VARIoT IoT vulnerabilities database
| VAR-201502-0120 | CVE-2015-0584 | Cisco Desktop Collaboration Experience DX650 Endpoint image-upgrade Any in the implementation of OS Command execution vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The image-upgrade implementation on Cisco Desktop Collaboration Experience (aka Collaboration Desk Experience or DX) DX650 endpoints allows local users to execute arbitrary OS commands via an unspecified parameter, aka Bug ID CSCus38947. Vendors have confirmed this vulnerability Bug ID CSCus38947 It is released as.By the local user via any unspecified parameters OS The command may be executed. The basic system is Android. The Cisco Desktop Collaboration Experience DX650 has a command injection vulnerability that allows an attacker to exploit a vulnerability to inject shell commands and execute it because the image update feature does not adequately filter input during the upgrade.
Successfully exploiting this issue may allow an attacker to execute arbitrary commands in context of the affected application.
This issue is being tracked by Cisco bug ID CSCus38947
| VAR-201502-0154 | CVE-2015-0628 | Cisco Web Security Vulnerability that bypasses proxy restrictions in the proxy engine of appliance devices |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The proxy engine on Cisco Web Security Appliance (WSA) devices allows remote attackers to bypass intended proxying restrictions via a malformed HTTP method, aka Bug ID CSCus79174. The Cisco Web Security Appliance is a secure Web gateway that integrates malware protection, application visualization control, policy control, and more on a single platform. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCus79174. The vulnerability is caused by the program not properly handling malformed HTTP methods
| VAR-201502-0063 | CVE-2015-1515 | SoftSphere DefenseWall Personal Firewall of dwall.sys Vulnerability to write data to arbitrary memory area in driver |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The dwall.sys driver in SoftSphere DefenseWall Personal Firewall 3.24 allows local users to write data to arbitrary memory locations, and consequently gain privileges, via a crafted 0x00222000, 0x00222004, 0x00222008, 0x0022200c, or 0x00222010 IOCTL call. SoftSphere DefenseWall Personal Firewall is prone to a local privilege-escalation.
SoftSphere DefenseWall Personal Firewall 3.24 is vulnerable; other versions may also be affected
| VAR-201502-0355 | CVE-2015-0331 | Adobe Flash Player Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322. This vulnerability CVE-2015-0313 , CVE-2015-0315 , CVE-2015-0320 ,and CVE-2015-0322 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use-after-free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of an invalid m3u8 playlist. By manipulating this playlist an attacker can force a dangling pointer to be reused after it has been freed. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers
| VAR-201502-0150 | CVE-2015-0622 | Cisco Wireless LAN Controller Run on device Wireless Intrusion Detection Service disruption in functionality (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Wireless Intrusion Detection (aka WIDS) functionality on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device outage) via crafted packets that are improperly handled during rendering of the Signature Events Summary page, aka Bug ID CSCus46861.
Attackers can exploit this issue to restart the affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCus46861
| VAR-201502-0151 | CVE-2015-0623 | Cisco Web Security The appliance Run on device Administrator Report page cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the Administrator report page on Cisco Web Security Appliance (WSA) devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCus40627. Vendors have confirmed this vulnerability Bug ID CSCus40627 It is released as.By any third party Web Script or HTML May be inserted. The Cisco Web Security Appliance is a secure Web gateway that integrates malware protection, application visualization control, policy control, and more on a single platform.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCus40627
| VAR-201502-0153 | CVE-2015-0626 | Cisco Hosted Collaboration Solution of SOAP Vulnerabilities that gain access rights in the interface |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The SOAP interface in Cisco Hosted Collaboration Solution (HCS) allows remote attackers to obtain access to system-management tools via crafted Challenge SOAP calls, aka Bug ID CSCuc38114.
Attackers can exploit this issue to gain unauthorized access and obtain sensitive information. This may aid in further attacks.
This issue is being tracked by Cisco bug ID CSCuc38114. The solution includes products such as Cisco TelePresence, Customer Collaboration (Contact Center) and Unified Communications to support customers to use collaboration technology in public cloud, private cloud and hybrid cloud models
| VAR-201502-0366 | CVE-2015-1349 | ISC BIND named Process Resource Management Error Vulnerability |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use. ISC BIND is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to crash the affected application, denying service to legitimate users. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: bind security update
Advisory ID: RHSA-2015:0672-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-0672.html
Issue date: 2015-03-10
CVE Names: CVE-2015-1349
=====================================================================
1. Summary:
Updated bind packages that fix one security issue are now available for Red
Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
A flaw was found in the way BIND handled trust anchor management. (CVE-2015-1349)
Red Hat would like to thank ISC for reporting this issue.
All bind users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the BIND daemon (named) will be restarted automatically.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1193820 - CVE-2015-1349 bind: issue in trust anchor management can cause named to crash
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
bind-9.8.2-0.30.rc1.el6_6.2.src.rpm
i386:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.i686.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386:
bind-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.i686.rpm
x86_64:
bind-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source:
bind-9.8.2-0.30.rc1.el6_6.2.src.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64:
bind-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
bind-9.8.2-0.30.rc1.el6_6.2.src.rpm
i386:
bind-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.i686.rpm
ppc64:
bind-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.ppc.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.ppc.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
s390x:
bind-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.s390.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.s390.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
x86_64:
bind-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.i686.rpm
ppc64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.ppc.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.ppc.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.ppc64.rpm
s390x:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.s390.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.s390.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.s390x.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
bind-9.8.2-0.30.rc1.el6_6.2.src.rpm
i386:
bind-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.i686.rpm
x86_64:
bind-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-chroot-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-libs-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-utils-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.i686.rpm
x86_64:
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-debuginfo-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.i686.rpm
bind-devel-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
bind-sdb-9.8.2-0.30.rc1.el6_6.2.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source:
bind-9.9.4-18.el7_1.1.src.rpm
noarch:
bind-license-9.9.4-18.el7_1.1.noarch.rpm
x86_64:
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-9.9.4-18.el7_1.1.i686.rpm
bind-libs-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-lite-9.9.4-18.el7_1.1.i686.rpm
bind-libs-lite-9.9.4-18.el7_1.1.x86_64.rpm
bind-utils-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bind-9.9.4-18.el7_1.1.x86_64.rpm
bind-chroot-9.9.4-18.el7_1.1.x86_64.rpm
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-devel-9.9.4-18.el7_1.1.i686.rpm
bind-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-lite-devel-9.9.4-18.el7_1.1.i686.rpm
bind-lite-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
bind-9.9.4-18.el7_1.1.src.rpm
noarch:
bind-license-9.9.4-18.el7_1.1.noarch.rpm
x86_64:
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-9.9.4-18.el7_1.1.i686.rpm
bind-libs-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-lite-9.9.4-18.el7_1.1.i686.rpm
bind-libs-lite-9.9.4-18.el7_1.1.x86_64.rpm
bind-utils-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bind-9.9.4-18.el7_1.1.x86_64.rpm
bind-chroot-9.9.4-18.el7_1.1.x86_64.rpm
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-devel-9.9.4-18.el7_1.1.i686.rpm
bind-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-lite-devel-9.9.4-18.el7_1.1.i686.rpm
bind-lite-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
bind-9.9.4-18.el7_1.1.src.rpm
noarch:
bind-license-9.9.4-18.el7_1.1.noarch.rpm
ppc64:
bind-9.9.4-18.el7_1.1.ppc64.rpm
bind-chroot-9.9.4-18.el7_1.1.ppc64.rpm
bind-debuginfo-9.9.4-18.el7_1.1.ppc.rpm
bind-debuginfo-9.9.4-18.el7_1.1.ppc64.rpm
bind-libs-9.9.4-18.el7_1.1.ppc.rpm
bind-libs-9.9.4-18.el7_1.1.ppc64.rpm
bind-libs-lite-9.9.4-18.el7_1.1.ppc.rpm
bind-libs-lite-9.9.4-18.el7_1.1.ppc64.rpm
bind-utils-9.9.4-18.el7_1.1.ppc64.rpm
s390x:
bind-9.9.4-18.el7_1.1.s390x.rpm
bind-chroot-9.9.4-18.el7_1.1.s390x.rpm
bind-debuginfo-9.9.4-18.el7_1.1.s390.rpm
bind-debuginfo-9.9.4-18.el7_1.1.s390x.rpm
bind-libs-9.9.4-18.el7_1.1.s390.rpm
bind-libs-9.9.4-18.el7_1.1.s390x.rpm
bind-libs-lite-9.9.4-18.el7_1.1.s390.rpm
bind-libs-lite-9.9.4-18.el7_1.1.s390x.rpm
bind-utils-9.9.4-18.el7_1.1.s390x.rpm
x86_64:
bind-9.9.4-18.el7_1.1.x86_64.rpm
bind-chroot-9.9.4-18.el7_1.1.x86_64.rpm
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-9.9.4-18.el7_1.1.i686.rpm
bind-libs-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-lite-9.9.4-18.el7_1.1.i686.rpm
bind-libs-lite-9.9.4-18.el7_1.1.x86_64.rpm
bind-utils-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
bind-9.9.4-18.ael7b_1.1.src.rpm
noarch:
bind-license-9.9.4-18.ael7b_1.1.noarch.rpm
ppc64le:
bind-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-chroot-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-debuginfo-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-libs-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-libs-lite-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-utils-9.9.4-18.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bind-debuginfo-9.9.4-18.el7_1.1.ppc.rpm
bind-debuginfo-9.9.4-18.el7_1.1.ppc64.rpm
bind-devel-9.9.4-18.el7_1.1.ppc.rpm
bind-devel-9.9.4-18.el7_1.1.ppc64.rpm
bind-lite-devel-9.9.4-18.el7_1.1.ppc.rpm
bind-lite-devel-9.9.4-18.el7_1.1.ppc64.rpm
bind-sdb-9.9.4-18.el7_1.1.ppc64.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.ppc64.rpm
s390x:
bind-debuginfo-9.9.4-18.el7_1.1.s390.rpm
bind-debuginfo-9.9.4-18.el7_1.1.s390x.rpm
bind-devel-9.9.4-18.el7_1.1.s390.rpm
bind-devel-9.9.4-18.el7_1.1.s390x.rpm
bind-lite-devel-9.9.4-18.el7_1.1.s390.rpm
bind-lite-devel-9.9.4-18.el7_1.1.s390x.rpm
bind-sdb-9.9.4-18.el7_1.1.s390x.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.s390x.rpm
x86_64:
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-devel-9.9.4-18.el7_1.1.i686.rpm
bind-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-lite-devel-9.9.4-18.el7_1.1.i686.rpm
bind-lite-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64le:
bind-debuginfo-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-devel-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-lite-devel-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-sdb-9.9.4-18.ael7b_1.1.ppc64le.rpm
bind-sdb-chroot-9.9.4-18.ael7b_1.1.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
bind-9.9.4-18.el7_1.1.src.rpm
noarch:
bind-license-9.9.4-18.el7_1.1.noarch.rpm
x86_64:
bind-9.9.4-18.el7_1.1.x86_64.rpm
bind-chroot-9.9.4-18.el7_1.1.x86_64.rpm
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-9.9.4-18.el7_1.1.i686.rpm
bind-libs-9.9.4-18.el7_1.1.x86_64.rpm
bind-libs-lite-9.9.4-18.el7_1.1.i686.rpm
bind-libs-lite-9.9.4-18.el7_1.1.x86_64.rpm
bind-utils-9.9.4-18.el7_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bind-debuginfo-9.9.4-18.el7_1.1.i686.rpm
bind-debuginfo-9.9.4-18.el7_1.1.x86_64.rpm
bind-devel-9.9.4-18.el7_1.1.i686.rpm
bind-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-lite-devel-9.9.4-18.el7_1.1.i686.rpm
bind-lite-devel-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-9.9.4-18.el7_1.1.x86_64.rpm
bind-sdb-chroot-9.9.4-18.el7_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2015-1349
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFU/7nhXlSAg2UNWIIRArKUAJ9WX/XGIY2BbVU1+km5wJAaBaPytQCdGBnW
7ZfcyFEskWi6YX7JcLMs9Fg=
=dWCz
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Release Date: 2015-07-17
Last Updated: 2015-07-17
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP-UX running
BIND. This vulnerability could be exploited remotely to create a Denial of
Service (DoS).
References:
CVE-2015-1349
CVE-2015-4620
SSRT101976
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.31 running BIND 9.7.3 prior to C.9.7.3.7.0
HP-UX B.11.31 running BIND 9.9.4 prior to C.9.9.4.3.0
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2015-1349 (AV:N/AC:H/Au:N/C:N/I:N/A:C) 5.4
CVE-2015-4620 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided updated versions of the BIND service to resolve this
vulnerability.
BIND 9.7.3 for HP-UX Release
Depot Name
Download location
B.11.31 (PA and IA)
HP_UX_11.31_HPUX-NameServer_C.9.7.3.7.0_HP-UX_B.11.31_IA_PA.depot
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumbe
r=BIND
BIND 9.9.4 for HP-UX Release
Depot Name
Download location
B.11.31 (PA and IA)
HP_UX_11.31_HPUX-NameServer_C.9.9.4.3.0_HP-UX_B.11.31_IA_PA.depot
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumbe
r=BIND
MANUAL ACTIONS: Yes - Update
Download and install the software update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application
that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins
issued by HP and lists recommended actions that may apply to a specific HP-UX
system. It can also download patches and create a depot automatically. For
more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
For BIND 9.7.3
HP-UX B.11.31
==================
NameService.BIND-AUX
NameService.BIND-RUN
action: install revision C.9.7.3.7.0 or subsequent
For BIND 9.9.4
HP-UX B.11.31
==================
NameService.BIND-AUX
NameService.BIND-RUN
action: install revision C.9.9.4.3.0 or subsequent
END AFFECTED VERSIONS
HISTORY
Version:1 (rev.1) - 17 July 2015 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners. This can
lead to resource exhaustion and denial of service (up to and including
termination of the named server process) (CVE-2014-8500).
Jan-Piet Mens discovered that the BIND DNS server would crash when
processing an invalid DNSSEC key rollover, either due to an error
on the zone operator's part, or due to interference with network
traffic by an attacker. This issue affects configurations with the
directives "dnssec-lookaside auto;" (as enabled in the Mandriva
default configuration) or "dnssec-validation auto;" (CVE-2015-1349).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349
http://advisories.mageia.org/MGASA-2014-0524.html
http://advisories.mageia.org/MGASA-2015-0082.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
a2cf83873b09b47275d0030063a236c8 mbs2/x86_64/bind-9.10.1.P2-7.mbs2.x86_64.rpm
83d97de0884ef84b933cb06bfbbce24a mbs2/x86_64/bind-devel-9.10.1.P2-7.mbs2.x86_64.rpm
633a8a160c3be4dda5f134550288df8f mbs2/x86_64/bind-doc-9.10.1.P2-7.mbs2.noarch.rpm
40760cee0f0c97261b80d159ab60cb32 mbs2/x86_64/bind-sdb-9.10.1.P2-7.mbs2.x86_64.rpm
ec17a87a3d0e50c4a1c33c84adc0c08b mbs2/x86_64/bind-utils-9.10.1.P2-7.mbs2.x86_64.rpm
95f44b351208cfcbf15108dc707b0f21 mbs2/SRPMS/bind-9.10.1.P2-7.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
For the stable distribution (wheezy), this problem has been fixed in
version 1:9.8.4.dfsg.P1-6+nmu2+deb7u4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-09-16-4 OS X Server 5.0.3
OS X Server 5.0.3 is now available and addresses the following:
apache
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in Apache, the most serious of
which may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in Apache versions
prior to 2.4.16. These issues were addressed by updating Apache to
version 2.4.16.
CVE-ID
CVE-2013-5704
CVE-2014-3581
CVE-2014-3583
CVE-2014-8109
CVE-2015-0228
CVE-2015-0253
CVE-2015-3183
CVE-2015-3185
BIND
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in BIND, the most severe of which
may allow a remote attacker to cause a denial of service
Description: Multiple vulnerabilities existed in BIND versions prior
to 9.9.7. These issues were addressed by updating BIND to version
9.9.7.
CVE-ID
CVE-2014-8500
CVE-2015-1349
PostgreSQL
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in PostgreSQL, the most serious of
which may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in PostgreSQL versions
prior to 9.3.9. These issues were addressed by updating PostgreSQL to
version 9.3.9.
CVE-ID
CVE-2014-0067
CVE-2014-8161
CVE-2015-0241
CVE-2015-0242
CVE-2015-0243
CVE-2015-0244
CVE-2015-3165
CVE-2015-3166
CVE-2015-3167
Wiki Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple XML security issues in Wiki Server
Description: Multiple XML vulnerabilities existed in Wiki Server
based on Twisted. This issue was addressed by removing Twisted.
CVE-ID
CVE-2015-5911 : Zachary Jones of WhiteHat Security Threat Research
Center
OS X Server 5.0.3 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-15:05.bind Security Advisory
The FreeBSD Project
Topic: BIND remote denial of service vulnerability
Category: contrib
Module: bind
Announced: 2015-02-25
Credits: ISC
Affects: FreeBSD 8.x and FreeBSD 9.x.
Corrected: 2015-02-18 22:20:19 UTC (stable/9, 9.3-STABLE)
2015-02-25 05:56:54 UTC (releng/9.3, 9.3-RELEASE-p10)
2015-02-18 22:29:52 UTC (stable/8, 8.4-STABLE)
2015-02-25 05:56:54 UTC (releng/8.4, 8.4-RELEASE-p24)
CVE Name: CVE-2015-1349
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
II. Problem Description
BIND servers which are configured to perform DNSSEC validation and which
are using managed keys (which occurs implicitly when using
"dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
unpredictable behavior due to the use of an improperly initialized
variable.
III. However,
the complexity of the attack is very high unless the attacker has a
specific network relationship to the BIND server which is targeted.
IV. Workaround
Only systems that runs BIND, including recursive resolvers and authoritative
servers that performs DNSSEC validation and using managed-keys are affected.
This issue can be worked around by not using "auto" for the dnssec-validation
or dnssec-lookaside options and do not configure a managed-keys statement.
Note that in order to do DNSSEC validation with this workaround one would
have to configure an explicit trusted-keys statement with the appropriate
keys.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or
release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64
platforms can be updated via the freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/SA-15:05/bind.patch
# fetch https://security.FreeBSD.org/patches/SA-15:05/bind.patch.asc
# gpg --verify bind.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
Restart the applicable daemons, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each
affected branch.
Branch/path Revision
- -------------------------------------------------------------------------
stable/8/ r278973
releng/8.4/ r279265
stable/9/ r278972
releng/9.3/ r279265
- -------------------------------------------------------------------------
To see which files were modified by a particular revision, run the
following command, replacing NNNNNN with the revision number, on a
machine with Subversion installed:
# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
VII. ============================================================================
Ubuntu Security Notice USN-2503-1
February 18, 2015
bind9 vulnerability
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Bind could be made to crash if it received specially crafted network
traffic.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
bind9 1:9.9.5.dfsg-4.3ubuntu0.2
Ubuntu 14.04 LTS:
bind9 1:9.9.5.dfsg-3ubuntu0.2
Ubuntu 12.04 LTS:
bind9 1:9.8.1.dfsg.P1-4ubuntu0.10
In general, a standard system update will make all the necessary changes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: BIND: Denial of Service
Date: October 18, 2015
Bugs: #540640, #553584, #556150, #559462
ID: 201510-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A vulnerability in BIND could lead to a Denial of Service condition.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/bind < 9.10.2_p4 >= 9.10.2_p4
Description
===========
A vulnerability has been discovered in BIND's named utility leading to
a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All BIND users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/bind-9.10.2_p4"
References
==========
[ 1 ] CVE-2015-1349
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1349
[ 2 ] CVE-2015-4620
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4620
[ 3 ] CVE-2015-5477
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5477
[ 4 ] CVE-2015-5722
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5722
[ 5 ] CVE-2015-5986
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5986
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201510-01
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201502-0508 | No CVE | Multiple NetGear Routers SOAP Service Verification Bypass Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
NetGear WNDR3700v4, WNR2200 and WNR2500 are all wireless router products of NetGear.
A remote authentication bypass vulnerability exists in several NetGear routers. An attacker could use this vulnerability to bypass the authentication mechanism and obtain potentially sensitive information. The following products and versions are affected: NetGear WNDR3700v4 V1.0.0.4SH version, WNDR3700v4 V1.0.1.52 version, WNR2200 V1.0.1.88 version, WNR2500 V1.0.0.24 version
| VAR-201502-0149 | CVE-2015-0621 | Cisco TelePresence MCU Service disruption in device software (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence MCU devices with software 4.5(1.45) allow remote attackers to cause a denial of service (device reload) via an unspecified series of TCP packets, aka Bug ID CSCur50347. Vendors have confirmed this vulnerability Bug ID CSCur50347 It is released as. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. Cisco TelePresence Multipoint Control Unit is prone to a denial-of-service vulnerability.
An attacker can exploit this issue to reload the device, denying service to legitimate users
| VAR-201502-0145 | CVE-2015-0617 | Cisco ASR 5500 System Architecture Evolution Gateway Service disruption on devices (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Cisco ASR 5500 System Architecture Evolution (SAE) Gateway devices allow remote attackers to cause a denial of service (CPU consumption and SNMP outage) via malformed SNMP packets, aka Bug ID CSCur13393. The Cisco ASR 5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). A denial of service vulnerability exists in the Cisco ASR 5000 Series Software. The SNMP code of the gateway fails to properly verify SNMP packets, allowing an attacker to exploit this vulnerability to send a specially crafted SNMP message to crash the SNMP process.
Successful exploitation of the issue will cause excessive CPU consumption, resulting in a denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCur13393
| VAR-201502-0148 | CVE-2015-0620 | Cisco TelePresence Management Suite of XML Service disruption in parsers (DoS) Vulnerabilities |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The XML parser in Cisco TelePresence Management Suite (TMS) 14.3(.2) and earlier does not properly handle external entities, which allows remote authenticated users to cause a denial of service via POST requests, aka Bug ID CSCus51494. Vendors have confirmed this vulnerability Bug ID CSCus51494 It is released as.By a remotely authenticated user POST Service disruption via request (DoS) There is a possibility of being put into a state.
Attackers can exploit this issue to obtain potentially sensitive information or cause a denial-of-service condition. This may lead to further attacks.
This issue is being tracked by Cisco Bug ID CSCus51494. Cisco TelePresence Management Suite (TMS) is a telepresence management suite product of Cisco (Cisco), which is convenient for large-scale configuration of TelePresence and more transparent integration. A remote attacker could exploit this vulnerability by sending a POST request to cause a denial of service
| VAR-201502-0214 | CVE-2014-8023 | Cisco Adaptive Security Appliance Software Vulnerabilities in which access restrictions to resources are bypassed |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Cisco Adaptive Security Appliance (ASA) Software 9.2(.3) and earlier, when challenge-response authentication is used, does not properly select tunnel groups, which allows remote authenticated users to bypass intended resource-access restrictions via a crafted tunnel-group parameter, aka Bug ID CSCtz48533. Vendors have confirmed this vulnerability Bug ID CSCtz48533 It is released as.Crafted by remotely authenticated users tunnel-group Access to resources may be circumvented via parameters.
An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks.
This issue is tracked by Cisco Bug ID CSCtz48533
| VAR-201502-0017 | CVE-2014-9375 | Lexmark Markvision Enterprise of LibraryFileUploadServlet Directory traversal vulnerability in servlets |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Directory traversal vulnerability in the LibraryFileUploadServlet servlet in Lexmark Markvision Enterprise allows remote authenticated users to write to and execute arbitrary files via a .. (dot dot) in a file path in a ZIP archive. Authentication is not required to exploit this vulnerability. The specific flaw exists within the LibraryFileUploadServlet servlet. An attacker could leverage this to execute arbitrary code as SYSTEM. Lexmark Markvision Enterprise is a web-based network device management software from Lexmark. This software is mainly used to manage network devices such as printers, such as providing some printer drivers for Unix systems. Failed attacks may cause a denial-of-service condition
| VAR-201502-0367 | CVE-2015-1355 | Siemens SIMATIC STEP 7 Sensitive Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 uses a weak password-hash algorithm, which makes it easier for local users to determine cleartext passwords by reading a project file and conducting a brute-force attack. Siemens SIMATIC is an automation software in a single engineering environment. Siemens SIMATIC STEP 7 TIA Portal is prone to an information-disclosure vulnerability.
Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
Versions prior to SIMATIC STEP 7 TIA Portal V13 SP1 are vulnerable. The software provides PLC programming, design option packages, advanced drive technology and more
| VAR-201502-0368 | CVE-2015-1356 | Siemens SIMATIC STEP 7 Security Bypass Vulnerability |
CVSS V2: 4.4 CVSS V3: - Severity: MEDIUM |
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of project-file fields that lack integrity protection, which allows remote attackers to establish arbitrary authorization data via a modified file. Siemens SIMATIC is an automation software in a single engineering environment. Siemens SIMATIC STEP 7 is prone to a a security-bypass vulnerability.
Attackers can exploit this issue to perform unauthorized actions with elevated privileges.
Versions prior to SIMATIC STEP 7 V13 SP1 are vulnerable. Siemens SIMATIC STEP 7 (TIA Portal) is a set of programming software for SIMATIC controllers from Siemens, Germany. The software provides PLC programming, design option packages, advanced drive technology and more
| VAR-201502-0370 | CVE-2015-1358 | Siemens SIMATIC WinCC TIA Portal Man-in-the-middle information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The remote-management module in the (1) Multi Panels, (2) Comfort Panels, and (3) RT Advanced functionality in Siemens SIMATIC WinCC (TIA Portal) before 13 SP1 and in the (4) panels and (5) runtime functionality in SIMATIC WinCC flexible before 2008 SP3 Up7 does not properly encrypt credentials in transit, which makes it easier for remote attackers to determine cleartext credentials by sniffing the network and conducting a decryption attack. Siemens SIMATIC WinCC is a monitoring control and data acquisition SCADA and human machine interface HMI system. An information disclosure vulnerability exists in Siemens SIMATIC WinCC V13 SP1 that could allow an attacker to obtain sensitive information through man-in-the-middle attacks.
Versions prior to Siemens SIMATIC WinCC TIA Portal V13 SP1 are vulnerable. The vulnerability stems from the fact that the program does not properly encrypt the certificate in transmission. A remote attacker could exploit this vulnerability by sniffing the network and performing a decryption attack to obtain clear text certificates
| VAR-201708-0199 | CVE-2015-1600 | Netatmo Indoor Module Information disclosure vulnerability in firmware |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Information disclosure vulnerability in Netatmo Indoor Module firmware 100 and earlier.
Successful exploits may allow an attacker to gain access to sensitive information that may aid in further attacks. Netatmo Indoor Module is an indoor environment monitoring equipment produced by French company Netatmo. Summary
During initial setup, the weather station will submit its complete configuration unencrypted to the manufacturer cloud service. This configuration includes confidential information like the user's Wifi password.
The problem has been fixed by removing this configuration dump from current firmware versions.
CVE: CVE-2015-1600.
Additional Details: https://isc.sans.edu/forums/diary/Did+You+Remove+That+Debug+Code+Netatmo+Weather+Station+Sending+WPA+Passphrase+in+the+Clear/19327/
Manufacturers web site: www.netatmo.com
Patch: Affected systems will download updated firmware automatically from Netatmo's cloud service
| VAR-201502-0202 | CVE-2015-2052 | D-Link DIR-645 Wired/Wireless Router firmware stack-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary code via a long string in a GetDeviceSettings action to the HNAP interface. The D-Link DIR-645 is a D-Link router that regulates wireless transmit power. Ax. D-Link DIR-645 has command injection and buffer overflow vulnerabilities that allow malicious applications to perform buffer overflow attacks, execute arbitrary commands, and inject arbitrary commands through the HNAP interface. D-Link DIR-645 is prone to a command-injection and a stack-based buffer-overflow vulnerability. Ax with firmware 1.04b12 and earlier. The vulnerability stems from the fact that the program does not adequately filter the input submitted by the user when processing the GetDeviceSettings request
| VAR-201502-0142 | CVE-2015-0609 | Cisco IOS of Measurement Implementation of Common Classification Engine Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Race condition in the Common Classification Engine (CCE) in the Measurement, Aggregation, and Correlation Engine (MACE) implementation in Cisco IOS 15.4(2)T3 and earlier allows remote attackers to cause a denial of service (device reload) via crafted network traffic that triggers improper handling of the timing of process switching and Cisco Express Forwarding (CEF) switching, aka Bug ID CSCuj96752. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A denial of service vulnerability exists in Cisco IOS Software that could allow an attacker to reinstall a device and deny service to a legitimate user. Cisco IOS Software is prone to a denial-of-service vulnerability.
This issue is being tracked by Cisco Bug ID CSCuj96752. Measurement, Aggregation, and Correlation Engine (MACE) is one of the functions for measuring and analyzing network packets