VARIoT IoT vulnerabilities database
| VAR-202012-0196 | CVE-2019-19286 | Siemens XHQ SQL injection vulnerability |
CVSS V2: 6.5 CVSS V3: 7.2 Severity: HIGH |
A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow SQL injection attacks if an attacker is able to modify content of particular web pages. XHQ Has SQL An injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Siemens XHQ is a software platform that aggregates factory or pipeline operation data, and processes these data in a target-oriented manner, and then makes decisions in real time, and effectively improves factory or pipeline operation performance.
The version of Siemens XHQ prior to 6.1 has a SQL injection vulnerability
| VAR-202012-0851 | CVE-2020-28946 | Plum IK-401 Inadequate protection of credentials on devices Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An improper webserver configuration on Plum IK-401 devices with firmware before 1.02 allows an attacker (with network access to the device) to obtain the configuration file, including hashed credential data. Successful exploitation could allow access to hashed credential data with a single unauthenticated GET request. Plum IK-401 The device contains a vulnerability related to insufficient protection of credentials.Information may be obtained. Plum Ik-401 is a 4G modem/router used in industrial environments from Plum in Germany.
Plum IK-401 version prior to 1.02 has a security vulnerability
| VAR-202012-0198 | CVE-2019-19288 | XHQ Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A vulnerability has been identified in XHQ (All Versions < 6.1). The web interface could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. XHQ Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Siemens XHQ is a software platform that aggregates factory or pipeline operation data, and processes these data in a target-oriented manner, and then makes decisions in real time, and effectively improves factory or pipeline operation performance
| VAR-202012-0194 | CVE-2019-19283 | Siemens XHQ information disclosure vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A vulnerability has been identified in XHQ (All Versions < 6.1). The application's web server could expose non-sensitive information about the server's architecture. This could allow an attacker to adapt further attacks to the version in place. XHQ Contains an information disclosure vulnerability.Information may be obtained. Siemens XHQ is a software platform that aggregates factory or pipeline operation data, and processes these data in a target-oriented manner, and then makes decisions in real time, and effectively improves factory or pipeline operation performance. Attackers can use this vulnerability to obtain sensitive information
| VAR-202012-0380 | CVE-2020-26832 | SAP AS ABAP and SAP S4 HANA Vulnerability in Microsoft |
CVSS V2: 7.5 CVSS V3: 7.6 Severity: HIGH |
SAP AS ABAP (SAP Landscape Transformation), versions - 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 and SAP S4 HANA (SAP Landscape Transformation), versions - 101, 102, 103, 104, 105, allows a high privileged user to execute a RFC function module to which access should be restricted, however due to missing authorization an attacker can get access to some sensitive internal information of vulnerable SAP system or to make vulnerable SAP systems completely unavailable. SEC Consult Vulnerability Lab Security Advisory < 20220518-0 >
=======================================================================
title: Multiple Critical Vulnerabilities
product: SAP® Application Server
ABAP and ABAP® Platform (Different Software Components)
vulnerable version: see section "Vulnerable / tested versions"
fixed version: see SAP security notes 2958563, 2973735,
2993132, 2986980, 2999854, 3002517, 3048657
CVE number: CVE-2020-6318, CVE-2020-26808, CVE-2020-26832,
CVE-2021-21465, CVE-2021-21468, CVE-2021-21466,
CVE-2021-21473, CVE-2021-33678
impact: critical
homepage: https://www.sap.com
found: 08/2020 - 02/2021
by: Fabian Hagg (Office Vienna)
Alexander Meier (Office Berlin)
SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Atos company
Europe | Asia | North America
https://www.sec-consult.com
=======================================================================
Vendor description:
-------------------
"SAP is a market share leader in enterprise resource planning (ERP),
analytics, supply chain management, human capital management, master
data management, data integration as well as in experience management"
[1]. Customers comprise 92% of the Forbes Global 2000 companies and
98% of the 100 most valued brands. 77% of the world’s transaction revenue
touches an SAP system [1, 2].
"SAP NetWeaver Application Server for ABAP (AS ABAP) is a platform on
which important business processes run. It provides a complete development
and runtime environment for ABAP-based applications. The purpose of AS ABAP
is to provide programmers with an efficient means of expressing business
logic and relieve them from the necessity of platform-related and purely
technical coding. AS ABAP is therefore a basis for all ABAP systems" [3].
"The [successor] ABAP platform provides a reliable and scalable server
and programming environment for modern ABAP development [...]. The ABAP
platform offers support for SAP HANA and SAP Fiori and allows developers
to efficiently build enterprise software that meets the requirements of
their business scenarios – on-premise as well as in the cloud" [4].
[1] https://www.sap.com/about/company.html
[2] https://www.sap.com/documents/2017/04/4666ecdd-b67c-0010-82c7-eda71
af511fa.html
[3] https://help.sap.com/viewer/ff18034f08af4d7bb33894c2047c3b71/7.52.5/
en-US/797de8aa42e24916953c4bb3d983662d.html
[4] https://developers.sap.com/topics/abap-platform.html
Business recommendation:
------------------------
By exploiting the vulnerabilities documented in this advisory, privileged
attackers can take complete control of affected application servers. Thus,
successful exploitation can enable fraud, sabotage or data theft while
affecting confidentiality, integrity, and availability of business data.
SEC Consult recommends to implement security notes 2958563, 2973735,
2993132, 2986980, 2999854, 3002517, 3048657 where the documented issues
are fixed according to the vendor. We advise installing the corrections
as a matter of priority to keep business-critical data secured.
Vulnerability overview/description:
-----------------------------------
Advanced Business Application Programming (ABAP)® is a proprietary
programming language by SAP SE. In common with every other programming
language, ABAP can be susceptible to software vulnerabilities ranging
from missing or improper authorization checks to inadequate input
validation and output sanitization. Of particular concern are injection
vulnerabilities, which can jeopardize the overall system security.
Remote Function Call (RFC) is a proprietary network protocol by SAP SE.
Comparable to application programming interfaces (APIs), SAP systems
come with thousands of built-in function modules implemented in ABAP. RFC
allows remote-enabled functions to be accessed via the network. This makes
it possible to decentralize business applications even across system
boundaries. External programs and external clients can make use of RFC
connections to interact with an SAP system via libraries (e.g. NW RFC SDK)
provisioned by SAP SE.
This advisory covers multiple critical vulnerabilities discovered in
the ABAP® coding of standard function modules. These are part of different
software components that build upon the bedrock products SAP® Application
Server ABAP and ABAP® Platform.
1) [CVE-2020-6318] Code Injection Vulnerability in SAP NetWeaver
(ABAP Server) and ABAP Platform
Function modules RSDU_LIST_DB_TABLE_SYB and RSDU_LIST_DB_TABLE_DB4
of function groups RSDU_UTIL_SYB and RSDU_CORE_UTIL_DB4 are vulnerable
to ABAP code injection bugs allowing to execute arbitrary ABAP
code. Successful exploitation leads to full system compromise.
2) [CVE-2020-26808] Code Injection Vulnerability in SAP AS ABAP
and S/4 HANA (DMIS)
Function module CNV_MBT_SEL_STRING_RETURN of function group
CNV_MBT_SEL is vulnerable to an ABAP code injection bug allowing to
embed arbitrary code into the ABAP Repository. An attacker can abuse
this bug by invoking the function remotely via the RFC protocol.
Successful exploitation leads to full system compromise. An attacker can abuse this bug by invoking
the function remotely via the RFC protocol. Successful exploitation
allows to retrieve internal information and to make a targeted SAP
system completely unavailable to its intended users. The latter
is to be considered as a Denial of Service (DoS) attack.
4) [CVE-2021-21468] Missing Authorization Check in SAP Business
Warehouse (Database Interface)
Function module RSDL_DB_GET_DATA_BWS of function group RSDL does
not perform any programmatically implemented authorization check.
An attacker can abuse this bug by invoking the function remotely
via the RFC protocol. Successful exploitation allows to read out
the entire database including cross-client data access.
5) [CVE-2021-21465] Native SQL Injection Vulnerability in SAP
Business Warehouse (Database Interface)
Function module RSDL_DB_GET_DATA_BWS of function group RSDL is
vulnerable to a native SQL injection (ADBC) bug allowing to execute
arbitrary SQL commands at database level. An attacker can abuse
this bug by invoking the function remotely via the RFC protocol.
Successful exploitation leads to full system compromise.
6) [CVE-2021-21466] Code Injection Vulnerability in SAP Business
Warehouse and SAP BW/4HANA
Function module RSDRI_DF_TEXT_READ of function group RSDRI_DF_FACADE
is vulnerable to an ABAP code injection bug allowing to embed
arbitrary code into the ABAP Repository. An attacker can abuse this
bug by invoking the function remotely via the RFC protocol. Successful
exploitation leads to full system compromise.
7) [CVE-2021-21473] Missing Authorization Check in SAP NetWeaver AS ABAP
and ABAP Platform
Function module SRM_RFC_SUBMIT_REPORT of function group SRM_REP does not
enforce proper authorization checks for critical use of a dynamic program
call. An attacker can abuse this bug by invoking the function remotely
via the RFC protocol. Successful exploitation allows an attacker to
execute existing ABAP reports without holding sufficient authorizations.
8) [CVE-2021-33678] Code Injection vulnerability in SAP NetWeaver AS ABAP
(Reconciliation Framework)
Function module CONVERT_FROM_CHAR_SORT_RFW of function group FG_RFW contains
a code injection vulnerability with a limited exploitation primitive. An
attacker can abuse this bug to delete critical system tables (e.g. USR02),
making the targeted SAP system completely unavailable to its intended users.
Proof of concept:
-----------------
1) [CVE-2020-6318] Code Injection Vulnerability in SAP NetWeaver
(ABAP Server) and ABAP Platform
The vulnerable functions make use of the GENERATE SUBROUTINE POOL
instruction by providing source code that is created dynamically
using untrusted user input. As there is no input validation or
output sanitization, an attacker can inject malicious ABAP code
through specific import parameters. This code gets executed on the
fly by the application server in the course of execution of the
functions.
The following payload exploits the bug to escalate privileges via
reference user assignment:
Import Parameter: I_TABLNM
Value: USR02
Import Table: I_T_SELECT_FIELDS
╒═══════════════════════════════════════════════════════════════╕
│ RSD_FIELDNM │
╞═══════════════════════════════════════════════════════════════╡
│ BNAME │
╘═══════════════════════════════════════════════════════════════╛
Import Table: I_T_WHERE_COND
╒═══════════╤══════╤════════════════════════════════════════════╕
│ FIELDNM │ OP │ LOW │
╞═══════════╪══════╪════════════════════════════════════════════╡
│ BNAME │ EQ │ S'ENDEXEC. EXEC SQL.UPDATE USREFUS SET │
│ │ │ REFUSER = 'DDIC' WHERE BNAME = 'ATTACKER │
╘═══════════╧══════╧════════════════════════════════════════════╛
2) [CVE-2020-26808] Code Injection Vulnerability in SAP AS ABAP
and S/4 HANA (DMIS)
The vulnerable function makes use of the INSERT REPORT instruction
by providing source code that is created dynamically using untrusted
user input. As there is no input validation or output sanitization,
an attacker can inject malicious ABAP code through specific import
parameters. Inserted code may be executed by chaining this bug with
CVE-2021-21473.
The following payload exploits the bug to escalate privileges via
reference user assignment:
Import Parameter: TABNAME
Value: USR02
Import Table: IMT_SELSTRING
╒══════════════════════════════════════════════════════════════╕
│ LINE │
╞══════════════════════════════════════════════════════════════╡
│ BNAME = 'TEST'. ENDSELECT. Depending on a specific import parameter, the function leaks
active logon sessions (opcode 02) or terminates all active logon
sessions (opcode 25) by kernel call 'ThUsrInfo'. Invoking the function
periodically prevents users from logging into the application server.
The following payload exploits the bug to trigger the information
disclosure and enumerate active user sessions:
Import Parameter: MODE
Value: 1
The following payload exploits the bug to terminate all active user
sessions:
Import Parameter: MODE
Value: 2
4) [CVE-2021-21468] Missing Authorization Check in SAP Business
Warehouse (Database Interface)
The vulnerable function does not perform any explicit authorization
check. It uses predefined classes and methods from the ABAP Database
Connectivity (ADBC) framework to execute native SQL queries at database
level. Depending on specific import parameters, this allows to read out
arbitrary table data including user master records or secure storages
(e.g. RSECTAB).
The following payload exploits the bug to exfiltrate user password
hashes:
Import Table: I_S_TABSEL
╒══════════════════════════════════════════════════════════════╕
│ NAME │
╞══════════════════════════════════════════════════════════════╡
│ USR02 │
╘══════════════════════════════════════════════════════════════╛
Import Table: I_S_DBCON
╒══════════════════════════════════════════════════════════════╕
│ CON_NAME │
╞══════════════════════════════════════════════════════════════╡
│ <Database Connection String> (e.g. DEFAULT) │
╘══════════════════════════════════════════════════════════════╛
Import Table: I_T_DBFIELDS
╒═══════════════╤═════════╤════════════════════════════════════╕
│ NAME │ TYPE │ LENGTH │
╞═══════════════╪═════════╪════════════════════════════════════╡
│ BNAME │ CHAR255 │ 000255 │
├───────────────┼─────────┼────────────────────────────────────┤
│ PWDSALTEDHASH │ CHAR255 │ 000255 │
╘══════════════════════════════════════════════════════════════╛
5) [CVE-2021-21465] Native SQL Injection Vulnerability in SAP
Business Warehouse (Database Interface)
The vulnerable function does not perform any input validation or
output sanitization on import parameters that can be used to define
conditional SQL statements. This allows to inject arbitrary SQL
commands that get executed natively at database level in the course
of execution of the function.
The following payload exploits the bug to escalate privileges via
reference user assignment:
Import Table: I_S_TABSEL
╒══════════════════════════════════════════════════════════════╕
│ NAME │
╞══════════════════════════════════════════════════════════════╡
│ USR02 │
╘══════════════════════════════════════════════════════════════╛
Import Table: I_S_DBCON
╒══════════════════════════════════════════════════════════════╕
│ CON_NAME │
╞══════════════════════════════════════════════════════════════╡
│ <Database Connection String> (e.g. DEFAULT) │
╘══════════════════════════════════════════════════════════════╛
Import Table: I_T_DBFIELDS
╒═══════════════╤═════════╤════════════════════════════════════╕
│ NAME │ TYPE │ LENGTH │
╞═══════════════╪═════════╪════════════════════════════════════╡
│ BNAME │ CHAR255 │ 000255 │
╘══════════════════════════════════════════════════════════════╛
Import Table: I_T_SELECT
╒══════════════════════╤════════╤══════════════════════════════╕
│ FIELDNM │ OPTION │LOW │
╞══════════════════════╪════════╪══════════════════════════════╡
│ BNAME │ EQ │'';UPDATE USREFUS SET REFUSER │
│ │ │='DDIC' WHERE '1 │
├──────────────────────┼────────┼──────────────────────────────┤
│ ' = '1 AND' AND BNAME│ EQ │'ATTACKER'; │
╘══════════════════════════════════════════════════════════════╛
6) [CVE-2021-21466] Code Injection Vulnerability in SAP Business
Warehouse and SAP BW/4HANA
The vulnerable function makes use of the INSERT REPORT instruction
by providing source code that is created dynamically using untrusted
user input. As there is no input validation or output sanitization,
an attacker can inject malicious ABAP code through specific import
parameters. Inserted code may be executed by chaining this bug with
CVE-2021-21473.
The following payload exploits the bug to escalate privileges via
reference user assignment:
Import Parameter: I_TABLE_NAME
Value: INJECTION
Import Parameter: I_DEBUG_SUFFIX
Value: SAP
Import Table: I_T_RANGE_STRING
╒═══════════╤═════════════════════════════════════╤════════════╕
│ CHANM │ LOW │ HIGH │
╞═══════════╪═════════════════════════════════════╪════════════╡
│ BNAME │ '. UPDATE USREFUS SET REFUSER │ '. EXIT. " │
│ │ = 'DDIC' WHERE BNAME = 'ATTACKER │ │
╘═══════════╧═════════════════════════════════════╧════════════╛
7) [CVE-2021-21473] Missing Authorization Check in SAP NetWeaver AS ABAP
and ABAP Platform
The vulnerable function uses a dynamically generated program name (based
on data from untrusted sources) in a SUBMIT call. No authorization checks
are programmatically enforced. Thus, a remote, unauthorized attacker can
leverage this function to start any existing ABAP report by providing the
respective report name in the import parameter REPORTNAME.
8) [CVE-2021-33678] Code Injection vulnerability in SAP NetWeaver AS ABAP
(Reconciliation Framework)
The vulnerable function makes use of the GENERATE SUBROUTINE POOL instruction
in form 'get_dynamic_fields' by providing source code that is created
dynamically using untrusted user input. As there is no input validation or
output sanitization, an attacker can inject malicious ABAP code through specific
import parameters. These parameters are limited in size due to their variable
type. This restricts an attacker in exploitation scenarios. However, it is still
possible, for example, to delete critical system tables by exploiting this bug.
The following payload exploits the bug to drop table USR02, leading to a complete
loss of availability of the target system:
Import Parameter: RTABNAME
Value: X. EXEC SQL. DROP TABLE USR02-
Import Parameter: RFIELDNAME
Value: ENDEXEC
Vulnerable / tested versions:
-----------------------------
All tests were conducted on SAP NetWeaver Application Server ABAP 752 SP04
and ABAP Platform 1909. No additional testing on other releases has been
carried out. All identified vulnerabilities have been fixed by now
by SAP and SEC Consult releases this security advisory adhering to the
responsible disclosure policy.
CVE-2020-6318
--------------------------------
2020-08-12 | Contacting vendor with detailed report through vulnerability
submission web form.
2020-08-13 | Vendor confirms receipt and assigns security incident number
#2080354772.
2020-08-19 | Vendor confirms vulnerability.
2020-08-24 | Vendor informs about patch development strategy.
2020-09-07 | Vendor informs about release of the patch, registration of CVE
number and corresponding security note.
2020-09-08 | Vendor releases patch with SAP Security Note 2958563.
CVE-2020-26808
--------------------------------
2020-09-24 | Contacting vendor with detailed report through vulnerability
submission web form.
2020-09-25 | Vendor confirms receipt and assigns security incident number
#2070354293.
2020-10-20 | Contacting vendor to request progress information.
2020-10-21 | Vendor confirms vulnerability and states that a fix is in
development.
2020-11-09 | Vendor informs about release of the patch, registration of CVE
number and corresponding security note.
2020-11-10 | Vendor releases patch with SAP Security Note 2973735.
CVE-2020-26832
--------------------------------
2020-10-23 | Contacting vendor with detailed report through vulnerability
submission web form.
2020-10-26 | Vendor confirms receipt and assigns security incident number
#2070432866.
2020-11-17 | Vendor confirms vulnerability and proposes CVSS score of 7.6.
2020-11-23 | Vendor asks for exploit script shown in the initial report.
2020-11-24 | Providing the requested script via encrypted PGP mail.
2020-12-07 | Vendor informs about release of the patch, registration of CVE
number and corresponding security note.
2020-12-08 | Vendor releases patch with SAP Security Note 2993132.
CVE-2021-21465 / CVE-2021-21468
--------------------------------
2020-10-27 | Contacting vendor with detailed report through vulnerability
submission web form.
2020-10-29 | Vendor confirms receipt and assigns separated security incident
numbers #2070446047 and #2070446050.
2020-11-06 | Vendor confirms vulnerability and predicts patches to be released
on December Patch Tuesday 2020.
2020-11-18 | Vendor confirms that they are still on track for December Patch
Tuesday 2020.
2020-12-01 | Vendor informs that patch needs to be postponed to January Patch
Tuesday 2021.
2021-01-08 | Vendor informs about release of patches and clarifies that a single
security note will fix both issues. Additional information about
CVSS scores is provided.
2021-01-11 | Vendor informs about release of the patches, registration of CVE
numbers and corresponding security note.
2021-01-12 | Vendor releases patches with SAP Security Note 2986980.
CVE-2021-21466 / CVE-2021-21473
--------------------------------
2020-11-25 | Contacting vendor with detailed report through vulnerability
submission web form.
2020-11-27 | Vendor confirms receipt and assigns security incident number
#2080396648.
2021-01-04 | Vendor confirms vulnerability and states that they are working
on a fix. Additional information is provided detailing on that
they will split the reported finding into two separated security
issues and security incident numbers #2080396648 and #2080412695.
2021-01-11 | Vendor informs about release of the first patch, registration of CVE
number and corresponding security note.
2021-01-11 | Vendor informs about patch release for the first issue. Additional
information is provided describing that a patch for the second issue
is still in development.
2021-01-12 | Vendor releases first patch with SAP Security Note 2999854.
2021-05-07 | Asking vendor for update regarding the second issue.
2021-05-11 | Vendor informs that fix is in progress and note will be released soon.
2021-06-07 | Vendor informs about release of the second patch, registration of CVE
number and corresponding security note.
2021-06-08 | Vendor releases second patch with SAP Security Note 3002517.
CVE-2021-33678
--------------------------------
2021-02-01 | Contacting vendor with detailed report through vulnerability
submission web form.
2021-02-03 | Vendor confirms receipt and assigns security incident number
#2180074995.
2021-05-07 | Asking vendor for update.
2021-05-11 | Vendor informs that fix is in progress.
2021-07-12 | Vendor informs about release of the patch, registration of CVE
number and corresponding security note.
2021-07-13 | Vendor releases patch with SAP Security Note 3048657.
Solution:
---------
SAP SE reacted promptly to our findings. Product Security Incident Response
Team (PSRT) and engineers released patches in a timely manner for each of
the reported issues. These patches are available in form of SAP Security
Notes which can be accessed via the SAP Customer Launchpad [5]. More
information can also be found at the Official SAP Product Security Response
Space [6].
The following Security Notes need to be implemented:
2958563, 2973735, 2993132, 2986980, 2999854, 3002517, 3048657
[5] https://launchpad.support.sap.com/#/securitynotes
[6] https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day
Workaround:
-----------
None
Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Vulnerability Lab
SEC Consult, an Atos company
Europe | Asia | North America
About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Atos company. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/
Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mail: security-research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: http://blog.sec-consult.com
Twitter: https://twitter.com/sec_consult
EOF F. Hagg, A. Meier / @2022
| VAR-202012-0382 | CVE-2020-26835 | SAP NetWeaver AS ABAP Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: Medium |
SAP NetWeaver AS ABAP, versions - 740, 750, 751, 752, 753, 754 , does not sufficiently encode URL which allows an attacker to input malicious java script in the URL which could be executed in the browser resulting in Reflected Cross-Site Scripting (XSS) vulnerability. SAP NetWeaver AS ABAP Contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with
| VAR-202012-0815 | CVE-2020-28215 | Easergy T300 Vulnerability in Microsoft |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A CWE-862: Missing Authorization vulnerability exists in Easergy T300 (firmware 2.7 and older), that could cause a wide range of problems, including information exposures, denial of service, and arbitrary code execution when access control checks are not applied consistently. Easergy T300 Is vulnerable to a lack of authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Easergy T300 is a new generation of distribution network automation intelligent terminal, adhering to the "modularity, flexibility, application-oriented" design concept, can be widely used in medium voltage distribution network management, fault location, isolation and recovery (FLISR), distributed energy integration Internet, energy growth and asset management.
Easergy T300 2.7 and earlier versions have improper access control vulnerabilities
| VAR-202012-0840 | CVE-2020-28396 | plural SICAM Product protection mechanism defect vulnerability |
CVSS V2: 4.9 CVSS V3: 7.3 Severity: HIGH |
A vulnerability has been identified in SICAM A8000 CP-8000 (All versions < V16), SICAM A8000 CP-8021 (All versions < V16), SICAM A8000 CP-8022 (All versions < V16). A web server misconfiguration of the affected device can cause insecure ciphers usage by a user´s browser. An attacker in a privileged position could decrypt the communication and compromise confidentiality and integrity of the transmitted information. SICAM A8000 CP-8000 , SICAM A8000 CP-8021 , SICAM A8000 CP-8022 There is a vulnerability related to a defect in the protection mechanism.Information may be obtained and information may be tampered with. The SIEMENS SICAM A8000 RTUs (Remote Terminal Equipment) series is a modular equipment series for remote control and automation applications in all energy supply fields.
SIEMENS SICAM A8000 RTUs have security vulnerabilities
| VAR-202012-0525 | CVE-2020-25234 | LOGO! 8 BM Vulnerability in using hard-coded encryption keys in |
CVSS V2: 3.6 CVSS V3: 7.7 Severity: HIGH |
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3), LOGO! Soft Comfort (All versions < V8.3). The LOGO! program files generated and used by the affected components offer the possibility to save user-defined functions (UDF) in a password protected way. This protection is implemented in the software that displays the information. An attacker could reverse engineer the UDFs directly from stored program files. LOGO! 8 BM (SIPLUS variants Including ) There is a vulnerability in the use of hard-coded encryption keys.Information may be obtained and information may be tampered with. Siemens LOGO! 8 BM is a programming software for the Windows platform in an industrial environment from Siemens in Germany. Attackers can use this vulnerability to gain complete access to all services without authorization
| VAR-202012-0526 | CVE-2020-25235 | LOGO! 8 BM Vulnerability regarding inadequate protection of credentials in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The password used for authentication for the LOGO! Website and the LOGO! Access Tool is sent in a recoverable format. An attacker with access to the network traffic could derive valid logins. LOGO! 8 BM (SIPLUS variants Including ) Exists in an inadequate protection of credentials.Information may be obtained. Siemens LOGO! 8 BM is a programming software for the Windows platform in an industrial environment from Siemens in Germany
| VAR-202012-0814 | CVE-2020-28214 | Modicon M221 Predictable in Salt Vulnerability in using one-way hash |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: Medium |
A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon M221 (all references, all versions), that could allow an attacker to pre-compute the hash value using dictionary attack technique such as rainbow tables, effectively disabling the protection that an unpredictable salt would provide. Modicon M221 Is predictable Salt A vulnerability exists regarding the use of one-way hashes.Information may be obtained
| VAR-202012-0524 | CVE-2020-25233 | LOGO! 8 BM Vulnerability in using hard-coded encryption keys in |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V8.3). The firmware update of affected devices contains the private RSA key that is used as a basis for encryption of communication with the device. Siemens LOGO! 8 BM is a programming software for the Windows platform in an industrial environment from Siemens in Germany
| VAR-202012-1527 | CVE-2020-1971 | Red Hat Security Advisory 2021-0056-01 |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w). The product supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, secure hash algorithms, etc. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: openssl security update
Advisory ID: RHSA-2021:0056-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0056
Issue date: 2021-01-11
CVE Names: CVE-2020-1971
=====================================================================
1. Summary:
An update for openssl is now available for Red Hat Enterprise Linux 6
Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server (v. 6 ELS) - i386, ppc64, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 6 ELS) - i386, ppc64, s390x, x86_64
3. Description:
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS) protocols, as well as a full-strength
general-purpose cryptography library.
Security Fix(es):
* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library
must be restarted, or the system rebooted.
5. Package List:
Red Hat Enterprise Linux Server (v. 6 ELS):
Source:
openssl-1.0.1e-59.el6_10.src.rpm
i386:
openssl-1.0.1e-59.el6_10.i686.rpm
openssl-debuginfo-1.0.1e-59.el6_10.i686.rpm
openssl-devel-1.0.1e-59.el6_10.i686.rpm
ppc64:
openssl-1.0.1e-59.el6_10.ppc.rpm
openssl-1.0.1e-59.el6_10.ppc64.rpm
openssl-debuginfo-1.0.1e-59.el6_10.ppc.rpm
openssl-debuginfo-1.0.1e-59.el6_10.ppc64.rpm
openssl-devel-1.0.1e-59.el6_10.ppc.rpm
openssl-devel-1.0.1e-59.el6_10.ppc64.rpm
s390x:
openssl-1.0.1e-59.el6_10.s390.rpm
openssl-1.0.1e-59.el6_10.s390x.rpm
openssl-debuginfo-1.0.1e-59.el6_10.s390.rpm
openssl-debuginfo-1.0.1e-59.el6_10.s390x.rpm
openssl-devel-1.0.1e-59.el6_10.s390.rpm
openssl-devel-1.0.1e-59.el6_10.s390x.rpm
x86_64:
openssl-1.0.1e-59.el6_10.i686.rpm
openssl-1.0.1e-59.el6_10.x86_64.rpm
openssl-debuginfo-1.0.1e-59.el6_10.i686.rpm
openssl-debuginfo-1.0.1e-59.el6_10.x86_64.rpm
openssl-devel-1.0.1e-59.el6_10.i686.rpm
openssl-devel-1.0.1e-59.el6_10.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6 ELS):
i386:
openssl-debuginfo-1.0.1e-59.el6_10.i686.rpm
openssl-perl-1.0.1e-59.el6_10.i686.rpm
openssl-static-1.0.1e-59.el6_10.i686.rpm
ppc64:
openssl-debuginfo-1.0.1e-59.el6_10.ppc64.rpm
openssl-perl-1.0.1e-59.el6_10.ppc64.rpm
openssl-static-1.0.1e-59.el6_10.ppc64.rpm
s390x:
openssl-debuginfo-1.0.1e-59.el6_10.s390x.rpm
openssl-perl-1.0.1e-59.el6_10.s390x.rpm
openssl-static-1.0.1e-59.el6_10.s390x.rpm
x86_64:
openssl-debuginfo-1.0.1e-59.el6_10.x86_64.rpm
openssl-perl-1.0.1e-59.el6_10.x86_64.rpm
openssl-static-1.0.1e-59.el6_10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-1971
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=Mset
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
Bug Fix(es):
* Configuring the system with non-RT kernel will hang the system
(BZ#1923220)
3. Bugs fixed (https://bugzilla.redhat.com/):
1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
5. JIRA issues fixed (https://issues.jboss.org/):
CNF-802 - Infrastructure-provided enablement/disablement of interrupt processing for guaranteed pod CPUs
CNF-854 - Performance tests in CNF Tests
6. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
The compliance-operator image updates are now available for OpenShift
Container Platform 4.6.
Bug Fix(es):
* Aggregator pod tries to parse ConfigMaps without results (BZ#1899479)
* The compliancesuite object returns error with ocp4-cis tailored profile
(BZ#1902251)
* The compliancesuite does not trigger when there are multiple rhcos4
profiles added in scansettingbinding object (BZ#1902634)
* [OCP v46] Not all remediations get applied through machineConfig although
the status of all rules shows Applied in ComplianceRemediations object
(BZ#1907414)
* The profile parser pod deployment and associated profiles should get
removed after upgrade the compliance operator (BZ#1908991)
* Applying the "rhcos4-moderate" compliance profile leads to Ignition error
"something else exists at that path" (BZ#1909081)
* [OCP v46] Always update the default profilebundles on Compliance operator
startup (BZ#1909122)
3. Solution:
For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.6/updating/updating-cluster
- -cli.html. Bugs fixed (https://bugzilla.redhat.com/):
1899479 - Aggregator pod tries to parse ConfigMaps without results
1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
1902251 - The compliancesuite object returns error with ocp4-cis tailored profile
1902634 - The compliancesuite does not trigger when there are multiple rhcos4 profiles added in scansettingbinding object
1907414 - [OCP v46] Not all remediations get applied through machineConfig although the status of all rules shows Applied in ComplianceRemediations object
1908991 - The profile parser pod deployment and associated profiles should get removed after upgrade the compliance operator
1909081 - Applying the "rhcos4-moderate" compliance profile leads to Ignition error "something else exists at that path"
1909122 - [OCP v46] Always update the default profilebundles on Compliance operator startup
5. 8) - aarch64, ppc64le, s390x, x86_64
3.
Bug Fix(es):
* Reject certificates with explicit EC parameters in strict mode
(BZ#1891541)
* Add FIPS selftest for HKDF, SSKDF, SSHKDF, and TLS12PRF; add
DH_compute_key KAT to DH selftest (BZ#1891542)
4. Bugs fixed (https://bugzilla.redhat.com/):
1732329 - Virtual Machine is missing documentation of its properties in yaml editor
1783192 - Guest kernel panic when start RHEL6.10 guest with q35 machine type and virtio disk in cnv
1791753 - [RFE] [SSP] Template validator should check validations in template's parent template
1804533 - CVE-2020-9283 golang.org/x/crypto: Processing of crafted ssh-ed25519 public keys allows for panic
1848954 - KMP missing CA extensions in cabundle of mutatingwebhookconfiguration
1848956 - KMP requires downtime for CA stabilization during certificate rotation
1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash
1853911 - VM with dot in network name fails to start with unclear message
1854098 - NodeNetworkState on workers doesn't have "status" key due to nmstate-handler pod failure to run "nmstatectl show"
1856347 - SR-IOV : Missing network name for sriov during vm setup
1856953 - CVE-2020-15586 golang: data race in certain net/http servers including ReverseProxy can lead to DoS
1859235 - Common Templates - after upgrade there are 2 common templates per each os-workload-flavor combination
1860714 - No API information from `oc explain`
1860992 - CNV upgrade - users are not removed from privileged SecurityContextConstraints
1864577 - [v2v][RHV to CNV non migratable source VM fails to import to Ceph-rbd / File system due to overhead required for Filesystem
1866593 - CDI is not handling vm disk clone
1867099 - CVE-2020-16845 golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
1868817 - Container-native Virtualization 2.6.0 Images
1873771 - Improve the VMCreationFailed error message caused by VM low memory
1874812 - SR-IOV: Guest Agent expose link-local ipv6 address for sometime and then remove it
1878499 - DV import doesn't recover from scratch space PVC deletion
1879108 - Inconsistent naming of "oc virt" command in help text
1881874 - openshift-cnv namespace is getting stuck if the user tries to delete it while CNV is running
1883232 - Webscale: kubevirt/CNV datavolume importer pod inability to disable sidecar injection if namespace has sidecar injection enabled but VM Template does NOT
1883371 - CVE-2020-26160 jwt-go: access restriction bypass vulnerability
1885153 - [v2v][RHV to CNv VM import] Wrong Network mapping do not show a relevant error message
1885418 - [openshift-cnv] issues with memory overhead calculation when limits are used
1887398 - [openshift-cnv][CNV] nodes need to exist and be labeled first, *before* the NodeNetworkConfigurationPolicy is applied
1889295 - [v2v][VMware to CNV VM import API] diskMappings: volumeMode Block is not passed on to PVC request.
1891285 - Common templates and kubevirt-config cm - update machine-type
1891440 - [v2v][VMware to CNV VM import API]Source VM with no network interface fail with unclear error
1892227 - [SSP] cluster scoped resources are not being reconciled
1893278 - openshift-virtualization-os-images namespace not seen by user
1893646 - [HCO] Pod placement configuration - dry run is not performed for all the configuration stanza
1894428 - Message for VMI not migratable is not clear enough
1894824 - [v2v][VM import] Pick the smallest template for the imported VM, and not always Medium
1894897 - [v2v][VMIO] VMimport CR is not reported as failed when target VM is deleted during the import
1895414 - Virt-operator is accepting updates to the placement of its workload components even with running VMs
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers
1898072 - Add Fedora33 to Fedora common templates
1898840 - [v2v] VM import VMWare to CNV Import 63 chars vm name should not fail
1899558 - CNV 2.6 - nmstate fails to set state
1901480 - VM disk io can't worked if namespace have label kubemacpool
1902046 - Not possible to edit CDIConfig (through CDI CR / CDIConfig)
1902111 - CVE-2020-27813 golang-github-gorilla-websocket: integer overflow leads to denial of service
1903014 - hco-webhook pod in CreateContainerError
1903585 - [v2v] Windows 2012 VM imported from RHV goes into Windows repair mode
1904797 - [VMIO][vmware] A migrated RHEL/Windows VM starts in emergency mode/safe mode when target storage is NFS and target namespace is NOT "default"
1906199 - [CNV-2.5] CNV Tries to Install on Windows Workers
1907151 - kubevirt version is not reported correctly via virtctl
1907352 - VM/VMI link changes to `kubevirt.io~v1~VirtualMachineInstance` on CNV 2.6
1907691 - [CNV] Configuring NodeNetworkConfigurationPolicy caused "Internal error occurred" for creating datavolume
1907988 - VM loses dynamic IP address of its default interface after migration
1908363 - Applying NodeNetworkConfigurationPolicy for different NIC than default disables br-ex bridge and nodes lose connectivity
1908421 - [v2v] [VM import RHV to CNV] Windows imported VM boot failed: INACCESSIBLE BOOT DEVICE error
1908883 - CVE-2020-29652 golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference
1909458 - [V2V][VMware to CNV VM import via api using VMIO] VM import to Ceph RBD/BLOCK fails on "qemu-img: /data/disk.img" error
1910857 - Provide a mechanism to enable the HotplugVolumes feature gate via HCO
1911118 - Windows VMI LiveMigration / shutdown fails on 'XML error: non unique alias detected: ua-')
1911396 - Set networkInterfaceMultiqueue false in rhel 6 template for e1000e interface
1911662 - el6 guests don't work properly if virtio bus is specified on various devices
1912908 - Allow using "scsi" bus for disks in template validation
1913248 - Creating vlan interface on top of a bond device via NodeNetworkConfigurationPolicy fails
1913320 - Informative message needed with virtctl image-upload, that additional step is needed from the user
1913717 - Users should have read permitions for golden images data volumes
1913756 - Migrating to Ceph-RBD + Block fails when skipping zeroes
1914177 - CNV does not preallocate blank file data volumes
1914608 - Obsolete CPU models (kubevirt-cpu-plugin-configmap) are set on worker nodes
1914947 - HPP golden images - DV shoudld not be created with WaitForFirstConsumer
1917908 - [VMIO] vmimport pod fail to create when using ceph-rbd/block
1917963 - [CNV 2.6] Unable to install CNV disconnected - requires kvm-info-nfd-plugin which is not mirrored
1919391 - CVE-2021-20206 containernetworking-cni: Arbitrary path injection via type field in CNI configuration
1920576 - HCO can report ready=true when it failed to create a CR for a component operator
1920610 - e2e-aws-4.7-cnv consistently failing on Hyperconverged Cluster Operator
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1923979 - kubernetes-nmstate: nmstate-handler pod crashes when configuring bridge device using ip tool
1927373 - NoExecute taint violates pdb; VMIs are not live migrated
1931376 - VMs disconnected from nmstate-defined bridge after CNV-2.5.4->CNV-2.6.0 upgrade
5. Description:
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the
PicketLink Vault extension for Apache Tomcat, and the Tomcat Native
library.
This release of Red Hat JBoss Web Server 5.4.1 serves as a replacement for
Red Hat JBoss Web Server 5.4.0, and includes bug fixes, enhancements and
component upgrades, which are documented in the Release Notes, linked to in
the References. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1887648 - CVE-2020-13943 tomcat: Apache Tomcat HTTP/2 Request mix-up
1903409 - CVE-2020-1971 openssl: EDIPARTYNAME NULL pointer de-reference
1904221 - CVE-2020-17527 tomcat: HTTP/2 request header mix-up
1917209 - CVE-2021-24122 tomcat: Information disclosure when using NTFS file system
6. Description:
Red Hat OpenShift Do (odo) is a simple CLI tool for developers to create,
build, and deploy applications on OpenShift. The odo tool is completely
client-based and requires no server within the OpenShift cluster for
deployment. It detects changes to local code and deploys it to the cluster
automatically, giving instant feedback to validate changes in real-time. It
supports multiple programming languages and frameworks.
The advisory addresses the following issues:
* Re-release of odo-init-image 1.1.3 for security updates
3. Solution:
Download and install a new CLI binary by following the instructions linked
from the References section. Bugs fixed (https://bugzilla.redhat.com/):
1843640 - CVE-2020-13379 grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
1879672 - /var/log/tcmu-runner.log within tcmu-runner container does not get rotated and log grows without limit
| VAR-202012-0245 | CVE-2020-17437 | Embedded TCP/IP stacks have memory corruption vulnerabilities |
CVSS V2: 6.4 CVSS V3: 8.2 Severity: HIGH |
An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c. Multiple open-source embedded TCP/IP stacks, commonly used in Internet of Things (IoT) and embedded devices, have several vulnerabilities stemming from improper memory management. These vulnerabilities are also tracked as ICS-VU-633937 and JVNVU#96491057 as well as the name AMNESIA:33.CVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not AffectedCVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not Affected. Multiple Embedded TCP/IP is an efficient embedded stack developed using a verifiable process and strictly compliant with MISRA coding standards. =========================================================================
Ubuntu Security Notice USN-6259-1
July 27, 2023
open-iscsi vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Open-iSCSI.
Software Description:
- open-iscsi: Open Source iSCSI implementation
Details:
Jos Wetzels, Stanislav Dashevskyi, and Amine Amri discovered that
Open-iSCSI incorrectly handled certain checksums for IP packets.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2020-13987)
Jos Wetzels, Stanislav Dashevskyi, Amine Amri discovered that
Open-iSCSI incorrectly handled certain parsing TCP MSS options.
An attacker could possibly use this issue to cause a crash or cause
unexpected behavior. (CVE-2020-13988)
Amine Amri and Stanislav Dashevskyi discovered that Open-iSCSI
incorrectly handled certain TCP data. An attacker could possibly
use this issue to expose sensitive information. (CVE-2020-17437)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
open-iscsi 2.0.874-7.1ubuntu6.4
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
open-iscsi 2.0.874-5ubuntu2.11+esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
open-iscsi 2.0.873+git0.3b4b4500-14ubuntu3.7+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6259-1
CVE-2020-13987, CVE-2020-13988, CVE-2020-17437
Package Information:
https://launchpad.net/ubuntu/+source/open-iscsi/2.0.874-7.1ubuntu6.4
| VAR-202012-0125 | CVE-2020-13987 | Embedded TCP/IP stacks have memory corruption vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c. Multiple open-source embedded TCP/IP stacks, commonly used in Internet of Things (IoT) and embedded devices, have several vulnerabilities stemming from improper memory management. These vulnerabilities are also tracked as ICS-VU-633937 and JVNVU#96491057 as well as the name AMNESIA:33.CVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not AffectedCVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not Affected. Contiki is an open source cross-platform operating system for IoT (Internet of Things) devices.
Contiki-OS has a buffer error vulnerability that stems from not checking the length field of the packet header based on the available data in the packet. Given any length, an out-of-bounds memory read can be performed during the checksum calculation. =========================================================================
Ubuntu Security Notice USN-6259-1
July 27, 2023
open-iscsi vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in Open-iSCSI.
Software Description:
- open-iscsi: Open Source iSCSI implementation
Details:
Jos Wetzels, Stanislav Dashevskyi, and Amine Amri discovered that
Open-iSCSI incorrectly handled certain checksums for IP packets.
An attacker could possibly use this issue to expose sensitive information.
(CVE-2020-13987)
Jos Wetzels, Stanislav Dashevskyi, Amine Amri discovered that
Open-iSCSI incorrectly handled certain parsing TCP MSS options.
An attacker could possibly use this issue to cause a crash or cause
unexpected behavior. (CVE-2020-13988)
Amine Amri and Stanislav Dashevskyi discovered that Open-iSCSI
incorrectly handled certain TCP data. An attacker could possibly
use this issue to expose sensitive information. (CVE-2020-17437)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS:
open-iscsi 2.0.874-7.1ubuntu6.4
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
open-iscsi 2.0.874-5ubuntu2.11+esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
open-iscsi 2.0.873+git0.3b4b4500-14ubuntu3.7+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6259-1
CVE-2020-13987, CVE-2020-13988, CVE-2020-17437
Package Information:
https://launchpad.net/ubuntu/+source/open-iscsi/2.0.874-7.1ubuntu6.4
| VAR-202012-0485 | CVE-2020-24336 | Embedded TCP/IP stacks have memory corruption vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in Contiki through 3.0 and Contiki-NG through 4.5. The code for parsing Type A domain name answers in ip64-dns64.c doesn't verify whether the address in the answer's length is sane. Therefore, when copying an address of an arbitrary length, a buffer overflow can occur. This bug can be exploited whenever NAT64 is enabled. Multiple open-source embedded TCP/IP stacks, commonly used in Internet of Things (IoT) and embedded devices, have several vulnerabilities stemming from improper memory management. These vulnerabilities are also tracked as ICS-VU-633937 and JVNVU#96491057 as well as the name AMNESIA:33.CVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not AffectedCVE-2020-13984 Not Affected
CVE-2020-13985 Affected
CVE-2020-13986 Affected
CVE-2020-13987 Affected
CVE-2020-13988 Affected
CVE-2020-17437 Affected
CVE-2020-17438 Affected
CVE-2020-17439 Affected
CVE-2020-17440 Affected
CVE-2020-17441 Not Affected
CVE-2020-17442 Not Affected
CVE-2020-17443 Not Affected
CVE-2020-17444 Not Affected
CVE-2020-17445 Not Affected
CVE-2020-17467 Not Affected
CVE-2020-17468 Not Affected
CVE-2020-17469 Not Affected
CVE-2020-17470 Not Affected
CVE-2020-24334 Affected
CVE-2020-24335 Not Affected
CVE-2020-24336 Affected
CVE-2020-24337 Not Affected
CVE-2020-24338 Not Affected
CVE-2020-24339 Not Affected
CVE-2020-24340 Not Affected
CVE-2020-24341 Not Affected
CVE-2020-24383 Not Affected
CVE-2020-25107 Not Affected
CVE-2020-25108 Not Affected
CVE-2020-25109 Not Affected
CVE-2020-25110 Not Affected
CVE-2020-25111 Not Affected
CVE-2020-25112 Not Affected
CVE-2021-28362 Not Affected. Contiki is an open source cross-platform operating system for IoT (Internet of Things) devices. Contiki-NG is an open source cross-platform operating system for next-generation IoT (Internet of Things) devices.
Contiki-NG and Contiki have a buffer error vulnerability. The vulnerability stems from the fact that the function that parses the DNS record in the DNS response packet sent through NAT64 does not verify the length field of the response record, allowing an attacker to destroy the memory. An issue exists in Contiki up to and including 3.0 and Contiki-NG up to and including 4.5
| VAR-202104-0173 | CVE-2020-27931 | plural Apple Out-of-bounds write vulnerabilities in the product |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0. Processing a maliciously crafted font file may lead to arbitrary code execution. plural Apple The product contains a vulnerability related to out-of-bounds writes.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the parsing of TTF fonts. Crafted data in a TTF font can trigger a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. A buffer error vulnerability exists in Apple macOs. The vulnerability stems from some unknown functionality of the component FontParser. Entering unknown operations will result in memory corruption
| VAR-202104-0159 | CVE-2020-27952 | Apple macOS libFontParser TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
An out-of-bounds write was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. Processing a maliciously crafted font file may lead to arbitrary code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the parsing of TTF fonts. Crafted data in a TTF font can trigger a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. A buffer error vulnerability exists in Apple macOS. The vulnerability stems from an unknown function of FontParser. Entering unknown operations will result in memory corruption. Apple macOS could allow a remote authenticated malicious user to gain elevated privileges on the system, caused by an out-of-bounds write in the parsing of TTF fonts
| VAR-202012-1424 | CVE-2020-9922 | macOS Logic vulnerability in |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
A logic issue was addressed with improved state management. This issue is fixed in macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra. Processing a maliciously crafted email may lead to writing arbitrary files. Apple macOS Mojave and so on are a set of dedicated operating systems developed by Apple for Mac computers
| VAR-202012-0748 | CVE-2020-27895 | iTunes Vulnerability to disclose information in |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
An information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs