VARIoT IoT vulnerabilities database
| VAR-201405-0491 | CVE-2014-2172 | Cisco TelePresence TC Software and TE Software buffer overflow vulnerability |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows local users to gain privileges by leveraging improper handling of the u-boot compiler flag for internal executable files, aka Bug ID CSCub67693. Cisco TelePresence TC Software and TE The software contains a buffer overflow vulnerability. Vendors have confirmed this vulnerability Bug ID CSCub67693 It is released as.For local executables by local users u-boot Authority may be obtained by using improper handling of compiler flags. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco). The vulnerability is caused by the program not properly handling the u-boot compiler flag inside the executable
| VAR-201405-0492 | CVE-2014-2173 | Cisco TelePresence TC Software and TE Vulnerability gained privilege in software |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly restrict access to the serial port, which allows local users to gain privileges via unspecified commands, aka Bug ID CSCub67692. Vendors have confirmed this vulnerability Bug ID CSCub67692 It is released as.A local user could gain privileges via an unspecified command. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0465 | CVE-2014-2175 | Cisco TelePresence TC Software and TE Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attackers to cause a denial of service (memory consumption) via crafted H.225 packets, aka Bug ID CSCtq78849. Vendors have confirmed this vulnerability Bug ID CSCtq78849 It is released as.Skillfully crafted by a third party H.225 Service disruption via packets ( Memory consumption ) There is a possibility of being put into a state. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0537 | CVE-2014-3792 |
Beetel 450TC2 Router Cross-Site Request Forgery Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201404-0185 |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in Beetel 450TC2 Router with firmware TX6-0Q-005_retail allows remote attackers to hijack the authentication of administrators for requests that change the administrator password via the uiViewTools_Password and uiViewTools_PasswordConfirm parameters to Forms/tools_admin_1. The Beetel 450TC2 Router is a router device. Beetel 450TC2 Router is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions. This may lead to further attacks.
Beetel 450TC2 Router running firmware versions TX6-0Q-005_retail is vulnerable; other versions may also be affected. The vulnerability is caused by the Forms/tools_admin_1 script not adequately filtering the 'uiViewTools_Password' and 'uiViewTools_PasswordConfirm' parameters
| VAR-201405-0321 | CVE-2014-1899 | Citrix NetScaler Gateway Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Citrix NetScaler Gateway (formerly Citrix Access Gateway Enterprise Edition) 9.x before 9.3.66.5 and 10.x before 10.1.123.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks.
Citrix NetScaler Gateway 10.x prior 10.1.123.9 and 9.x prior 9.3.66.5 are vulnerable. This solution provides administrators with application-level and data-level control functions to enable users to remotely access applications and data from any location
| VAR-201405-0482 | CVE-2014-2156 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0483 | CVE-2014-2157 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45733. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0484 | CVE-2014-2158 | Cisco TelePresence System MXP Service disruption in series software (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45720. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCty45739, CSCty45733, and CSCty45720. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0485 | CVE-2014-2159 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCtq78722. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0486 | CVE-2014-2160 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45745. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0487 | CVE-2014-2161 | Cisco TelePresence System MXP Series of software H.225 Service disruption in subsystems (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The H.225 subsystem in Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted packets, aka Bug ID CSCty45731. Cisco TelePresence System is prone to multiple remote denial-of-service vulnerabilities.
Successfully exploiting these issues allows remote attackers to cause denial-of-service conditions.
These issues are being tracked by Cisco Bug IDs CSCtq78722, CSCty45745, and CSCty45731. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201405-0493 | CVE-2014-2162 | Cisco TelePresence TC Software and TE Software SIP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCud29566. Multiple remote denial-of-service vulnerabilities
2. A buffer-overflow vulnerability
3. A command-injection vulnerability
4. A command-injection vulnerability
5. A heap-based buffer-overflow vulnerability
6. A local buffer-overflow vulnerability
7. A local authentication-bypass vulnerability
8. A remote denial-of-service vulnerability
Attackers can exploit these issues to execute arbitrary code in the context of the device, bypass authentication mechanisms, gain unauthorized access, execute arbitrary commands, or cause denial-of-service conditions; other attacks may also be possible.
These issues are being tracked by Cisco Bug IDs CSCud29566, CSCua64961, CSCuj94651, CSCtq72699, CSCto70562, CSCua86589, CSCty44804, CSCue60211, CSCue60202, CSCud81796, CSCub67693, CSCub67692, and CSCtq78849. Cisco TelePresence is a set of video conferencing solutions called "TelePresence" system of Cisco (Cisco)
| VAR-201404-0699 | No CVE | NETGEAR DGN2200 ADSL Router Web Interface HTML Injection vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
NETGEAR DGN2200 is a wireless router product from NETGEAR.
An HTML injection vulnerability exists in Netgear DGN2200, which originates from the fact that the user does not properly filter the input submitted by the program before generating dynamic content. An attacker could use this vulnerability to execute arbitrary code on a browser in the context of an affected site. Helps steal cookie-based authentication and launch further attacks. There are vulnerabilities in Netgear DGN2200 1.0.0.29_1.7.29. Other versions may also be affected
| VAR-201405-0303 | CVE-2014-2882 | Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management GUI Vulnerability in |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unspecified impact and vectors, related to certificate validation.
Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Lack of SSL Certificate Validation in Citrix Netscaler
CVE: CVE-2014-2882
Vendor: Citrix
Product: Netscaler
Affected version: All prior to 10.1-122.17/9.3-66.5
Fixed version: 10.1-122.17/9.3-66.5
Reported by: Graham Sutherland
Details:
The remote configuration Java applet assigns an empty trust manager to
its SSL context, causing it to accept any certificate regardless of
validity.
Further details at:
https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/
Copyright:
Copyright (c) Portcullis Computer Security Limited 2014, All rights
reserved worldwide. Permission is hereby granted for the electronic
redistribution of this information. It is not to be edited or altered in
any way without the express written consent of Portcullis Computer
Security Limited.
Disclaimer:
The information herein contained may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are NO warranties, implied or otherwise, with regard to this information
or its use. Any use of this information is at the user's risk. In no
event shall the author/distributor (Portcullis Computer Security
Limited) be held liable for any damages whatsoever arising out of or in
connection with the use or spread of this information
| VAR-201405-0534 | CVE-2014-3788 | Cogent Real-Time Systems Cogent DataHub Heap Buffer Overflow Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Heap-based buffer overflow in the Web Server in Cogent Real-Time Systems Cogent DataHub before 7.3.5 allows remote attackers to execute arbitrary code via a negative value in the Content-Length field in a request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the included Web Server. By providing a request with a crafted Content-Length field, an attacker is able to overflow a heap buffer. An attacker could leverage this to execute arbitrary code in the context of the DataHub process. Cogent DataHub is software for SCADA and automation. Failed exploit attempts will likely result in denial-of-service conditions.
Versions prior to Cogent DataHub 7.3.5 are vulnerable
| VAR-201404-0564 | CVE-2014-2186 | Cisco WebEx Meetings Server of Web Cross-site request forgery vulnerability in framework |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in the web framework in Cisco WebEx Meetings Server allows remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCuj81777. Vendors have confirmed this vulnerability Bug ID CSCuj81777 It is released as.A third party may be able to hijack the authentication of any user.
Exploiting this issue may allow a remote attacker to perform certain unauthorized actions and gain access to the affected application. Other attacks are also possible.
This issue is being tracked by Cisco Bug IDs CSCuj81777, CSCuj81786 and CSCuj81864. Cisco WebEx Meetings Server (CWMS) is a set of multi-functional conference solutions including audio, video and Web conference in Cisco's WebEx conference solution
| VAR-201404-0288 | CVE-2014-0114 | Apache Struts ClassLoader Manipulation CVE-2014-0114 Security Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Apache Struts is prone to a security-bypass vulnerability because it fails to adequately handle user-supplied input.
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions. This may lead to further attacks.
Apache Struts versions 1.0.0 through 1.3.10 are vulnerable. Description:
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint,
flexible, open source enterprise service bus and integration platform. (CVE-2014-0114)
Refer to the readme.txt file included with the patch files for
installation instructions.
Security Fix(es):
* Apache Struts 1: Class Loader manipulation via request parameters
(CVE-2014-0114)
* thrift: Improper file path sanitization in
t_go_generator.cc:format_go_output() of the go client library can allow an
attacker to inject commands (CVE-2016-5397)
* slf4j: Deserialisation vulnerability in EventData constructor can allow
for arbitrary code execution (CVE-2018-8088)
* jolokia: JMX proxy mode vulnerable to remote code execution
(CVE-2018-1000130)
* bouncycastle: DSA does not fully validate ASN.1 encoding during signature
verification allowing for injection of unsigned data (CVE-2016-1000338)
* bouncycastle: Information leak in AESFastEngine class (CVE-2016-1000339)
* bouncycastle: Information exposure in DSA signature generation via timing
attack (CVE-2016-1000341)
* bouncycastle: ECDSA improper validation of ASN.1 encoding of signature
(CVE-2016-1000342)
* bouncycastle: DHIES implementation allowed the use of ECB mode
(CVE-2016-1000344)
* bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle
attack (CVE-2016-1000345)
* bouncycastle: Other party DH public keys are not fully validated
(CVE-2016-1000346)
* bouncycastle: ECIES implementation allowed the use of ECB mode
(CVE-2016-1000352)
* async-http-client: Invalid URL parsing with '?' (CVE-2017-14063)
* undertow: File descriptor leak caused by
JarURLConnection.getLastModified() allows attacker to cause a denial of
service (CVE-2018-1114)
* spring-framework: Directory traversal vulnerability with static resources
on Windows filesystems (CVE-2018-1271)
* tika: Infinite loop in BPGParser can allow remote attacker to cause a
denial of service (CVE-2018-1338)
* tika: Infinite loop in ChmParser can allow remote attacker to cause a
denial of service (CVE-2018-1339)
* pdfbox: Infinite loop in AFMParser.java allows for out of memory erros
via crafted PDF (CVE-2018-8036)
* jolokia: Cross site scripting in the HTTP servlet (CVE-2018-1000129)
* bouncycastle: flaw in the low-level interface to RSA key pair generator
(CVE-2018-1000180)
* bouncycastle: Carry propagation bug in math.raw.Nat??? class
(CVE-2016-1000340)
* bouncycastle: DSA key pair generator generates a weak private key by
default (CVE-2016-1000343)
* spring-framework: Multipart content pollution (CVE-2018-1272)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
Red Hat would like to thank Chris McCown for reporting CVE-2018-8088.
Installation instructions are located in the download section of the
customer portal. Bugs fixed (https://bugzilla.redhat.com/):
1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters
1487563 - CVE-2017-14063 async-http-client: Invalid URL parsing with '?'
1544620 - CVE-2016-5397 thrift: Improper file path sanitization in t_go_generator.cc:format_go_output() of the go client library can allow an attacker to inject commands
1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution
1559316 - CVE-2018-1000130 jolokia: JMX proxy mode vulnerable to remote code execution
1559317 - CVE-2018-1000129 jolokia: Cross site scripting in the HTTP servlet
1564408 - CVE-2018-1272 spring-framework: Multipart content pollution
1571050 - CVE-2018-1271 spring-framework: Directory traversal vulnerability with static resources on Windows filesystems
1572421 - CVE-2018-1338 tika: Infinite loop in BPGParser can allow remote attacker to cause a denial of service
1572424 - CVE-2018-1339 tika: Infinite loop in ChmParser can allow remote attacker to cause a denial of service
1573045 - CVE-2018-1114 undertow: File descriptor leak caused by JarURLConnection.getLastModified() allows attacker to cause a denial of service
1588306 - CVE-2018-1000180 bouncycastle: flaw in the low-level interface to RSA key pair generator
1588313 - CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data
1588314 - CVE-2016-1000344 bouncycastle: DHIES implementation allowed the use of ECB mode
1588323 - CVE-2016-1000345 bouncycastle: DHIES/ECIES CBC modes are vulnerable to padding oracle attack
1588327 - CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated
1588330 - CVE-2016-1000352 bouncycastle: ECIES implementation allowed the use of ECB mode
1588688 - CVE-2016-1000340 bouncycastle: Carry propagation bug in math.raw.Nat??? class
1588695 - CVE-2016-1000339 bouncycastle: Information leak in AESFastEngine class
1588708 - CVE-2016-1000341 bouncycastle: Information exposure in DSA signature generation via timing attack
1588715 - CVE-2016-1000342 bouncycastle: ECDSA improper validation of ASN.1 encoding of signature
1588721 - CVE-2016-1000343 bouncycastle: DSA key pair generator generates a weak private key by default
1597490 - CVE-2018-8036 pdfbox: Infinite loop in AFMParser.java allows for out of memory erros via crafted PDF
5.
This is a different underlying flaw. For future reference, please use
CVE-2014-0114 in regards to this issue.
[1] http://struts.apache.org/release/2.3.x/docs/s2-021.html
--
Ren\xe9 Gielen
http://twitter.com/rgielen
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: struts security update
Advisory ID: RHSA-2014:0474-01
Product: Red Hat Enterprise Linux
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0474.html
Issue date: 2014-05-07
CVE Names: CVE-2014-0114
=====================================================================
1. Summary:
Updated struts packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
2. Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64
3. Description:
Apache Struts is a framework for building web applications with Java. A
remote attacker could use this flaw to manipulate the ClassLoader used by
an application server running Struts 1. This could lead to remote code
execution under certain conditions. (CVE-2014-0114)
All struts users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
using struts must be restarted for this update to take effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1091938 - CVE-2014-0114 Apache Struts 1: Class Loader manipulation via request parameters
6. Package List:
RHEL Desktop Workstation (v. 5 client):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm
i386:
struts-1.2.9-4jpp.8.el5_10.i386.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm
struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm
x86_64:
struts-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/struts-1.2.9-4jpp.8.el5_10.src.rpm
i386:
struts-1.2.9-4jpp.8.el5_10.i386.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.i386.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.i386.rpm
struts-manual-1.2.9-4jpp.8.el5_10.i386.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.i386.rpm
ia64:
struts-1.2.9-4jpp.8.el5_10.ia64.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.ia64.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.ia64.rpm
struts-manual-1.2.9-4jpp.8.el5_10.ia64.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ia64.rpm
ppc:
struts-1.2.9-4jpp.8.el5_10.ppc.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.ppc.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.ppc.rpm
struts-manual-1.2.9-4jpp.8.el5_10.ppc.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.ppc.rpm
s390x:
struts-1.2.9-4jpp.8.el5_10.s390x.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.s390x.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.s390x.rpm
struts-manual-1.2.9-4jpp.8.el5_10.s390x.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.s390x.rpm
x86_64:
struts-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-debuginfo-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-javadoc-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-manual-1.2.9-4jpp.8.el5_10.x86_64.rpm
struts-webapps-tomcat5-1.2.9-4jpp.8.el5_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0114.html
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFTacDGXlSAg2UNWIIRAhvbAJ0Za5jRat54AcgbIdHKlzbZN1y1hACcC8DR
HJqJt2S278nXdfwLyGc7EJQ=
=qMuX
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201607-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Commons-BeanUtils: Arbitrary code execution
Date: July 20, 2016
Bugs: #534498
ID: 201607-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Apache Commons BeanUtils does not properly suppress the class property,
which could lead to the remote execution of arbitrary code.
Impact
======
Remote attackers could potentially execute arbitrary code with the
privileges of the process.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Commons BeanUtils users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=dev-java/commons-beanutils-1.9.2"
References
==========
[ 1 ] CVE-2014-0114
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0114
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-09
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ
Artemis. It uses an asynchronous journal for fast message persistence, and
supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to
in the References section. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link (you must
log in to download the update).
References:
CVE-2014-0114 (SSRT101747)
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Device Manager v1.0.0-00 to earlier than v7.6.1-06
- HP Device Manager v8.0.0-00 to earlier than v8.0.0-06
- HP XP P9000 Replication Manager v5.0.0-00 to earlier than v6.0.0-00
- HP XP P9000 Replication Manager v6.0.0-00 to earlier than v7.6.1-06
- HP XP P9000 Replication Manager v8.0.0-00 to earlier than v8.0.0-06
- HP XP P9000 Tiered Storage Manager 1.1.0-00 to earlier than 7.6.1-06
- HP XP P9000 Tiered Storage Manager v8.0.0-00 to earlier than v8.0.0-06
- HP XP7 Global Link Manager Software v6.4.0-00 to earlier than v7.6.0-02
- HP XP7 Global Link Manager Software v8.0.0-00
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-0114 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has released the following software updates to resolve the vulnerability
in HP XP Command View Advanced Edition running Apache Struts.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. Description:
Red Hat Satellite is a systems management tool for Linux-based
infrastructures. It allows for provisioning, monitoring, and remote
management of multiple Linux deployments with a single, centralized tool. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05324755
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c05324755
Version: 1
HPSBGN03669 rev.1 - HPE SiteScope, Local Elevation of Privilege, Remote
Denial of Service, Arbitrary Code Execution and Cross-Site Request Forgery
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2016-11-04
Last Updated: 2016-11-04
Potential Security Impact: Local: Elevation of Privilege; Remote: Arbitrary
Code Execution, Cross-Site Request Forgery (CSRF), Denial of Service (DoS)
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY
Potential vulnerabilities have been identified in HPE SiteScope. The
vulnerabilities could be exploited to allow local elevation of privilege and
exploited remotely to allow denial of service, arbitrary code execution,
cross-site request forgery.
References:
- CVE-2014-0114 - Apache Struts, execution of arbitrary code
- CVE-2016-0763 - Apache Tomcat, denial of service (DoS)
- CVE-2014-0107 - Apache XML Xalan, bypass expected restrictions
- CVE-2015-3253 - Apache Groovy, execution of arbitrary code
- CVE-2015-5652 - Python, elevation of privilege
- CVE-2013-6429 - Spring Framework, cross-site request forgery
- CVE-2014-0050 - Apache Commons FileUpload, denial of service (DoS)
- PSRT110264
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP SiteScope Monitors Software Series 11.2xa11.32IP1
BACKGROUND
CVSS Base Metrics
=================
Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2013-6429
6.5 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVE-2014-0050
8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2014-0107
8.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2014-0114
6.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-3253
7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE-2015-5652
8.6 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)
CVE-2016-0763
6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
6.5 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has provided a resolution via an update to HPE SiteScope. Details on the
update and each vulnerability are in the KM articles below.
**Note:** The resolution for each vulnerability listed is to upgrade to
SiteScope 11.32IP2 or an even more recent version of SiteScope if available.
The SiteScope update can be can found in the personal zone in "my updates" in
HPE Software Support Online: <https://softwaresupport.hpe.com>.
* Apache Commons FileUpload: KM02550251 (CVE-2014-0050):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02550251>
* Apache Struts: KM02553983 (CVE-2014-0114):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553983>
* Apache Tomcat: KM02553990 (CVE-2016-0763):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553990>
* Apache XML Xalan: KM02553991 (CVE-2014-0107):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553991>
* Apache Groovy: KM02553992 (CVE-2015-3253):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553992>
* Python: KM02553997 (CVE-2015-5652):
*
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553997>
* Spring Framework: KM02553998 (CVE-2013-6429):
+
<https://softwaresupport.hpe.com/group/softwaresupport/search-result/-/facets
arch/document/KM02553998>
HISTORY
Version:1 (rev.1) - 4 November 2016 Initial release
Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported
product:
Web form: https://www.hpe.com/info/report-security-vulnerability
Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
Thanks to the efforts of Alvaro Munoz and the HP Fortify team, the
Apache Struts project team can recommend a first mitigation that is
relatively simple to apply. It involves the introduction of a generic
Servlet filter, adding the possibility to blacklist unacceptable request
parameters based on regular expressions. Please see the corresponding HP
Fortify blog entry [2] for detailed instructions. Based
on this information, the Apache Struts project team recommends to apply
the mitigation advice *immediately* for all Struts 1 based applications.
Struts 1 has had its End-Of-Life announcement more than one year ago
[3]. However, in a cross project effort the Struts team is looking for a
correction or an improved mitigation path. Please stay tuned for further
information regarding a solution.
This is a cross-list posting. If you have questions regarding this
report, please direct them to security@struts.apache.org only.
[1] http://struts.apache.org/release/2.3.x/docs/s2-021.html
[2]
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Protect-your-Struts1-applications/ba-p/6463188#.U2J7xeaSxro
[3] http://struts.apache.org/struts1eol-announcement.html
--
Ren\xe9 Gielen
http://twitter.com/rgielen
| VAR-201405-0243 | CVE-2014-0196 | Linux kernel n_tty_write 'function competition condition vulnerability |
CVSS V2: 6.9 CVSS V3: 5.5 Severity: MEDIUM |
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings. The Linux kernel is prone to a memory-corruption vulnerability.
Local attackers can exploit this issue to execute arbitrary code in contexts of the application or corrupt the kernel memory. Failed exploit attempts can result in a denial-of-service condition.
Linux kernel 3.0 through versions 3.14.3 are vulnerable.
This BID is being retired as a duplicate of BID 67199. The NFSv4 implementation is one of the distributed file system protocols. The vulnerability is caused by the program not properly managing the access rights of the tty driver. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security update
Advisory ID: RHSA-2014:0557-01
Product: Red Hat Enterprise MRG for RHEL-6
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0557.html
Issue date: 2014-05-27
CVE Names: CVE-2014-0100 CVE-2014-0196 CVE-2014-1737
CVE-2014-1738 CVE-2014-2672 CVE-2014-2678
CVE-2014-2706 CVE-2014-2851 CVE-2014-3122
=====================================================================
1. Summary:
Updated kernel-rt packages that fix multiple security issues are now
available for Red Hat Enterprise MRG 2.5.
The Red Hat Security Response Team has rated this update as having
Important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
2. Relevant releases/architectures:
MRG Realtime for RHEL 6 Server v.2 - noarch, x86_64
3.
* A race condition leading to a use-after-free flaw was found in the way
the Linux kernel's TCP/IP protocol suite implementation handled the
addition of fragments to the LRU (Last-Recently Used) list under certain
conditions. A remote attacker could use this flaw to crash the system or,
potentially, escalate their privileges on the system by sending a large
amount of specially crafted fragmented packets to that system.
(CVE-2014-0100, Important)
* A race condition flaw, leading to heap-based buffer overflows, was found
in the way the Linux kernel's N_TTY line discipline (LDISC) implementation
handled concurrent processing of echo output and TTY write operations
originating from user space when the underlying TTY driver was PTY.
An unprivileged, local user could use this flaw to crash the system or,
potentially, escalate their privileges on the system. (CVE-2014-0196,
Important)
* A flaw was found in the way the Linux kernel's floppy driver handled user
space provided data in certain error code paths while processing FDRAWCMD
IOCTL commands.
(CVE-2014-1737, Important)
* It was found that the Linux kernel's floppy driver leaked internal kernel
memory addresses to user space during the processing of the FDRAWCMD IOCTL
command. A local user with write access to /dev/fdX could use this flaw to
obtain information about the kernel heap arrangement. (CVE-2014-1738, Low)
Note: A local user with write access to /dev/fdX could use these two flaws
(CVE-2014-1737 in combination with CVE-2014-1738) to escalate their
privileges on the system.
* A use-after-free flaw was found in the way the ping_init_sock() function
of the Linux kernel handled the group_info reference counter. A local,
unprivileged user could use this flaw to crash the system or, potentially,
escalate their privileges on the system. (CVE-2014-2851, Important)
* It was found that a remote attacker could use a race condition flaw in
the ath_tx_aggr_sleep() function to crash the system by creating large
network traffic on the system's Atheros 9k wireless network adapter.
(CVE-2014-2672, Moderate)
* A NULL pointer dereference flaw was found in the rds_iw_laddr_check()
function in the Linux kernel's implementation of Reliable Datagram Sockets
(RDS). A local, unprivileged user could use this flaw to crash the system.
(CVE-2014-2678, Moderate)
* A race condition flaw was found in the way the Linux kernel's mac80211
subsystem implementation handled synchronization between TX and STA wake-up
code paths. A remote attacker could use this flaw to crash the system.
(CVE-2014-2706, Moderate)
* It was found that the try_to_unmap_cluster() function in the Linux
kernel's Memory Managment subsystem did not properly handle page locking in
certain cases, which could potentially trigger the BUG_ON() macro in the
mlock_vma_page() function. A local, unprivileged user could use this flaw
to crash the system. (CVE-2014-3122, Moderate)
Red Hat would like to thank Matthew Daley for reporting CVE-2014-1737 and
CVE-2014-1738. The CVE-2014-0100 issue was discovered by Nikolay
Aleksandrov of Red Hat.
Users are advised to upgrade to these updated packages, which upgrade the
kernel-rt kernel to version kernel-rt-3.10.33-rt32.34 and correct these
issues. The system must be rebooted for this update to take effect.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not use
"rpm -Uvh" as that will remove the running kernel binaries from your
system. You may use "rpm -e" to remove old kernels after determining that
the new kernel functions properly on your system.
5. Bugs fixed (https://bugzilla.redhat.com/):
1070618 - CVE-2014-0100 kernel: net: inet frag code race condition leading to user-after-free
1083246 - CVE-2014-2672 kernel: ath9k: tid->sched race in ath_tx_aggr_sleep()
1083274 - CVE-2014-2678 kernel: net: rds: dereference of a NULL device in rds_iw_laddr_check()
1083512 - CVE-2014-2706 Kernel: net: mac80211: crash dues to AP powersave TX vs. wakeup race
1086730 - CVE-2014-2851 kernel: net: ping: refcount issue in ping_init_sock() function
1093076 - CVE-2014-3122 Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
1094232 - CVE-2014-0196 kernel: pty layer race condition leading to memory corruption
1094299 - CVE-2014-1737 CVE-2014-1738 kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command
6. Package List:
MRG Realtime for RHEL 6 Server v.2:
Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEMRG-RHEL6/SRPMS/kernel-rt-3.10.33-rt32.34.el6rt.src.rpm
noarch:
kernel-rt-doc-3.10.33-rt32.34.el6rt.noarch.rpm
kernel-rt-firmware-3.10.33-rt32.34.el6rt.noarch.rpm
x86_64:
kernel-rt-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-debug-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-debug-debuginfo-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-debug-devel-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-debuginfo-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-devel-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-trace-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-trace-debuginfo-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-trace-devel-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-vanilla-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-vanilla-debuginfo-3.10.33-rt32.34.el6rt.x86_64.rpm
kernel-rt-vanilla-devel-3.10.33-rt32.34.el6rt.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0100.html
https://www.redhat.com/security/data/cve/CVE-2014-0196.html
https://www.redhat.com/security/data/cve/CVE-2014-1737.html
https://www.redhat.com/security/data/cve/CVE-2014-1738.html
https://www.redhat.com/security/data/cve/CVE-2014-2672.html
https://www.redhat.com/security/data/cve/CVE-2014-2678.html
https://www.redhat.com/security/data/cve/CVE-2014-2706.html
https://www.redhat.com/security/data/cve/CVE-2014-2851.html
https://www.redhat.com/security/data/cve/CVE-2014-3122.html
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFThL2GXlSAg2UNWIIRAnKNAKC8L7AEZsVfN3SDIRby/ZWJeNGsfACePcvG
f8gO1I7yuxLQ1jWWp5abYcQ=
=WQJC
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Relevant releases/architectures:
Red Hat Enterprise Linux Compute Node EUS (v. 6.3) - noarch, x86_64
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3) - x86_64
Red Hat Enterprise Linux Server EUS (v. 6.3) - i386, noarch, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional EUS (v. 6.3) - i386, ppc64, s390x, x86_64
3. 6.3):
Source:
kernel-2.6.32-279.43.2.el6.src.rpm
noarch:
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
x86_64:
kernel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-devel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.2.el6.x86_64.rpm
kernel-devel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-headers-2.6.32-279.43.2.el6.x86_64.rpm
perf-2.6.32-279.43.2.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.2.el6.src.rpm
x86_64:
kernel-debug-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.2.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
python-perf-2.6.32-279.43.2.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.3):
Source:
kernel-2.6.32-279.43.2.el6.src.rpm
i386:
kernel-2.6.32-279.43.2.el6.i686.rpm
kernel-debug-2.6.32-279.43.2.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-279.43.2.el6.i686.rpm
kernel-debug-devel-2.6.32-279.43.2.el6.i686.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-279.43.2.el6.i686.rpm
kernel-devel-2.6.32-279.43.2.el6.i686.rpm
kernel-headers-2.6.32-279.43.2.el6.i686.rpm
perf-2.6.32-279.43.2.el6.i686.rpm
perf-debuginfo-2.6.32-279.43.2.el6.i686.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.i686.rpm
noarch:
kernel-doc-2.6.32-279.43.2.el6.noarch.rpm
kernel-firmware-2.6.32-279.43.2.el6.noarch.rpm
ppc64:
kernel-2.6.32-279.43.2.el6.ppc64.rpm
kernel-bootwrapper-2.6.32-279.43.2.el6.ppc64.rpm
kernel-debug-2.6.32-279.43.2.el6.ppc64.rpm
kernel-debug-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
kernel-debug-devel-2.6.32-279.43.2.el6.ppc64.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
kernel-debuginfo-common-ppc64-2.6.32-279.43.2.el6.ppc64.rpm
kernel-devel-2.6.32-279.43.2.el6.ppc64.rpm
kernel-headers-2.6.32-279.43.2.el6.ppc64.rpm
perf-2.6.32-279.43.2.el6.ppc64.rpm
perf-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.ppc64.rpm
s390x:
kernel-2.6.32-279.43.2.el6.s390x.rpm
kernel-debug-2.6.32-279.43.2.el6.s390x.rpm
kernel-debug-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
kernel-debug-devel-2.6.32-279.43.2.el6.s390x.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
kernel-debuginfo-common-s390x-2.6.32-279.43.2.el6.s390x.rpm
kernel-devel-2.6.32-279.43.2.el6.s390x.rpm
kernel-headers-2.6.32-279.43.2.el6.s390x.rpm
kernel-kdump-2.6.32-279.43.2.el6.s390x.rpm
kernel-kdump-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
kernel-kdump-devel-2.6.32-279.43.2.el6.s390x.rpm
perf-2.6.32-279.43.2.el6.s390x.rpm
perf-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.s390x.rpm
x86_64:
kernel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debug-devel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-279.43.2.el6.x86_64.rpm
kernel-devel-2.6.32-279.43.2.el6.x86_64.rpm
kernel-headers-2.6.32-279.43.2.el6.x86_64.rpm
perf-2.6.32-279.43.2.el6.x86_64.rpm
perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-279.43.2.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2014:124
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : kernel
Date : June 13, 2014
Affected: Business Server 1.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in the Linux
kernel:
kernel/auditsc.c in the Linux kernel through 3.14.5, when
CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows
local users to obtain potentially sensitive single-bit values from
kernel memory or cause a denial of service (OOPS) via a large value
of a syscall number (CVE-2014-3917).
The futex_requeue function in kernel/futex.c in the Linux kernel
through 3.14.5 does not ensure that calls have two different futex
addresses, which allows local users to gain privileges via a crafted
FUTEX_REQUEUE command that facilitates unsafe waiter modification
(CVE-2014-3153). NOTE: the affected code was moved to
the __skb_get_nlattr and __skb_get_nlattr_nest functions before the
vulnerability was announced (CVE-2014-3144). NOTE: the affected code was moved to the
__skb_get_nlattr_nest function before the vulnerability was announced
(CVE-2014-3145).
Multiple array index errors in drivers/hid/hid-multitouch.c in the
Human Interface Device (HID) subsystem in the Linux kernel through
3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate
attackers to cause a denial of service (heap memory corruption, or NULL
pointer dereference and OOPS) via a crafted device (CVE-2013-2897).
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the
Linux kernel through 3.13.6 does not validate certain auth_enable
and auth_capable fields before making an sctp_sf_authenticate call,
which allows remote attackers to cause a denial of service (NULL
pointer dereference and system crash) via an SCTP handshake with
a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO
chunk (CVE-2014-0101). The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFTmvH3mqjQ0CJFipgRAjgaAKDtCfvK/cukQMyPkhdgllxaobQHFQCdHoJo
g42VcK2YoEgcX9BPP3/zfWg=
=4uZg
-----END PGP SIGNATURE-----
. ============================================================================
Ubuntu Security Notice USN-2260-1
June 27, 2014
linux-lts-trusty vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux-lts-trusty: Block storage devices (udeb)
Details:
A flaw was discovered in the Linux kernel's pseudo tty (pty) device.
(CVE-2014-0196)
Pinkie Pie discovered a flaw in the Linux kernel's futex subsystem. (CVE-2014-1737)
A flaw was discovered in the handling of network packets when mergeable
buffers are disabled for virtual machines in the Linux kernel. (CVE-2014-2568)
A flaw was discovered in the Linux kernel's ping sockets.
(CVE-2014-2851)
Sasha Levin reported a bug in the Linux kernel's virtual memory management
subsystem. (CVE-2014-3122)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
linux-image-3.13.0-30-generic 3.13.0-30.54~precise2
linux-image-3.13.0-30-generic-lpae 3.13.0-30.54~precise2
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well
| VAR-201404-0530 | CVE-2014-3130 | SAP Netweaver ABAP Application Server of Basis of ABAP Help Vulnerability gained in documentation and translation tools |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The ABAP Help documentation and translation tools (BC-DOC-HLP) in Basis in SAP Netweaver ABAP Application Server does not properly restrict access, which allows local users to gain privileges and execute ABAP instructions via crafted help messages. SAP BASIS is prone to a security bypass vulnerability.
Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and to gain unauthorized actions
| VAR-201404-0560 | CVE-2014-2182 | Cisco Adaptive Security Appliance Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Cisco Adaptive Security Appliance (ASA) Software, when DHCPv6 replay is configured, allows remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 packet, aka Bug ID CSCun45520.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is tracked by Cisco Bug ID CSCun45520