VARIoT IoT vulnerabilities database
| VAR-201411-0036 | CVE-2014-0584 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590. This vulnerability CVE-2014-0577 , CVE-2014-0585 , CVE-2014-0586 ,and CVE-2014-0590 Is a different vulnerability.Unspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0037 | CVE-2014-0585 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0586, and CVE-2014-0590. This vulnerability CVE-2014-0577 , CVE-2014-0584 , CVE-2014-0586 ,and CVE-2014-0590 Is a different vulnerability.Unspecified by attacker " Mixing of molds (type confusion)" May be used to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0034 | CVE-2014-0582 | Adobe Flash Player and Adobe AIR Heap-based buffer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0589. This vulnerability CVE-2014-0589 Is a different vulnerability.An attacker could execute arbitrary code. Failed exploit attempts likely result in denial-of-service conditions. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0033 | CVE-2014-0581 | Adobe Flash Player and Adobe AIR Vulnerable to arbitrary code execution |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-8440, and CVE-2014-8441. This vulnerability CVE-2014-0576 , CVE-2014-8440 ,and CVE-2014-8441 Is a different vulnerability.An attacker could execute arbitrary code or cause a denial of service ( Memory corruption ) There is a possibility of being put into a state.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Security flaws exist in several Adobe products. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:1852-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1852.html
Issue date: 2014-11-13
CVE Names: CVE-2014-0573 CVE-2014-0574 CVE-2014-0576
CVE-2014-0577 CVE-2014-0581 CVE-2014-0582
CVE-2014-0584 CVE-2014-0585 CVE-2014-0586
CVE-2014-0588 CVE-2014-0589 CVE-2014-0590
CVE-2014-8437 CVE-2014-8438 CVE-2014-8440
CVE-2014-8441
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes multiple security issues
is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-24,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0573, CVE-2014-0574, CVE-2014-0576, CVE-2014-0577,
CVE-2014-0581, CVE-2014-0582, CVE-2014-0584, CVE-2014-0585, CVE-2014-0586,
CVE-2014-0588, CVE-2014-0589, CVE-2014-0590, CVE-2014-8438, CVE-2014-8440,
CVE-2014-8441)
This update also fixes an information disclosure flaw in flash-plugin that
could allow a remote attacker to obtain a victim's session cookie.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1162911 - flash-plugin: multiple code execution flaws (APSB14-24)
1162912 - CVE-2014-8437 flash-plugin: information disclosure leading to session token leak (APSB14-24)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.418-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.418-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux HPC Node Supplementary (v. 6):
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.418-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.418-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2014-0573
https://access.redhat.com/security/cve/CVE-2014-0574
https://access.redhat.com/security/cve/CVE-2014-0576
https://access.redhat.com/security/cve/CVE-2014-0577
https://access.redhat.com/security/cve/CVE-2014-0581
https://access.redhat.com/security/cve/CVE-2014-0582
https://access.redhat.com/security/cve/CVE-2014-0584
https://access.redhat.com/security/cve/CVE-2014-0585
https://access.redhat.com/security/cve/CVE-2014-0586
https://access.redhat.com/security/cve/CVE-2014-0588
https://access.redhat.com/security/cve/CVE-2014-0589
https://access.redhat.com/security/cve/CVE-2014-0590
https://access.redhat.com/security/cve/CVE-2014-8437
https://access.redhat.com/security/cve/CVE-2014-8438
https://access.redhat.com/security/cve/CVE-2014-8440
https://access.redhat.com/security/cve/CVE-2014-8441
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-24.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iD8DBQFUY/m4XlSAg2UNWIIRAnucAJ9FEEr9ZDeoe7/BF77dhXKgzSPf1wCgkdhn
8zFraVcUPA+vpzzYwVjX5LE=
=L7wt
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.418"
References
==========
[ 1 ] CVE-2014-0558
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0558
[ 2 ] CVE-2014-0564
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0564
[ 3 ] CVE-2014-0569
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0569
[ 4 ] CVE-2014-0573
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0573
[ 5 ] CVE-2014-0574
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0574
[ 6 ] CVE-2014-0576
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0576
[ 7 ] CVE-2014-0577
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0577
[ 8 ] CVE-2014-0581
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0581
[ 9 ] CVE-2014-0582
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0582
[ 10 ] CVE-2014-0583
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0583
[ 11 ] CVE-2014-0584
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0584
[ 12 ] CVE-2014-0585
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0585
[ 13 ] CVE-2014-0586
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0586
[ 14 ] CVE-2014-0588
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0588
[ 15 ] CVE-2014-0589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0589
[ 16 ] CVE-2014-0590
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0590
[ 17 ] CVE-2014-8437
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8437
[ 18 ] CVE-2014-8438
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8438
[ 19 ] CVE-2014-8440
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8440
[ 20 ] CVE-2014-8441
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8441
[ 21 ] CVE-2014-8442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8442
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201411-06.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201411-0146 | CVE-2014-4078 | Microsoft IIS of IP Vulnerability to bypass ruleset of wildcard domain restriction in security function |
CVSS V2: 5.1 CVSS V3: - Severity: MEDIUM |
The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability.". Microsoft Internet Information Services is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access; this may aid in launching further attacks. The title has been changed to better reflect the vulnerability information
| VAR-201802-0099 | CVE-2014-8985 | Microsoft Internet Explorer 11 Vulnerabilities in arbitrary code execution |
CVSS V2: 7.6 CVSS V3: 7.5 Severity: HIGH |
Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2810, CVE-2014-2811, CVE-2014-2822, CVE-2014-2823, CVE-2014-4057, and CVE-2014-4145.
An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access; this may aid in launching further attacks. The title has been changed to better reflect the vulnerability information
| VAR-201411-0246 | CVE-2014-7991 | Cisco Unified Communications Manager of Remote Mobile Access Subsystem In VCS core Device forgery vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376. Cisco Unified Communications Manager is prone to a security-bypass vulnerability.
An attacker can exploit this issue to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCuq86376. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution. There is a security vulnerability in the Remote Mobile Access Subsystem of CUCM 10.0(1) and earlier versions. The vulnerability is caused by the fact that the program does not correctly verify the Subject Alternative Name (SAN) field of the X.509 certificate
| VAR-201411-0175 | CVE-2014-8652 | Elipse E3 Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Elipse E3 3.x and earlier allows remote attackers to cause a denial of service (application crash and plant outage) via a rapid series of HTTP requests to index.html on TCP port 1681. The Elipse E3 is a monitoring control and data acquisition system. Elipse has a denial of service vulnerability. An attacker could exploit this vulnerability to initiate a denial of service attack.
E3 3.2 and prior versions are vulnerable. Elipse Software E3 is a set of HMI/SCADA platform that provides support for distributed applications, mission-critical applications and control centers from Elipse Software in Brazil
| VAR-201501-0590 | CVE-2014-10026 | D-Link DAP-1360 Router firmware index.cgi Vulnerabilities that bypass authentication |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
index.cgi in D-Link DAP-1360 with firmware 2.5.4 and earlier allows remote attackers to bypass authentication and obtain sensitive information by setting the client_login cookie to admin. The D-Link DAP-1360 is a wireless router. D-Link DAP-1360 is prone to multiple cross-site request-forgery vulnerabilities and an information-disclosure vulnerability. D-Link DAP-1360 is a wireless access point product (AP) of D-Link. A security vulnerability exists in the index.cgi file in D-Link DAP-1360 routers with firmware version 2.5.4 and earlier
| VAR-201411-0466 | CVE-2014-8580 | Citrix NetScaler Application Delivery Controller and NetScaler Gateway Vulnerability in accessing network resources of other users |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Citrix NetScaler Application Delivery Controller and NetScaler Gateway 10.5.50.10 before 10.5-52.11, 10.1.122.17 before 10.1-129.11, and 10.1-120.1316.e before 10.1-129.1105.e, when using unspecified configurations, allows remote authenticated users to access "network resources" of other users via unknown vectors. The following products and versions are affected: Citrix NetScaler ADC and NetScaler Gateway versions 10.5.50.10 and 10.5.51.10, 10.1.122.17 through 10.1.128.8, 10.1-120.1316.e through 10.1-128.8003.e
| VAR-201411-0243 | CVE-2014-7988 | Cisco Unity Connection of Unified Messaging Service Vulnerability in which important information is obtained |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Unified Messaging Service (UMS) in Cisco Unity Connection 10.5 and earlier allows remote authenticated users to obtain sensitive information by reading log files, aka Bug ID CSCur06493. Cisco Unity Connection is a comprehensive IP communications system consisting of voice, video, data and mobile products and applications. Allows an attacker to exploit this vulnerability to view log-sensitive information. Cisco Unity Connection is a set of voice message platform of Cisco (Cisco), which can use voice commands to make calls or listen to messages in a "hands-free" manner
| VAR-201411-0559 | No CVE | ZTE Modem ZXDSL Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
ZTE ZXDSL is an ADSL device. ZTE Modem ZXDSL has a cross-site scripting vulnerability that allows an attacker to initiate a cross-site scripting attack.
| VAR-201411-0535 | No CVE | Citrix Systems NetScaler SOAP Handler Memory corruption vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Citrix Systems NetScaler is a versatile web application delivery controller from Citrix Systems, Inc., which can be used to optimize, secure, and control the delivery of all enterprise and cloud services.
A memory corruption vulnerability exists in Citrix Systems NetScaler. An attacker could use this vulnerability to execute arbitrary code in the context of an application or cause a denial of service. Failed attacks may cause a denial-of-service condition
| VAR-201411-0143 | CVE-2014-1635 | Belkin N750 Router F9K1103 Firmware MiniHttpd Vulnerable to buffer overflow |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Buffer overflow in login.cgi in MiniHttpd in Belkin N750 Router with firmware before F9K1103_WW_1.10.17m allows remote attackers to execute arbitrary code via a long string in the jump parameter. The Belkin N750 DB Wi-Fi Gigabit Router is a router that combines multiple video streams with up to 900 Mbps of wireless network connectivity and multi-player online game speed + routing speed. The Belkin N750 DB Wi-Fi Gigabit Router has a buffer overflow vulnerability due to the program not fully checking the user-supplied data. An attacker could exploit this vulnerability to execute arbitrary code or initiate a denial of service on an affected device. Belkin N750 is a dual-band wireless router product of Belkin. MiniHttpd is an embedded HTTP web server for it
| VAR-201411-0244 | CVE-2014-7989 | Cisco Unified Computing System B Vulnerability in which shell privileges are acquired on a series blade server |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cisco Unified Computing System on B-Series blade servers allows local users to gain shell privileges via a crafted (1) ping6 or (2) traceroute6 command, aka Bug ID CSCuq38176.
Local attackers can exploit these issues to execute arbitrary commands with root privileges.
This issue is being tracked by Cisco Bug ID CSCuq38176
| VAR-201411-0245 | CVE-2014-7990 | plural Cisco Runs on the device Cisco IOS XE In Linux of root Vulnerability for which access rights are acquired |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cisco IOS XE 3.5E and earlier on WS-C3850, WS-C3860, and AIR-CT5760 devices does not properly parse the "request system shell" challenge response, which allows local users to obtain Linux root access by leveraging administrative privilege, aka Bug ID CSCur09815. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. The Cisco IOS XE software has a local security bypass vulnerability that an attacker can use to bypass certain security restrictions and perform unauthorized operations in an affected system environment.
This issue is being tracked by Cisco Bug ID CSCur09815. The vulnerability is caused by the program not correctly parsing the 'request system shell' challenge response
| VAR-201411-0186 | CVE-2014-8663 | SAP NetWeaver Business Warehouse of Data Basis In SQL Injection vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
SQL injection vulnerability in Data Basis (BW-WHM-DBA) in SAP NetWeaver Business Warehouse allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database
| VAR-201411-0115 | CVE-2014-9021 |
ZTE ZXDSL 831 Vulnerable to cross-site scripting
Related entries in the VARIoT exploits database: VAR-E-201411-0052 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in ZTE ZXDSL 831 allow remote attackers to inject arbitrary web script or HTML via the (1) tr69cAcsURL, (2) tr69cAcsUser, (3) tr69cAcsPwd, (4) tr69cConnReqPwd, or (5) tr69cDebugEnable parameter to the TR-069 client page (tr69cfg.cgi); the (6) timezone parameter to the Time and date page (sntpcfg.sntp); or the (7) hostname parameter in a save action to the Quick Stats page (psilan.cgi). NOTE: this issue was SPLIT from CVE-2014-9020 per ADT1 due to different affected products and codebases. ZTE ZXDSL 831 Contains a cross-site scripting vulnerability. CVE-2014-9020 It was divided from.By any third party, via the following parameters Web Script or HTML May be inserted. ZXDSL831 is an ADSL modem produced by ZTE Corporation. It is a modem with routing function, which can be called a cat routing machine. ZTE ZXDSL 831 has multiple HTML injection vulnerabilities. An attacker could exploit this vulnerability to steal cookies and obtain sensitive information. ZTE ZXDSL 831 is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible. # Exploit Title: ZTE ZXDSL 831 Multiple Cross Site Scripting
# Date: 11/3/2014
# Exploit Author: Paulos Yibelo
# Vendor Homepage: zte.com.cn
# Software Link: -
# Version: -
# Tested on: Windows 7
# CVE :-
TR-069 Client page: Stored
| VAR-201411-0114 | CVE-2014-9020 |
ZTE ZXDSL 831 and 831CII of Quick Stats Page cross-site scripting vulnerability
Related entries in the VARIoT exploits database: VAR-E-201411-0052 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the Quick Stats page (psilan.cgi) in ZTE ZXDSL 831 and 831CII allows remote attackers to inject arbitrary web script or HTML via the domainname parameter in a save action. NOTE: this issue was SPLIT from CVE-2014-9021 per ADT1 due to different affected products and codebases. The ZTE 831CII is a router device. ZTE 831CII has HTML injection, cross-site request forgery, clickjacking, information disclosure, and unauthorized access vulnerabilities, allowing remote attackers to perform certain administrative operations, execute arbitrary scripts or HTML code in the browser context, or steal cookie-based authentication certificates. ZTE 831CII is prone to the following security vulnerabilities:
1. An HTML-injection vulnerability
2. A cross-site request-forgery vulnerability
3. An unspecified clickjacking vulnerability
4. An information-disclosure vulnerability
5. Other attacks are also possible. Both ZTE ZXDSL 831 and 831CII are ADSL modem (Modem) products of China ZTE Corporation. Hardcoded default misconfiguration - The modem comes with admin:admin user credintials.
Stored XSS - http://192.168.1.1/psilan.cgi?action=saveðIpAddress=192.168.1.1ðSubnetMask=255.255.255.0&hostname=ZXDSL83C1II&domainname=home%27;alert%280%29;//&enblUpnp=1&enblLan2=0
Any user browsing to http://192.168.1.1/main.html will have a stored xss executed!
CSRF based Stored XSS - http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=%27;alert%280%29;//&sysPassword=37F6E6F627B6 - letting an admin visit this link would result the admin username changed to ';alert(0);// also a stored XSS in the home page.
CSRF - there is no token/capcha or even current password prompt when the admin changes the password, and creditintials are sent over GET. PoC: http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=admin&sysPassword=F6C656269697
if an authenticated admin browses that link their credintials will become admin:yibelo
UI Redressing - The modem (like most modems) does not have a clickjacking protection. thus, can be used to modify settings, override admin accounts by a simple clickjack. forexample by using http://192.168.1.1/adminpasswd.html it is possible into tricking an admin submit a form with our credintials (since it doesn't require current password)
not using SSL - The modem does not use HTTPS, so anyone can use MiTM to sniff on going actions, possibly gain user credintials.
Unrestricted privileges - anyone who is connected to the modem with Telnet or tftp is root. simply telneting and authenticating as admin:admin and typing sh and echo $USER would prove that. # Exploit Title: ZTE ZXDSL 831 Multiple Cross Site Scripting
# Date: 11/3/2014
# Exploit Author: Paulos Yibelo
# Vendor Homepage: zte.com.cn
# Software Link: -
# Version: -
# Tested on: Windows 7
# CVE :-
TR-069 Client page: Stored
| VAR-201411-0113 | CVE-2014-9019 |
ZTE ZXDSL 831CII Vulnerable to cross-site request forgery
Related entries in the VARIoT exploits database: VAR-E-201411-0052 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Multiple cross-site request forgery (CSRF) vulnerabilities in ZTE ZXDSL 831CII allow remote attackers to hijack the authentication of administrators for requests that (1) change the admin user name or (2) conduct cross-site scripting (XSS) attacks via the sysUserName parameter in a save action to adminpasswd.cgi or (3) change the admin user password via the sysPassword parameter in a save action to adminpasswd.cgi. The ZTE 831CII is a router device. ZTE 831CII is prone to the following security vulnerabilities:
1. An HTML-injection vulnerability
2. A cross-site request-forgery vulnerability
3. An unspecified clickjacking vulnerability
4. An information-disclosure vulnerability
5. Other attacks are also possible. ZTE ZXDSL 831CII is an ADSL modem (Modem) product of China ZTE Corporation (ZTE). The vulnerability comes from the fact that the adminpasswd.cgi file does not fully filter the 'sysUserName' and 'sysPassword' parameters when the program executes the save operation. Hardcoded default misconfiguration - The modem comes with admin:admin user credintials.
Stored XSS - http://192.168.1.1/psilan.cgi?action=saveðIpAddress=192.168.1.1ðSubnetMask=255.255.255.0&hostname=ZXDSL83C1II&domainname=home%27;alert%280%29;//&enblUpnp=1&enblLan2=0
Any user browsing to http://192.168.1.1/main.html will have a stored xss executed!
CSRF based Stored XSS - http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=%27;alert%280%29;//&sysPassword=37F6E6F627B6 - letting an admin visit this link would result the admin username changed to ';alert(0);// also a stored XSS in the home page.
CSRF - there is no token/capcha or even current password prompt when the admin changes the password, and creditintials are sent over GET. PoC: http://192.168.1.1/adminpasswd.cgi?action=save&sysUserName=admin&sysPassword=F6C656269697
if an authenticated admin browses that link their credintials will become admin:yibelo
UI Redressing - The modem (like most modems) does not have a clickjacking protection. thus, can be used to modify settings, override admin accounts by a simple clickjack. forexample by using http://192.168.1.1/adminpasswd.html it is possible into tricking an admin submit a form with our credintials (since it doesn't require current password)
not using SSL - The modem does not use HTTPS, so anyone can use MiTM to sniff on going actions, possibly gain user credintials.
Unrestricted privileges - anyone who is connected to the modem with Telnet or tftp is root. simply telneting and authenticating as admin:admin and typing sh and echo $USER would prove that