering all tiers of SAP security:
vulnerability assessment, source code review, and Segregation of Duties.
The largest companies from diverse industries like oil and gas, banking,
retail, even nuclear power installations as well as consulting companies
have successfully deployed the software. ERPScan Security Monitoring
Suite for SAP is specifically designed for enterprises to continuously
monitor changes in multiple SAP systems. It generates and analyzes
trends in user friendly dashboards, manages risks, tasks, and can export
results to external systems. These features enable central management of
SAP system security with minimal time and effort.
We follow the sun and function in two hubs located in the Netherlands
and the US to operate local offices and partner network spanning 20+
countries around the globe. This enables monitoring cyber threats in
real time and providing agile customer support.
Address USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA, 94301
Phone: 650.798.5255
Twitter: @erpscan
Scoop-it: Business Application Security
http://erpscan.com
--
<https://www.linkedin.com/company/2217474?trk=ppro_cprof>
<https://twitter.com/erpscan>
<http://erpscan.com/>
------------------------------------------------------------------------
e-mail: d.maenkova@erpscan.com <mailto:d.maenkova@erpscan.com>
address: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301
phone: 650.798.5255
erpscan.com <http://erpscan.com>
| VAR-201504-0229 | CVE-2015-2817 | SAP NetWeaver of SAP Management Console Vulnerability in which important information is obtained |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The SAP Management Console in SAP NetWeaver 7.40 allows remote attackers to obtain sensitive information via the ReadProfile parameters, aka SAP Security Note 2091768. SAP Netweaver is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
SAP Netweaver 7.40 is vulnerable. VULNERABILITY INFORMATION
Class: Information disclosure [CWE-200]
Impact: Information disclosure
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2015-2817
3. VULNERABILITY DESCRIPTION
It is possible to get some information from the web interface of CCMS
without authentication.
4.
Other versions are probably affected too, but they were not checked.
5. SOLUTIONS AND WORKAROUNDS
Install SAP Security Note 2091768 or upgrade kernel to the associated
patch level.
6. AUTHOR
Dmitry Chastukhin (ERPScan)
7. TECHNICAL DESCRIPTION
An anonymous attacker can send a special POST HTTP request to get
information about any SAP profile parameters.
8. REPORT TIMELINE
Sent: 09.12.2014
Reported: 09.12.2014
Vendor response: 10.12.2014
Date of Public Advisory: 18.06.2015
9. REFERENCES
http://erpscan.com/advisories/erpscan-15-007-sap-management-console-readprofile-parameters-information-disclosure
10. ABOUT ERPScan Research
The company’s expertise is based on the research subdivision of ERPScan,
which is engaged in vulnerability research and analysis of critical
enterprise applications. It has achieved multiple acknowledgments from
the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware,
HP for discovering more than 400 vulnerabilities in their solutions (200
of them just in SAP!).
ERPScan researchers are proud to have exposed new types of
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated
for the best server-side vulnerability at BlackHat 2013.
ERPScan experts have been invited to speak, present, and train at 60+
prime international security conferences in 25+ countries across the
continents. These include BlackHat, RSA, HITB, and private SAP trainings
in several Fortune 2000 companies.
ERPScan researchers lead the project EAS-SEC, which is focused on
enterprise application security research and awareness. They have
published 3 exhaustive annual award-winning surveys about SAP security.
ERPScan experts have been interviewed by leading media resources and
featured in specialized info-sec publications worldwide. These include
Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,
Heise, and Chinabyte, to name a few.
We have highly qualified experts in staff with experience in many
different fields of security, from web applications and mobile/embedded
to reverse engineering and ICS/SCADA systems, accumulating their
experience to conduct the best SAP security research.
11. ABOUT ERPScan
ERPScan is one of the most respected and credible Business Application
Security providers. Founded in 2010, the company operates globally.
Named an Emerging vendor in Security by CRN and distinguished by more
than 25 other awards, ERPScan is the leading SAP SE partner in
discovering and resolving security vulnerabilities. ERPScan consultants
work with SAP SE in Walldorf to improve the security of their latest
solutions.
ERPScan’s primary mission is to close the gap between technical and
business security. We provide solutions to secure ERP systems and
business-critical applications from both cyber attacks and internal
fraud. Our clients are usually large enterprises, Fortune 2000
companies, and managed service providers whose requirements are to
actively monitor and manage the security of vast SAP landscapes on a
global scale.
Our flagship product is ERPScan Security Monitoring Suite for SAP. This
multi award-winning innovative software is the only solution on the
market certified by SAP SE covering all tiers of SAP security:
vulnerability assessment, source code review, and Segregation of Duties.
The largest companies from diverse industries like oil and gas, banking,
retail, even nuclear power installations as well as consulting companies
have successfully deployed the software. ERPScan Security Monitoring
Suite for SAP is specifically designed for enterprises to continuously
monitor changes in multiple SAP systems. It generates and analyzes
trends in user friendly dashboards, manages risks, tasks, and can export
results to external systems. These features enable central management of
SAP system security with minimal time and effort.
We follow the sun and function in two hubs located in the Netherlands
and the US to operate local offices and partner network spanning 20+
countries around the globe. This enables monitoring cyber threats in
real time and providing agile customer support.
Address USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA, 94301
Phone: 650.798.5255
Twitter: @erpscan
Scoop-it: Business Application Security
http://erpscan.com
--
<https://www.linkedin.com/company/2217474?trk=ppro_cprof>
<https://twitter.com/erpscan>
<http://erpscan.com/>
------------------------------------------------------------------------
e-mail: d.maenkova@erpscan.com <mailto:d.maenkova@erpscan.com>
address: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301
phone: 650.798.5255
erpscan.com <http://erpscan.com>
| VAR-201708-0272 | CVE-2014-6189 | IBM Security Network Protection Cross-site scripting vulnerability in device firmware |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in IBM Security Network Protection 3100, 4100, 5100, and 7100 devices with firmware 5.2 before 5.2.0.0-ISS-XGS-All-Models-Hotfix-FP0008 and 5.3 before 5.3.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. The system can monitor application usage, website access and operation execution within the network to avoid threats such as malware and botnets
| VAR-201504-0197 | CVE-2015-0612 | Cisco Unity Connection of Connection Conversation Manager Service disruption in the process (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU6, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (SIP outage) via a crafted UDP packet, aka Bug ID CSCuh25062. Vendors have confirmed this vulnerability Bug ID CSCuh25062 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlSkillfully crafted by a third party UDP Service disruption via packets (SIP Stop ) There is a possibility of being put into a state. Cisco Unity Connection is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause denial of service condition.
These issues are being tracked by Cisco Bug IDs CSCuh25062, CSCul20444, CSCul26267, CSCul28089, CSCul69819. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free". The following releases are affected: Cisco Unity Connection 8.5 prior to 8.5(1)SU6, 8.6 prior to 8.6(2a)SU4, and 9.x prior to 9.1(2)SU2
| VAR-201504-0198 | CVE-2015-0613 | Cisco Unity Connection of Connection Conversation Manager Service disruption in the process (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul20444. Vendors have confirmed this vulnerability Bug ID CSCul20444 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlSkillfully crafted by a third party SIP INVITE Service disruption via message ( Core dump and reboot ) There is a possibility of being put into a state. Cisco Unity Connection is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause denial of service condition.
These issues are being tracked by Cisco Bug IDs CSCuh25062, CSCul20444, CSCul26267, CSCul28089, CSCul69819. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free". The following versions are affected: Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, 9.x prior to 9.1(2)SU2, and 10.0 prior to 10.0(1)SU1
| VAR-201504-0199 | CVE-2015-0614 | Cisco Unity Connection of Connection Conversation Manager Denial of service in process (DoS) Vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) via crafted SIP INVITE messages, aka Bug ID CSCul26267. Vendors report this vulnerability Bug ID CSCul26267 Published as. Supplementary information : CWE Vulnerability types by CWE-19: Data Handling ( Data processing ) Has been identified. Cisco Unity Connection is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause denial of service condition.
These issues are being tracked by Cisco Bug IDs CSCuh25062, CSCul20444, CSCul26267, CSCul28089, CSCul69819. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free". The following versions are affected: Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, 9.x prior to 9.1(2)SU2, and 10.0 prior to 10.0(1)SU1
| VAR-201504-0200 | CVE-2015-0615 | Cisco Unity Connection Service disruption in the implementation of call processing (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The call-handling implementation in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, 9.x before 9.1(2)SU2, and 10.0 before 10.0(1)SU1, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (port consumption) by improperly terminating SIP sessions, aka Bug ID CSCul28089. Vendors have confirmed this vulnerability Bug ID CSCul28089 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlBy a third party SIP Service operation disruption due to improper termination of session ( Port consumption ) There is a possibility of being put into a state. Cisco Unity Connection is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause denial of service condition.
These issues are being tracked by Cisco Bug IDs CSCuh25062, CSCul20444, CSCul26267, CSCul28089, CSCul69819. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free". The following versions are affected: Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, 9.x prior to 9.1(2)SU2, and 10.0 prior to 10.0(1)SU1
| VAR-201504-0201 | CVE-2015-0616 | Cisco Unity Connection of Connection Conversation Manager Service disruption in the process (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Connection Conversation Manager (aka CuCsMgr) process in Cisco Unity Connection 8.5 before 8.5(1)SU7, 8.6 before 8.6(2a)SU4, and 9.x before 9.1(2)SU2, when SIP trunk integration is enabled, allows remote attackers to cause a denial of service (core dump and restart) by improperly terminating SIP TCP connections, aka Bug ID CSCul69819. Vendors have confirmed this vulnerability Bug ID CSCul69819 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmlBy a third party SIP TCP Service operation disruption due to improper termination of connection ( Core dump and reboot ) There is a possibility of being put into a state. Cisco Unity Connection is prone to multiple denial-of-service vulnerabilities.
An attacker can exploit these issues to cause denial of service condition.
These issues are being tracked by Cisco Bug IDs CSCuh25062, CSCul20444, CSCul26267, CSCul28089, CSCul69819. Cisco Unity Connection (UC) is a set of voice message platform of Cisco (Cisco). The platform can use voice commands to make calls or listen to messages "hands-free". The following releases are affected: Cisco Unity Connection 8.5 prior to 8.5(1)SU7, 8.6 prior to 8.6(2a)SU4, and 9.x prior to 9.1(2)SU2
| VAR-201706-0182 | CVE-2015-0936 | Ceragon FibeAir IP-10 In SSH Vulnerability for which access rights are acquired |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Ceragon FibeAir IP-10 have a default SSH public key in the authorized_keys file for the mateidu user, which allows remote attackers to obtain SSH access by leveraging knowledge of the private key. The Ceragon FiberAir IP-10 is a wireless microwave transmission device from Israel's Ceragon. Ceragon FiberAir IP-10 is prone to an information-disclosure vulnerability
| VAR-201504-0422 | CVE-2015-1233 | Google Chrome Vulnerable to arbitrary code execution |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlA third party may execute arbitrary code. Google Chrome is prone to multiple unspecified remote code-execution vulnerabilities.
Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to Google Chrome 41.0.2272.118 are vulnerable. Google Chrome is a web browser developed by Google (Google). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Chromium: Multiple vulnerabilities
Date: June 23, 2015
Bugs: #545300, #546728, #548108, #549944
ID: 201506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been fixed in Chromium, the worst of
which can cause arbitrary remote code execution.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 43.0.2357.65 >= 43.0.2357.65
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers referenced below for details.
Impact
======
A remote attacker can cause arbitrary remote code execution, Denial of
Service or bypass of security mechanisms.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-43.0.2357.65"
References
==========
[ 1 ] CVE-2015-1233
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233
[ 2 ] CVE-2015-1234
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234
[ 3 ] CVE-2015-1235
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235
[ 4 ] CVE-2015-1236
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236
[ 5 ] CVE-2015-1237
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237
[ 6 ] CVE-2015-1238
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238
[ 7 ] CVE-2015-1240
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240
[ 8 ] CVE-2015-1241
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241
[ 9 ] CVE-2015-1242
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242
[ 10 ] CVE-2015-1243
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243
[ 11 ] CVE-2015-1244
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244
[ 12 ] CVE-2015-1245
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245
[ 13 ] CVE-2015-1246
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246
[ 14 ] CVE-2015-1247
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247
[ 15 ] CVE-2015-1248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248
[ 16 ] CVE-2015-1250
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250
[ 17 ] CVE-2015-1251
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251
[ 18 ] CVE-2015-1252
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252
[ 19 ] CVE-2015-1253
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253
[ 20 ] CVE-2015-1254
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254
[ 21 ] CVE-2015-1255
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255
[ 22 ] CVE-2015-1256
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256
[ 23 ] CVE-2015-1257
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257
[ 24 ] CVE-2015-1258
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258
[ 25 ] CVE-2015-1259
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259
[ 26 ] CVE-2015-1260
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260
[ 27 ] CVE-2015-1262
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262
[ 28 ] CVE-2015-1263
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263
[ 29 ] CVE-2015-1264
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264
[ 30 ] CVE-2015-1265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: chromium-browser security update
Advisory ID: RHSA-2015:0778-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0778.html
Issue date: 2015-04-06
CVE Names: CVE-2015-1233 CVE-2015-1234
=====================================================================
1. Summary:
Updated chromium-browser packages that fix two security issues are now
available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash or,
potentially, execute arbitrary code with the privileges of the user running
Chromium. (CVE-2015-1233, CVE-2015-1234)
All Chromium users should upgrade to these updated packages, which contain
Chromium version 41.0.2272.118, which corrects these issues. After
installing the update, Chromium must be restarted for the changes to take
effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-1233
https://access.redhat.com/security/cve/CVE-2015-1234
https://access.redhat.com/security/updates/classification/#critical
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVIpk8XlSAg2UNWIIRAqvfAJ4gF/bAUqQnIGEvpjz2gm98etxcJQCdEYz1
RYA4PeHRl1iWQQ2YMJdo6rg=
=oA8r
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ============================================================================
Ubuntu Security Notice USN-2556-1
April 07, 2015
oxide-qt vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Oxide. (CVE-2015-1233)
A buffer overflow was discovered in the GPU service. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash. (CVE-2015-1234)
It was discovered that Oxide did not correctly manage the lifetime of
BrowserContext, resulting in a potential use-after-free in some
circumstances. (CVE-2015-1317)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
liboxideqtcore0 1.5.6-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
liboxideqtcore0 1.5.6-0ubuntu0.14.04.2
In general, a standard system update will make all the necessary changes
| VAR-201504-0423 | CVE-2015-1234 | Google Chrome of gpu/command_buffer/service/gles2_cmd_decoder.cc Service disruption in (DoS) Vulnerabilities |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Google Chrome. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of communication between the GPU process and the renderer processes. The issue lies in the verification of values from the renderer without copying them out of a shared memory section. An attacker can leverage this vulnerability to execute code under the context of the current process. Google Chrome is prone to a buffer-overflow vulnerability. Failed exploit attempts may result in a denial-of-service condition.
Versions prior to Google Chrome 41.0.2272.118 are vulnerable. Google Chrome is a web browser developed by Google (Google). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: chromium-browser security update
Advisory ID: RHSA-2015:0778-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0778.html
Issue date: 2015-04-06
CVE Names: CVE-2015-1233 CVE-2015-1234
=====================================================================
1. Summary:
Updated chromium-browser packages that fix two security issues are now
available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
Chromium is an open-source web browser, powered by WebKit (Blink).
Several flaws were found in the processing of malformed web content. A web
page containing malicious content could cause Chromium to crash or,
potentially, execute arbitrary code with the privileges of the user running
Chromium. (CVE-2015-1233, CVE-2015-1234)
All Chromium users should upgrade to these updated packages, which contain
Chromium version 41.0.2272.118, which corrects these issues. After
installing the update, Chromium must be restarted for the changes to take
effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1208422 - CVE-2015-1233 chromium-browser: combination of V8, Gamepad and IPC bugs that can lead to remote code execution
1208424 - CVE-2015-1234 chromium-browser: buffer overflow via race condition in GPU
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
Source:
chromium-browser-41.0.2272.118-1.el6_6.src.rpm
i386:
chromium-browser-41.0.2272.118-1.el6_6.i686.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.i686.rpm
x86_64:
chromium-browser-41.0.2272.118-1.el6_6.x86_64.rpm
chromium-browser-debuginfo-41.0.2272.118-1.el6_6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-1233
https://access.redhat.com/security/cve/CVE-2015-1234
https://access.redhat.com/security/updates/classification/#critical
http://googlechromereleases.blogspot.com/2015/04/stable-channel-update.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFVIpk8XlSAg2UNWIIRAqvfAJ4gF/bAUqQnIGEvpjz2gm98etxcJQCdEYz1
RYA4PeHRl1iWQQ2YMJdo6rg=
=oA8r
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ============================================================================
Ubuntu Security Notice USN-2556-1
April 07, 2015
oxide-qt vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Oxide.
Software Description:
- oxide-qt: Web browser engine library for Qt (QML plugin)
Details:
It was discovered that Chromium did not properly handle the interaction
of IPC, the gamepad API and V8. (CVE-2015-1233)
A buffer overflow was discovered in the GPU service. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash. (CVE-2015-1234)
It was discovered that Oxide did not correctly manage the lifetime of
BrowserContext, resulting in a potential use-after-free in some
circumstances. (CVE-2015-1317)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
liboxideqtcore0 1.5.6-0ubuntu0.14.10.1
Ubuntu 14.04 LTS:
liboxideqtcore0 1.5.6-0ubuntu0.14.04.2
In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Chromium: Multiple vulnerabilities
Date: June 23, 2015
Bugs: #545300, #546728, #548108, #549944
ID: 201506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been fixed in Chromium, the worst of
which can cause arbitrary remote code execution.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 43.0.2357.65 >= 43.0.2357.65
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-43.0.2357.65"
References
==========
[ 1 ] CVE-2015-1233
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233
[ 2 ] CVE-2015-1234
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234
[ 3 ] CVE-2015-1235
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235
[ 4 ] CVE-2015-1236
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236
[ 5 ] CVE-2015-1237
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237
[ 6 ] CVE-2015-1238
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238
[ 7 ] CVE-2015-1240
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240
[ 8 ] CVE-2015-1241
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241
[ 9 ] CVE-2015-1242
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242
[ 10 ] CVE-2015-1243
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243
[ 11 ] CVE-2015-1244
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244
[ 12 ] CVE-2015-1245
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245
[ 13 ] CVE-2015-1246
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246
[ 14 ] CVE-2015-1247
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247
[ 15 ] CVE-2015-1248
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248
[ 16 ] CVE-2015-1250
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250
[ 17 ] CVE-2015-1251
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251
[ 18 ] CVE-2015-1252
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252
[ 19 ] CVE-2015-1253
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253
[ 20 ] CVE-2015-1254
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254
[ 21 ] CVE-2015-1255
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255
[ 22 ] CVE-2015-1256
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256
[ 23 ] CVE-2015-1257
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257
[ 24 ] CVE-2015-1258
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258
[ 25 ] CVE-2015-1259
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259
[ 26 ] CVE-2015-1260
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260
[ 27 ] CVE-2015-1262
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262
[ 28 ] CVE-2015-1263
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263
[ 29 ] CVE-2015-1264
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264
[ 30 ] CVE-2015-1265
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201506-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5