VARIoT IoT vulnerabilities database
| VAR-201401-0178 | CVE-2013-4375 | Xen and QEMU of qemu-xen of qdisk PV Service disruption in disk backend (DoS) Vulnerabilities |
CVSS V2: 2.7 CVSS V3: - Severity: LOW |
The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors. Xen is an open source virtual machine monitor developed by the University of Cambridge. Xen 4.2.x, 4.3.x have errors related to mapping authorization references. A domain can be exploited to leak, and then another domain that shares the driver domain is denied service status. Xen is prone to a denial-of-service vulnerability.
Successful exploits may allow an attacker to cause a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201407-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Xen: Multiple Vunlerabilities
Date: July 16, 2014
Bugs: #440768, #484478, #486354, #497082, #497084, #497086,
#499054, #499124, #500528, #500530, #500536, #501080,
#501906, #505714, #509054, #513824
ID: 201407-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Xen, the worst of which
could lead to arbitrary code execution.
Background
==========
Xen is a bare-metal hypervisor.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulations/xen < 4.3.2-r4 >= 4.3.2-r4
*>= 4.2.4-r4
2 app-emulations/xen-tools
< 4.3.2-r5 >= 4.3.2-r5
*>= 4.2.4-r6
3 app-emulations/xen-pvgrub
< 4.3.2 *>= 4.3.2
*>= 4.2.4
-------------------------------------------------------------------
3 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.
Impact
======
A remote attacker can utilize multiple vectors to execute arbitrary
code, cause Denial of Service, or gain access to data on the host.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Xen 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.3.2-r2"
All Xen 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.2.4-r2"
All xen-tools 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-tools-4.3.2-r2"
All xen-tools 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-tools-4.2.4-r2"
All Xen PVGRUB 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-pvgrub-4.3.2"
All Xen PVGRUB 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-pvgrub-4.2.4"
References
==========
[ 1 ] CVE-2013-1442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442
[ 2 ] CVE-2013-4329
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329
[ 3 ] CVE-2013-4355
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355
[ 4 ] CVE-2013-4356
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356
[ 5 ] CVE-2013-4361
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361
[ 6 ] CVE-2013-4368
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368
[ 7 ] CVE-2013-4369
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369
[ 8 ] CVE-2013-4370
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370
[ 9 ] CVE-2013-4371
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371
[ 10 ] CVE-2013-4375
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375
[ 11 ] CVE-2013-4416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416
[ 12 ] CVE-2013-4494
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494
[ 13 ] CVE-2013-4551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551
[ 14 ] CVE-2013-4553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553
[ 15 ] CVE-2013-4554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554
[ 16 ] CVE-2013-6375
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375
[ 17 ] CVE-2013-6400
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400
[ 18 ] CVE-2013-6885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885
[ 19 ] CVE-2013-6885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885
[ 20 ] CVE-2014-1642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642
[ 21 ] CVE-2014-1666
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666
[ 22 ] CVE-2014-1891
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891
[ 23 ] CVE-2014-1892
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892
[ 24 ] CVE-2014-1893
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893
[ 25 ] CVE-2014-1894
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894
[ 26 ] CVE-2014-1895
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895
[ 27 ] CVE-2014-1896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896
[ 28 ] CVE-2014-2599
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599
[ 29 ] CVE-2014-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124
[ 30 ] CVE-2014-4021
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201407-03.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. ============================================================================
Ubuntu Security Notice USN-2092-1
January 30, 2014
qemu, qemu-kvm vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 13.10
- Ubuntu 12.10
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in QEMU.
Software Description:
- qemu: Machine emulator and virtualizer
- qemu-kvm: Machine emulator and virtualizer
Details:
Asias He discovered that QEMU incorrectly handled SCSI controllers with
more than 256 attached devices. A local user could possibly use this flaw
to elevate privileges. (CVE-2013-4344)
It was discovered that QEMU incorrectly handled Xen disks. A local guest
could possibly use this flaw to consume resources, resulting in a denial of
service. This issue only affected Ubuntu 12.10 and Ubuntu 13.10.
(CVE-2013-4375)
Sibiao Luo discovered that QEMU incorrectly handled device hot-unplugging.
A local user could possibly use this flaw to cause a denial of service.
This issue only affected Ubuntu 13.10. (CVE-2013-4377)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
qemu-system 1.5.0+dfsg-3ubuntu5.3
qemu-system-arm 1.5.0+dfsg-3ubuntu5.3
qemu-system-mips 1.5.0+dfsg-3ubuntu5.3
qemu-system-misc 1.5.0+dfsg-3ubuntu5.3
qemu-system-ppc 1.5.0+dfsg-3ubuntu5.3
qemu-system-sparc 1.5.0+dfsg-3ubuntu5.3
qemu-system-x86 1.5.0+dfsg-3ubuntu5.3
Ubuntu 12.10:
qemu-kvm 1.2.0+noroms-0ubuntu2.12.10.6
Ubuntu 12.04 LTS:
qemu-kvm 1.0+noroms-0ubuntu14.13
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2092-1
CVE-2013-4344, CVE-2013-4375, CVE-2013-4377
Package Information:
https://launchpad.net/ubuntu/+source/qemu/1.5.0+dfsg-3ubuntu5.3
https://launchpad.net/ubuntu/+source/qemu-kvm/1.2.0+noroms-0ubuntu2.12.10.6
https://launchpad.net/ubuntu/+source/qemu-kvm/1.0+noroms-0ubuntu14.13
| VAR-201310-0681 | No CVE | Vu+ Solo Unauthorized Access Vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Vu+SOLO does not perform any form of verification on the control software, allowing remote unauthenticated attackers to reboot the system. Vu + Solo is a VU + series high-definition satellite receiver using the Broadcom BCM7325 solution from Ceru of South Korea.
An unauthorized access vulnerability exists in Vu + Solo. An attacker could use this vulnerability to gain access, perform malicious operations on the affected system, or cause a denial of service. This may results in a denial-of-service condition
| VAR-201310-0516 | CVE-2013-5533 | Cisco 9900 Unified IP phones of image-upgrade Vulnerabilities that can be authorized for functions |
CVSS V2: 6.0 CVSS V3: - Severity: MEDIUM |
The image-upgrade functionality on Cisco 9900 Unified IP phones allows local users to gain privileges by placing shell commands in an unspecified parameter, aka Bug ID CSCuh10334. Cisco 9900 Unified IP phones of image-upgrade There are vulnerabilities that can be used to obtain privileges. The vulnerability is due to insufficient filtering of input during the image upgrade process. An attacker can use the \";\" sign to inject shell commands and execute them. Successful exploits may compromise the affected device.
This issue is being tracked by Cisco Bug ID CSCuh10334. This product provides voice and video functions
| VAR-201310-0515 | CVE-2013-5532 | Cisco 9900 IP phones of Web Application interface buffer overflow vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the web-application interface on Cisco 9900 IP phones allows remote attackers to cause a denial of service (webapp interface outage) via long values in unspecified fields, aka Bug ID CSCuh10343. The Cisco Unified IP Phones 9900 is an IP telephony device developed by Cisco. The vulnerability is due to the lack of adequate filtering of some of the fields, allowing the attacker to overflow some of the input fields for a denial of service attack. The Cisco Unified IP Phone 9900 series is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user supplied input.
This issue is tracked by Cisco Bug ID CSCuh10343. This product provides voice and video functions
| VAR-201310-0433 | CVE-2013-4370 | Xen 'xc_vcpu_getaffinity()' function heap memory corruption vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free. Xen is an open source virtual machine monitor developed by the University of Cambridge. Xen's ocaml xc_vcpu_getaffinity has a re-use vulnerability after release. An attacker could exploit this vulnerability to cause heap corruption and denial of service. Xen is prone to a heap-memory-corruption vulnerability.
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed attacks may cause a denial-of-service condition. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201407-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Xen: Multiple Vunlerabilities
Date: July 16, 2014
Bugs: #440768, #484478, #486354, #497082, #497084, #497086,
#499054, #499124, #500528, #500530, #500536, #501080,
#501906, #505714, #509054, #513824
ID: 201407-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Xen, the worst of which
could lead to arbitrary code execution.
Background
==========
Xen is a bare-metal hypervisor.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulations/xen < 4.3.2-r4 >= 4.3.2-r4
*>= 4.2.4-r4
2 app-emulations/xen-tools
< 4.3.2-r5 >= 4.3.2-r5
*>= 4.2.4-r6
3 app-emulations/xen-pvgrub
< 4.3.2 *>= 4.3.2
*>= 4.2.4
-------------------------------------------------------------------
3 affected packages
Description
===========
Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.
Impact
======
A remote attacker can utilize multiple vectors to execute arbitrary
code, cause Denial of Service, or gain access to data on the host.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Xen 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.3.2-r2"
All Xen 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulations/xen-4.2.4-r2"
All xen-tools 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-tools-4.3.2-r2"
All xen-tools 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-tools-4.2.4-r2"
All Xen PVGRUB 4.3 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-pvgrub-4.3.2"
All Xen PVGRUB 4.2 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=app-emulations/xen-pvgrub-4.2.4"
References
==========
[ 1 ] CVE-2013-1442
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1442
[ 2 ] CVE-2013-4329
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4329
[ 3 ] CVE-2013-4355
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4355
[ 4 ] CVE-2013-4356
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4356
[ 5 ] CVE-2013-4361
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4361
[ 6 ] CVE-2013-4368
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4368
[ 7 ] CVE-2013-4369
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4369
[ 8 ] CVE-2013-4370
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4370
[ 9 ] CVE-2013-4371
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4371
[ 10 ] CVE-2013-4375
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4375
[ 11 ] CVE-2013-4416
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4416
[ 12 ] CVE-2013-4494
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4494
[ 13 ] CVE-2013-4551
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4551
[ 14 ] CVE-2013-4553
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4553
[ 15 ] CVE-2013-4554
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4554
[ 16 ] CVE-2013-6375
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6375
[ 17 ] CVE-2013-6400
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6400
[ 18 ] CVE-2013-6885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885
[ 19 ] CVE-2013-6885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6885
[ 20 ] CVE-2014-1642
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1642
[ 21 ] CVE-2014-1666
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1666
[ 22 ] CVE-2014-1891
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1891
[ 23 ] CVE-2014-1892
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1892
[ 24 ] CVE-2014-1893
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1893
[ 25 ] CVE-2014-1894
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1894
[ 26 ] CVE-2014-1895
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1895
[ 27 ] CVE-2014-1896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1896
[ 28 ] CVE-2014-2599
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2599
[ 29 ] CVE-2014-3124
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3124
[ 30 ] CVE-2014-4021
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4021
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201407-03.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201310-0309 | CVE-2013-5030 | Ruckus Wireless Zoneflex 2942 Wireless Access Point vulnerable to authentication bypass |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Ruckus Wireless Zoneflex 2942 devices with firmware 9.6.0.0.267 allow remote attackers to bypass authentication, and subsequently access certain configuration/ and maintenance/ scripts, by constructing a crafted URI after receiving an authentication error for an arbitrary login attempt. wireless LAN access point Is Zoneflex 2942 Contains an authentication bypass vulnerability. Ruckus Wireless Provided by wireless LAN Is an access point Zoneflex 2942 There is an authentication bypass vulnerability (CWE-592) Exists.A third party may access the settings screen of the product or restart the product. After receiving a verification failure message, the user can delete the /login.asp part of the URL to bypass the login page. The graphical user interface cannot access other configuration pages, but you can directly edit the URI to access the following page: /configuration/wireless.asp/configuration/local_network.asp/configuration/internet.asp/configuration/device.asp/maintenance/upgrade.asp/maintenance /reboot.asp. RUCKUS WIRELESS Zoneflex 2942 is prone to multiple authentication-bypass vulnerabilities. Successful exploits may allow attackers to reboot the access point, causing a denial-of-service condition.
http://drupal.org/node/207891.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
RUCKUS ADVISORY ID 10282013
Customer release date: Oct 28, 2013
Public release date: Nov 28, 2013
TITLE
User authentication bypass vulnerability in Ruckus Access Point's
administrative web interface
SUMMARY
An user authentication bypass vulnerability has been discovered in
Ruckus Access Point's administrative web interface.
AFFECTED SOFTWARE VERSIONS AND DEVICES
Device Affected software
- -------------------------- ------------------
ZoneFlex Access Points 9.5.x, 9.6.x
Any products not mentioned in the table above are not affected
DETAILS
A weakness has been discovered in the administrative web interface of
the Ruckus Access Point devices.
The user does not have to be authenticated to the web interface for
this attack to be successful.
CVSS v2 BASE METRIC SCORE: 6.4 (AV:N/AC:L/Au:N/C:P/I:P/A:N)
WORKAROUNDS
Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical. However, in the event that a patch cannot
immediately be applied, the following suggestions might help reduce
the risk:
- Do not expose management interfaces of Ruckus devices (including
administrative web interface) to untrusted networks such as the Internet.
- Use a firewall to limit traffic to/from Ruckus Access Point's
administrative web interface to trusted hosts.
SOLUTION
Ruckus recommends that all customers apply the appropriate patch(es)
as soon as practical.
The following patches have the fix (any later patches will also have
the fix):
Branch Software Patch
- - ----------- ------------------
9.5.x 9.5.3.0.44MR
9.6.x 9.6.1.0.15MR
CREDITS
This vulnerability was discovered and responsibly disclosed to Ruckus
Wireless by multiple sources:
- - - David Peters of Ansecurity
- - - Neil Lines of Nettitude Group
This issue has also been reported to CERT and NVD by a third party
without informing Ruckus Wireless.
http://www.kb.cert.org/vuls/id/742932
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5030
OBTAINING FIXED FIRMWARE
Ruckus customers can obtain the fixed firmware from the support website at
https://support.ruckuswireless.com/
Ruckus Support can be contacted as follows:
1-855-RUCKUS1 (1-855-782-5871) (United States)
The full contact list is at:
https://support.ruckuswireless.com/contact-us
PUBLIC ANNOUNCEMENTS
This security advisory is strictly confidential and will be made
available for public consumption on Nov 28, 2013 at the following source
Ruckus Website
http://www.ruckuswireless.com/security
SecurityFocus Bugtraq
http://www.securityfocus.com/archive/1
Future updates of this advisory, if any, will be placed on Ruckus's
website, but may or may not be actively announced on mailing lists.
REVISION HISTORY
Revision 1.0 / 28th Nov 2013 / Initial release
RUCKUS WIRELESS SECURITY PROCEDURES
Complete information on reporting security vulnerabilities in Ruckus
Wireless
products, obtaining assistance with security incidents is available at
http://www.ruckuswireless.com/security
For reporting new security issues, email can be sent to
security(at)ruckuswireless.com
For sensitive information we encourage the use of PGP encryption. Our
public keys can be
found at http://www.ruckuswireless.com/security
STATUS OF THIS NOTICE: Final
Although Ruckus cannot guarantee the accuracy of all statements
in this advisory, all of the facts have been checked to the best of our
ability. Ruckus does not anticipate issuing updated versions of
this advisory unless there is some material change in the facts. Should
there be a significant change in the facts, Ruckus may update this
advisory.
(c) Copyright 2013 by Ruckus Wireless
This advisory may be redistributed freely after the public release
date given at
the top of the text, provided that redistributed copies are complete and
unmodified, including all date and version information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQEcBAEBAgAGBQJSlnB/AAoJEFH6g5RLqzh1hoUIAMooTly+eiCi+xXnb5u7U9mW
/HrBYdf6ayAIllwtBtbdeWCJd8bpxMeJzYdOY21zNQMWmUzkIREUtMqJRlHrOflT
EVqQc67b+SPyGb46nKUoMe8IkYw0ZT/HBWAqbkD1CZqaXR9aPbfKvdksbQvWhXks
fBTTowuvs7Ez/2FeJfZIBp3g2skK+1PwZxK8+S/AC0Mlen2MVLJNOf7ZBreZLN9f
7Xa1ZRRI4j3ehvYshUWdDS0c54Nd591PrGgFMpvWbmmOTzRRKqdzOYTanMsmbTSv
Qjpu3wwbDVKuz8n7dIigOBjxHnoJqR4TbbRtYU3JOJlpwTWURif89PP45slX4vY=
=pNjb
-----END PGP SIGNATURE-----
| VAR-201310-0511 | CVE-2013-5528 | Cisco Unified Communications Manager of Tomcat management Web Directory traversal vulnerability in the interface |
CVSS V2: 4.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal sequences in an unspecified input string, aka Bug ID CSCui78815.
Exploiting this issue can allow an attacker to gain access to arbitrary files. Information harvested may aid in launching further attacks.
This issue is being tracked by Cisco Bug ID CSCui78815. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution.
The vulnerability is due to a failure to properly sanitize user-supplied input passed to a specific function. An attacker could exploit this vulnerability by supplying a series of directory traversal characters, allowing the malicious user to designate a file outside the restricted directory to be returned. An exploit could allow the malicious user to obtain the contents of any file that is readable by the Apache Tomcat service account.
Cisco has confirmed the vulnerability in a security notice and released software updates.
To exploit this vulnerability, an attacker must be able to authenticate to a targeted device. This access requirement decreases the likelihood of a successful exploit.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available
| VAR-201310-0461 | CVE-2013-4689 | Juniper Junos of J-Web Vulnerable to bypass cross-site request forgery protection mechanism |
CVSS V2: 5.1 CVSS V3: - Severity: MEDIUM |
J-Web in Juniper Junos before 10.4R13, 11.4 before 11.4R7, 12.1R before 12.1R6, 12.1X44 before 12.1X44-D15, 12.1x45 before 12.1X45-D10, 12.2 before 12.2R3, 12.3 before 12.3R2, and 13.1 before 13.1R3 allow remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism and hijack the authentication of administrators for requests that (1) create new administrator accounts or (2) have other unspecified impacts. Juniper Junos is prone to a cross-site request-forgery vulnerability.
Attackers can exploit this issue to perform certain administrative actions and gain unauthorized access to the affected device.
Juniper Junos 10.4, 11.4, 12.1, 12.1X44, 12.2, 12.3, and 13.1 are vulnerable. Juniper Networks Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. J-Web is a network management tool for routers or switches using Junos. The following releases are affected: Junos 10.4, 11.4, 12.1, 12.1X44, 12.2, 12.3, 13.1
| VAR-201310-0203 | CVE-2013-3409 | Hosted Collaboration Solution for Cisco Prime Central Vulnerabilities in which important information is obtained in the portal |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The portal in Cisco Prime Central for Hosted Collaboration Solution (HCS) places cleartext credentials in temporary files, which allows local users to obtain sensitive information by leveraging weak file permissions to read these files, aka Bug IDs CSCuh33735 and CSCuh34230.
Successful exploits will allow attackers to obtain sensitive information, such as credentials, that may aid in further attacks.
This issue is being tracked by Cisco bug IDs CSCuh33735 and CSCuh34230. The platform provides functions such as secure access authentication and real-time fault analysis. A remote attacker could exploit this vulnerability by accessing a file to obtain credentials and gain access to internal application components
| VAR-201310-0510 | CVE-2013-5527 | Cisco IOS and IOS XE of OSPF Denial of service in function (DoS) Vulnerability |
CVSS V2: 5.7 CVSS V3: - Severity: MEDIUM |
The OSPF functionality in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted options in an LSA type 11 packet, aka Bug ID CSCui21030. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches.
Exploiting this issue may allow attackers to cause a reload of the affected device. This may cause denial-of-service conditions.
This issue is being tracked by Cisco Bug ID CSCui21030
| VAR-201310-0231 | CVE-2013-2787 | Alstom e-terracontrol Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Alstom e-terracontrol 3.5, 3.6, and 3.7 allows remote attackers to cause a denial of service (infinite loop) via crafted DNP3 packets. Alstom e-Terracontrol is software for monitoring and controlling power systems on a SCADA system. e-Terracontrol is prone to multiple denial-of-service vulnerabilities. This can result in denial-of-service conditions.
e-Terracontrol 3.5, 3.6, and 3.7 are vulnerable
| VAR-201310-0348 | CVE-2013-5741 | Nano-10 PLC Remote Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Triangle Research International (aka Tri) Nano-10 PLC devices with firmware r81 and earlier do not properly handle large length values in MODBUS data, which allows remote attackers to cause a denial of service (transition to the interrupt state) via a crafted packet to TCP port 502. The Nano-10 PLC has an input verification vulnerability that allows an attacker to use the vulnerability to send a special message to the Nano-10 PLC for a denial of service attack, which can cause the device to run in an undefined interrupt state and need to be restarted to restore normal functionality. The Triangle Research Nano-10 PLC is a controller for automated manufacturing. This vulnerability can be triggered when the firmware is processing a special length (over 0x200) MODBUS TCP message on TCP port 502. Nano-10 PLC is prone to a remote denial-of-service vulnerability.
Attackers can exploit this issue to cause the affected device to crash, denying service to legitimate users.
Nano-10 PLC running firmware r81 and prior are vulnerable. This product is usually used in automatic production equipment such as packaging machines, batching machines, etc
| VAR-201310-0533 | CVE-2013-5506 | Cisco Firewall Services Module Vulnerability in reading context settings in authentication function |
CVSS V2: 6.6 CVSS V3: - Severity: MEDIUM |
The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080.
A local attacker may exploit this issue to execute certain commands in any of the user contexts of the affected system.
This issue is being tracked by Cisco Bug ID CSCue46080
| VAR-201310-0534 | CVE-2013-5507 | Cisco Adaptive Security Appliances Software IPsec Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The IPsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(1.7), when an IPsec VPN tunnel is enabled, allows remote attackers to cause a denial of service (device reload) via a (1) ICMP or (2) ICMPv6 packet that is improperly handled during decryption, aka Bug ID CSCue18975. Vendors have confirmed this vulnerability Bug ID CSCue18975 It is released as.Inappropriate processing during decryption by a third party (1) ICMP Or (2) ICMPv6 Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance (ASA) is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to reload an affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCue18975
| VAR-201310-0545 | CVE-2013-5508 | Cisco ASA Software and FWSM of SQL*Net Service disruption in inspection engines (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The SQL*Net inspection engine in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.6), 9.0.x before 9.0(2.10), and 9.1.x before 9.1(2) and Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(27) and 4.x before 4.1(14) allows remote attackers to cause a denial of service (device reload) via crafted segmented Transparent Network Substrate (TNS) packets, aka Bug ID CSCub98434.
An attacker can exploit this issue to reload an affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCui34914 and CSCub98434. ASA is a set of firewall equipment. FWSM is a firewall service module used to provide traffic acceleration on switches and routers
| VAR-201310-0546 | CVE-2013-5509 | Cisco Adaptive Security Appliance Software SSL Vulnerabilities that prevent authentication from being implemented |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 before 9.0(2.6) and 9.1 before 9.1(2) allows remote attackers to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCuf52468.
Successfully exploiting this issue will allow attackers to bypass the certificate authentication and gain unauthorized access to the affected device.
This issue is tracked by Cisco Bug ID CSCuf52468
| VAR-201310-0537 | CVE-2013-5510 | Cisco Adaptive Security Appliance Software remote access VPN Vulnerabilities that prevent authentication from being implemented |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
The remote-access VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 7.x before 7.2(5.12), 8.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.6.x before 8.6(1.12), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.5), when an override-account-disable option is enabled, does not properly parse AAA LDAP responses, which allows remote attackers to bypass authentication via a VPN connection attempt, aka Bug ID CSCug83401. Vendors have confirmed this vulnerability Bug ID CSCug83401 It is released as.By a third party VPN Authentication may be bypassed through connection attempts. Cisco Adaptive Security Appliance (ASA) is prone to an authentication-bypass vulnerability.
Successfully exploiting this issue will allow attackers to bypass authentication and gain unauthorized access to the affected device.
This issue is tracked by Cisco Bug ID CSCug83401. The following versions are affected: Cisco Adaptive Security Appliance Software 7.x prior to 7.2(5.12), 8.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4 prior to 8.4(6) .x version, 8.6.x version before 8.6(1.12), 9.0.x version before 9.0(3.1), 9.1.x version before 9.1(2.5)
| VAR-201310-0538 | CVE-2013-5511 | Cisco ASA Software ASDM Vulnerabilities that prevent authentication in the remote management function |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The Adaptive Security Device Management (ASDM) remote-management feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(6), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.1), and 9.1.x before 9.1(2.6) does not properly implement the authentication-certificate option, which allows remote attackers to bypass authentication via a TCP session to an ASDM interface, aka Bug ID CSCuh44815. Vendors have confirmed this vulnerability Bug ID CSCuh44815 It is released as.By a third party ASDM To the interface TCP Authentication may be bypassed through the session.
Successfully exploiting this issue will allow attackers to bypass the digital certificate authentication and gain unauthorized access to the affected device.
This issue is tracked by Cisco Bug ID CSCuh44815. certified. A remote attacker can use this vulnerability to bypass authentication, log in to the system management interface as an administrator, and then control the entire system. The following versions are affected: Cisco Adaptive Security Appliance Software 8.2.x prior to 8.2(5.46), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(6), 8.5 prior to 8.5(1.18) .x version, 8.6.x version before 8.6(1.12), 8.7.x version before 8.7(1.7), 9.0.x version before 9.0(3.1), 9.1.x version before 9.1(2.6)
| VAR-201310-0539 | CVE-2013-5512 | Cisco Adaptive Security Appliance Software HTTP Deep Packet Inspection Service disruption in functionality (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Race condition in the HTTP Deep Packet Inspection (DPI) feature in Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.5), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.4), 9.0.x before 9.0(1.4), and 9.1.x before 9.1(1.2), in certain conditions involving the spoof-server option or ActiveX or Java response inspection, allows remote attackers to cause a denial of service (device reload) via a crafted HTTP response, aka Bug ID CSCud37992. Vendors have confirmed this vulnerability Bug ID CSCud37992 It is released as.Skillfully crafted by a third party HTTP Service disruption via response ( Device reload ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance Software is prone to a remote denial-of-service vulnerability.
An attacker can exploit this issue to reload an affected device, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCud37992.
Cisco Adaptive Security Appliance Software prior to 8.2(5.46), 8.3(2.39), 8.4(5.6), 8.5(1.18), 8.6(1.12), 8.7(1.4), 9.0(1.4), and 9.1(1.2) are vulnerable. The vulnerability stems from the fact that the HTTP DPI engine does not properly handle race conditions when inspecting HTTP packets. Successful exploitation of this vulnerability requires the spoof-server parameter option to be enabled or the Cisco ASA software configured to detect and block HTTP responses containing active-x or java-applet. x version, 8.6.x version before 8.6(1.12), 8.7.x version before 8.7(1.4), 9.0.x version before 9.0(1.4), 9.1.x version before 9.1(1.2)
| VAR-201310-0540 | CVE-2013-5513 | Cisco Adaptive Security Appliance Service disruption in software (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco Adaptive Security Appliance (ASA) Software 8.2.x before 8.2(5.46), 8.3.x before 8.3(2.39), 8.4.x before 8.4(7), 8.5.x before 8.5(1.18), 8.6.x before 8.6(1.12), 8.7.x before 8.7(1.7), 9.0.x before 9.0(3.3), and 9.1.x before 9.1(1.8), when the DNS ALPI engine is enabled for TCP, allows remote attackers to cause a denial of service (device reload) via crafted TCP DNS packets, aka Bug ID CSCug03975.
An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users.
This issue is being tracked by Cisco Bug ID CSCug03975. x version, 8.6.x version before 8.6(1.12), 8.7.x version before 8.7(1.7), 9.0.x version before 9.0(3.3), 9.1.x version before 9.1(1.8)