VARIoT IoT vulnerabilities database
| VAR-202203-2075 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Uninitialized Pointer Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-2060 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Out-Of-Bound Read Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-2055 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Out-Of-Bound Write Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process.
| VAR-202203-0231 | CVE-2022-24322 | Schneider Electric EcoStruxure Control Experta Buffer error vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
A CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists that could cause a disruption of communication between the Modicon controller and the engineering software when an attacker is able to intercept and manipulate specific Modbus response data. Affected Product: EcoStruxure Control Expert (V15.0 SP1 and prior)
| VAR-202203-0237 | CVE-2022-22805 | plural Schneider Electric Classic buffer overflow vulnerability in the product |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability exists that could cause remote code execution when an improperly handled TLS packet is reassembled. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior). Schneider Electric The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Schneider Electric APC Smart-UPS SMC Series, etc. are all products of the French Schneider Electric (Schneider Electric). The Schneider Electric APC Smart-UPS SMC Series is an entry-level UPS for single server, low-power networking, and point-of-sale (POS) devices. Schneider Electric APC Smart-UPS SMT Series is a line interactive power protection for servers, point of sale, routers, switches, hubs and other network equipment. Schneider Electric APC Smart-UPS SMX Series is an intelligent and efficient network power protection
| VAR-202203-0664 | CVE-2021-25220 | BIND Cache Pollution with Incorrect Records Vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.8 Severity: MEDIUM |
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients. Bogus NS records supplied by the forwarders may be cached and used by name if it needs to recurse for any reason. This issue causes it to obtain and pass on potentially incorrect answers. (CVE-2021-25220)
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service. (CVE-2022-2795)
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38177)
By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources. (CVE-2022-38178).
For the oldstable distribution (buster), this problem has been fixed
in version 1:9.11.5.P4+dfsg-5.1+deb10u7.
For the stable distribution (bullseye), this problem has been fixed in
version 1:9.16.27-1~deb11u1.
We recommend that you upgrade your bind9 packages.
For the detailed security status of bind9 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/bind9
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=6st2
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: bind security update
Advisory ID: RHSA-2023:0402-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0402
Issue date: 2023-01-24
CVE Names: CVE-2021-25220 CVE-2022-2795
====================================================================
1. Summary:
An update for bind is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64
Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
3. Description:
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220)
* bind: processing large delegations may severely degrade resolver
performance (CVE-2022-2795)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, the BIND daemon (named) will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
2064512 - CVE-2021-25220 bind: DNS forwarders - cache poisoning vulnerability
2128584 - CVE-2022-2795 bind: processing large delegations may severely degrade resolver performance
6. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
bind-9.11.4-26.P2.el7_9.13.src.rpm
noarch:
bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm
x86_64:
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64:
bind-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
bind-9.11.4-26.P2.el7_9.13.src.rpm
noarch:
bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm
x86_64:
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64:
bind-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
bind-9.11.4-26.P2.el7_9.13.src.rpm
noarch:
bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm
ppc64:
bind-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-libs-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-libs-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-utils-9.11.4-26.P2.el7_9.13.ppc64.rpm
ppc64le:
bind-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-libs-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-utils-9.11.4-26.P2.el7_9.13.ppc64le.rpm
s390x:
bind-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.s390.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.s390.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-libs-9.11.4-26.P2.el7_9.13.s390.rpm
bind-libs-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.s390.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.s390.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-utils-9.11.4-26.P2.el7_9.13.s390x.rpm
x86_64:
bind-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64:
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-devel-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-devel-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.ppc.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.ppc64.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.ppc64.rpm
ppc64le:
bind-debuginfo-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-devel-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.ppc64le.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.ppc64le.rpm
s390x:
bind-debuginfo-9.11.4-26.P2.el7_9.13.s390.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-devel-9.11.4-26.P2.el7_9.13.s390.rpm
bind-devel-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.s390.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.s390.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.s390.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.s390x.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.s390x.rpm
x86_64:
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
bind-9.11.4-26.P2.el7_9.13.src.rpm
noarch:
bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm
x86_64:
bind-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm
bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64:
bind-debuginfo-9.11.4-26.P2.el7_9.13.i686.rpm
bind-debuginfo-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm
bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm
bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-25220
https://access.redhat.com/security/cve/CVE-2022-2795
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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azJw
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. 9) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows
individual devices on an IP network to get their own network configuration
information, including an IP address, a subnet mask, and a broadcast
address. The dhcp packages provide a relay agent and ISC DHCP service
required to enable and administer DHCP on a network.
The following advisory data is extracted from:
https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_2720.json
Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. 8) - aarch64, ppc64le, s390x, x86_64
3. ==========================================================================
Ubuntu Security Notice USN-5332-1
March 17, 2022
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
- bind9: Internet Domain Name Server
Details:
Xiang Li, Baojun Liu, Chaoyi Lu, and Changgen Zou discovered that Bind
incorrectly handled certain bogus NS records when using forwarders. A
remote attacker could possibly use this issue to manipulate cache results.
(CVE-2021-25220)
It was discovered that Bind incorrectly handled certain crafted TCP
streams. A remote attacker could possibly use this issue to cause Bind to
consume resources, leading to a denial of service. This issue only affected
Ubuntu 21.10. (CVE-2022-0396)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 21.10:
bind9 1:9.16.15-1ubuntu1.2
Ubuntu 20.04 LTS:
bind9 1:9.16.1-0ubuntu2.10
Ubuntu 18.04 LTS:
bind9 1:9.11.3+dfsg-1ubuntu1.17
In general, a standard system update will make all the necessary changes
| VAR-202203-0217 | CVE-2022-25214 | plural PHICOMM Fraudulent Authentication Vulnerability in Products |
CVSS V2: 5.8 CVSS V3: 7.4 Severity: HIGH |
Improper access control on the LocalClientList.asp interface allows an unauthenticated remote attacker to obtain sensitive information concerning devices on the local area network, including IP and MAC addresses. Improper access control on the wirelesssetup.asp interface allows an unauthenticated remote attacker to obtain the WPA passphrases for the 2.4GHz and 5.0GHz wireless networks. This is particularly dangerous given that the K2G setup wizard presents the user with the option of using the same password for the 2.4Ghz network and the administrative interface, by clicking a checkbox. When Remote Managment is enabled, these endpoints are exposed to the WAN. k2 firmware, k3 firmware, k3c firmware etc. PHICOMM The product contains an incorrect authentication vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
| VAR-202203-0222 | CVE-2022-25213 | plural PHICOMM Product use of hardcoded credentials vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell. k2 firmware, k3 firmware, k3c firmware etc. PHICOMM The product contains a vulnerability related to the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202203-0218 | CVE-2022-25215 | plural PHICOMM Fraudulent Authentication Vulnerability in Products |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Improper access control on the LocalMACConfig.asp interface allows an unauthenticated remote attacker to add (or remove) client MAC addresses to (or from) a list of banned hosts. Clients with those MAC addresses are then prevented from accessing either the WAN or the router itself. k2 firmware, k3 firmware, k3c firmware etc. PHICOMM The product contains an incorrect authentication vulnerability.Information may be tampered with
| VAR-202203-2047 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Out-Of-Bound Read Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-0347 | CVE-2021-33150 | Intel Trace Hub Permission Licensing and Access Control Issue Vulnerability |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Hardware allows activation of test or debug logic at runtime for some Intel(R) Trace Hub instances which may allow an unauthenticated user to potentially enable escalation of privilege via physical access
| VAR-202203-0959 | CVE-2022-22511 | Cross-site scripting vulnerability in multiple Wago Japan products |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised. 750-8100 firmware, 750-8101 firmware, 750-8102 Multiple Wago Japan Co., Ltd. products such as firmware contain a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202203-2040 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Out-Of-Bound Read Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-0221 | CVE-2022-25217 | PHICOMM of k2 firmware and k3c Vulnerability related to use of hardcoded credentials in firmware |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet. The builds of telnetd_startup included in the version 22.5.9.163 of the K2 firmware, and version 32.1.15.93 of the K3C firmware (possibly amongst many other releases) included both the private and public RSA keys. The remaining versions cited here redacted the private key, but left the public key unchanged. An attacker in possession of the leaked private key may, through a scripted exchange of UDP packets, instruct telnetd_startup to spawn an unauthenticated telnet shell as root, by means of which they can then obtain complete control of the device. A consequence of the limited availablility of firmware images for testing is that models and versions not listed here may share this vulnerability. PHICOMM of k2 firmware and k3c A vulnerability exists in the firmware regarding the use of hardcoded credentials.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202203-2044 | No CVE | (0Day) Ecava IntegraXor Inkscape WMF File Parsing Memory Corruption Remote Code Execution Vulnerability |
CVSS V2: - CVSS V3: 7.8 Severity: HIGH |
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of WMF files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process.
| VAR-202203-0219 | CVE-2022-25219 | plural PHICOMM Product Interpretation Conflict Vulnerability |
CVSS V2: 6.9 CVSS V3: 8.4 Severity: HIGH |
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218). k2 firmware, k3 firmware, k3c firmware etc. PHICOMM The product contains an interpretation conflict vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202203-0220 | CVE-2022-25218 | plural PHICOMM Product vulnerabilities |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decrypted by OpenSSL's RSA_public_decrypt() function. This weakness allows the attacker to manipulate the various iterations of the telnetd startup state machine and eventually obtain a root shell on the device, by means of an exchange of crafted UDP packets. In all versions but K2 22.5.9.163 and K3C 32.1.15.93 a successful attack also requires the exploitation of a null-byte interaction error (CVE-2022-25219). k2 firmware, k3 firmware, k3c firmware etc. PHICOMM There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202203-2071 | No CVE | (0Day) Ecava IntegraXor Inkscape PCX File Parsing Out-Of-Bound Read Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of PCX files within the Inkscape component. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-2081 | No CVE | (0Day) Ecava IntegraXor Inkscape EMF File Parsing Uninitialized Pointer Information Disclosure Vulnerability |
CVSS V2: - CVSS V3: 3.3 Severity: LOW |
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Ecava IntegraXor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files within the Inkscape component. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
| VAR-202203-0236 | CVE-2022-22806 | plural Schneider Electric In the product Capture-replay Authentication Bypass Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-294: Authentication Bypass by Capture-replay vulnerability exists that could cause an unauthenticated connection to the UPS when a malformed connection is sent. Affected Product: SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior). Schneider Electric The product has Capture-replay An authentication bypass vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Schneider Electric APC Smart-UPS SMC Series, etc. are all products of the French Schneider Electric (Schneider Electric). The Schneider Electric APC Smart-UPS SMC Series is an entry-level UPS for single server, low-power networking, and point-of-sale (POS) devices. Schneider Electric APC Smart-UPS SMT Series is a line interactive power protection for servers, point of sale, routers, switches, hubs and other network equipment. Schneider Electric APC Smart-UPS SMX Series is an intelligent and efficient network power protection