VARIoT IoT vulnerabilities database
| VAR-201209-0286 | CVE-2012-5049 | Optimalog Optima PLC of APIFTP Server Service disruption in ( infinite loop ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
APIFTP Server in Optimalog Optima PLC 1.5.2 and earlier allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. Optima is software that controls the PLC via the SCADA/HMI interface. The APIFTP server is a file server. Optima PLC is prone to multiple remote denial-of-service vulnerabilities.
Successful exploit of these issues allows an attacker to cause the affected application to crash or enter an endless loop, denying service to legitimate users. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
EOScada Information Disclosure and Denial of Service Vulnerabilities
SECUNIA ADVISORY ID:
SA51171
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/51171/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=51171
RELEASE DATE:
2012-11-02
DISCUSS ADVISORY:
http://secunia.com/advisories/51171/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/51171/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=51171
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in EOScada, which can be
exploited by malicious people to disclose potentially sensitive
information and cause a DoS (Denial of Service).
1) An error in "EOS Core Scada.exe" when processing certain data can
be exploited to cause a crash via random data sent to TCP port 5050
or 24004.
2) An error in EOSDataServer.exe when processing certain data can be
exploited to cause a resource management error via large amount of
data sent to TCP port 24006.
3) An error in eosfailoverservice.exe when processing certain data
can be exploited to cause a resource management error via large
amount of data sent to TCP port 12000.
4) An error in eosfailoverservice.exe can be exploited to cause the
service to return unspecified data in clear text.
SOLUTION:
Update to version 11.0.19.2.
PROVIDED AND/OR DISCOVERED BY:
ICS-CERT credits Dale Peterson, Digital Bond.
ORIGINAL ADVISORY:
ICS-CERT:
http://www.us-cert.gov/control_systems/pdf/ICSA-12-271-01.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201209-0399 | CVE-2012-3949 |
plural Cisco Product SIP Service disruption in implementations (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201209-0720 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP implementation in Cisco Unified Communications Manager (CUCM) 6.x and 7.x before 7.1(5b)su5, 8.x before 8.5(1)su4, and 8.6 before 8.6(2a)su1; Cisco IOS 12.2 through 12.4 and 15.0 through 15.2; and Cisco IOS XE 3.3.xSG before 3.3.1SG, 3.4.xS, and 3.5.xS allows remote attackers to cause a denial of service (service crash or device reload) via a crafted SIP message containing an SDP session description, aka Bug IDs CSCtw66721, CSCtj33003, and CSCtw84664. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtw66721, CSCtj33003 and CSCtw84664. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Cisco IOS / IOS XE SIP Denial of Service Vulnerability
SECUNIA ADVISORY ID:
SA50774
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50774/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50774
RELEASE DATE:
2012-09-27
DISCUSS ADVISORY:
http://secunia.com/advisories/50774/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50774/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50774
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Cisco IOS and Cisco IOS XE,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error when processing Session
Initiation Protocol (SIP) packets.
For more information:
SA50775
The vulnerability is reported in IOS version 12.x and 15.x and IOS XE
version 3.3.x, 3.4.x, and 3.5.x.
SOLUTION:
Update to a fixed version (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Cisco (cisco-sa-20120926-sip):
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-sip
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201209-0387 | CVE-2012-3950 | Cisco IOS of Intrusion Prevention System Service disruption in functionality ( Device reload ) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The Intrusion Prevention System (IPS) feature in Cisco IOS 12.3 through 12.4 and 15.0 through 15.2, in certain configurations of enabled categories and missing signatures, allows remote attackers to cause a denial of service (device reload) via DNS packets, aka Bug ID CSCtw55976. The problem is Bug ID CSCtw55976 It is a problem.By a third party DNS Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtw55976.
An attacker can exploit this issue to cause a device to reload, resulting in a denial-of-service condition. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Cisco IOS Intrusion Prevention System DNS Packet Handling Denial of
Service Vulnerability
SECUNIA ADVISORY ID:
SA50777
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50777/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50777
RELEASE DATE:
2012-09-27
DISCUSS ADVISORY:
http://secunia.com/advisories/50777/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50777/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50777
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Cisco IOS, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the Intrusion
Prevention System implementation when handling DNS packets and can be
exploited to trigger a reload.
Please see the vendor's advisory for a list of affected versions.
SOLUTION:
Update to a fixed version (please see the vendor's advisory for
details).
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ios-ips
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201209-0195 | CVE-2012-4617 | plural Cisco IOS Product BGP Service disruption in implementations (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The BGP implementation in Cisco IOS 15.2, IOS XE 3.5.xS before 3.5.2S, and IOS XR 4.1.0 through 4.2.2 allows remote attackers to cause a denial of service (multiple connection resets) by leveraging a peer relationship and sending a malformed attribute, aka Bug IDs CSCtt35379, CSCty58300, CSCtz63248, and CSCtz62914. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtt35379, CSCty58300, CSCtz63248 and CSCtz62914.
Successfully exploiting this issue will result in denial-of-service conditions
| VAR-201209-0196 | CVE-2012-4618 | Cisco IOS of NAT Service disruption in implementations ( Device reload ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The SIP ALG feature in the NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtn76183. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtn76183
| VAR-201209-0197 | CVE-2012-4619 | Cisco IOS of NAT Service disruption in the implementation of ( Device reload ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The NAT implementation in Cisco IOS 12.2, 12.4, and 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via transit IP packets, aka Bug ID CSCtr46123. Cisco IOS is a popular Internet operating system. This Cisco bug ID is CSCtr46123.
Successful exploit of this issue could allow the attacker to cause the targeted device to reload, resulting in denial-of-service conditions
| VAR-201209-0198 | CVE-2012-4620 | Cisco 10000 Runs on a series router Cisco IOS Service disruption in (DoS) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Cisco IOS 12.2 and 15.0 through 15.2 on Cisco 10000 series routers, when a tunnel interface exists, allows remote attackers to cause a denial of service (interface queue wedge) via tunneled (1) GRE/IP, (2) IPIP, or (3) IPv6 in IPv4 packets, aka Bug ID CSCts66808. Cisco IOS is a popular Internet operating system. As a result, some packets cannot be deleted in the queue. , causing a denial of service attack. This Cisco bug ID is CSCts66808.
An attacker can exploit this issue to consume all available space in the affected interface queue, resulting in a queue wedge which may prevent new packets from being processed
| VAR-201209-0199 | CVE-2012-4621 | Cisco IOS Service disruption in device sensor functions ( Device reload ) Vulnerabilities |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The Device Sensor feature in Cisco IOS 15.0 through 15.2 allows remote attackers to cause a denial of service (device reload) via a DHCP packet, aka Bug ID CSCty96049. Cisco IOS is a popular Internet operating system. Allows an attacker to reload a device while passing a DHCP message. This Cisco bug ID is CSCty96049.
Note: To successfully exploit this issue NAT SIP ALG feature should be enabled in the device
| VAR-201209-0200 | CVE-2012-4622 | Cisco Catalyst 4500E Series Switch Denial of Service Vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Cisco IOS XE 03.02.00.XO.15.0(2)XO on Catalyst 4500E series switches, when a Supervisor Engine 7L-E card is installed, allows remote attackers to cause a denial of service (card reload) via malformed packets that trigger uncorrected ECC error messages, aka Bug ID CSCty88456. The Cisco Catalyst 4500 E-Series is the next-generation, high-performance extension of the Cisco Catalyst 4500 Series Ethernet Modular Switch. This Cisco bug ID is CSCty88456.
Successfully exploiting this issue will result in denial-of-service conditions. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment
| VAR-201209-0193 | CVE-2012-4623 |
Cisco IOS and IOS XE of DHCPv6 Service disruption at the server (DoS) Vulnerabilities
Related entries in the VARIoT exploits database: VAR-E-201209-0106 |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
The DHCPv6 server in Cisco IOS 12.2 through 12.4 and 15.0 through 15.2 and IOS XE 2.1.x through 2.6.x, 3.1.xS before 3.1.4S, 3.1.xSG and 3.2.xSG before 3.2.5SG, 3.2.xS, 3.2.xXO, 3.3.xS, and 3.3.xSG before 3.3.1SG allows remote attackers to cause a denial of service (device reload) via a malformed DHCPv6 packet, aka Bug ID CSCto57723. The problem is Bug ID CSCto57723 It is a problem.Malformed by a third party DHCPv6 Service disruption via packets ( Device reload ) There is a possibility of being put into a state. Cisco IOS is a popular Internet operating system. Allowing remote unauthenticated attackers to send a single DHCP message or through an affected device can cause the device to be overloaded. This Cisco bug ID is CSCto57723.
An attacker can exploit this issue to cause the affected device to reload, denying service to legitimate users
| VAR-201209-0798 | No CVE | WAN Emulator result.php pc parameter arbitrary command execution vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The WAN Emulator is a wide area network simulator. There is an illegal access vulnerability in the WAN Emulator. This vulnerability can be triggered by installing the setuid root in the dosu binary, causing the local attacker to gain root privileges.
| VAR-201209-0320 | CVE-2012-2896 | Mac OS X Run on Google Chrome of WebGL Implementation of integer overflow vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Integer overflow in the WebGL implementation in Google Chrome before 22.0.1229.79 on Mac OS X allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. Google Chrome is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, execute arbitrary script code in the browser of an unsuspecting user, or steal cookie-based authentication credentials; other attacks are also possible.
Versions prior to Chrome 22.0.1229.79 are vulnerable.
NOTE: The CVE-2012-2897 issue has been moved to BID 56457 (Microsoft Windows Kernel 'Win32k.sys' TrueType Font Parsing Remote Code Execution Vulnerability) to better document it. Google Chrome is a web browser developed by Google (Google). ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Google Chrome Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA50759
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50759/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50759
RELEASE DATE:
2012-09-26
DISCUSS ADVISORY:
http://secunia.com/advisories/50759/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50759/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50759
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Google Chrome, where
some have an unknown impact and others can be exploited by malicious
people to conduct cross-site scripting attacks, bypass certain
security restrictions, and compromise a user's system.
1) Certain unspecified input related to frame handling is not
properly sanitised before being returned to the user.
2) Certain unspecified input within v8 bindings is not properly
sanitised before being returned to the user.
3) An error exists within plugin handling and can be exploited to
cause DOM tree corruption.
4) An error due to SSE2 optimizations can be exploited to cause a
buffer overflow.
5) An error exists within Skia and can be exploited to cause an
out-of-bounds write.
6) A use-after-free error exists within onclick handling.
7) A use-after-free error exists related to SVG text references.
8) An integer overflow error exists related to WebGL handling.
9) An unspecified error can be exploited to cause DOM topology
corruption.
10) An error exists within Skia and can be exploited to cause an
out-of-bounds write.
11) Some weaknesses exist in the PDF viewer.
12) A use-after-free error exists within the plug-in handling.
13) A race condition exists when handling plug-in paint buffers.
14) An error when handling OGG containers can be exploited to
reference an invalid pointer.
15) A double-free error exists on exit.
16) A use-after-free error exists within the PDF viewer.
17) An unspecified error exists and can be exploited to bypass the
pop-up block.
18) A double-free error exists within XSL transforms.
19) Some errors within the PDF viewer can be exploited to cause an
out-of-bounds write.
SOLUTION:
Upgrade to version 22.0.1229.79.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1, 2) Sergey Glazunov
3) Chamal de Silva
4, 5, 6) Atte Kettunen, OUSPG
7, 8) miaubiz
9) pawlkt
10, 14) Inferno, Google Chrome Security Team
11, 16, 19) Mateusz Jurczyk, Google Security Team and Gynvael
Coldwind, Google Security Team
12) Fermin Serna, Google Security Team
13, 17, 18) Cris Neckar, Google Chrome Security Team
15) Chromium development community
ORIGINAL ADVISORY:
Google:
http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201210-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Chromium: Multiple vulnerabilities
Date: October 21, 2012
Bugs: #433551, #436234, #437664, #437984
ID: 201210-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Chromium, some of which
may allow execution of arbitrary code.
Background
==========
Chromium is an open source web browser project.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 22.0.1229.94 >= 22.0.1229.94
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers and release notes referenced below for
details.
Impact
======
A remote attacker could entice a user to open a specially crafted web
site using Chromium, possibly resulting in the execution of arbitrary
code with the privileges of the process, arbitrary file write, a Denial
of Service condition, Cross-Site Scripting in SSL interstitial and
various Universal Cross-Site Scripting attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-22.0.1229.94"
References
==========
[ 1 ] CVE-2012-2859
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859
[ 2 ] CVE-2012-2860
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860
[ 3 ] CVE-2012-2865
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865
[ 4 ] CVE-2012-2866
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866
[ 5 ] CVE-2012-2867
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867
[ 6 ] CVE-2012-2868
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868
[ 7 ] CVE-2012-2869
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869
[ 8 ] CVE-2012-2872
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872
[ 9 ] CVE-2012-2874
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874
[ 10 ] CVE-2012-2876
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876
[ 11 ] CVE-2012-2877
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877
[ 12 ] CVE-2012-2878
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878
[ 13 ] CVE-2012-2879
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879
[ 14 ] CVE-2012-2880
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880
[ 15 ] CVE-2012-2881
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881
[ 16 ] CVE-2012-2882
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882
[ 17 ] CVE-2012-2883
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883
[ 18 ] CVE-2012-2884
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884
[ 19 ] CVE-2012-2885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885
[ 20 ] CVE-2012-2886
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886
[ 21 ] CVE-2012-2887
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887
[ 22 ] CVE-2012-2888
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888
[ 23 ] CVE-2012-2889
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889
[ 24 ] CVE-2012-2891
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891
[ 25 ] CVE-2012-2892
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892
[ 26 ] CVE-2012-2894
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894
[ 27 ] CVE-2012-2896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896
[ 28 ] CVE-2012-2900
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900
[ 29 ] CVE-2012-5108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108
[ 30 ] CVE-2012-5110
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110
[ 31 ] CVE-2012-5111
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111
[ 32 ] CVE-2012-5112
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112
[ 33 ] CVE-2012-5376
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376
[ 34 ] Release Notes 21.0.1180.89
http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30=
.html
[ 35 ] Release Notes 22.0.1229.79
http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25=
.html
[ 36 ] Release Notes 22.0.1229.92
http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht=
ml
[ 37 ] Release Notes 22.0.1229.94
http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61=
05.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201210-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201209-0323 | CVE-2012-2889 | Used in multiple products WebKit Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Google Chrome before 22.0.1229.79 allows remote attackers to inject arbitrary web script or HTML via vectors involving frames, aka "Universal XSS (UXSS).". Google Chrome Contains a cross-site scripting vulnerability.
Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, execute arbitrary script code in the browser of an unsuspecting user, or steal cookie-based authentication credentials; other attacks are also possible.
Versions prior to Chrome 22.0.1229.79 are vulnerable.
NOTE: The CVE-2012-2897 issue has been moved to BID 56457 (Microsoft Windows Kernel 'Win32k.sys' TrueType Font Parsing Remote Code Execution Vulnerability) to better document it. Google Chrome is a web browser developed by Google (Google).
CVE-ID
CVE-2013-0962 : Mario Heiderich of Cure53
For OS X Lion systems Safari 6.0.3 is available via
the Apple Software Update application.
For OS X Mountain Lion systems Safari 6.0.3 is included with
OS X v10.8.3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2013-01-28-1 iOS 6.1 Software Update
iOS 6.1 Software Update is now available and addresses the following:
Identity Services
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Authentication relying on certificate-based Apple ID
authentication may be bypassed
Description: An error handling issue existed in Identity Services.
If the user's AppleID certificate failed to validate, the user's
AppleID was assumed to be the empty string. If multiple systems
belonging to different users enter this state, applications relying
on this identity determination may erroneously extend trust. This
issue was addressed by ensuring that NULL is returned instead of an
empty string.
CVE-ID
CVE-2013-0963
International Components for Unicode
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-
site scripting attack
Description: A canonicalization issue existed in the handling of the
EUC-JP encoding, which could lead to a cross-site scripting attack on
EUC-JP encoded websites. This issue was addressed by updating the
EUC-JP mapping table.
CVE-ID
CVE-2011-3058 : Masato Kinugawa
Kernel
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: A user-mode process may be able to access the first page of
kernel memory
Description: The iOS kernel has checks to validate that the user-
mode pointer and length passed to the copyin and copyout functions
would not result in a user-mode process being able to directly access
kernel memory. The checks were not being used if the length was
smaller than one page. This issue was addressed through additional
validation of the arguments to copyin and copyout.
CVE-ID
CVE-2013-0964 : Mark Dowd of Azimuth Security
Security
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may intercept
user credentials or other sensitive information
Description: Several intermediate CA certificates were mistakenly
issued by TURKTRUST. This may allow a man-in-the-middle attacker to
redirect connections and intercept user credentials or other
sensitive information. This issue was addressed by not allowing the
incorrect SSL certificates.
StoreKit
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: JavaScript may be enabled in Mobile Safari without user
interaction
Description: If a user disabled JavaScript in Safari Preferences,
visiting a site which displayed a Smart App Banner would re-enable
JavaScript without warning the user. This issue was addressed by not
enabling JavaScript when visiting a site with a Smart App Banner.
CVE-ID
CVE-2013-0974 : Andrew Plotkin of Zarfhome Software Consulting, Ben
Madison of BitCloud, Marek Durcek
WebKit
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2012-2824 : miaubiz
CVE-2012-2857 : Arthur Gerkis
CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2012-3621 : Skylined of the Google Chrome Security Team
CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2012-3687 : kuzzcc
CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0948 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0949 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0950 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0951 : Apple
CVE-2013-0952 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the
Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0968 : Aaron Nelson
WebKit
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Copying and pasting content on a malicious website may lead
to a cross-site scripting attack
Description: A cross-site scripting issue existed in the handling of
content pasted from a different origin. This issue was addressed
through additional validation of pasted content.
CVE-ID
CVE-2013-0962 : Mario Heiderich of Cure53
WebKit
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to a cross-
site scripting attack
Description: A cross-site scripting issue existed in the handling of
frame elements. This issue was addressed through improved origin
tracking.
CVE-ID
CVE-2012-2889 : Sergey Glazunov
WiFi
Available for: iPhone 3GS, iPhone 4, iPod touch (4th generation),
iPad 2
Impact: A remote attacker on the same WiFi network may be able to
temporarily disable WiFi
Description: An out of bounds read issue exists in Broadcom's
BCM4325 and BCM4329 firmware's handling of 802.11i information
elements. This issue was addressed through additional validation of
802.11i information elements.
CVE-ID
CVE-2012-2619 : Andres Blanco and Matias Eissler of Core Security
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "6.1".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org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=J2jv
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Google Chrome Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA50759
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50759/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50759
RELEASE DATE:
2012-09-26
DISCUSS ADVISORY:
http://secunia.com/advisories/50759/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50759/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50759
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in Google Chrome, where
some have an unknown impact and others can be exploited by malicious
people to conduct cross-site scripting attacks, bypass certain
security restrictions, and compromise a user's system.
1) Certain unspecified input related to frame handling is not
properly sanitised before being returned to the user.
2) Certain unspecified input within v8 bindings is not properly
sanitised before being returned to the user.
3) An error exists within plugin handling and can be exploited to
cause DOM tree corruption.
4) An error due to SSE2 optimizations can be exploited to cause a
buffer overflow.
5) An error exists within Skia and can be exploited to cause an
out-of-bounds write.
6) A use-after-free error exists within onclick handling.
7) A use-after-free error exists related to SVG text references.
8) An integer overflow error exists related to WebGL handling.
9) An unspecified error can be exploited to cause DOM topology
corruption.
10) An error exists within Skia and can be exploited to cause an
out-of-bounds write.
11) Some weaknesses exist in the PDF viewer.
12) A use-after-free error exists within the plug-in handling.
13) A race condition exists when handling plug-in paint buffers.
14) An error when handling OGG containers can be exploited to
reference an invalid pointer.
15) A double-free error exists on exit.
16) A use-after-free error exists within the PDF viewer.
17) An unspecified error exists and can be exploited to bypass the
pop-up block.
18) A double-free error exists within XSL transforms.
19) Some errors within the PDF viewer can be exploited to cause an
out-of-bounds write.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1, 2) Sergey Glazunov
3) Chamal de Silva
4, 5, 6) Atte Kettunen, OUSPG
7, 8) miaubiz
9) pawlkt
10, 14) Inferno, Google Chrome Security Team
11, 16, 19) Mateusz Jurczyk, Google Security Team and Gynvael
Coldwind, Google Security Team
12) Fermin Serna, Google Security Team
13, 17, 18) Cris Neckar, Google Chrome Security Team
15) Chromium development community
ORIGINAL ADVISORY:
Google:
http://googlechromereleases.blogspot.dk/2012/09/stable-channel-update_25.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201210-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Chromium: Multiple vulnerabilities
Date: October 21, 2012
Bugs: #433551, #436234, #437664, #437984
ID: 201210-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been reported in Chromium, some of which
may allow execution of arbitrary code.
Background
==========
Chromium is an open source web browser project.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-client/chromium < 22.0.1229.94 >= 22.0.1229.94
Description
===========
Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers and release notes referenced below for
details.
Impact
======
A remote attacker could entice a user to open a specially crafted web
site using Chromium, possibly resulting in the execution of arbitrary
code with the privileges of the process, arbitrary file write, a Denial
of Service condition, Cross-Site Scripting in SSL interstitial and
various Universal Cross-Site Scripting attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Chromium users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=www-client/chromium-22.0.1229.94"
References
==========
[ 1 ] CVE-2012-2859
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2859
[ 2 ] CVE-2012-2860
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2860
[ 3 ] CVE-2012-2865
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2865
[ 4 ] CVE-2012-2866
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2866
[ 5 ] CVE-2012-2867
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2867
[ 6 ] CVE-2012-2868
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2868
[ 7 ] CVE-2012-2869
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2869
[ 8 ] CVE-2012-2872
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2872
[ 9 ] CVE-2012-2874
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2874
[ 10 ] CVE-2012-2876
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2876
[ 11 ] CVE-2012-2877
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2877
[ 12 ] CVE-2012-2878
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2878
[ 13 ] CVE-2012-2879
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2879
[ 14 ] CVE-2012-2880
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2880
[ 15 ] CVE-2012-2881
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2881
[ 16 ] CVE-2012-2882
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2882
[ 17 ] CVE-2012-2883
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2883
[ 18 ] CVE-2012-2884
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2884
[ 19 ] CVE-2012-2885
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2885
[ 20 ] CVE-2012-2886
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2886
[ 21 ] CVE-2012-2887
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2887
[ 22 ] CVE-2012-2888
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2888
[ 23 ] CVE-2012-2889
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2889
[ 24 ] CVE-2012-2891
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2891
[ 25 ] CVE-2012-2892
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2892
[ 26 ] CVE-2012-2894
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2894
[ 27 ] CVE-2012-2896
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2896
[ 28 ] CVE-2012-2900
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2900
[ 29 ] CVE-2012-5108
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5108
[ 30 ] CVE-2012-5110
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5110
[ 31 ] CVE-2012-5111
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5111
[ 32 ] CVE-2012-5112
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5112
[ 33 ] CVE-2012-5376
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5376
[ 34 ] Release Notes 21.0.1180.89
http://googlechromereleases.blogspot.com/2012/08/stable-channel-update_30=
.html
[ 35 ] Release Notes 22.0.1229.79
http://googlechromereleases.blogspot.com/2012/09/stable-channel-update_25=
.html
[ 36 ] Release Notes 22.0.1229.92
http://googlechromereleases.blogspot.com/2012/10/stable-channel-update.ht=
ml
[ 37 ] Release Notes 22.0.1229.94
http://googlechromereleases.blogspot.com/2012/10/stable-channel-update_61=
05.html
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201210-07.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2012 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
| VAR-201401-0021 | CVE-2012-2899 | iOS Run on Google Chrome Vulnerabilities that bypass the same origin policy |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Google Chrome before 21.0.1180.82 on iOS makes certain incorrect calls to WebView methods that trigger use of an applewebdata: URL, which allows remote attackers to bypass the Same Origin Policy and conduct Universal XSS (UXSS) attacks via vectors involving the document.write method. Google Chrome for iOS is prone to a cross-domain scripting vulnerability because the application fails to properly enforce the same-origin policy.
Successful exploits will allow attackers to execute arbitrary script code within the context of the affected domain.
Versions prior to Chrome for iOS 21.0.1180.82 are vulnerable. Google Chrome is a web browser developed by Google (Google). The vulnerability stems from the fact that the program does not call the WebView method correctly
| VAR-201401-0020 | CVE-2012-2898 | iPad On the device iOS Run in Google Chrome In Omnibox URL Vulnerabilities that are disguised |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Google Chrome before 21.0.1180.82 on iOS on iPad devices allows remote attackers to spoof the Omnibox URL via vectors involving SSL error messages, a related issue to CVE-2012-0674. This vulnerability CVE-2012-0674 And related issues.By a third party SSL Depending on the problem with the error message, Omnibox URL May be disguised.
An attacker may exploit this vulnerability to spoof the originating URL of a trusted web site. This issue may allow a remote attacker to carry out phishing-style attacks.
Versions prior to Chrome 21.0.1180.82 are vulnerable. Google Chrome is a web browser developed by Google (Google)
| VAR-201306-0207 | CVE-2012-6568 | Huawei UTPS Vulnerable to buffer overflow |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the back-end component in Huawei UTPS 1.0 allows local users to gain privileges via a long IDS_PLUGIN_NAME string in a plug-in configuration file. Huawei UTPS is prone to a local buffer-overflow vulnerability.
Local attackers can exploit this issue to run arbitrary code with the privilege of the user running an affected application. Huawei UTPS is an application software for data card management run on PC by Huawei, China. There is a buffer overflow vulnerability in the back-end component of Huawei UTPS version 1.0. The vulnerability is due to insufficient verification of the incoming parameters when copying the string (IDS_PLUGIN_NAME), resulting in call stack overflow. A local attacker could execute a malicious user-specified script, which opens a malicious user-specified application
| VAR-201209-0663 | No CVE | Technicolor THOMSON TWG850-4 HTTP Authentication Bypass Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Technicolor THOMSON TWG850-4 is a wireless VoIP gateway. The Technicolor THOMSON TWG850-4 HTTP presence verification bypass vulnerability allows an attacker to exploit a vulnerability to bypass some security restrictions and perform unauthorized operations
| VAR-201209-0385 | CVE-2012-3746 | Apple iOS 6 Less than UIKit Vulnerability in obtaining plain text file contents |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
UIWebView in UIKit in Apple iOS before 6 does not properly use the Data Protection feature, which allows context-dependent attackers to obtain cleartext file content by leveraging direct access to a device's filesystem. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0383 | CVE-2012-3744 | Apple iOS 6 Vulnerability to forge text communication in less than |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Telephony in Apple iOS before 6 uses an SMS message's return address as the displayed sender address, which allows remote attackers to spoof text communication via a message in which the return address does not match the originating address. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0192 | CVE-2012-4655 | Cisco Secure Desktop of WebLaunch Vulnerability to execute arbitrary code in function |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The WebLaunch feature in Cisco Secure Desktop before 3.6.6020 does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug IDs CSCtz76128 and CSCtz78204. The problem is Bug ID CSCtz76128 ,and CSCtz78204 It is a problem.By a third party (1) ActiveX Or (2) Java Arbitrary code may be executed through the component.
An attacker can exploit this issue by using social engineering techniques to coerce unsuspecting users to download and execute arbitrary applications.
Successful exploits will allow an attacker to execute arbitrary code in the context of the user running the web browser. Failed exploit attempts will likely result in a denial-of-service condition.
This issue is tracked by Cisco Bug IDs CSCtz76128 and CSCtz78204. Cisco Secure Desktop (CSD) is a secure desktop product of Cisco (Cisco), which can reduce the number of cookies, browser history, temporary files and downloads in the system after remote user logout or SSL VPN session timeout through encryption function. remaining risks. Workarounds that mitigate these vulnerabilities are
available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac
Note: Revision 2.0 of this advisory corrects an inadvertent omission in
the original advisory, which failed to list that the fixes also address
a vulnerability in Cisco Secure Desktop, described by CVE-2012-4655.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
iF4EAREIAAYFAlBZ8RsACgkQUddfH3/BbTrMXAD+KzDhX4MHl8balbQ1dcfDrmeu
LwCqi3iKEPcAqHsa3sYBAI6GvgsZ99r1+5O3p7WBHGvWwcgRPQdAdSaWXznICylf
=J7RB
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Cisco Secure Desktop WebLaunch Vulnerability
SECUNIA ADVISORY ID:
SA50669
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50669/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50669
RELEASE DATE:
2012-09-20
DISCUSS ADVISORY:
http://secunia.com/advisories/50669/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50669/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50669
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Cisco Secure Desktop, which can
be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to the WebLaunch functionality not
properly authenticating the validity of downloaded executables and
can be exploited to download and execute an arbitrary program.
The vulnerability is reported in versions prior to 3.6.6020.
SOLUTION:
Update to version 3.6.6020.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
Cisco (CSCtz76128, CSCtz78204):
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------