VARIoT IoT vulnerabilities database
| VAR-201404-0081 | CVE-2013-0662 |
Schneider Electric Heap Buffer Overflow Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201403-0101, VAR-E-201403-0100 |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. The Modbus Serial driver used by many Schneider Electric products monitors the TCP 27700 port. Successful exploitation of vulnerabilities can execute arbitrary code in the context of an application. Multiple Schneider Electric Products are prone to a remote buffer-overflow vulnerability because it fails to properly validate user-supplied input. Failed exploit attempts will result in a denial-of-service condition.
The following products are vulnerable:
TwidoSuite 2.31.04 and prior
PowerSuite 2.6 and prior
SoMove 1.7 and prior
SoMachine 2.0, 3.0, 3.1, and 3.0 XS
Unity Pro 7.0 and prior
UnityLoader 2.3 and prior
Concept 2.6 SR7 and prior
ModbusCommDTM sl 2.1.2 and prior
PL7 4.5 SP5 and prior
SFT2841 14, 13.1 and prior
OPC Factory Server 3.50 and prior
| VAR-201403-0243 | CVE-2014-1982 | plural Allied Telesis Vulnerability gained in router products |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The administrative interface in Allied Telesis AT-RG634A ADSL Broadband router 3.3+, iMG624A firmware 3.5, iMG616LH firmware 2.4, and iMG646BD firmware 3.5 allows remote attackers to gain privileges and execute arbitrary commands via a direct request to cli.html. Allied Telesis AT-RG634A ADSL Broadband route is a broadband router device.
Allied Telesis AT-RG634A has a hidden http://<device IP>/cli.html page that allows attackers to connect via HTTP and execute commands in the administrator context. Allied Telesis Multiple Products are prone to an unauthorized-access vulnerability. This may aid in further attacks.
The following products are vulnerable:
Allied Telesis AT-RG634A firmware versions after 3.3; other versions may also be affected.
Allied Telesis AT-iMG624A firmware version 3.5.
Allied Telesis AT-iMG616LH firmware versions after 2.4.
Allied Telesis AT-iMG646BD firmware version 3.5
| VAR-201403-0475 | CVE-2014-2106 |
Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201204-0003, VAR-E-201204-0002, VAR-E-201204-0001 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco IOS 15.3M before 15.3(3)M2 and IOS XE 3.10.xS before 3.10.2S allow remote attackers to cause a denial of service (device reload) via crafted SIP messages, aka Bug ID CSCug45898. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A remote denial of service vulnerability exists in Cisco IOS/IOS XE-specific SIP message processing.
This issue is being tracked by Cisco Bug ID CSCug45898
| VAR-201403-0476 | CVE-2014-2107 | Cisco IOS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco IOS 12.2 and 15.0 through 15.3, when used with the Kailash FPGA before 2.6 on RSP720-3C-10GE and RSP720-3CXL-10GE devices, allows remote attackers to cause a denial of service (route switch processor outage) via crafted IP packets, aka Bug ID CSCug84789. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCug84789. The following releases are affected: Cisco IOS release 12.2 and releases 15.0 through 15.3 with the Kailash FPGA prior to 2.6
| VAR-201403-0477 | CVE-2014-2108 |
Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201204-0003, VAR-E-201204-0002, VAR-E-201204-0001 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco IOS 12.2 and 15.0 through 15.3 and IOS XE 3.2 through 3.7 before 3.7.5S and 3.8 through 3.10 before 3.10.1S allow remote attackers to cause a denial of service (device reload) via a malformed IKEv2 packet, aka Bug ID CSCui88426. Vendors have confirmed this vulnerability Bug ID CSCui88426 It is released as.Malformed by a third party IKEv2 Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A remote attacker exploits this vulnerability to create a denial of service (memory exhaustion) through a specially crafted IKEv2 packet.
An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCui88426
| VAR-201403-0478 | CVE-2014-2109 |
Cisco IOS of TCP Input Denial of service in module (DoS) Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201204-0003, VAR-E-201204-0002, VAR-E-201204-0001 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The TCP Input module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted TCP packets, aka Bug IDs CSCuh33843 and CSCuj41494. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches.
This issue is being tracked by Cisco Bug ID CSCue00996, CSCuh33843 and CSCuj41494
| VAR-201403-0479 | CVE-2014-2111 |
Cisco IOS of Application Layer Gateway Service disruption in modules (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201204-0003, VAR-E-201204-0002, VAR-E-201204-0001 |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Application Layer Gateway (ALG) module in Cisco IOS 12.2 through 12.4 and 15.0 through 15.4, when NAT is used, allows remote attackers to cause a denial of service (device reload) via crafted DNS packets, aka Bug ID CSCue00996. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches.
This issue is being tracked by Cisco Bug ID CSCue00996, CSCuh33843 and CSCuj41494
| VAR-201403-0480 | CVE-2014-2112 | Cisco IOS of SSL VPN Denial of service in function (DoS) Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SSL VPN (aka WebVPN) feature in Cisco IOS 15.1 through 15.4 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP requests, aka Bug ID CSCuf51357. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS is prone to a remote denial-of-service vulnerability.
Exploiting this issue may allow remote attackers to trigger denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCuf51357
| VAR-201403-0463 | CVE-2014-2113 | Cisco IOS and IOS XE Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco IOS 15.1 through 15.3 and IOS XE 3.3 and 3.5 before 3.5.2E; 3.7 before 3.7.5S; and 3.8, 3.9, and 3.10 before 3.10.2S allow remote attackers to cause a denial of service (I/O memory consumption and device reload) via a malformed IPv6 packet, aka Bug ID CSCui59540. There is a possibility. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. A remote denial of service vulnerability exists in Cisco IOS/IOS XE-specific IPv6 packet processing I/O.
Attackers can exploit this issue to crash the affected application, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCui59540. The following releases are affected: Cisco IOS Releases 15.1 through 15.3; IOS XE Release 3.3, Release 3.5 prior to 3.5.2E, Release 3.7 prior to 3.7.5S, Release 3.8, Release 3.9, Release 3.10 prior to 3.10.2S
| VAR-201404-0592 | CVE-2014-0160 |
LibYAML 'yaml_parser_scan_uri_escapes()' Function Remote Heap Based Buffer Overflow Vulnerability
Related entries in the VARIoT exploits database: VAR-E-201404-0110, VAR-E-201404-0107, VAR-E-201404-0108, VAR-E-201404-0109 |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. LibYAML is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly sanitize user-supplied input.
Successful exploits allow remote attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts likely result in denial-of-service conditions.
Versions prior to LibYAML 0.1.6 are vulnerable.
HP CloudSystem Matrix 7.3 Update 1 v7.3.1.0 and HP CloudSystem built on
ConvergedSystem 700x solutions support customers moving from OA 4.11 to OA
4.12.
OpenSSL is a 3rd party product that is embedded with some of HP Software
products. This bulletin objective is to notify HP Software customers about
products affected by the Heartbleed vulnerability. This weakness
potentially allows disclosure of information protected, under normal
conditions, by the SSL/TLS protocol. The impacted products appear in the list
below are vulnerable due to embedding OpenSSL standard release software. Each bulletin will include a patch and/or mitigation
guideline.
Note: OpenSSL is an external product embedded in HP products.
Bulletin Applicability:
This bulletin applies to each OpenSSL component that is embedded within the
HP products listed in the security bulletin. The bulletin does not apply to
any other 3rd party application (e.g. operating system, web server, or
application server) that may be required to be installed by the customer
according instructions in the product install guide.
To learn more about HP Software Incident Response, please visit http://www8.h
p.com/us/en/software-solutions/enterprise-software-security-center/response-c
enter.html .
There are no workarounds that mitigate these vulnerabilities. A vulnerability has been discovered in
OpenSSL library which may allow an unauthenticated, remote attacker to
retrieve memory in chunks of 64 kilobytes from a connected client or
server.
AFFECTED SOFTWARE VERSIONS AND DEVICES
Device Affected software
- --------------------- ------------------
Smart Cell Gateway 1.1.x
SmartCell Access Points NOT AFFECTED
ZoneDirector Controllers NOT AFFECTED
ZoneFlex Access Points NOT AFFECTED
Any products or services not mentioned in the table above are not affected
DETAILS
A vulnerability has been discovered in the popular OpenSSL
cryptographic software library. This weakness exists in OpenSSL's
implementation of the TLS/DTLS (transport layer security protocols)
heartbeat extension (RFC6520). This vulnerability is due to a missing
bounds check in implementation of the handling of the heartbeat
extension. When exploited, this issue may lead to leak of memory
contents from the server to the client and from the client to the
server.
IMPACT
Ruckus devices incorporate OpenSSL library to implement various
security related features. Below is list of the affected components:
- - Administrative HTTPS Interface (Port 8443)
CVSS v2 Base Score:5.0 (MEDIUM) (AV:N/AC:L/Au:N/C:P/I:N/A:N)
WORKAROUNDS
Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical. However, in the event that a patch cannot
immediately be applied, the following suggestions might help reduce
the risk:
- Do not expose administrative interfaces of Ruckus devices to
untrusted networks such as the Internet.
- Use a firewall to limit traffic to/from Ruckus device's
administrative interface to trusted hosts.
SOLUTION
Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical.
The following software builds have the fix (any later builds will also
have the fix):
Branch Software Build
- ------- ------------------
1.1.x 1.1.2.0.142
DISCOVERY
This vulnerability was disclosed online on various sources :
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
- - https://www.openssl.org/news/secadv_20140407.txt
- - http://heartbleed.com/
OBTAINING FIXED FIRMWARE
Ruckus customers can contact Ruckus support to obtain the fixed firmware
Ruckus Support contact list is at:
https://support.ruckuswireless.com/contact-us
PUBLIC ANNOUNCEMENTS
This security advisory will be made available for public consumption
on April 14, 2014 at the following source
Ruckus Website
http://www.ruckuswireless.com/security
SecurityFocus Bugtraq
http://www.securityfocus.com/archive/1
Future updates of this advisory, if any, will be placed on Ruckus's
website, but may or may not be actively announced on mailing lists.
REVISION HISTORY
Revision 1.0 / 14th April 2014 / Initial release
RUCKUS WIRELESS SECURITY PROCEDURES
Complete information on reporting security vulnerabilities in Ruckus
Wireless
products, obtaining assistance with security incidents is available at
http://www.ruckuswireless.com/security
For reporting new security issues, email can be sent to
security(at)ruckuswireless.com
For sensitive information we encourage the use of PGP encryption. Our
public keys can be
found at http://www.ruckuswireless.com/security
STATUS OF THIS NOTICE: Final
Although Ruckus cannot guarantee the accuracy of all statements
in this advisory, all of the facts have been checked to the best of our
ability. Ruckus does not anticipate issuing updated versions of
this advisory unless there is some material change in the facts. Should
there be a significant change in the facts, Ruckus may update this
advisory.
(c) Copyright 2014 by Ruckus Wireless
This advisory may be redistributed freely after the public release
date given at
the top of the text, provided that redistributed copies are complete and
unmodified, including all date and version information. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/
docDisplay?docId=emr_na-c04263236
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04263236
Version: 2
HPSBMU03022 rev.2 - HP Systems Insight Manager (SIM) Bundled Software running
OpenSSL, Remote Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.
Release Date: 2014-04-25
Last Updated: 2014-05-13
Potential Security Impact: Remote disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Systems
Insight Management (SIM) bundled software running OpenSSL. This is the
OpenSSL vulnerability known as "Heartbleed" which could be exploited remotely
resulting in disclosure of information.
The HP SIM software itself is not vulnerable to CVE-2014-0160 ("Heartbleed").
However, the software components bundled with HP SIM are impacted and should
be addressed if installed.
References: CVE-2014-0160, SSRT101527
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP Systems Insight Manager 7.2, 7.2.1, 7.2.2, 7.3, and 7.3.1 bundled with the
following software:
HP Smart Update Manager (SUM) 6.0.0 through 6.3.0
HP System Management Homepage (SMH) v7.1.2, v7.2, v7.2.1, v7.2.2, v7.3,
v7.3.1 for Linux and Windows
WMI Mapper for HP Systems Insight Manager v7.2.1, v7.2.2, v7.3, and v7.3.1
HP Version Control Agent (VCA) v7.2.0, v7.2.1, v7.2.2, v7.3.0, and v7.3.1 for
Windows
HP Version Control Agent (VCA) v7.2.2, v7.3.0, and v7.3.1 for Linux
HP Version Control Repository Manager (VCRM) v7.2.0, v7.2.1, v7.2.2, v7.3.0,
and v7.3.1 for Windows
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has addressed this vulnerability for the impacted software components
bundled with HP Systems Insight Manager (SIM) in the following HP Security
Bulletins:
HP SIM Component
HP Security Bulletin
Security Bulletin Location
HP Smart Update Manager (SUM)
HPSBMU02997
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_
na-c04239375
HP System Management Homepage (SMH)
HPSBMU02998
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_
na-c04239372
WMI Mapper for HP Systems Insight Manager
HPSBMU03013
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_
na-c04260385
HP Version Control Agent (VCA) and Version Control Repository Manager (VCRM)
on Linux and Windows,
HPSBMU03020
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_
na-c04262472
Note: If customers believe that the SIM installation was compromised while it
was running components vulnerable to Heartbleed they need to take the
following actions once they have upgraded to the non-vulnerable components.
This includes revoking, recreating, and re-importing certificates and
resetting passwords that might have been harvested by a malicious attacker
using the Heartbleed vulnerability.
HP has made the following hot fixes available for SIM v7.2.x that fix the
Heartbleed vulnerability: The HP SIM 7.2 Hotfix Kit is available in the
following location and is applicable to HP SIM 7.2.x installations. Please
read through the readme.txt file before proceeding with the installation.
Please click on the HP SIM 7.2 HotFix Kit link to download the hot fix for
your operating system platform:
http://h18013.www1.hp.com/products/servers/management/hpsim/download.html
After installing SIM72_hotfix_2014_Apr_win.exe hotfix, HP Systems Management
Homepage has to be manually upgraded if it is already installed on the CMS.
HP SMH installer for 32-bit and 64-bit can be found in the CMS under the
location SIM_INSTALL_DIR\smartcomponents . The installer filenames are
cp023242.exe and cp023243.exe.
In case it is suspected that the infrastructure has been compromised, the
user needs to create new HP SIM Server certificate and Single Sign-on (sso)
certificates. To create new server and sso certificates, refer the HP SIM 7.2
Command Line Interface guide which can be found in the below URL:
ttp://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/inde
x
Refer to the mxcert command section which has the details to create new
server and sso certificates.
Once the new server certificate is created, it will invalidate any trust
relationship between CMS and any other system that depend on this
certificate, such as browsers. The user must re-establish the trust between
CMS and other system that uses this certificate, and revoke any previous SIM
certificates from any device previously configured to trust SIM (Onboard
Administrator, Virtual Connect Module, iLOs, and SMH instances).
Once the new sso certificate is created, the user must re-establish the trust
between HP SIM and managed devices (HP SMH, ILO, OA. VC) for Single Sign-on
to work. To reestablish trust with the sso certificate, refer to HP SIM 7.2
user guide and HP SIM Online help (under security section). HP SIM 7.2 user
guide is located in the below URL:
http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c03651392-3.pdf
HP SIM 7.3 user guide is located in the below URL:
http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c04030739-2.pdf
CMS Reconfigure Tool (aka mxrefconfig)
In case it is suspected that CMS OS credentials are also compromised, then it
is recommended that credentials are changed. The SIM User Guide (Chapter 19
CMS Reconfigure Tool pg 93) provides two procedures to change the service
account password along with other related accounts. The procedures to follow
are:
Procedure 18 - Changing the CMS password for HP SIM and Insight Control
Procedure 19 - Changing CMS password for Matrix OE and Operations
Orchestration
Note:
if the customer has Insight Control server deployment installed, procedures
to change the password are documented in the HP Insight Control Server
Deployment User Guide.
Frequently Asked Questions:
Will updated systems require a reboot after applying the SIM hotfix?
No, reboot of the system will not be required. Installing the new build would
be sufficient to get back to the normal state.
Will new certificates be issued along with the patch, or need to be handled
separately?
If you suspect the certificate has been compromised due to this
vulnerability, we do recommend creating new certificates for server and
Single Sign-on and revoking previous certificates. Instructions on creating
new certificate and re-establishing trust between CMS and managed devices are
in the notes above.
- From where can I get HP SIM documentation?
All major documents are available at:
http://h17007.www1.hp.com/us/en/enterprise/servers/solutions/info-library/ind
ex.aspx?cat=insightmanagement&subcat=sim#.U2yioSi20tM
HISTORY
Version:1 (rev.1) - 25 April 2014 Initial release
Version:2 (rev.2) - 13 May 2014 Added additional remediation steps and v7.2
Hotfix
Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.
3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlNyXGAACgkQ4B86/C0qfVmjYgCggwxWeqRDnEyVKK5E1ZRxB5Lh
kYwAnj6XwjTIE82rjAsetI1Af/VO2tsC
=XSLk
-----END PGP SIGNATURE-----
.
HP Multimedia Service Environment (MSE) 2.1.1
HP Network Interactive Voice Response (NIVR) 2.1.0, Reactive Patches 001,
002, 003
HP Network Interactive Voice Response (NIVR) 2.0.7, Reactive Patch 003
Only the MSE (ACM TMP) database set up with Replication using SSL is impacted
for the above versions. This bulletin will be revised when the software updates are
released.
BACKGROUND
CVSS 2.0 Base Metrics
===========================================================
Reference Base Vector Base Score
CVE-2014-0160 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided firmware updates that address this vulnerability. Please see
the table below. To obtain the updated firmware, follow the below steps to
obtain the firmware Update.
Obtain the firmware update from www.hp.com/go/support
Select "Drivers & Downloads".
Enter the product name listed in the table below into the search field.
Click on "Go".
Click on the appropriate product.
Under "Select operating system" select any Windows operating system from the
list.
Select the appropriate firmware update under "Firmware".
All users are urged to upgrade their openssl packages (especially
libssl1.0.0) and restart applications as soon as possible.
According to the currently available information, private keys should be
considered as compromised and regenerated as soon as possible. More
details will be communicated at a later time.
The oldstable distribution (squeeze) is not affected by this
vulnerability.
For the stable distribution (wheezy), this problem has been fixed in
version 1.0.1e-2+deb7u5.
For the testing distribution (jessie), this problem has been fixed in
version 1.0.1g-1.
For the unstable distribution (sid), this problem has been fixed in
version 1.0.1g-1.
We recommend that you upgrade your openssl packages.
Until the firmware updates are available, HP recommends that customers
disable the HTTPS management protocol and instead manage the device securely
using SSH.
HP System Management Homepage (SMH) v7.1.2, v7.2, v7.2.1, v7.2.2, v7.3,
v7.3.1 for Linux and Windows. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Important: rhev-hypervisor6 security update
Advisory ID: RHSA-2014:0378-01
Product: Red Hat Enterprise Virtualization
Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0378.html
Issue date: 2014-04-08
CVE Names: CVE-2014-0160
=====================================================================
1. Summary:
An updated rhev-hypervisor6 package that fixes one security issue is now
available.
The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
2. Relevant releases/architectures:
RHEV Hypervisor for RHEL-6 - noarch
3. Description:
The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: a subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
An information disclosure flaw was found in the way OpenSSL handled TLS and
DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server
could send a specially crafted TLS or DTLS Heartbeat packet to disclose a
limited portion of memory per request from a connected client or server.
Note that the disclosed portions of memory could potentially include
sensitive information such as private keys. (CVE-2014-0160)
Red Hat would like to thank the OpenSSL project for reporting this issue.
Upstream acknowledges Neel Mehta of Google Security as the original
reporter.
Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which corrects this issue.
4. Solution:
This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
To upgrade Hypervisors in Red Hat Enterprise Virtualization environments
using the disk image provided by this package, refer to:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux
/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat
_Enterprise_Virtualization_Hypervisors.html
5. Bugs fixed (https://bugzilla.redhat.com/):
1084875 - CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets
6. Package List:
RHEV Hypervisor for RHEL-6:
noarch:
rhev-hypervisor6-6.5-20140407.0.el6ev.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package
7. References:
https://www.redhat.com/security/data/cve/CVE-2014-0160.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc
| VAR-201404-0424 | CVE-2014-2879 | Dell SonicWALL Email Security Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in Dell SonicWALL Email Security 7.4.5 and earlier allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the uploadPatch parameter to the System/Advanced page (settings_advanced.html) or (2) the uploadLicenses parameter in the License management (settings_upload_dlicense.html) page. The Dell SonicWall EMail Security Appliance is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input.
Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.
Dell SonicWall EMail Security Appliance 7.4.5 and prior versions are vulnerable. This scheme can effectively prevent various types of email attacks and supports encryption of data and information in emails. Filter the 'uploadLicenses' parameter
| VAR-201403-0252 | CVE-2014-1300 | OS X Run on Apple Safari Used in etc. Webkit In root Vulnerability to execute arbitrary code with privileges |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
Unspecified vulnerability in Apple Safari 7.0.2 on OS X allows remote attackers to execute arbitrary code with root privileges via unknown vectors, as demonstrated by Google during a Pwn4Fun competition at CanSecWest 2014. OS X Run on Apple Safari Used in etc. This vulnerability CanSecWest 2014 of Pwn4Fun Proven in competition.By a third party root An arbitrary code may be executed with privileges. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of string objects. The issue lies in the joining of strings in an array. An attacker can leverage this vulnerability to execute code under the context of the current process. WebKit is prone to an unspecified memory-corruption vulnerability. Failed exploit attempts will likely result in denial-of-service conditions.
CVE-ID
CVE-2014-1297 : Ian Beer of Google Project Zero
For OS X Mavericks and OS X Mountain Lion systems, Safari 7.0.3
and Safari 6.1.3 may be obtained from Mac App Store. ------------------------------------------------------------------------
WebKitGTK+ Security Advisory WSA-2015-0001
------------------------------------------------------------------------
Date reported : January 26, 2015
Advisory ID : WSA-2015-0001
Advisory URL : http://webkitgtk.org/security/WSA-2015-0001.html
Affected versions : 2.4 series before 2.4.1, 2.4.2 and 2.4.8.
CVE identifiers : CVE-2013-2871, CVE-2014-1292, CVE-2014-1298,
CVE-2014-1299, CVE-2014-1300, CVE-2014-1303,
CVE-2014-1304, CVE-2014-1305, CVE-2014-1307,
CVE-2014-1308, CVE-2014-1309, CVE-2014-1311,
CVE-2014-1313, CVE-2014-1713, CVE-2014-1297,
CVE-2013-2875, CVE-2013-2927, CVE-2014-1323,
CVE-2014-1326, CVE-2014-1329, CVE-2014-1330,
CVE-2014-1331, CVE-2014-1333, CVE-2014-1334,
CVE-2014-1335, CVE-2014-1336, CVE-2014-1337,
CVE-2014-1338, CVE-2014-1339, CVE-2014-1341,
CVE-2014-1342, CVE-2014-1343, CVE-2014-1731,
CVE-2014-1346, CVE-2014-1344, CVE-2014-1384,
CVE-2014-1385, CVE-2014-1387, CVE-2014-1388,
CVE-2014-1389, CVE-2014-1390.
Several vulnerabilities were discovered on the 2.4 stable series of
WebKitGTK+.
CVE-2013-2871
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to miaubiz.
CVE-2014-1292
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1298
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1299
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team, Apple, Renata Hodovan of
University of Szeged / Samsung Electronics.
CVE-2014-1300
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Ian Beer of Google Project Zero working with HP's Zero Day
Initiative.
CVE-2014-1303
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to KeenTeam working with HP's Zero Day Initiative.
CVE-2014-1304
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Apple.
CVE-2014-1305
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Apple.
CVE-2014-1307
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1308
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1309
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to cloudfuzzer.
CVE-2014-1311
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1313
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Google Chrome Security Team.
CVE-2014-1713
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to VUPEN working with HP's Zero Day Initiative.
CVE-2014-1297
Versions affected: WebKitGTK+ 2.4.X before 2.4.1.
Credit to Ian Beer of Google Project Zero.
CVE-2013-2875
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to miaubiz.
CVE-2013-2927
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to cloudfuzzer.
CVE-2014-1323
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to banty.
CVE-2014-1326
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Apple.
CVE-2014-1329
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1330
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1331
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to cloudfuzzer.
CVE-2014-1333
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1334
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Apple.
CVE-2014-1335
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1336
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Apple.
CVE-2014-1337
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Apple.
CVE-2014-1338
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1339
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Atte Kettunen of OUSPG.
CVE-2014-1341
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1342
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Apple.
CVE-2014-1343
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Google Chrome Security Team.
CVE-2014-1731
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to an anonymous member of the Blink development community.
core/html/HTMLSelectElement.cpp in the DOM implementation in Blink,
as used in Google Chrome before 34.0.1847.131 on Windows and OS X
and before 34.0.1847.132 on Linux, does not properly check renderer
state upon a focus event, which allows remote attackers to cause a
denial of service or possibly have unspecified other impact via
vectors that leverage "type confusion" for SELECT elements.
CVE-2014-1346
Versions affected: WebKitGTK+ 2.4.X before 2.4.2.
Credit to Erling Ellingsen of Facebook.
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4,
does not properly interpret Unicode encoding, which allows remote
attackers to spoof a postMessage origin, and bypass intended
restrictions on sending a message to a connected frame or window,
via crafted characters in a URL.
CVE-2014-1344
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Ian Beer of Google Project Zero.
CVE-2014-1384
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Apple.
CVE-2014-1385
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Apple.
CVE-2014-1387
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Google Chrome Security Team.
CVE-2014-1388
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Apple.
CVE-2014-1389
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Apple.
CVE-2014-1390
Versions affected: WebKitGTK+ 2.4.X before 2.4.8.
Credit to Apple.
For the 2.4 series, these problems have been fixed in release 2.4.8.
Further information about WebKitGTK+ Security Advisories can be found
at: http://webkitgtk.org/security.html
The WebKitGTK+ team,
January 26, 2015
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2014-04-22-2 iOS 7.1.1
iOS 7.1.1 is now available and addresses the following:
CFNetwork HTTPProtocol
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker in a privileged network position can obtain web
site credentials
Description: Set-Cookie HTTP headers would be processed even if the
connection closed before the header line was complete. An attacker
could strip security settings from the cookie by forcing the
connection to close before the security settings were sent, and then
obtain the value of the unprotected cookie. This issue was addressed
by ignoring incomplete HTTP header lines.
CVE-ID
CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris
IOKit Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user can read kernel pointers, which can be used to
bypass kernel address space layout randomization
Description: A set of kernel pointers stored in an IOKit object
could be retrieved from userland. This issue was addressed through
removing the pointers from the object.
CVE-ID
CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's
Zero Day Initiative
Security - Secure Transport
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may capture
data or change the operations performed in sessions protected by SSL
Description: In a 'triple handshake' attack, it was possible for an
attacker to establish two connections which had the same encryption
keys and handshake, insert the attacker's data in one connection, and
renegotiate so that the connections may be forwarded to each other.
To prevent attacks based on this scenario, Secure Transport was
changed so that, by default, a renegotiation must present the same
server certificate as was presented in the original connection.
CVE-ID
CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and
Alfredo Pironti of Prosecco at Inria Paris
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "7.1.1".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=ilSw
-----END PGP SIGNATURE-----
| VAR-201403-0358 | CVE-2014-0343 | Virtual Access GW6110A router privilege escalation vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
The web interface on Virtual Access GW6110A routers with software 9.00 before 9.09.27, 9.50 before 9.50.21, and 10.00 before 10.00.21 allows remote authenticated users to gain privileges via a modified JavaScript variable. Virtual Access Provided by GW6110A Contains a privilege escalation vulnerability. Virtual Access Provided by GW6110A of Web The administration screen shows the problem of managing user rights (CWE-472) A privilege escalation vulnerability exists. CWE-472: External Control of Assumed-Immutable Web Parameter http://cwe.mitre.org/data/definitions/472.htmlPrivileges may be elevated by users who can log in to the product. As a result, you may be able to access features with administrator privileges. Virtual Access GW6110A routers is a router device.
Remote attackers can exploit this issue to gain privileges and perform unauthorized actions
| VAR-201403-0714 | No CVE | Ubee EVW3200 Cross-Site Request Forgery Vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
The Ubee EVW3200 is a TV broadband cat product. The Ubee EVW3200 has a cross-site request forgery vulnerability that allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious operations in the target user context.
| VAR-201404-0553 | CVE-2014-0789 | plural Schneider Electric OPC Factory Server Product buffer overflow vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: MEDIUM |
Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions. Schneider Electric provides total solutions for the energy and infrastructure, industrial, data center and network, building and residential markets in more than 100 countries. Zone overflow vulnerability. Allowing a remote attacker to cause a denial of service through the \342\200\230long\342\200\231 parameter. Multiple Schneider Electric Products are prone to a remote buffer-overflow vulnerability because it fails to properly validate user-supplied input.
Attackers can exploit this issue to cause a denial-of-service condition.
The following products are vulnerable:
TLXCDSUOFS33 3.5 and prior
TLXCDSTOFS33 3.5 and prior
TLXCDLUOFS33 3.5 and prior
TLXCDLTOFS33 3.5 and prior
TLXCDLFOFS33 3.5 and prior. The application features easy integration, custom interface and more
| VAR-201403-0549 | CVE-2014-0628 | EMC RSA BSAFE Micro Edition Suite Service disruption in the server (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The server in EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.5 does not properly process certificate chains, which allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors. RSA BSAFE Micro Edition Suite (MES) is prone to a denial-of-service vulnerability.
Attackers can exploit this issue to cause the application to crash, denying service to legitimate users.
RSA BSAFE Micro Edition Suite (MES) prior 4.0.5 are vulnerable. The toolkit helps developers achieve stable and secure application design. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
ESA-2014-011: RSA BSAFE\xae Micro Edition Suite Server Crash Vulnerability
EMC Identifier: ESA-2014-011
CVE Identifier: CVE-2014-0628
Severity Rating: CVSS v2 Base Score: 5.4 (AV:N/AC:H/Au:N/C:N/I:N/A:C)
Affected Products:
RSA BSAFE Micro Edition Suite (MES) all 4.0.x versions prior to 4.0.5
Unaffected Products:
RSA BSAFE MES all 3.2.x versions
Summary:
RSA BSAFE MES 4.0.5 contains fix for a security vulnerability that could potentially be exploited by malicious users to deny access to the affected system.
Details:
This vulnerability may cause unpredictable application behavior resulting in a server crash due to faulty certificate chain processing logic.
Recommendation:
RSA recommends all customers upgrade to RSA BSAFE MES 4.0.5 at their earliest opportunity.
Obtaining Downloads:
To request your upgrade of the software, please call your local support telephone number (contact phone numbers are available at http://www.emc.com/support/rsa/contact/phone-numbers.htm) for most expedient service.
Obtaining Documentation:
To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.
Severity Rating:
For an explanation of Severity Ratings, refer to the Knowledge Base Article, \x93Security Advisories Severity Rating\x94 at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.
Obtaining More Information:
For more information about RSA products, visit the RSA web site at http://www.rsa.com.
Getting Support and Service:
For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.
General Customer Support Information:
http://www.emc.com/support/rsa/index.htm
RSA SecurCare Online:
https://knowledge.rsasecurity.com
EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details.
http://www.emc.com/support/rsa/eops/index.htm
SecurCare Online Security Advisories
RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
About RSA SecurCare Notes & Security Advisories Subscription
RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you\x92d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you\x92d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.
Sincerely,
RSA Customer Support
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (Cygwin)
iEYEARECAAYFAlMwP3kACgkQtjd2rKp+ALyJqgCffAZrlwRKpelw7DBIJI4wiMyb
d1IAoKKSaOrpCcHKhrcuZQRyIqi8Mzk7
=Tb8D
-----END PGP SIGNATURE-----
| VAR-201403-0558 | No CVE | D-Link DIR-600L '/goform/formSetPassword' Cross-Site Request Forgery Vulnerability |
CVSS V2: 3.5 CVSS V3: - Severity: LOW |
Dlink DIR-600L has a cross-site request forgery vulnerability that allows remote attackers to build malicious URIs, entice users to resolve, and perform malicious actions in the target user context. D-Link DIR-600L is a cloud router product of D-Link.
A cross-site request forgery vulnerability exists in D-Link DIR-600L. A remote attacker could use this vulnerability to perform unauthorized operations. Vulnerabilities in D-Link DIR-600L version 5.10, other versions may also be affected. This may lead to further attacks
| VAR-201403-0311 | CVE-2014-2250 | Siemens SIMATIC S7-1200 CPU PLC Vulnerability that breaks cryptographic protection mechanism in random number generation of devices |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251. This vulnerability CVE-2014-2251 Is a different vulnerability.A third party could break the cryptographic protection mechanism and hijack the session. The SIMATIC S7-1200 is a programmable controller for simple but highly precise automation tasks. The Siemens SIMATIC S7-1200 sends a specially crafted packet to TCP port 443, causing an attacker to exploit the vulnerability to put the device into defect mode. Siemens SIMATIC S7-1200 is prone to an entropy weakness.
Exploiting this issue can allow attackers to hijack another user's session and gain unauthorized access to the victim's account on the affected application.
Versions prior to SIMATIC S7-1200 4.0 are vulnerable. Siemens SIMATIC S7-1200 CPU PLC is a programmable logic controller (PLC) used in small and medium-sized automation systems developed by Siemens in Germany. The vulnerability is caused by the random number generator not having sufficient entropy
| VAR-201403-0313 | CVE-2014-2252 | Siemens SIMATIC S7-1200 Information Disclosure Vulnerability |
CVSS V2: 6.1 CVSS V3: - Severity: MEDIUM |
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253. The SIMATIC S7-1200 is a programmable controller for simple but highly precise automation tasks. An information disclosure vulnerability exists in the Siemens SIMATIC S7-1200, which can lead to hijacking sessions of another user due to weak entropy related errors in the random generator. Siemens SIMATIC S7-1200 is prone to a denial-of-service vulnerability.
Attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users.
Versions prior to SIMATIC S7-1200 4.0.0 are vulnerable. Siemens SIMATIC S7-1200 CPU PLC is a programmable logic controller (PLC) used in small and medium-sized automation systems developed by Siemens in Germany
| VAR-201403-0315 | CVE-2014-2254 | Siemens SIMATIC S7-1200 CPU PLC Service disruption on devices (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets, a different vulnerability than CVE-2014-2255. The SIMATIC S7-1200 is a programmable controller for simple but highly precise automation tasks. Siemens SIMATIC S7-1200 is prone to a denial-of-service vulnerability.
Remote attackers may exploit this issue to cause denial-of-service conditions, denying service to legitimate users.
Versions prior to SIMATIC S7-1200 4.0 are vulnerable. Siemens SIMATIC S7-1200 CPU PLC is a programmable logic controller (PLC) used in small and medium-sized automation systems developed by Siemens in Germany