VARIoT IoT vulnerabilities database
| VAR-201407-0380 | CVE-2014-3317 | Cisco Unified Communications Manager of Dialed Number Analyzer Directory traversal vulnerability in components |
CVSS V2: 5.5 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager 10.0(1) allows remote authenticated users to delete arbitrary files via a crafted URL, aka Bug ID CSCup76314. Vendors have confirmed this vulnerability Bug ID CSCup76314 It is released as.Crafted by remotely authenticated users URL Any file may be deleted through. Cisco Unified Communications Manager is prone to a directory-traversal vulnerability.
Exploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCup76314. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers. A remote attacker could exploit this vulnerability to delete arbitrary files by submitting a specially crafted URL request to an affected device
| VAR-201407-0378 | CVE-2014-3315 | Cisco Unified Communications Manager of Dialed Number Analyzer Component cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308. Vendors have confirmed this vulnerability Bug ID CSCup76308 It is released as.By any third party through unspecified parameters Web Script or HTML May be inserted.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCup76308. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
| VAR-201407-0379 | CVE-2014-3316 | Cisco Unified Communications Manager of Dialed Number Analyzer Vulnerability that bypasses upload restrictions in components |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297. Cisco Unified Communications Manager is prone to an arbitrary file-upload vulnerability.
An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application.
This issue is being tracked by Cisco Bug ID CSCup76297. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
| VAR-201407-0381 | CVE-2014-3318 | Cisco Unified Communications Manager of Dialed Number Analyzer Directory traversal vulnerability in components |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in dna/viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup76318. Vendors have confirmed this vulnerability Bug ID CSCup76318 It is released as.Crafted by remotely authenticated users URL Any file may be read via.
Exploiting this issue may allow an attacker to upload arbitrary files to arbitrary locations that could aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCup76318. Dialed Number Analyzer (DNA) is one of the serviceability tools used to analyze dial plans for specific numbers
| VAR-201407-0482 | CVE-2014-3822 | Juniper Networks SRX Runs on series devices Junos Service disruption in (DoS) Vulnerabilities |
CVSS V2: 5.4 CVSS V3: - Severity: MEDIUM |
Juniper Junos 11.4 before 11.4R8, 12.1 before 12.1R5, 12.1X44 before 12.1X44-D20, 12.1X45 before 12.1X45-D15, 12.1X46 before 12.1X46-D10, and 12.1X47 before 12.1X47-D10 on SRX Series devices, allows remote attackers to cause a denial of service (flowd crash) via a malformed packet, related to translating IPv6 to IPv4. Juniper Junos is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to cause an affected device to crash, denying service to legitimate users.
Note: This issue affects on SRX series devices. Juniper Networks Junos on SRX Series devices is a set of network operating systems of Juniper Networks (Juniper Networks) running on SRX series service gateway devices. The operating system provides a secure programming interface and Junos SDK. The following releases are affected: Juniper Junos 11.4 prior to 11.4R8, 12.1 prior to 12.1R5, 12.1X44 prior to 12.1X44-D20, 12.1X45 prior to 12.1X45-D15, 12.1X46 prior to 12.1X46-D10 , 12.1X47 versions prior to 12.1X47-D10
| VAR-201407-0478 | CVE-2014-3816 | Juniper Junos Vulnerability gained in |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R11, 12.1X44 before 12.1X44-D35, 12.1X45 before 12.1X45-D30, 12.1X46 before 12.1X46-D20, 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8-S2, 12.3 before 12.3R7, 13.1 before 13.1R4-S2, 13.2 before 13.2R5, 13.3 before 13.3R2-S2, and 14.1 before 14.1R1 allows remote authenticated users to gain privileges via unspecified combinations of CLI commands and arguments. Juniper Junos is prone to multiple local privilege-escalation vulnerabilities.
Local attackers can exploit these issues to execute arbitrary commands with root privileges. Juniper Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in the Junos OS CLI command and parameter combination for Juniper Networks Juniper Junos. A remote attacker could exploit this vulnerability to gain privileges. The following versions are affected: Juniper Junos 11.4 prior to 11.4R12, 12.1 prior to 12.1R11, 12.1X44 prior to 12.1X44-D35, 12.1X45 prior to 12.1X45-D30, 12.1X46 prior to 12.1X46-D20 , 12.1X47 before 12.1X47-D10, 12.2 before 12.2R8-S2, 12.3 before 12.3R7, 13.1 before 13.1R4-S2, 13.2 before 13.2R5, 13.3 before 13.3R2-S2 Version, 14.1 version before 14.1R1
| VAR-201407-0373 | CVE-2014-3309 | Cisco IOS and IOS XE of NTP Vulnerability that bypasses time synchronization restrictions |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The NTP implementation in Cisco IOS and IOS XE does not properly support use of the access-group command for a "deny all" configuration, which allows remote attackers to bypass intended restrictions on time synchronization via a standard query, aka Bug ID CSCuj66318. Vendors have confirmed this vulnerability Bug ID CSCuj66318 It is released as.A third party may be able to bypass time synchronization restrictions via standard queries. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS and IOS XE Software are prone to a remote security-bypass vulnerability.
An attacker can exploit this issue to bypass the security restrictions, access information and cause denial-of-service condition.
This issue is being tracked by Cisco Bug ID CSCuj66318. The vulnerability is caused by the incorrect implementation of the ntp access-group command in the program
| VAR-201407-0376 | CVE-2014-3312 | Cisco Small Business SPA300 and SPA500 phone Optional in the debug console interface debug Shell command execution vulnerability |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The debug console interface on Cisco Small Business SPA300 and SPA500 phones does not properly perform authentication, which allows local users to execute arbitrary debug-shell commands, or read or modify data in memory or a filesystem, via direct access to this interface, aka Bug ID CSCun77435. The Cisco Small Businsess SPA300 and SPA500 Series IP Phones are IP phone products. A security vulnerability exists in the Cisco Small Businsess SPA300 and SPA500 Series IP Phones.
This issue is being tracked by Cisco Bug ID CSCun77435
| VAR-201407-0377 | CVE-2014-3313 | Cisco Small Business SPA300 and SPA500 Series IP phone of Web Cross-site scripting vulnerability in user interface |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the web user interface on Cisco Small Business SPA300 and SPA500 phones allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuo52582. The Cisco Small Businsess SPA300 and SPA500 Series IP Phones WEB interfaces fail to adequately filter user input, and remote attackers exploit vulnerabilities to build malicious URIs, entice users to resolve, obtain sensitive cookies, hijack sessions, or perform malicious operations on the client.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
This issue is being tracked by Cisco Bug ID CSCuo52582
| VAR-201407-0755 | CVE-2014-4704 | Multiple Huawei Products RADIUS Component Denial of Service Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Multiple Huawei products are prone to a denial-of-service vulnerability.
An attacker can exploit this issue to restart the device, denying service to legitimate users.
| VAR-201407-0600 | CVE-2014-4671 | Adobe Flash Player and Adobe AIR Vulnerable to cross-site request forgery attacks |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API. Adobe Flash Player and Adobe AIR are prone to an unspecified security vulnerability.
Note: The impact of this issue is currently unknown. We will update this BID when more information emerges. The vulnerability stems from the fact that the program does not restrict the SWF file format.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394"
References
==========
[ 1 ] CVE-2014-0537
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537
[ 2 ] CVE-2014-0539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539
[ 3 ] CVE-2014-4671
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201407-02.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:0860-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html
Issue date: 2014-07-09
CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes three security issues is
now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash
Player web browser plug-in. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0537, CVE-2014-0539)
This update also fixes a flaw that would lead to Cross-Site Request Forgery
(CSRF) attacks. (CVE-2014-4671)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.394.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17)
1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0537.html
https://www.redhat.com/security/data/cve/CVE-2014-0539.html
https://www.redhat.com/security/data/cve/CVE-2014-4671.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-17.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB
gBDt4W/WHbfPbMm4yjzv5Qk=
=+esp
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201407-0069 | CVE-2014-0539 | Adobe Flash Player and Adobe AIR Vulnerable to access restrictions |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0537. This vulnerability CVE-2014-0537 Is a different vulnerability.An attacker may be able to bypass access restrictions.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394"
References
==========
[ 1 ] CVE-2014-0537
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537
[ 2 ] CVE-2014-0539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539
[ 3 ] CVE-2014-4671
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201407-02.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:0860-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html
Issue date: 2014-07-09
CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes three security issues is
now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0537, CVE-2014-0539)
This update also fixes a flaw that would lead to Cross-Site Request Forgery
(CSRF) attacks. (CVE-2014-4671)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.394.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17)
1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0537.html
https://www.redhat.com/security/data/cve/CVE-2014-0539.html
https://www.redhat.com/security/data/cve/CVE-2014-4671.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-17.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB
gBDt4W/WHbfPbMm4yjzv5Qk=
=+esp
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201407-0068 | CVE-2014-0537 | Adobe Flash Player and Adobe AIR Vulnerable to access restrictions |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK & Compiler before 14.0.0.137 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0539. This vulnerability CVE-2014-0539 Is a different vulnerability.An attacker may be able to bypass access restrictions.
Attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Security flaws exist in several Adobe products.
Background
==========
The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.
Please review the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Adobe Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.394"
References
==========
[ 1 ] CVE-2014-0537
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0537
[ 2 ] CVE-2014-0539
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0539
[ 3 ] CVE-2014-4671
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4671
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201407-02.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update
Advisory ID: RHSA-2014:0860-01
Product: Red Hat Enterprise Linux Supplementary
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0860.html
Issue date: 2014-07-09
CVE Names: CVE-2014-0537 CVE-2014-0539 CVE-2014-4671
=====================================================================
1. Summary:
An updated Adobe Flash Player package that fixes three security issues is
now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64
Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
3. These
vulnerabilities are detailed in the Adobe Security Bulletin APSB14-17,
listed in the References section.
Multiple flaws were found in the way flash-plugin displayed certain SWF
content. An attacker could use these flaws to create a specially crafted
SWF file that would cause flash-plugin to crash or, potentially, execute
arbitrary code when the victim loaded a page containing the malicious SWF
content. (CVE-2014-0537, CVE-2014-0539)
This update also fixes a flaw that would lead to Cross-Site Request Forgery
(CSRF) attacks. (CVE-2014-4671)
All users of Adobe Flash Player should install this updated package, which
upgrades Flash Player to version 11.2.202.394.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1117586 - CVE-2014-0537 CVE-2014-0539 flash-plugin: security protection bypass (APSB14-17)
1117588 - CVE-2014-4671 flash-plugin: vulnerable JSONP callback APIs issue (APSB14-17)
6. Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386:
flash-plugin-11.2.202.394-1.el5.i386.rpm
x86_64:
flash-plugin-11.2.202.394-1.el5.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386:
flash-plugin-11.2.202.394-1.el6.i686.rpm
x86_64:
flash-plugin-11.2.202.394-1.el6.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0537.html
https://www.redhat.com/security/data/cve/CVE-2014-0539.html
https://www.redhat.com/security/data/cve/CVE-2014-4671.html
https://access.redhat.com/security/updates/classification/#critical
https://helpx.adobe.com/security/products/flash-player/apsb14-17.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTvWIcXlSAg2UNWIIRArr2AJwJyNpz/+Ec1y8LhYAkqBKM1ZZXBACfZtYB
gBDt4W/WHbfPbMm4yjzv5Qk=
=+esp
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-201407-0714 | No CVE | SYAC TB DigiEye 3G product backdoor unauthorized access vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
SYAC TB DigiEye 3G is a 3G wireless solution device.
SYAC TB DigiEye 3G includes a backdoor service that listens to TCP port 7339. TECHBOARD SYAC TB DigiEye 3G Products is a set of digital security management system that provides remote management, alarm and communication for video and audio of Italian TECHBOARD company.
An unauthorized access vulnerability exists in TECHBOARD SYAC TB DigiEye 3G Products. A remote attacker could use this vulnerability to execute arbitrary commands on the affected device with root privileges. This may aid in further attacks
| VAR-201407-0492 | CVE-2014-3888 |
Yokogawa Multiple products 'BKFSim_vhfd.exe' Buffer Overflow Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201407-0158 |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet. Integrated production control system provided by Yokogawa Electric Corporation CENTUM Including multiple YOKOGAWA The product contains a buffer overflow vulnerability. This vulnerability JVNVU#98181377 Is different. JVNVU#98181377 http://jvn.jp/vu/JVNVU98181377/index.htmlIf a specially crafted packet is processed while the extended test function is running, the process may stop. In some cases, arbitrary code may be executed with the privileges of the user running the product. Yokogawa Corporation (YOKOGAWA) is a world-renowned leader in measurement, industrial automation control, and information systems. There are buffer overflow vulnerabilities in Yokogawa's multiple products 'BKFSim_vhfd.exe'. Since the sub_403E10\" (IDA notation) function in multiple YOKOGAWA products \"BKFSim_vhfd.exe\" service is used for logging functions, the function uses user controllable data to create logs. Using similar vsprintf and memcpy functions can cause an attacker to trigger a buffer overflow, which can crash an application or execute arbitrary code in the context of an application. Multiple Yokogawa Products are prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed attempts will likely cause a denial-of-service condition. Yokogawa CENTUM CS, etc. are all products of Japan's Yokogawa Electric (Yokogawa) company. Yokogawa CENTUM CS and CENTUM VP are large-scale production control systems. Exaopc is an OPC data access server
| VAR-201407-0439 | CVE-2014-2969 | Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
NETGEAR GS108PE Prosafe Plus switches with firmware 1.2.0.5 have a hardcoded password of debugpassword for the ntgruser account, which allows remote attackers to upload firmware or read or modify memory contents, and consequently execute arbitrary code, via a request to (1) produce_burn.cgi, (2) register_debug.cgi, or (3) bootcode_update.cgi. Netgear GS105PE Prosafe Plus Switch firmware version 1.2.0.5 contains hard-coded credentials. (CWE-798). An attacker could exploit this vulnerability to bypass the authentication mechanism and access the affected device without authorization. This may aid in further attacks. The vulnerability is caused by the use of a hard-coded password (debugpassword) for the ntgruser account
| VAR-201407-0372 | CVE-2014-3308 | Cisco IOS XR Software Static Punt Policer Denial of Service Vulnerability |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Cisco IOS XR on Trident line cards in ASR 9000 devices lacks a static punt policer, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted packets, aka Bug ID CSCun83985. Vendors have confirmed this vulnerability Bug ID CSCun83985 It is released as.A third party can send a large number of crafted packets to disrupt service operations. (CPU Resource consumption ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. On the Trident line card of the Cisco ASR 9000 series router, there is a security hole in the implementation of punt-police. Cisco IOS XR is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCun83985. The vulnerability stems from the lack of a static punt policer in the software
| VAR-201912-1656 | CVE-2014-3136 | D-Link DWR-113 Firmware vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Cross-site request forgery (CSRF) vulnerability in D-Link DWR-113 (Rev. Ax) with firmware before 2.03b02 allows remote attackers to hijack the authentication of administrators for requests that change the admin password via unspecified vectors. D-Link DWR-113 Contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. The D-link DWR-113 Wireless Router is a wireless router. D-link DWR-113 Wireless Router has a cross-site request forgery vulnerability that allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious operations in the target user context, such as modifying configurations.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
D-Link DWR-113 running firmware 2.02 is vulnerable; other versions may also be affected
| VAR-201407-0509 | CVE-2014-2197 | Cisco Unified CDM Application Software of Cisco Unified Communications Domain Manager Vulnerabilities that change administrator credentials |
CVSS V2: 9.0 CVSS V3: - Severity: HIGH |
The Administration GUI in the web framework in Cisco Unified Communications Domain Manager (CDM) in Unified CDM Application Software before 8.1.4 does not properly implement access control, which allows remote authenticated users to modify administrative credentials via a crafted URL, aka Bug ID CSCun49862. Vendors report this vulnerability Bug ID CSCun49862 Published as.Crafted by a remotely authenticated user URL Via, the administrator credentials may be changed.
An attacker can leverage this issue to escalate privileges and gain administrative access on an affected computer.
This issue is being tracked by Cisco Bug ID CSCun49862. This component features scalable, distributed, and highly available enterprise Voice over IP call processing. The vulnerability is caused by the incorrect implementation of access control in the program. A remote attacker could exploit this vulnerability by submitting a specially crafted URL to modify administrative credentials
| VAR-201407-0510 | CVE-2014-2198 | Cisco Unified CDM Platform Software of Cisco Unified Communications Domain Manager Vulnerabilities that gain access |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Cisco Unified Communications Domain Manager (CDM) in Unified CDM Platform Software before 4.4.2 has a hardcoded SSH private key, which makes it easier for remote attackers to obtain access to the support and root accounts by extracting this key from a binary file found in a different installation of the product, aka Bug ID CSCud41130.
Successfully exploiting this issue may allow an attacker to access the system with the privileges of the root user that may aid in further attacks.
This issue is being tracked by Cisco Bug ID CSCud41130. This component features scalable, distributed, and highly available enterprise Voice over IP call processing