VARIoT IoT vulnerabilities database

VAR-202010-0213 | CVE-2019-8618 | plural Apple Logic vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A logic issue was addressed with improved restrictions. This issue is fixed in watchOS 5.2, macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.2. A sandboxed process may be able to circumvent sandbox restrictions. watchOS , macOS , iOS Exists in a logic vulnerability due to a flaw in the processing of restrictions.Sandboxed processes can circumvent sandboxing restrictions. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple macOS High Sierra is a dedicated operating system developed for Mac computers. Apple watchOS is a smart watch operating system
VAR-202010-0199 | CVE-2019-8639 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices
VAR-202010-0198 | CVE-2019-8638 | plural Apple Multiple memory corruption vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in watchOS 5.2, iCloud for Windows 7.11, iOS 12.2, iTunes 12.9.4 for Windows, Safari 12.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple watchOS is a smart watch operating system
VAR-202010-0197 | CVE-2019-8633 | plural Apple Product validation vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3, watchOS 5.3. An application may be able to read restricted memory. plural Apple The product contains a validation vulnerability due to a flawed input sanitization process.Limited memory can be read through the application. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple macOS High Sierra is a dedicated operating system developed for Mac computers. tvOS is a smart TV operating system
VAR-202010-0196 | CVE-2019-8631 | plural Apple Logic vulnerabilities in the product |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A logic issue was addressed with improved state management. This issue is fixed in macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierra, iOS 12.3, tvOS 12.3. Users removed from an iMessage conversation may still be able to alter state. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. Apple macOS Mojave is a dedicated operating system developed for Mac computers. A security flaw in several Apple products stems from the fact that users who are removed from an iMessage session can still change status
VAR-202010-0116 | CVE-2019-8858 | macOS Logic vulnerability in |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006. A user who shares their screen may not be able to end screen sharing. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-0448 | CVE-2020-24990 | QSC Q-SYS Core Manager Traversal Vulnerability in Japan |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in QSC Q-SYS Core Manager 8.2.1. By utilizing the TFTP service running on UDP port 69, a remote attacker can perform a directory traversal and obtain operating system files via a TFTP GET request, as demonstrated by reading /etc/passwd or /proc/version. QSC Q-SYS is a device used in signal processing from QSC Corporation of the United States. The device is used in audio information processing and information exchange, and can be used in conferences, teachers, lecture halls and other multi-person conference scenarios. Attackers can use this vulnerability to traverse TFTP related directories
VAR-202010-1343 | CVE-2020-6876 | ZTE eVDC Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A ZTE product is impacted by an XSS vulnerability. The vulnerability is caused by the lack of correct verification of client data in the WEB module. By inserting malicious scripts into the web module, a remote attacker could trigger an XSS attack when the user browses the web page. Then the attacker could use the vulnerability to steal user cookies or destroy the page structure. This affects: eVDC ZXCLOUD-iROSV6.03.04. ZTE eVDC Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. ZTE eVDC is a virtualized data center product service of China ZTE Corporation (ZTE)
VAR-202010-1610 | No CVE | Sony (China) Co., Ltd. SNC series cameras have unauthorized access vulnerabilities |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
SNC series cameras are network surveillance products produced by Sony.
Sony (China) Co., Ltd. SNC series cameras have unauthorized access vulnerabilities. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202010-1612 | No CVE | Hanbang Hi-Tech camera has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Beijing Hanbang Hi-Tech Digital Technology Co., Ltd. is a high-tech enterprise. With "video technology" as the core, the company is committed to the research and development of "physical security" and "content security". The core business consists of three parts: smart security, radio and television monitoring and digital watermarking technology.
The camera of Hanbang Hi-Tech has weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202010-1613 | No CVE | BSP Security IPC has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
BSP Security is an enterprise that provides security systems and video surveillance.
BSP Security IPC has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-202010-1614 | No CVE | Shenzhen Jingyang Technology Co., Ltd. camera has a weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Jingyang Technology Co., Ltd. is a leading provider of smart video products and solutions in China, focusing on R&D and innovation of smart video products and solutions for the world.
Shenzhen Jingyang Technology Co., Ltd. camera has a weak password vulnerability. Attackers can use vulnerabilities to obtain sensitive information.
VAR-202010-1598 | No CVE | D-Link DIR-852 has command execution vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
D-Link DIR-852 is a wireless router.
D-Link DIR-852 has a command execution vulnerability. The attacker can use the leak to directly control the router.
VAR-202010-1611 | No CVE | Redmi Note7 has a denial of service vulnerability (CNVD-2020-62280) |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone.
Redmi Note7 has a denial of service vulnerability. Attackers can use this vulnerability to cause the device to restart.
VAR-202010-0520 | CVE-2020-26561 | Belkin LINKSYS WRT160NL Out-of-bounds write vulnerability in device |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
Belkin LINKSYS WRT160NL 1.0.04.002_US_20130619 devices have a stack-based buffer overflow vulnerability because of sprintf in create_dir in mini_httpd. Successful exploitation leads to arbitrary code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Belkin LINKSYS WRT160NL The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Belkin LINKSYS WRT160NL is a wireless router made by Belkin in the United States
VAR-202011-0444 | CVE-2020-15969 | Debian Security Advisory 4824-1 |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Google Chrome is a web browser developed by Google (Google). Chrome has security holes.
For the stable distribution (buster), these problems have been fixed in
version 78.4.0esr-1~deb10u2.
We recommend that you upgrade your firefox-esr packages. 6) - i386, x86_64
3. Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-12-14-7 tvOS 14.3
tvOS 14.3 addresses the following issues. Information about the
security content is also available at
https://support.apple.com/HT212005.
CoreAudio
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted audio file may lead to
arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab
FontParser
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted font may result in the
disclosure of process memory
Description: An information disclosure issue was addressed with
improved state management.
CVE-2020-27946: Mateusz Jurczyk of Google Project Zero
FontParser
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted font file may lead to
arbitrary code execution
Description: A memory corruption issue existed in the processing of
font files. This issue was addressed with improved input validation.
CVE-2020-27943: Mateusz Jurczyk of Google Project Zero
CVE-2020-27944: Mateusz Jurczyk of Google Project Zero
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted image may lead to heap
corruption
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab
CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab
ImageIO
Available for: Apple TV 4K and Apple TV HD
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2020-29611: Ivan Fratric of Google Project Zero
WebRTC
Available for: Apple TV 4K and Apple TV HD
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2020-15969: an anonymous researcher
Installation note:
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> System -> Software Update -> Update Software."
To check the current version of software, select
"Settings -> General -> About."
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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4OzT
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202101-30
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Qt WebEngine: Multiple vulnerabilities
Date: January 26, 2021
Bugs: #734600, #754852
ID: 202101-30
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been found in Qt WebEngine, the worst of
which could result in the arbitrary execution of code.
Background
=========
Library for rendering dynamic web content in Qt5 C++ and QML
applications.
Affected packages
================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-qt/qtwebengine < 5.15.2 >= 5.15.2
Description
==========
Multiple vulnerabilities have been discovered in Qt WebEngine. Please
review the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All Qt WebEngine users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-qt/qtwebengine-5.15.2"
References
=========
[ 1 ] CVE-2020-15959
https://nvd.nist.gov/vuln/detail/CVE-2020-15959
[ 2 ] CVE-2020-15959
https://nvd.nist.gov/vuln/detail/CVE-2020-15959
[ 3 ] CVE-2020-15960
https://nvd.nist.gov/vuln/detail/CVE-2020-15960
[ 4 ] CVE-2020-15960
https://nvd.nist.gov/vuln/detail/CVE-2020-15960
[ 5 ] CVE-2020-15961
https://nvd.nist.gov/vuln/detail/CVE-2020-15961
[ 6 ] CVE-2020-15961
https://nvd.nist.gov/vuln/detail/CVE-2020-15961
[ 7 ] CVE-2020-15962
https://nvd.nist.gov/vuln/detail/CVE-2020-15962
[ 8 ] CVE-2020-15962
https://nvd.nist.gov/vuln/detail/CVE-2020-15962
[ 9 ] CVE-2020-15963
https://nvd.nist.gov/vuln/detail/CVE-2020-15963
[ 10 ] CVE-2020-15963
https://nvd.nist.gov/vuln/detail/CVE-2020-15963
[ 11 ] CVE-2020-15964
https://nvd.nist.gov/vuln/detail/CVE-2020-15964
[ 12 ] CVE-2020-15964
https://nvd.nist.gov/vuln/detail/CVE-2020-15964
[ 13 ] CVE-2020-15965
https://nvd.nist.gov/vuln/detail/CVE-2020-15965
[ 14 ] CVE-2020-15965
https://nvd.nist.gov/vuln/detail/CVE-2020-15965
[ 15 ] CVE-2020-15966
https://nvd.nist.gov/vuln/detail/CVE-2020-15966
[ 16 ] CVE-2020-15966
https://nvd.nist.gov/vuln/detail/CVE-2020-15966
[ 17 ] CVE-2020-15968
https://nvd.nist.gov/vuln/detail/CVE-2020-15968
[ 18 ] CVE-2020-15968
https://nvd.nist.gov/vuln/detail/CVE-2020-15968
[ 19 ] CVE-2020-15969
https://nvd.nist.gov/vuln/detail/CVE-2020-15969
[ 20 ] CVE-2020-15969
https://nvd.nist.gov/vuln/detail/CVE-2020-15969
[ 21 ] CVE-2020-15972
https://nvd.nist.gov/vuln/detail/CVE-2020-15972
[ 22 ] CVE-2020-15972
https://nvd.nist.gov/vuln/detail/CVE-2020-15972
[ 23 ] CVE-2020-15974
https://nvd.nist.gov/vuln/detail/CVE-2020-15974
[ 24 ] CVE-2020-15974
https://nvd.nist.gov/vuln/detail/CVE-2020-15974
[ 25 ] CVE-2020-15976
https://nvd.nist.gov/vuln/detail/CVE-2020-15976
[ 26 ] CVE-2020-15976
https://nvd.nist.gov/vuln/detail/CVE-2020-15976
[ 27 ] CVE-2020-15977
https://nvd.nist.gov/vuln/detail/CVE-2020-15977
[ 28 ] CVE-2020-15977
https://nvd.nist.gov/vuln/detail/CVE-2020-15977
[ 29 ] CVE-2020-15978
https://nvd.nist.gov/vuln/detail/CVE-2020-15978
[ 30 ] CVE-2020-15978
https://nvd.nist.gov/vuln/detail/CVE-2020-15978
[ 31 ] CVE-2020-15979
https://nvd.nist.gov/vuln/detail/CVE-2020-15979
[ 32 ] CVE-2020-15979
https://nvd.nist.gov/vuln/detail/CVE-2020-15979
[ 33 ] CVE-2020-15985
https://nvd.nist.gov/vuln/detail/CVE-2020-15985
[ 34 ] CVE-2020-15985
https://nvd.nist.gov/vuln/detail/CVE-2020-15985
[ 35 ] CVE-2020-15987
https://nvd.nist.gov/vuln/detail/CVE-2020-15987
[ 36 ] CVE-2020-15987
https://nvd.nist.gov/vuln/detail/CVE-2020-15987
[ 37 ] CVE-2020-15989
https://nvd.nist.gov/vuln/detail/CVE-2020-15989
[ 38 ] CVE-2020-15989
https://nvd.nist.gov/vuln/detail/CVE-2020-15989
[ 39 ] CVE-2020-15992
https://nvd.nist.gov/vuln/detail/CVE-2020-15992
[ 40 ] CVE-2020-15992
https://nvd.nist.gov/vuln/detail/CVE-2020-15992
[ 41 ] CVE-2020-16001
https://nvd.nist.gov/vuln/detail/CVE-2020-16001
[ 42 ] CVE-2020-16001
https://nvd.nist.gov/vuln/detail/CVE-2020-16001
[ 43 ] CVE-2020-16002
https://nvd.nist.gov/vuln/detail/CVE-2020-16002
[ 44 ] CVE-2020-16002
https://nvd.nist.gov/vuln/detail/CVE-2020-16002
[ 45 ] CVE-2020-16003
https://nvd.nist.gov/vuln/detail/CVE-2020-16003
[ 46 ] CVE-2020-16003
https://nvd.nist.gov/vuln/detail/CVE-2020-16003
[ 47 ] CVE-2020-6467
https://nvd.nist.gov/vuln/detail/CVE-2020-6467
[ 48 ] CVE-2020-6467
https://nvd.nist.gov/vuln/detail/CVE-2020-6467
[ 49 ] CVE-2020-6470
https://nvd.nist.gov/vuln/detail/CVE-2020-6470
[ 50 ] CVE-2020-6470
https://nvd.nist.gov/vuln/detail/CVE-2020-6470
[ 51 ] CVE-2020-6471
https://nvd.nist.gov/vuln/detail/CVE-2020-6471
[ 52 ] CVE-2020-6471
https://nvd.nist.gov/vuln/detail/CVE-2020-6471
[ 53 ] CVE-2020-6472
https://nvd.nist.gov/vuln/detail/CVE-2020-6472
[ 54 ] CVE-2020-6473
https://nvd.nist.gov/vuln/detail/CVE-2020-6473
[ 55 ] CVE-2020-6474
https://nvd.nist.gov/vuln/detail/CVE-2020-6474
[ 56 ] CVE-2020-6475
https://nvd.nist.gov/vuln/detail/CVE-2020-6475
[ 57 ] CVE-2020-6476
https://nvd.nist.gov/vuln/detail/CVE-2020-6476
[ 58 ] CVE-2020-6480
https://nvd.nist.gov/vuln/detail/CVE-2020-6480
[ 59 ] CVE-2020-6481
https://nvd.nist.gov/vuln/detail/CVE-2020-6481
[ 60 ] CVE-2020-6482
https://nvd.nist.gov/vuln/detail/CVE-2020-6482
[ 61 ] CVE-2020-6483
https://nvd.nist.gov/vuln/detail/CVE-2020-6483
[ 62 ] CVE-2020-6486
https://nvd.nist.gov/vuln/detail/CVE-2020-6486
[ 63 ] CVE-2020-6487
https://nvd.nist.gov/vuln/detail/CVE-2020-6487
[ 64 ] CVE-2020-6489
https://nvd.nist.gov/vuln/detail/CVE-2020-6489
[ 65 ] CVE-2020-6490
https://nvd.nist.gov/vuln/detail/CVE-2020-6490
[ 66 ] CVE-2020-6506
https://nvd.nist.gov/vuln/detail/CVE-2020-6506
[ 67 ] CVE-2020-6510
https://nvd.nist.gov/vuln/detail/CVE-2020-6510
[ 68 ] CVE-2020-6511
https://nvd.nist.gov/vuln/detail/CVE-2020-6511
[ 69 ] CVE-2020-6512
https://nvd.nist.gov/vuln/detail/CVE-2020-6512
[ 70 ] CVE-2020-6513
https://nvd.nist.gov/vuln/detail/CVE-2020-6513
[ 71 ] CVE-2020-6514
https://nvd.nist.gov/vuln/detail/CVE-2020-6514
[ 72 ] CVE-2020-6518
https://nvd.nist.gov/vuln/detail/CVE-2020-6518
[ 73 ] CVE-2020-6523
https://nvd.nist.gov/vuln/detail/CVE-2020-6523
[ 74 ] CVE-2020-6524
https://nvd.nist.gov/vuln/detail/CVE-2020-6524
[ 75 ] CVE-2020-6526
https://nvd.nist.gov/vuln/detail/CVE-2020-6526
[ 76 ] CVE-2020-6529
https://nvd.nist.gov/vuln/detail/CVE-2020-6529
[ 77 ] CVE-2020-6530
https://nvd.nist.gov/vuln/detail/CVE-2020-6530
[ 78 ] CVE-2020-6531
https://nvd.nist.gov/vuln/detail/CVE-2020-6531
[ 79 ] CVE-2020-6532
https://nvd.nist.gov/vuln/detail/CVE-2020-6532
[ 80 ] CVE-2020-6533
https://nvd.nist.gov/vuln/detail/CVE-2020-6533
[ 81 ] CVE-2020-6534
https://nvd.nist.gov/vuln/detail/CVE-2020-6534
[ 82 ] CVE-2020-6535
https://nvd.nist.gov/vuln/detail/CVE-2020-6535
[ 83 ] CVE-2020-6540
https://nvd.nist.gov/vuln/detail/CVE-2020-6540
[ 84 ] CVE-2020-6541
https://nvd.nist.gov/vuln/detail/CVE-2020-6541
[ 85 ] CVE-2020-6542
https://nvd.nist.gov/vuln/detail/CVE-2020-6542
[ 86 ] CVE-2020-6543
https://nvd.nist.gov/vuln/detail/CVE-2020-6543
[ 87 ] CVE-2020-6544
https://nvd.nist.gov/vuln/detail/CVE-2020-6544
[ 88 ] CVE-2020-6545
https://nvd.nist.gov/vuln/detail/CVE-2020-6545
[ 89 ] CVE-2020-6548
https://nvd.nist.gov/vuln/detail/CVE-2020-6548
[ 90 ] CVE-2020-6549
https://nvd.nist.gov/vuln/detail/CVE-2020-6549
[ 91 ] CVE-2020-6550
https://nvd.nist.gov/vuln/detail/CVE-2020-6550
[ 92 ] CVE-2020-6551
https://nvd.nist.gov/vuln/detail/CVE-2020-6551
[ 93 ] CVE-2020-6555
https://nvd.nist.gov/vuln/detail/CVE-2020-6555
[ 94 ] CVE-2020-6557
https://nvd.nist.gov/vuln/detail/CVE-2020-6557
[ 95 ] CVE-2020-6559
https://nvd.nist.gov/vuln/detail/CVE-2020-6559
[ 96 ] CVE-2020-6561
https://nvd.nist.gov/vuln/detail/CVE-2020-6561
[ 97 ] CVE-2020-6562
https://nvd.nist.gov/vuln/detail/CVE-2020-6562
[ 98 ] CVE-2020-6569
https://nvd.nist.gov/vuln/detail/CVE-2020-6569
[ 99 ] CVE-2020-6570
https://nvd.nist.gov/vuln/detail/CVE-2020-6570
[ 100 ] CVE-2020-6571
https://nvd.nist.gov/vuln/detail/CVE-2020-6571
[ 101 ] CVE-2020-6573
https://nvd.nist.gov/vuln/detail/CVE-2020-6573
[ 102 ] CVE-2020-6575
https://nvd.nist.gov/vuln/detail/CVE-2020-6575
[ 103 ] CVE-2020-6576
https://nvd.nist.gov/vuln/detail/CVE-2020-6576
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202101-30
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. 8.1) - aarch64, ppc64le, s390x, x86_64
3. 8.0) - ppc64le, x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: firefox security update
Advisory ID: RHSA-2020:4330-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4330
Issue date: 2020-10-26
CVE Names: CVE-2020-15683 CVE-2020-15969
=====================================================================
1. Summary:
An update for firefox is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64
Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64
Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64
Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6) - x86_64
Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64
Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64
3. Description:
Mozilla Firefox is an open-source web browser, designed for standards
compliance, performance, and portability.
This update upgrades Firefox to version 78.4.0 ESR.
Security Fix(es):
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
(CVE-2020-15683)
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the update, Firefox must be restarted for the changes to
take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1885885 - CVE-2020-15969 chromium-browser: Use after free in WebRTC
1889932 - CVE-2020-15683 Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
6. Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source:
firefox-78.4.0-2.el6_10.src.rpm
i386:
firefox-78.4.0-2.el6_10.i686.rpm
x86_64:
firefox-78.4.0-2.el6_10.x86_64.rpm
firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
x86_64:
firefox-78.4.0-2.el6_10.i686.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source:
firefox-78.4.0-2.el6_10.src.rpm
x86_64:
firefox-78.4.0-2.el6_10.i686.rpm
firefox-78.4.0-2.el6_10.x86_64.rpm
firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source:
firefox-78.4.0-2.el6_10.src.rpm
i386:
firefox-78.4.0-2.el6_10.i686.rpm
ppc64:
firefox-78.4.0-2.el6_10.ppc64.rpm
firefox-debuginfo-78.4.0-2.el6_10.ppc64.rpm
s390x:
firefox-78.4.0-2.el6_10.s390x.rpm
firefox-debuginfo-78.4.0-2.el6_10.s390x.rpm
x86_64:
firefox-78.4.0-2.el6_10.x86_64.rpm
firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
x86_64:
firefox-78.4.0-2.el6_10.i686.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source:
firefox-78.4.0-2.el6_10.src.rpm
i386:
firefox-78.4.0-2.el6_10.i686.rpm
x86_64:
firefox-78.4.0-2.el6_10.x86_64.rpm
firefox-debuginfo-78.4.0-2.el6_10.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
x86_64:
firefox-78.4.0-2.el6_10.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-15683
https://access.redhat.com/security/cve/CVE-2020-15969
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=vjZ7
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 8.2) - aarch64, ppc64le, x86_64
3
VAR-202010-1604 | No CVE | Unicom optical modem GPON/4+1+WIFI(2.4G) PT952G has unauthorized vulnerability |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
GPON/4+1+WIFI (2.4G) is a Unicom optical modem.
Unicom Optical modem GPON/4+1+WIFI(2.4G) PT952G has an unauthorized vulnerability. Attackers can use this vulnerability to achieve the purpose of privilege escalation and obtain sensitive information.
VAR-202010-0830 | CVE-2020-24033 | fs.com S3900-24T4S cross-site request forgery vulnerability |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered in fs.com S3900 24T4S 1.7.0 and earlier. The form does not have an authentication or token authentication mechanism that allows remote attackers to forge requests on behalf of a site administrator to change all settings including deleting users, creating new users with escalated privileges. fs.com S3900 24T4S Contains a cross-site request forgery vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. fs.com S3900-24T4S is a gigabit stackable switch from China's fast innovation (fs) company. The FS S3900-24T4S switch is equipped with 24 10/100/1000Base-T ports, 4 10G SFP+ uplink ports, supports stacking of up to 6 switches, simple operation, highly secure business processing capabilities, flexible network deployment, and no Border network experience and complete QoS control strategy.
The fs.com S3900 24T4S version 1.7.0 and previous versions have security vulnerabilities. Authentication mechanism
VAR-202010-1525 | CVE-2020-9985 | plural Apple Product Buffer Overflow Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. Apple OS X is a set of dedicated operating systems developed by Apple for Mac computers
VAR-202010-1524 | CVE-2020-9984 | plural Apple Out-of-bounds read vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. plural Apple The product is vulnerable to out-of-bounds reading due to flawed input validation.Arbitrary code can be executed by processing maliciously created images. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. Apple iTunes for Windows is a media player application based on the Windows platform