VARIoT IoT vulnerabilities database
| VAR-201104-0325 | No CVE | Hitachi Web Server 'RequestHeader' Directive Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
Hitachi Web Server is a web server on Hitachi products. The Hitachi Web Server SSL protocol has errors and can be injected into any plain text. Handling session negotiation makes the TLS protocol wrong, and man-in-the-middle attacks can inject arbitrary clear text before legitimate clients send data.
Attackers can exploit this issue to obtain potentially sensitive information that may aid in further attacks. ----------------------------------------------------------------------
http://secunia.com/research/
http://secunia.com/company/jobs/open_positions/reverse_engineer
----------------------------------------------------------------------
TITLE:
Hitachi Web Server Two Vulnerabilities
SECUNIA ADVISORY ID:
SA44309
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44309/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44309
RELEASE DATE:
2011-04-26
DISCUSS ADVISORY:
http://secunia.com/advisories/44309/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44309/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44309
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Two vulnerabilities have been reported in Hitachi Web Server, which
can be exploited by malicious people to disclose sensitive
information and manipulate certain data.
1) An error in the SSL protocol can be exploited to insert arbitrary
plaintext.
This may be related to vulnerability #3 in:
SA38776
Please see the vendor's advisory for the list of affected versions.
SOLUTION:
Apply patches. Please see the vendor's advisory for more information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-006/index.html
http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-007/index.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0424 | No CVE | AT-TFTP Server 'Read' Request Remote Denial of Service Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
AT-TFTP is prone to a remote denial-of-service vulnerability.
Successfully exploiting this issue allows remote attackers to crash the affected application, denying service to legitimate users.
AT-TFTP 1.8 is affected; other versions may also be vulnerable.
| VAR-201104-0218 | CVE-2011-1725 | HP Network Automation Unknown Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in HP Network Automation 7.2x, 7.5x, 7.6x, 9.0, and 9.10 allows remote attackers to obtain sensitive information via unknown vectors. HP Network Automation is an automated network configuration management tool. ----------------------------------------------------------------------
http://secunia.com/research/
http://secunia.com/company/jobs/open_positions/reverse_engineer
----------------------------------------------------------------------
TITLE:
HP Network Automation Unspecified Information Disclosure
SECUNIA ADVISORY ID:
SA44304
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44304/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44304
RELEASE DATE:
2011-04-25
DISCUSS ADVISORY:
http://secunia.com/advisories/44304/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44304/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44304
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in HP Network Automation, which can
be exploited by malicious people to gain knowledge of potentially
sensitive information.
The vulnerability is caused due to an unspecified error. No more
information is currently available.
SOLUTION:
Update to version 9.10 and apply hotfix 87674.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
HPSBMA02666 SSRT100434:
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02789514
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02789514
Version: 1
HPSBMA02666 SSRT100434 rev.1 - HP Network Automation Running on Linux, Solaris, and Windows, Remote Information Disclosure
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. This vulnerability could be exploited remotely resulting in information disclosure.
References: CVE-2011-1725
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. The hotfix can be obtained by contacting the normal HP Services support channel.
Upgrade to HP Network Automation v9.10
Apply the 87674 hotfix
HISTORY
Version:1 (rev.1) - 21 April 2011 Initial Release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information.
To get the security-alert PGP key, please send an e-mail message as follows:
To: security-alert@hp.com
Subject: get key
Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up
Under Step1: your ITRC security bulletins and patches
-check ALL categories for which alerts are required and continue.
Under Step2: your ITRC operating systems
-verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page: Subscriber's choice for Business: sign-in.
On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
* The Software Product Category that this Security Bulletin
relates to is represented by the 5th and 6th characters
of the Bulletin number in the title:
GN = HP General SW
MA = HP Management Agents
MI = Misc. 3rd Party SW
MP = HP MPE/iX
NS = HP NonStop Servers
OV = HP OpenVMS
PI = HP Printing & Imaging
ST = HP Storage SW
TL = HP Trusted Linux
TU = HP Tru64 UNIX
UX = HP-UX
VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2011 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk2wL4YACgkQ4B86/C0qfVm3RACdGY2kwBBl8P5VURaJoNpljewG
RaYAoNOCkk+396TpOt+2ZxPqbNXhNHhK
=E5ri
-----END PGP SIGNATURE-----
| VAR-201105-0042 | CVE-2011-0610 | plural Adobe Product CoolType Vulnerability to execute arbitrary code in library |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
The CoolType library in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. plural Adobe Product CoolType The library could execute arbitrary code or disrupt service ( Memory corruption ) There is a vulnerability that becomes a condition.Arbitrary code is executed or service operation is interrupted by a third party ( Memory corruption ) There is a possibility of being put into a state. Adobe Reader and Acrobat are prone to a remote code-execution vulnerability due to a memory-corruption issue.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Adobe Reader is an excellent PDF document reading software developed by Adobe Corporation of the United States. Acrobat is a series of products aimed at enterprises, technicians and creative professionals launched in 1993, making the transmission and collaboration of intelligent documents more flexible, reliable and secure
| VAR-201104-0314 | No CVE | SAP NetWeaver Cross-Site Scripting Vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. There is a security vulnerability in the SAP NetWeaver web application server. Some of the unknown input is before the returning user. ITS Mobile Start and ITS Mobile Test lack sufficient filtering for it, and the attacker can exploit the vulnerability for cross-site scripting attacks. In addition, SAP NetWeaver Portal incorrectly limits error messages, and an attacker submits a specially crafted HTTP request to obtain the actual absolute path of the installed component. SAP Netweaver is prone to multiple unspecified cross-site scripting vulnerabilities and an information-disclosure vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. The information-disclosure vulnerability can allow the attacker to obtain sensitive information that can aid in launching further attacks. ----------------------------------------------------------------------
A step-by-step discussion of the latest Flash Player 0-day exploit:
http://secunia.com/blog/210
----------------------------------------------------------------------
TITLE:
SAP NetWeaver Web Application Server Cross-Site Scripting
Vulnerabilities
SECUNIA ADVISORY ID:
SA44205
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44205/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44205
RELEASE DATE:
2011-04-15
DISCUSS ADVISORY:
http://secunia.com/advisories/44205/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44205/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44205
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Onapsis has reported multiple vulnerabilities in SAP NetWeaver Web
Application Server, which can be exploited by malicious people to
conduct cross-site scripting attacks.
Certain unspecified input is not properly sanitised in the ITS Mobile
Start and ITS Mobile Test services before being returned to the user.
Please see the vendor's advisory for a list of affected versions.
SOLUTION:
Apply fixes (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
Mariano Nunez Di Croce, Onapsis
ORIGINAL ADVISORY:
SAP:
https://service.sap.com/sap/support/notes/1512134
Onapsis:
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2011-003
http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2011-004
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201108-0126 | CVE-2011-3141 | Invensys Wonderware inBatch BatchField ActiveX Control Buffer Overflow Vulnerability |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Buffer overflow in the InBatch BatchField ActiveX control for Invensys Wonderware InBatch 8.1 SP1, 9.0, and 9.0 SP1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. Invensys Wonderware inBatch is an industrial batch management software. There are three security vulnerabilities in Invensys Wonderware inBatch that exist in the GUIControls, BatchObjSrv, and BatchSecCtrl controls. Submitting a long string value to the property/method referenced by the control, enticing the client user to resolve, can trigger a denial of service attack, and successfully exploiting the vulnerability can execute arbitrary code in the context of the logged in user. Wonderware InBatch is prone to a denial-of-service vulnerability. Invensys Wonderware inBatch is prone to a remote stack-based buffer-overflow vulnerability that affects the inBatch BatchField ActiveX control. Failed exploit attempts will result in a denial-of-service condition.
Invensys Wonderware inBatch 8.1 and 9.0 SP1 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------
Secunia is hiring!
http://secunia.com/company/jobs/
----------------------------------------------------------------------
TITLE:
Wonderware InBatch BatchField ActiveX Control Buffer Overflow
Vulnerability
SECUNIA ADVISORY ID:
SA44336
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44336/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44336
RELEASE DATE:
2011-05-04
DISCUSS ADVISORY:
http://secunia.com/advisories/44336/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44336/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44336
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Wonderware InBatch, which can be
exploited by malicious people to compromise a user's system.
Successful exploitation may allow execution of arbitrary code.
SOLUTION:
Apply updates. Contact the vendor for more information.
PROVIDED AND/OR DISCOVERED BY:
US-CERT credits Jeremy Brown.
ORIGINAL ADVISORY:
Wonderware:
http://iom.invensys.com/EN/pdfLibrary/Final.Tech.Alert.141.pdf
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0313 | No CVE | SAP GUI 'saplogon.ini' File Buffer Overflow Vulnerability |
CVSS V2: - CVSS V3: - Severity: HIGH |
The SAP GUI is a graphical user interface client for SAP software. An attacker can build a saplogon.ini file containing a specially crafted label that overwrites the files on the user's upgrade server, causing a buffer overflow when the user installs the upgrade. Successful exploitation of a vulnerability can execute arbitrary code in the context of an application. SAP GUI is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Failed attacks will cause denial-of-service conditions
| VAR-201104-0093 | CVE-2011-0935 | Cisco IOS of PKI Vulnerabilities that bypass authentication in functions |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685. Cisco IOS of PKI Because the feature does not prevent the use of a persistent cache for a particular public key, there are vulnerabilities that are bypassed for authentication or otherwise unaffected. The problem is Bug ID CSCth82164 Is the problem of CVE-2010-4685 Is a different vulnerability.Keys that have been disabled from valid IKE Through peer relationships, authentication can be bypassed or other details can be affected. Cisco IOS is prone to a security-bypass vulnerability.
Exploiting this issue can allow attackers to bypass certain security restrictions.
Cisco IOS 15.0 and 15.1 are vulnerable. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. ----------------------------------------------------------------------
http://secunia.com/research/
http://secunia.com/company/jobs/open_positions/reverse_engineer
----------------------------------------------------------------------
TITLE:
Cisco IOS OCSP Revoked Certificate Security Issue
SECUNIA ADVISORY ID:
SA44363
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44363/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44363
RELEASE DATE:
2011-04-27
DISCUSS ADVISORY:
http://secunia.com/advisories/44363/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44363/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44363
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A security issue has been reported in Cisco IOS, which can be
exploited by malicious people to bypass certain security
restrictions.
The security issue is caused due to an error in the OCSP
functionality and can lead to a revoked certificate being
successfully authenticated.
SOLUTION:
Update to versions 15.1(1)S1 or 15.1(2)T2.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html
http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0315 | No CVE | SAP NetWeaver Arbitrary code execution vulnerability |
CVSS V2: - CVSS V3: - Severity: MEDIUM |
SAP NetWeaver is the technical foundation for SAP Business Suite solutions, SAP xApps composite applications, partner solutions, and custom applications. SAP NetWeaver has an input validation error, and the input to the \"sort\", \"numPerPage\", \"page\", \"lastPage\", \"numPerpageb\", \"pageb\" and \"direction\" parameters passed to MessagingSystem/monitor/monitor.jsp is returned. The lack of filtering by users can lead to cross-site scripting attacks. The user lacks filtering before and can execute arbitrary HTML and script code on the target user's browser. SAP Netweaver is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input. This may let the attacker steal cookie-based authentication credentials and launch other attacks. ----------------------------------------------------------------------
A step-by-step discussion of the latest Flash Player 0-day exploit:
http://secunia.com/blog/210
----------------------------------------------------------------------
TITLE:
SAP NetWeaver Multiple Cross-Site Scripting Vulnerabilities
SECUNIA ADVISORY ID:
SA44187
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44187/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44187
RELEASE DATE:
2011-04-14
DISCUSS ADVISORY:
http://secunia.com/advisories/44187/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44187/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44187
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Multiple vulnerabilities have been reported in SAP NetWeaver, which
can be exploited by malicious people to conduct cross-site scripting
attacks.
SOLUTION:
Apply fixes (please see the vendor's advisory for details).
PROVIDED AND/OR DISCOVERED BY:
1) Alexandr Polyakov, Digital Security Research Group
2) Dmitriy Evdokimov, Digital Security Research Group
ORIGINAL ADVISORY:
SAP:
https://service.sap.com/sap/support/notes/1443367
https://service.sap.com/sap/support/notes/1490335
Digital Security Research Group (DSECRG-11-015, DSECRG-11-016):
http://dsecrg.com/pages/vul/show.php?id=315
http://dsecrg.com/pages/vul/show.php?id=316
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0504 | No CVE | RETIRED: Oracle April 2011 Critical Patch Update Multiple Vulnerabilities |
CVSS V2: - CVSS V3: - Severity: - |
Oracle has released advance notification regarding the April 2011 Critical Patch Update (CPU) to be released on April 19, 2011. The update addresses 73 vulnerabilities affecting the following software:
Oracle Database
Oracle Fusion Middleware
Oracle Application Server
Oracle Identity Management
Oracle JRockit
Oracle Outside In Technology
Oracle WebLogic Server
Oracle E-Business Suite
Oracle Agile Technology Platform
Oracle PeopleSoft Enterprise CRM
Oracle PeopleSoft Enterprise ELS
Oracle PeopleSoft Enterprise HRMS
Oracle PeopleSoft Enterprise Portal
Oracle PeopleSoft Enterprise People Tools
Oracle JD Edwards OneWorld Tools
Oracle JD Edwards EnterpriseOne Tools
Oracle Siebel CRM Core
Oracle InForm
Oracle Sun Product Suite
Oracle Open Office
StarOffice/StarSuite
Exploiting the most severe of these vulnerabilities may potentially compromise the database server or the host operating system.
This BID is being retired. The following individual records exist to better document the issues:
46031 OpenOffice Multiple Remote Code Execution Vulnerabilities
46091 Oracle Java Floating-Point Value Denial of Service Vulnerability
46387 Oracle Java SE and Java for Business CVE-2010-4470 Remote Java Runtime Environment Vulnerability
46388 Oracle Java 'Applet2ClassLoader' Class Unsigned Applet Remote Code Execution Vulnerability
46391 Oracle Java SE and Java for Business Java Runtime Environment CVE-2010-4454 Remote Vulnerability
46393 Oracle Java SE and Java for Business CVE-2010-4468 Remote Java Runtime Environment Vulnerability
46394 Oracle Java SE and Java for Business Remote Code Execution Vulnerability
46395 Oracle Java SE and Java for Business CVE-2010-4467 Remote Java Runtime Environment Vulnerability
46397 Oracle Java SE and Java for Business CVE-2010-4450 Remote Java Runtime Environment Vulnerability
46398 Oracle Java SE and Java for Business CVE-2010-4448 Remote Java Runtime Environment Vulnerability
46399 Oracle Java SE and Java for Business CVE-2010-4471 Remote Security Vulnerability
46403 Oracle Java SE and Java for Business CVE-2010-4473 Remote Java Runtime Environment Vulnerability
46404 Oracle Java SE and Java for Business CVE-2010-4472 Remote Java Runtime Environment Vulnerability
46406 Oracle Java Applet Clipboard Injection Remote Code Execution Vulnerability
46767 Multiple Vendors STARTTLS Implementation Plaintext Arbitrary Command Injection Vulnerability
47171 Oracle Solaris CVE-2011-0412 Password Hash Local Information Disclosure Weakness
47429 Oracle Database Server CVE-2011-0792 Remote Oracle Warehouse Builder Vulnerability
47430 Oracle Database CVE-2011-0806 Network Foundation Remote Vulnerability
47431 Oracle Database Server CVE-2011-0799 Remote Warehouse Builder Vulnerability
47432 Oracle Database Server CVE-2011-0804 Remote Database Vault Vulnerability
47434 Oracle E-Business Suite CVE-2011-0809 Web ADI Remote Vulnerability
47435 Oracle Outside In Technology Lotus 123 File Parsing Remote Code Execution Vulnerability
47436 Oracle Database Server CVE-2011-0793 Remote Database Vault Vulnerability
47437 Oracle Outside In Technology Microsoft CAB File Parsing Remote Code Execution Vulnerability
47438 Oracle Sun GlassFish/Java System Application Server Remote Authentication Bypass Vulnerability
47439 Oracle PeopleSoft Enterprise HRMS CVE-2011-0853 Remote PeopleSoft Enterprise HRMS Vulnerability
47440 Oracle E-Business Suite CVE-2011-0797 Applications Install Remote Vulnerability
47441 Oracle Database Server CVE-2011-0805 Remote UIX Vulnerability
47442 Oracle PeopleSoft Enterprise HRMS CVE-2011-0854 Remote PeopleSoft Enterprise HRMS Vulnerability
47443 Oracle Database Server CVE-2011-0785 Remote Oracle Help Vulnerability
47444 Oracle Sun Solaris 11 Express CVE-2011-0841 Remote Vulnerability
47445 Oracle PeopleSoft Enterprise HRMS CVE-2011-0858 Remote Talent Acquisition Manager Vulnerability
47446 Oracle E-Business Suite CVE-2011-0791 Remote Application Object Library Vulnerability
47448 Oracle PeopleSoft Enterprise HRMS CVE-2011-0857 Remote PeopleSoft Enterprise HRMS Vulnerability
47449 Oracle E-Business Suite CVE-2011-0796 Applications Install Local Vulnerability
47450 Oracle Sun Solaris CVE-2011-0800 Local Vulnerability
47451 Oracle Enterprise Manager Grid Control CVE-2011-0787 Remote Security Vulnerability
47452 Oracle JD Edwards EnterpriseOne Tools CVE-2011-0825 Remote Vulnerability
47453 Oracle PeopleSoft Enterprise HRMS CVE-2011-0859 Remote Global Payroll North America Vulnerability
47454 Oracle Supply Chain Product CVE-2011-0837 Remote Agile Technology Platform Vulnerability
47455 Oracle JD Edwards EnterpriseOne Tools CVE-2011-0824 Remote Vulnerabilty
47456 Oracle Peoplesoft Enterprise CVE-2011-0826 Remote Vulnerability
47459 Oracle PeopleSoft Enterprise HRMS CVE-2011-0860 Remote Global Payroll Spain Vulnerability
47460 Oracle PeopleSoft Enterprise CRM CVE-2011-0850 Remote Vulnerability
47461 Oracle JD Edwards EnterpriseOne Tools CVE-2011-0803 Remote Vulnerability
47462 Oracle PeopleSoft CVE-2011-0828 Remote PeopleSoft Enterprise Vulnerability
47463 Oracle Portal CVE-2011-0798 Remote Security Vulnerability
47464 Oracle JD Edwards OneWorld Tools CVE-2011-0818 Remote Vulnerability
47465 Oracle PeopleSoft Enterprise CVE-2011-0827 Remote Vulnerability
47466 Oracle JD Edwards EnterpriseOne Tools CVE-2011-0819 Remote Vulnerability
47467 Oracle PeopleSoft Enterprise ELS CVE-2011-0851 Remote Vulnerability
47468 Oracle JD Edwards OneWorld Tools CVE-2011-0823 Remote Vulnerability
47469 Oracle JD Edwards EnterpriseOne Tools CVE-2011-0810 Remote Vulnerability
47470 Oracle PeopleSoft CVE-2011-0861 Remote PeopleSoft Enterprise HRMS Vulnerability
47471 Oracle PeopleSoft CVE-2011-0840 Remote PeopleSoft Enterprise PeopleTools Vulnerability
47472 Oracle Peoplesoft Enterprise CVE-2011-0856 Remote Vulnerability
47473 Oracle InForm CVE-2011-0855 Remote Vulnerability
47475 Oracle Application Server CVE-2011-0795 Remote Security Vulnerability
47476 Oracle Sun Solaris CVE-2011-0829 Local Vulnerability
47477 Oracle Solaris CVE-2011-0812 Local Solaris Vulnerability
47478 Oracle Solaris CVE-2011-0839 Local Solaris Vulnerability
47479 Oracle Oracle JD Edwards EnterpriseOne and OneWorld Tools CVE-2011-0836 Remote Vulnerability
47480 Oracle Solaris CVE-2011-0820 Remote Kernel Vulnerability
47481 Oracle OpenSSO & Java System Access Manager CVE-2011-0847 Remote Vulnerability
47483 Oracle Java Dynamic Management Kit CVE-2011-0849 Remote Vulnerability
47484 Oracle Siebel CVE-2011-0833 Remote Siebel CRM Core Vulnerability
47486 Oracle Siebel CVE-2011-0834 Remote Siebel CRM Core Vulnerability
47487 Oracle Java System Access Manager Policy Agent CVE-2011-0846 Remote Web Proxy Agent Vulnerability
47488 Oracle Siebel CVE-2011-0843 Remote Siebel CRM Core Vulnerability
47489 Oracle Application Server CVE-2011-0789 Remote Security Vulnerability
47490 Oracle OpenSSO & Java System Access Manager CVE-2011-0844 Remote Vulnerability
47491 Oracle Solaris CVE-2011-0801 Local Vulnerability
47492 Oracle Solaris CVE-2011-0813 Local Kernel Vulnerability
47493 Oracle Sun Solaris CVE-2011-0821 Local Vulnerability
47494 Oracle Solaris CVE-2011-0790 Local Vulnerability
| VAR-201112-0165 | CVE-2011-4896 | Tor Vulnerability in which important information is obtained |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port. Tor is prone to an information disclosure vulnerability.
Successful exploits will allow attackers to obtain sensitive information to launch further attacks.
Versions prior to Tor 0.2.2.24 are vulnerable
| VAR-201208-0645 | CVE-2011-5100 | McAfee Firewall Reporter of Web Interface access vulnerability |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
The web interface in McAfee Firewall Reporter before 5.1.0.13 does not properly implement cookie authentication, which allows remote attackers to obtain access, and disable anti-virus functionality, via an HTTP request. Authentication is not required to exploit this vulnerability. The specific flaw exists within the code responsible for authenticating users. The GernalUtilities.pm file contains code to validate sessions by parsing cookie values without sanitization. The faulty logic simply checks for the existence of a particular file, without verifying its contents. By using a directory traversal technique an attacker can point the cgisess cookie value to an arbitrary file that exists on the server and thus bypass authentication.
This issue may allow websites to bypass certain security restrictions and gain access to potentially sensitive information.
This issue was introduced in McAfee Firewall Reporter 5.1.0.6. ZDI-11-117: McAfee Firewall Reporter GeneralUtilities.pm isValidClient Authentication Bypass Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-11-117
April 11, 2011
-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
-- Affected Vendors:
McAfee
-- Affected Products:
McAfee Firewall Reporter
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 10522.
-- Vendor Response:
McAfee states:
Fixed February 9, 2011
Bulletin modified April 11, 2011:
https://kc.mcafee.com/corporate/index?page=content&id=SB10015
-- Disclosure Timeline:
2010-09-22 - Vulnerability reported to vendor
2011-04-11 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Andrea Micalizzi aka rgod
-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is
used. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
----------------------------------------------------------------------
TITLE:
McAfee Firewall Reporter Web Interface Security Bypass Vulnerability
SECUNIA ADVISORY ID:
SA44110
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44110/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44110
RELEASE DATE:
2011-04-14
DISCUSS ADVISORY:
http://secunia.com/advisories/44110/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44110/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44110
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in McAfee Firewall Reporter, which
can be exploited by malicious people to bypass certain security
restrictions.
The vulnerability is reported in version 5.1.0.6.
SOLUTION:
Update to version 5.1.0.13.
PROVIDED AND/OR DISCOVERED BY:
Andrea Micalizzi (rgod) via ZDI
ORIGINAL ADVISORY:
McAfee:
https://kc.mcafee.com/corporate/index?page=content&id=SB10015
ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-11-117/
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201105-0126 | CVE-2011-1323 | Yamaha RT Series Router IP Header Resolution Denial of Service Vulnerability |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
Yamaha RTX, RT, SRT, RTV, RTW, and RTA series routers with firmware 6.x through 10.x, and NEC IP38X series routers with firmware 6.x through 10.x, do not properly handle IP header options, which allows remote attackers to cause a denial of service (device reboot) via a crafted option that triggers access to an invalid memory location. Multiple routers provided by Yamaha contain a denial-of-service vulnerability. Multiple routers provided by Yamaha contain a denial-of-service (DoS) vulnerability due to an issue in processing IP packets. Yuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.A remote attacker may cause a denial-of-service (DoS). The Yamaha RT Series Router is a high speed broadband router device. A security vulnerability exists in the Yamaha RT series router when parsing IP packets, allowing an attacker to perform a denial of service attack on the device.
Successful exploits will cause the device to crash, denying service to legitimate users. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
----------------------------------------------------------------------
TITLE:
Yamaha RT Series Routers IP Header Parsing Denial of Service
Vulnerability
SECUNIA ADVISORY ID:
SA44087
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44087/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44087
RELEASE DATE:
2011-04-12
DISCUSS ADVISORY:
http://secunia.com/advisories/44087/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44087/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44087
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in the Yamaha RT Series Routers,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error when parsing certain IP
header options and can be exploited to cause a device to reboot via a
specially crafted packet.
Please see the vendor's advisory for the list of affected products
and versions.
SOLUTION:
Update to a fixed firmware version if available or restrict access to
trusted hosts only. Please see the vendor's advisory for more details.
ORIGINAL ADVISORY:
Yamaha:
http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVN55714408.html
JVN:
http://jvn.jp/en/jp/JVN55714408/index.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0089 | CVE-2011-0988 | SUSE Linux Enterprise Server Used in pure-ftpd Vulnerable to overwriting arbitrary files |
CVSS V2: 4.4 CVSS V3: - Severity: MEDIUM |
pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors. Pure-FTPd in SUSE is prone to a local insecure-file-permissions vulnerability.
A local attacker can exploit this issue to overwrite certain files. This may lead to privilege escalation; other attacks may also be possible. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
----------------------------------------------------------------------
TITLE:
SUSE pure-ftpd Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA44039
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44039/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44039
RELEASE DATE:
2011-04-08
DISCUSS ADVISORY:
http://secunia.com/advisories/44039/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44039/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44039
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
SUSE has acknowledged a vulnerability in the pure-ftpd package for
SUSE Linux Enterprise Server, which can be exploited by malicious,
local users to gain escalated privileges.
The vulnerability is caused due to an error related to a
world-writable folder created by the "OES pure-ftpd Netware
extensions", which can be exploited to manipulate system files and
gain escalated privileges. Further information is currently not
available.
SOLUTION:
Apply updated packages via the zypper package manager.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
SUSE-SU-2011:0306-1:
https://hermes.opensuse.org/messages/7849430
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0367 | No CVE | vtiger CRM 'sortfieldsjson.php' Local File Include Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
vtiger CRM is prone to a local file-include vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to obtain potentially sensitive information and execute arbitrary local scripts in the context of the webserver process. This may allow the attacker to compromise the application and the underlying computer; other attacks are also possible.
vtiger CRM 5.2.1 is vulnerable; other versions may also be affected.
| VAR-201110-0139 | CVE-2011-0459 | Cyber-Ark PIM Suite Password Vault Web Access Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Cyber-Ark Password Vault Web Access (PVWA) 5.0 and earlier, 5.5 through 5.5 patch 4, and 6.0 through 6.0 patch 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Password Vault Web Access (PVWA) provided by Cyber-Ark Software, Ltd. contains a cross-site scripting vulnerability. Password Vault Web Access (PVWA) is a module in the Privileged Identity Management Suite that allows access via a web portal. PVWA contains a cross-site scripting vulnerability.An arbitrary script may be executed on the web browser of an user who is logged on. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
----------------------------------------------------------------------
TITLE:
Cyber-Ark PIM Suite Password Vault Web Access Cross-Site Scripting
Vulnerability
SECUNIA ADVISORY ID:
SA44058
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44058/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44058
RELEASE DATE:
2011-04-09
DISCUSS ADVISORY:
http://secunia.com/advisories/44058/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44058/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44058
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
A vulnerability has been reported in Cyber-Ark PIM Suite, which can
be exploited by malicious people to conduct cross-site scripting
attacks. Please contact the vendor for more
information.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
JVN:
http://jvn.jp/en/jp/JVN11424086/index.html
http://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000023.html
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0326 | No CVE | Fiberhome HG-110 Directory Traversal Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The Fiberhome HG-110 is an ADSL router device. The Fiberhome HG-110 has a cross-site scripting attack that can lead to the disclosure of sensitive information or unauthorized access to system sensitive files. Fiberhome HG-110 is prone to a cross-site scripting vulnerability and a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting these issues will allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site and to view arbitrary local files and directories within the context of the webserver. This may let the attacker steal cookie-based authentication credentials and other harvested information, which may aid in launching further attacks.
Fiberhome HG-110 firmware 1.0.0 is vulnerable other versions may also be affected
| VAR-201104-0277 | CVE-2011-1496 | tmux In utmp Vulnerability to obtain group privileges |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
tmux 1.3 and 1.4 does not properly drop group privileges, which allows local users to gain utmp group privileges via a filename to the -S command-line option.
Local attackers may exploit this issue to gain elevated privileges; other attacks may also be possible. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -------------------------------------------------------------------------
Debian Security Advisory DSA-2212-1 security@debian.org
http://www.debian.org/security/ Nico Golde
April 7, 2011 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : tmux
Vulnerability : privilege escalation
Problem type : local
Debian-specific: yes
CVE ID : CVE-2011-1496
Debian bug : 620304
Daniel Danner discovered that tmux, a terminal multiplexer, is not
properly dropping group privileges.
The oldstable distribution (lenny) is not affected by this problem,
it does not include tmux.
For the stable distribution (squeeze), this problem has been fixed in
version 1.3-2+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in
version 1.4-6.
For the testing distribution (sid), this problem has been fixed in
version 1.4-6.
We recommend that you upgrade your tmux packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk2eFbcACgkQHYflSXNkfP/NsgCfcy8X81nTclGCQSWTXxX1/wDF
o3kAnR7KmINuzH+MnbAls9Vf8Ewib/Bc
=jUL0
-----END PGP SIGNATURE-----
. ----------------------------------------------------------------------
Q1 Factsheets released:
http://secunia.com/resources/factsheets/2011_vendor/
----------------------------------------------------------------------
TITLE:
Debian update for tmux
SECUNIA ADVISORY ID:
SA44081
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/44081/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=44081
RELEASE DATE:
2011-04-09
DISCUSS ADVISORY:
http://secunia.com/advisories/44081/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/44081/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44081
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Debian has issued an update for tmux.
The security issue is caused due to the application not dropping
group privileges and can be exploited to perform certain actions
using permissions of the "tmux" group.
SOLUTION:
Apply updated packages via the apt-get package manager.
PROVIDED AND/OR DISCOVERED BY:
Reported by Daniel Danner in a Debian bug report.
ORIGINAL ADVISORY:
DSA-2212-1:
http://www.debian.org/security/2011/dsa-2212
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/products/corporate/EVM/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
| VAR-201104-0174 | CVE-2011-0746 | ZyXEL O2 DSL Router Classic of Forms/PortForwarding_Edit_1 Vulnerable to cross-site request forgery |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site request forgery (CSRF) vulnerability in Forms/PortForwarding_Edit_1 on the ZyXEL O2 DSL Router Classic allows remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the PortRule_Name parameter. The device is produced by ZyXEL, it seems it
has no other name than the brand "O2 DSL Router Classic".
As an example, the form at /Forms/PortForwarding_Edit_1 accepts
javascript code for the parameter PortRule_Name, which will be
permanently stored. Also, the form has no protection against CSRF.
A sample code that will inject permanent javascript when called by a
user who is logged into his router:
<form id="form1" method="post"
action="http://192.168.1.1/Forms/PortForwarding_Edit_1"> <input
name="PortRule_Name" value='"><script>alert(7)</script>'> <input
name="PortRule_SPort" value="77"> <input name="PortRule_EPort"
value="77"> <input name="PortRule_SrvAddr" value="10.0.0.1" >
<script>
var frm = document.getElementById("form1");
frm.submit();
</script>
This is just an example, all forms in the router interface are
vulnerable to CSRF and, if they accept text input, to XSS.
The vulnerability has been disclosed to O2 in advance without any reply.
Disclosure Timeline
2011-02-03: Vendor contacted
2011-04-07: Published advisory
This vulnerability was discovered by Hanno Boeck, http://www.hboeck.de,
of schokokeks.org webhosting
| VAR-201104-0324 | No CVE | O2 DSL Router Classic Cross-Site Request Forgery Vulnerability |
CVSS V2: - CVSS V3: - Severity: - |
The O2 DSL Router Classic is a router. O2 DSL Router Classic has a cross-site request forgery vulnerability. An attacker could exploit the vulnerability to execute arbitrary instructions in the context of a user session. This may aid in other attacks. Other attacks are also possible