VARIoT IoT vulnerabilities database
| VAR-202106-2289 | No CVE | D-Link DIR-615 has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
D-Link DIR-615 is a wireless router made by D-Link in Taiwan.
D-Link DIR-615 has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-1607 | CVE-2021-25405 | Samsung Notes Authentication Vulnerability in Microsoft |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
An improper access control vulnerability in ScreenOffActivity in Samsung Notes prior to version 4.2.04.27 allows untrusted applications to access local files. Samsung Notes Contains an improper authentication vulnerability.Information may be obtained. Samsung Notes is a Notes series smart phone product of South Korea's Samsung (Samsung) company
| VAR-202106-1623 | CVE-2021-25421 | Galaxy Watch3 Vulnerability regarding information leakage from log files in plugins |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper log management vulnerability in Galaxy Watch3 PlugIn prior to version 2.2.09.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. Samsung Galaxy Watch3 is the third-generation smart watch in the Samsung Galaxy Watch series
| VAR-202106-1625 | CVE-2021-25423 | Watch Active2 Vulnerability regarding information leakage from log files in plugins |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper log management vulnerability in Watch Active2 PlugIn prior to 2.2.08.21033151 version allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone via log. Samsung Watch Active2 is a smart watch produced by South Korea's Samsung (Samsung) company
| VAR-202106-1624 | CVE-2021-25422 | Watch Active Vulnerability regarding information leakage from log files in plugins |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper log management vulnerability in Watch Active PlugIn prior to version 2.2.07.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. Samsung Watch Active2 is a smart watch produced by South Korea's Samsung (Samsung) company
| VAR-202106-1622 | CVE-2021-25420 | Galaxy Watch Vulnerability regarding information leakage from log files in plugins |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper log management vulnerability in Galaxy Watch PlugIn prior to version 2.2.05.21033151 allows attacker with log permissions to leak Wi-Fi password connected to the user smartphone within log. Samsung Galaxy Apps is a pre-installed app store program for Samsung mobile devices of South Korea's Samsung (Samsung)
| VAR-202106-2328 | No CVE | Kingdee Cloud·Xingkong has arbitrary file reading vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Kingdee Cloud·Xingkong is a new generation of strategic enterprise management software developed by Kingdee Software (China) Co., Ltd. based on cutting-edge technologies such as cloud computing, big data, social networking, artificial intelligence, and the Internet of Things.
Kingdee Cloud·Xingkong has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-2329 | No CVE | Shanghai China Consumer Network Technology Co., Ltd. fire protection platform has logic flaws and loopholes |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
China Consumer Online Co., Ltd., former name/alias: Shanghai China Consumer Network Technology Co., Ltd., the company is committed to creating industry standards for fire safety, industry standards for fire safety products, standards for smart fire Internet +" One-stop technical operation solutions to promote the innovation of fire safety models and the intelligentization of science and technology.
Shanghai China Consumer Network Technology Co., Ltd. fire-fighting first-level platform has a logic flaw vulnerability. Attackers can use this vulnerability to bypass login to obtain sensitive information.
| VAR-202106-2338 | No CVE | Panasonic Electric (China) Co., Ltd. Network Camera BB-SW172A has an unauthorized access vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales service activities of home appliances, systems, environment, components and other commodities.
Matsushita Electric (China) Co., Ltd. Network Camera BB-SW172A has an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202106-0541 | CVE-2021-22763 | plural Schneider Electric Product password management vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-640: Weak Password Recovery Mechanism for Forgotten Password vulnerability exists in PowerLogic PM55xx, PowerLogic PM8ECC, PowerLogic EGX100 and PowerLogic EGX300 (see security notification for version infromation) that could allow an attacker administrator level access to a device. plural Schneider Electric The product contains a vulnerability related to the password management function.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202106-1381 | CVE-2021-34540 | Advantech WebAccess Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard. Advantech WebAccess Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Advantech WebAccess is a set of browser-based HMI/SCADA software developed by China Taiwan Advantech Company. The software supports dynamic graphic display and real-time data control, and provides functions of remote control and management of automation equipment
| VAR-202106-0542 | CVE-2021-22764 | plural Schneider Electric Product certification vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A CWE-287: Improper Authentication vulnerability exists in PowerLogic PM55xx, PowerLogic PM8ECC, PowerLogic EGX100 and PowerLogic EGX300 (see security notification for version infromation) that could cause loss of connectivity to the device via Modbus TCP protocol when an attacker sends a specially crafted HTTP request. plural Schneider Electric The product contains authentication vulnerabilities.Service operation interruption (DoS) It may be in a state
| VAR-202106-1604 | CVE-2021-25402 | Samsung Notes Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: Low |
Information Exposure vulnerability in Samsung Notes prior to version 4.2.04.27 allows attacker to access s pen latency information. Samsung Notes There is a vulnerability in the insecure storage of important information.Information may be obtained
| VAR-202106-0521 | CVE-2021-22898 | curl Vulnerability in resource initialization deficiency in |
CVSS V2: 2.6 CVSS V3: 3.1 Severity: LOW |
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. curl Exists in a flaw in resource initialization.Information may be obtained. Bugs fixed (https://bugzilla.redhat.com/):
1944888 - CVE-2021-21409 netty: Request smuggling via content-length header
2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
5. JIRA issues fixed (https://issues.jboss.org/):
LOG-1775 - [release-5.2] Syslog output is serializing json incorrectly
LOG-1824 - [release-5.2] Rejected by Elasticsearch and unexpected json-parsing
LOG-1963 - [release-5.2] CLO panic: runtime error: slice bounds out of range [:-1]
LOG-1970 - Applying cluster state is causing elasticsearch to hit an issue and become unusable
6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: curl security and bug fix update
Advisory ID: RHSA-2021:4511-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:4511
Issue date: 2021-11-09
CVE Names: CVE-2021-22876 CVE-2021-22898 CVE-2021-22925
====================================================================
1. Summary:
An update for curl is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
The curl packages provide the libcurl library and the curl utility for
downloading files from servers using various protocols, including HTTP,
FTP, and LDAP.
Security Fix(es):
* curl: Leak of authentication credentials in URL via automatic Referer
(CVE-2021-22876)
* curl: TELNET stack contents disclosure (CVE-2021-22898)
* curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
(CVE-2021-22925)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.5 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1941964 - CVE-2021-22876 curl: Leak of authentication credentials in URL via automatic Referer
1947493 - Why there is a difference between curl --head output on the RHEL7 and RHEL8.
1964887 - CVE-2021-22898 curl: TELNET stack contents disclosure
1970902 - CVE-2021-22925 curl: Incorrect fix for CVE-2021-22898 TELNET stack contents disclosure
6. Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
curl-7.61.1-22.el8.src.rpm
aarch64:
curl-7.61.1-22.el8.aarch64.rpm
curl-debuginfo-7.61.1-22.el8.aarch64.rpm
curl-debugsource-7.61.1-22.el8.aarch64.rpm
curl-minimal-debuginfo-7.61.1-22.el8.aarch64.rpm
libcurl-7.61.1-22.el8.aarch64.rpm
libcurl-debuginfo-7.61.1-22.el8.aarch64.rpm
libcurl-devel-7.61.1-22.el8.aarch64.rpm
libcurl-minimal-7.61.1-22.el8.aarch64.rpm
libcurl-minimal-debuginfo-7.61.1-22.el8.aarch64.rpm
ppc64le:
curl-7.61.1-22.el8.ppc64le.rpm
curl-debuginfo-7.61.1-22.el8.ppc64le.rpm
curl-debugsource-7.61.1-22.el8.ppc64le.rpm
curl-minimal-debuginfo-7.61.1-22.el8.ppc64le.rpm
libcurl-7.61.1-22.el8.ppc64le.rpm
libcurl-debuginfo-7.61.1-22.el8.ppc64le.rpm
libcurl-devel-7.61.1-22.el8.ppc64le.rpm
libcurl-minimal-7.61.1-22.el8.ppc64le.rpm
libcurl-minimal-debuginfo-7.61.1-22.el8.ppc64le.rpm
s390x:
curl-7.61.1-22.el8.s390x.rpm
curl-debuginfo-7.61.1-22.el8.s390x.rpm
curl-debugsource-7.61.1-22.el8.s390x.rpm
curl-minimal-debuginfo-7.61.1-22.el8.s390x.rpm
libcurl-7.61.1-22.el8.s390x.rpm
libcurl-debuginfo-7.61.1-22.el8.s390x.rpm
libcurl-devel-7.61.1-22.el8.s390x.rpm
libcurl-minimal-7.61.1-22.el8.s390x.rpm
libcurl-minimal-debuginfo-7.61.1-22.el8.s390x.rpm
x86_64:
curl-7.61.1-22.el8.x86_64.rpm
curl-debuginfo-7.61.1-22.el8.i686.rpm
curl-debuginfo-7.61.1-22.el8.x86_64.rpm
curl-debugsource-7.61.1-22.el8.i686.rpm
curl-debugsource-7.61.1-22.el8.x86_64.rpm
curl-minimal-debuginfo-7.61.1-22.el8.i686.rpm
curl-minimal-debuginfo-7.61.1-22.el8.x86_64.rpm
libcurl-7.61.1-22.el8.i686.rpm
libcurl-7.61.1-22.el8.x86_64.rpm
libcurl-debuginfo-7.61.1-22.el8.i686.rpm
libcurl-debuginfo-7.61.1-22.el8.x86_64.rpm
libcurl-devel-7.61.1-22.el8.i686.rpm
libcurl-devel-7.61.1-22.el8.x86_64.rpm
libcurl-minimal-7.61.1-22.el8.i686.rpm
libcurl-minimal-7.61.1-22.el8.x86_64.rpm
libcurl-minimal-debuginfo-7.61.1-22.el8.i686.rpm
libcurl-minimal-debuginfo-7.61.1-22.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-22876
https://access.redhat.com/security/cve/CVE-2021-22898
https://access.redhat.com/security/cve/CVE-2021-22925
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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7Kqb
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. ==========================================================================
Ubuntu Security Notice USN-5021-2
January 20, 2022
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
curl could be made to expose sensitive information if it received a
specially crafted input. This update provides
the corresponding updates for Ubuntu 16.04 ESM. (CVE-2021-22898,
CVE-2021-22925)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
curl 7.47.0-1ubuntu2.19+esm3
libcurl3 7.47.0-1ubuntu2.19+esm3
libcurl3-gnutls 7.47.0-1ubuntu2.19+esm3
libcurl3-nss 7.47.0-1ubuntu2.19+esm3
In general, a standard system update will make all the necessary changes. Summary:
The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API. Bugs fixed (https://bugzilla.redhat.com/):
1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
5. Bugs fixed (https://bugzilla.redhat.com/):
1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic
1992006 - CVE-2021-29923 golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet
1997017 - unprivileged client fails to get guest agent data
1998855 - Node drain: Sometimes source virt-launcher pod status is Failed and not Completed
2000251 - RoleBinding and ClusterRoleBinding brought in by kubevirt does not get reconciled when kind is ServiceAccount
2001270 - [VMIO] [Warm from Vmware] Snapshot files are not deleted after Successful Import
2001281 - [VMIO] [Warm from VMware] Source VM should not be turned ON if vmio import is removed
2001901 - [4.8.3] NNCP creation failures after nmstate-handler pod deletion
2007336 - 4.8.3 containers
2007776 - Failed to Migrate Windows VM with CDROM (readonly)
2008511 - [CNV-4.8.3] VMI is in LiveMigrate loop when Upgrading Cluster from 2.6.7/4.7.32 to OCP 4.8.13
2012890 - With descheduler during multiple VMIs migrations, some VMs are restarted
2025475 - [4.8.3] Upgrade from 2.6 to 4.x versions failed due to vlan-filtering issues
2026881 - [4.8.3] vlan-filtering is getting applied on veth ports
5. Description:
Red Hat OpenShift Container Storage is software-defined storage integrated
with and optimized for the Red Hat OpenShift Container Platform.
Red Hat OpenShift Container Storage is highly scalable, production-grade
persistent storage for stateful applications running in the Red Hat
OpenShift Container Platform. In addition to persistent storage, Red Hat
OpenShift Container Storage provides a multicloud data management service
with an S3 compatible API.
Bug Fix(es):
* Previously, when the namespace store target was deleted, no alert was
sent to the namespace bucket because of an issue in calculating the
namespace bucket health. With this update, the issue in calculating the
namespace bucket health is fixed and alerts are triggered as expected.
(BZ#1993873)
* Previously, the Multicloud Object Gateway (MCG) components performed
slowly and there was a lot of pressure on the MCG components due to
non-optimized database queries. With this update the non-optimized
database queries are fixed which reduces the compute resources and time
taken for queries. Bugs fixed (https://bugzilla.redhat.com/):
1993873 - [4.8.z clone] Alert NooBaaNamespaceBucketErrorState is not triggered when namespacestore's target bucket is deleted
2006958 - CVE-2020-26301 nodejs-ssh2: Command injection by calling vulnerable method with untrusted input
5
| VAR-202106-0543 | CVE-2021-22765 | PowerLogic EGX100 and PowerLogic EGX300 Input confirmation vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: Critical |
** UNSUPPORTED WHEN ASSIGNED ** A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3.0.0 and newer) and PowerLogic EGX300 (All Versions) that could cause denial of service or remote code execution via a specially crafted HTTP packet. ** Not supported ** This is a vulnerability in an unsupported product. PowerLogic EGX100 and PowerLogic EGX300 Is vulnerable to input validation.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202106-1606 | CVE-2021-25404 | SmartThings Vulnerability in insecure storage of important information in |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
Information Exposure vulnerability in SmartThings prior to version 1.7.64.21 allows attacker to access user information via log. SmartThings There is a vulnerability in the insecure storage of important information.Information may be obtained
| VAR-202106-1626 | CVE-2021-25424 | Tizen bluetooth-frwk Authentication vulnerabilities in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness. Tizen bluetooth-frwk Contains an authentication vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202106-1589 | CVE-2021-25387 | Android Out-of-bounds Vulnerability in Microsoft |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
An improper input validation vulnerability in sflacfd_get_frm() in libsflacextractor library prior to SMR MAY-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process. Android Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Samsung libsapeextractor library is a component of Samsung mobile devices.
Samsung libsapeextractor library has an input validation error vulnerability
| VAR-202106-1588 | CVE-2021-25386 | Android Buffer Overflow Vulnerability in Linux |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An improper input validation vulnerability in sdfffd_parse_chunk_FVER() in libsdffextractor library prior to SMR MAY-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process. Android Contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Samsung libsdffextractor library is a component of Samsung mobile devices.
Samsung libsdffextractor library has an input validation error vulnerability
| VAR-202106-1587 | CVE-2021-25385 | Android Buffer Overflow Vulnerability in Linux |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An improper input validation vulnerability in sdfffd_parse_chunk_PROP() in libsdffextractor library prior to SMR MAY-2021 Release 1 allows attackers to execute arbitrary code on mediaextractor process. Android Contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Samsung libsdffextractor library is a component of Samsung mobile devices.
Samsung libsdffextractor library has an input validation error vulnerability