VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201407-0175 CVE-2014-4977 Dell SonicWall Scrutinizer In SQL Injection vulnerability CVSS V2: 6.5
CVSS V3: -
Severity: MEDIUM
Multiple SQL injection vulnerabilities in Dell SonicWall Scrutinizer 11.0.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) selectedUserGroup parameter in a create new user request to cgi-bin/admin.cgi or the (2) user_id parameter in the changeUnit function, (3) methodDetail parameter in the methodDetail function, or (4) xcNetworkDetail parameter in the xcNetworkDetail function in d4d/exporters.php. Dell SonicWALL Scrutinizer is prone to multiple security vulnerabilities, including: 1. A privilege-escalation vulnerability 2. Multiple SQL-injection vulnerabilities Attackers can exploit these issues to perform certain actions with elevated privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. Other attacks may also be possible. Dell SonicWALL Scrutinizer is a set of multi-vendor application communication analysis visualization and reporting tools developed by Dell. The tool provides features such as deep packet analysis, vibration/latency monitoring, and historical and proactive reporting. A remote attacker can exploit this vulnerability to execute arbitrary SQL commands
VAR-201407-0174 CVE-2014-4976 Dell SonicWall Scrutinizer Vulnerable to changing user password CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
Dell SonicWall Scrutinizer 11.0.1 allows remote authenticated users to change user passwords via the user ID in the savePrefs parameter in a change password request to cgi-bin/admin.cgi. Dell SonicWALL Scrutinizer is prone to multiple security vulnerabilities, including: 1. A privilege-escalation vulnerability 2. Multiple SQL-injection vulnerabilities Attackers can exploit these issues to perform certain actions with elevated privileges, access or modify data, or exploit latent vulnerabilities in the underlying database. Other attacks may also be possible. Dell SonicWALL Scrutinizer is a set of multi-vendor application communication analysis visualization and reporting tools developed by Dell. The tool provides features such as deep packet analysis, vibration/latency monitoring, and historical and proactive reporting
VAR-201407-0047 CVE-2014-4738 FortiGuard FortiWeb Vulnerable to cross-site scripting CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in FortiGuard FortiWeb 5.0.x, 5.1.x, and 5.2.x before 5.2.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) user/ldap_user/check_dlg or (2) user/radius_user/check_dlg. Fortinet Fortiweb is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet Fortiweb 5.0.x, 5.1.x and 5.2.0 are vulnerable. Fortinet FortiGuard FortiWeb is a web application layer firewall developed by Fortinet, which can block threats such as cross-site scripting, SQL injection, cookie poisoning, schema poisoning, etc. Sensitive database content. A cross-site scripting vulnerability exists in the user/ldap_user/check_dlg and user/radius_user/check_dlg URIs of Fortinet FortiGuard FortiWeb 5.0.x to 5.2.0
VAR-201407-0032 CVE-2014-3419 Infoblox NetMRI Vulnerabilities that gain access CVSS V2: 7.2
CVSS V3: -
Severity: HIGH
Infoblox NetMRI before 6.8.5 has a default password of admin for the "root" MySQL database account, which makes it easier for local users to obtain access via unspecified vectors. Infoblox Network Automation is a network automation product. Infoblox Network Automation has a weak password with a username/password of root/root. Multiple Infoblox Network Automation Products including NetMRI, Switch Port Manager, Automation Change Manager and Security Device Controller are prone to a local security-bypass vulnerability. Local attackers may exploit this issue to bypass certain security restrictions and perform unauthorized actions
VAR-201407-0031 CVE-2014-3418 Infoblox NetMRI Vulnerabilities that gain access CVSS V2: 10.0
CVSS V3: -
Severity: High
config/userAdmin/login.tdf in Infoblox NetMRI before 6.8.5 allows remote attackers to execute arbitrary commands via shell metacharacters in the skipjackUsername parameter. Infoblox NetMRI Is "root" of MySQL There is a vulnerability in which access rights can be obtained because the default password of the administrator is used for the database account.Local users may be able to gain access. Infoblox Network Automation is a network automation product. Infoblox Network Automation failed to properly handle the input submitted by the user via the skipjackUsername POST parameter, allowing remote attackers to exploit the vulnerability to inject operating system commands to the root user. Multiple Infoblox Network Automation Products including NetMRI, Switch Port Manager, Automation Change Manager and Security Device Controller are prone to an OS command-injection vulnerability
VAR-201407-0380 CVE-2014-3317 Cisco Unified Communications Manager of Dialed Number Analyzer Directory traversal vulnerability in components CVSS V2: 5.5
CVSS V3: -
Severity: MEDIUM
Directory traversal vulnerability in the Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager 10.0(1) allows remote authenticated users to delete arbitrary files via a crafted URL, aka Bug ID CSCup76314. Vendors have confirmed this vulnerability Bug ID CSCup76314 It is released as.Crafted by remotely authenticated users URL Any file may be deleted through. Cisco Unified Communications Manager is prone to a directory-traversal vulnerability. Exploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks. This issue is being tracked by Cisco Bug ID CSCup76314. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers. A remote attacker could exploit this vulnerability to delete arbitrary files by submitting a specially crafted URL request to an affected device
VAR-201407-0378 CVE-2014-3315 Cisco Unified Communications Manager of Dialed Number Analyzer Component cross-site scripting vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308. Vendors have confirmed this vulnerability Bug ID CSCup76308 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCup76308. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
VAR-201407-0379 CVE-2014-3316 Cisco Unified Communications Manager of Dialed Number Analyzer Vulnerability that bypasses upload restrictions in components CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297. Cisco Unified Communications Manager is prone to an arbitrary file-upload vulnerability. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. This issue is being tracked by Cisco Bug ID CSCup76297. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
VAR-201407-0381 CVE-2014-3318 Cisco Unified Communications Manager of Dialed Number Analyzer Directory traversal vulnerability in components CVSS V2: 4.0
CVSS V3: -
Severity: MEDIUM
Directory traversal vulnerability in dna/viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup76318. Vendors have confirmed this vulnerability Bug ID CSCup76318 It is released as.Crafted by remotely authenticated users URL Any file may be read via. Exploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks. This issue is being tracked by Cisco Bug ID CSCup76318. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
VAR-201407-0482 CVE-2014-3822 Juniper Networks SRX Runs on series devices Junos Service disruption in (DoS) Vulnerabilities CVSS V2: 5.4
CVSS V3: -
Severity: MEDIUM
Juniper Junos 11.4 before 11.4R8, 12.1 before 12.1R5, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D15, 12.1X46 before 12.1X46-D10, and 12.1X47 before 12.1X47-D10 on SRX Series devices, allows remote attackers to cause a denial of service (flowd crash) via a malformed packet, related to translating IPv6 to IPv4. Juniper Junos is prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause an affected device to crash, denying service to legitimate users. Note: This issue affects on SRX series devices. Juniper Networks Junos on SRX Series devices is a set of network operating systems of Juniper Networks (Juniper Networks) running on SRX series service gateway devices. The operating system provides a secure programming interface and Junos SDK. The following releases are affected: Juniper Junos 11.4 prior to 11.4R8, 12.1 prior to 12.1R5, 12.1X44 prior to 12.1X44-D20, 12.1X45 prior to 12.1X45-D15, 12.1X46 prior to 12.1X46-D10 , 12.1X47 versions prior to 12.1X47-D10
VAR-201407-0478 CVE-2014-3816 Juniper Junos Vulnerability gained in CVSS V2: 9.0
CVSS V3: -
Severity: HIGH
Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R11, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8-S2, 12.3 before 12.3R7, 13.1 before 13.1R4-S2, 13.2 before 13.2R5, 13.3 before 13.3R2-S2, and 14.1 before 14.1R1 allows remote authenticated users to gain privileges via unspecified combinations of CLI commands and arguments. Juniper Junos is prone to multiple local privilege-escalation vulnerabilities. Local attackers can exploit these issues to execute arbitrary commands with root privileges. Juniper Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in the Junos OS CLI command and parameter combination for Juniper Networks Juniper Junos. A remote attacker could exploit this vulnerability to gain privileges. The following versions are affected: Juniper Junos 11.4 prior to 11.4R12, 12.1 prior to 12.1R11, 12.1X44 prior to 12.1X44-D35, 12.1X45 prior to 12.1X45-D30, 12.1X46 prior to 12.1X46-D20 , 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8-S2, 12.3 before 12.3R7, 13.1 before 13.1R4-S2, 13.2 before 13.2R5, 13.3 before 13.3R2-S2 Version, 14.1 version before 14.1R1
VAR-201407-0373 CVE-2014-3309 Cisco IOS and IOS XE of NTP Vulnerability that bypasses time synchronization restrictions CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318. Vendors have confirmed this vulnerability Bug ID CSCuj66318 It is released as.A third party may be able to bypass time synchronization restrictions via standard queries. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS and IOS XE Software are prone to a remote security-bypass vulnerability. An attacker can exploit this issue to bypass the security restrictions, access information and cause denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCuj66318. The vulnerability is caused by the incorrect implementation of the ntp access-group command in the program
VAR-201407-0376 CVE-2014-3312 Cisco Small Business SPA300 and SPA500 phone Optional in the debug console interface debug Shell command execution vulnerability CVSS V2: 6.9
CVSS V3: -
Severity: MEDIUM
The debug console interface on Cisco Small Business SPA300 and SPA500 phones does not properly perform authentication, which allows local users to execute arbitrary debug-shell commands, or read or modify data in memory or a filesystem, via direct access to this interface, aka Bug ID CSCun77435. The Cisco Small Businsess SPA300 and SPA500 Series IP Phones are IP phone products. A security vulnerability exists in the Cisco Small Businsess SPA300 and SPA500 Series IP Phones. This issue is being tracked by Cisco Bug ID CSCun77435
VAR-201407-0377 CVE-2014-3313 Cisco Small Business SPA300 and SPA500 Series IP phone of Web Cross-site scripting vulnerability in user interface CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Cross-site scripting (XSS) vulnerability in the web user interface on Cisco Small Business SPA300 and SPA500 phones allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuo52582. The Cisco Small Businsess SPA300 and SPA500 Series IP Phones WEB interfaces fail to adequately filter user input, and remote attackers exploit vulnerabilities to build malicious URIs, entice users to resolve, obtain sensitive cookies, hijack sessions, or perform malicious operations on the client. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This issue is being tracked by Cisco Bug ID CSCuo52582
VAR-201407-0755 CVE-2014-4704 Multiple Huawei Products RADIUS Component Denial of Service Vulnerability CVSS V2: -
CVSS V3: -
Severity: -
Multiple Huawei products are prone to a denial-of-service vulnerability. An attacker can exploit this issue to restart the device, denying service to legitimate users.
VAR-201407-0600 CVE-2014-4671 Adobe Flash Player and Adobe AIR Vulnerable to cross-site request forgery attacks CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. Adobe Flash Player and Adobe AIR are prone to an unspecified security vulnerability. Note: The impact of this issue is currently unknown. We will update this BID when more information emerges. The vulnerability stems from the fact that the program does not restrict the SWF file format. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394" References ========== [ 1 ] CVE-2014-0537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537 [ 2 ] CVE-2014-0539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539 [ 3 ] CVE-2014-4671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201407-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0860-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html Issue date: 2014-07-09 CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes three security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0537, CVE-2014-0539) This update also fixes a flaw that would lead to Cross-Site Request Forgery (CSRF) attacks. (CVE-2014-4671) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.394. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17) 1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0537.html https://www.redhat.com/security/data/cve/CVE-2014-0539.html https://www.redhat.com/security/data/cve/CVE-2014-4671.html https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb14-17.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB gBDt4W/WHbfPbMm4yjzv5Qk= =+esp -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
VAR-201407-0069 CVE-2014-0539 Adobe Flash Player and Adobe AIR Vulnerable to access restrictions CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0537. This vulnerability CVE-2014-0537 Is a different vulnerability.An attacker may be able to bypass access restrictions. Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Security flaws exist in several Adobe products. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394" References ========== [ 1 ] CVE-2014-0537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537 [ 2 ] CVE-2014-0539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539 [ 3 ] CVE-2014-4671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201407-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0860-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html Issue date: 2014-07-09 CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes three security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0537, CVE-2014-0539) This update also fixes a flaw that would lead to Cross-Site Request Forgery (CSRF) attacks. (CVE-2014-4671) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.394. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17) 1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0537.html https://www.redhat.com/security/data/cve/CVE-2014-0539.html https://www.redhat.com/security/data/cve/CVE-2014-4671.html https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb14-17.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB gBDt4W/WHbfPbMm4yjzv5Qk= =+esp -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
VAR-201407-0068 CVE-2014-0537 Adobe Flash Player and Adobe AIR Vulnerable to access restrictions CVSS V2: 7.5
CVSS V3: -
Severity: HIGH
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0539. This vulnerability CVE-2014-0539 Is a different vulnerability.An attacker may be able to bypass access restrictions. Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Security flaws exist in several Adobe products. Background ========== The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394" References ========== [ 1 ] CVE-2014-0537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537 [ 2 ] CVE-2014-0539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539 [ 3 ] CVE-2014-4671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201407-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2014:0860-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html Issue date: 2014-07-09 CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671 ===================================================================== 1. Summary: An updated Adobe Flash Player package that fixes three security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. These vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17, listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content. (CVE-2014-0537, CVE-2014-0539) This update also fixes a flaw that would lead to Cross-Site Request Forgery (CSRF) attacks. (CVE-2014-4671) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.394. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17) 1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Server Supplementary (v. 5): i386: flash-plugin-11.2.202.394-1.el5.i386.rpm x86_64: flash-plugin-11.2.202.394-1.el5.i386.rpm Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: flash-plugin-11.2.202.394-1.el6.i686.rpm x86_64: flash-plugin-11.2.202.394-1.el6.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0537.html https://www.redhat.com/security/data/cve/CVE-2014-0539.html https://www.redhat.com/security/data/cve/CVE-2014-4671.html https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb14-17.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB gBDt4W/WHbfPbMm4yjzv5Qk= =+esp -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
VAR-201407-0714 No CVE SYAC TB DigiEye 3G product backdoor unauthorized access vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
SYAC TB DigiEye 3G is a 3G wireless solution device. SYAC TB DigiEye 3G includes a backdoor service that listens to TCP port 7339. TECHBOARD SYAC TB DigiEye 3G Products is a set of digital security management system that provides remote management, alarm and communication for video and audio of Italian TECHBOARD company. An unauthorized access vulnerability exists in TECHBOARD SYAC TB DigiEye 3G Products. A remote attacker could use this vulnerability to execute arbitrary commands on the affected device with root privileges. This may aid in further attacks
VAR-201407-0492 CVE-2014-3888 Yokogawa Multiple products 'BKFSim_vhfd.exe' Buffer Overflow Vulnerability

Related entries in the VARIoT exploits database: VAR-E-201407-0158
CVSS V2: 8.3
CVSS V3: -
Severity: HIGH
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA The product contains a buffer overflow vulnerability. This vulnerability JVNVU#98181377 Is different. JVNVU#98181377 http://jvn.jp/vu/JVNVU98181377/index.htmlIf a specially crafted packet is processed while the extended test function is running, the process may stop. In some cases, arbitrary code may be executed with the privileges of the user running the product. Yokogawa Corporation (YOKOGAWA) is a world-renowned leader in measurement, industrial automation control, and information systems. There are buffer overflow vulnerabilities in Yokogawa's multiple products 'BKFSim_vhfd.exe'. Since the sub_403E10\" (IDA notation) function in multiple YOKOGAWA products \"BKFSim_vhfd.exe\" service is used for logging functions, the function uses user controllable data to create logs. Using similar vsprintf and memcpy functions can cause an attacker to trigger a buffer overflow, which can crash an application or execute arbitrary code in the context of an application. Multiple Yokogawa Products are prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed attempts will likely cause a denial-of-service condition. Yokogawa CENTUM CS, etc. are all products of Japan's Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server