VARIoT IoT vulnerabilities database
| VAR-202009-1520 | CVE-2020-8333 | plural Lenovo Desktop and ThinkStation Vulnerability in the model |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution. plural Lenovo Desktop and ThinkStation There are unspecified vulnerabilities in the model.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202006-0026 | CVE-2020-0596 | Intel(R) AMT and ISM Input verification vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access. Intel(R) AMT and ISM There is an input verification vulnerability in.Information may be obtained. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. A remote attacker could exploit this vulnerability to obtain information. The following products and versions are affected: Intel AMT before 11.8.77, before 11.12.77, before 11.22.77, before 12.0.64; ISM before 11.8.77, before 11.12.77, before 11.22.77 Version, version before 12.0.64
| VAR-202006-0253 | CVE-2020-0538 | Intel(R) AMT Input verification vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Improper input validation in subsystem for Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable denial of service via network access. Intel(R) AMT There is an input verification vulnerability in.Service operation interruption (DoS) It may be put into a state. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. An attacker could exploit this vulnerability to cause a denial of service. The following products and versions are affected: Intel AMT versions prior to 11.8.77, versions prior to 11.12.77, versions prior to 11.22.77, and versions prior to 12.0.64
| VAR-202006-1520 | CVE-2020-7585 | Vulnerabilities in uncontrolled search path elements in multiple Siemens products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
A vulnerability has been identified in SIMATIC PCS 7 V8.2 and earlier (All versions), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP3), SIMATIC PDM (All versions < V9.2), SIMATIC STEP 7 V5.X (All versions < V5.6 SP2 HF3), SINAMICS STARTER (containing STEP 7 OEM version) (All versions < V5.4 HF2). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges. The security vulnerability could be exploited by an attacker with local access to the affected systems. Successful exploitation requires user privileges but no user interaction. The vulnerability could allow an attacker to compromise the availability of the system as well as to have access to confidential information. Several Siemens products contain vulnerabilities in uncontrolled search path elements.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. A code issue vulnerability exists in several Siemens products
| VAR-202006-0257 | CVE-2020-0542 | Intel(R) CSME Buffer error vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper buffer restrictions in subsystem for Intel(R) CSME versions before 12.0.64, 13.0.32, 14.0.33 and 14.5.12 may allow an authenticated user to potentially enable escalation of privilege, information disclosure or denial of service via local access. Intel(R) CSME Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Converged Security and Management Engine (CSME) is a security management engine of Intel Corporation. A security vulnerability exists in a subsystem in Intel CSME. Attackers can exploit this vulnerability to elevate privileges, causing information disclosure and denial of service. The following products and versions are affected: Intel CSME versions prior to 12.0.64, versions prior to 13.0.32, versions prior to 14.0.33, and versions prior to 14.5.12
| VAR-202006-0248 | CVE-2020-0533 | Intel(R) CSME Vulnerability in using password hashes with insufficient strength in |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Reversible one-way hash in Intel(R) CSME versions before 11.8.76, 11.12.77 and 11.22.77 may allow a privileged user to potentially enable escalation of privilege, denial of service or information disclosure via local access. Intel(R) CSME There is a vulnerability in the use of password hashes that is not strong enough.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Converged Security and Management Engine (CSME) is a security management engine of Intel Corporation. Security vulnerabilities exist in Intel CSME versions prior to 11.8.76, versions prior to 11.12.77, and versions prior to 11.22.77
| VAR-202006-0245 | CVE-2020-0531 | Intel(R) AMT Input verification vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Improper input validation in Intel(R) AMT versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an authenticated user to potentially enable information disclosure via network access. Intel(R) AMT There is an input verification vulnerability in.Information may be obtained. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. An attacker could exploit this vulnerability to obtain information. The following products and versions are affected: Intel AMT versions prior to 11.8.77, versions prior to 11.12.77, versions prior to 11.22.77, and versions prior to 12.0.64
| VAR-202006-1686 | CVE-2020-8674 | Treck IP stacks contain multiple vulnerabilities |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Out-of-bounds read in DHCPv6 subsystem in Intel(R) AMT and Intel(R)ISM versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64 and 14.0.33 may allow an unauthenticated user to potentially enable information disclosure via network access. Treck IP stack implementations for embedded systems are affected by multiple vulnerabilities. This set of vulnerabilities was researched and reported by JSOF, who calls them Ripple20.CVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 UnknownCVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 Unknown. Intel(R) AMT and ISM Exists in an out-of-bounds read vulnerability.Information may be obtained. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. A remote attacker could exploit this vulnerability to obtain information. The following products and versions are affected: Intel AMT before 11.8.77, before 11.12.77, before 11.22.77, before 12.0.64, before 14.0.33; ISM before 11.8.76, before 11.12.77 Version, version before 11.22.77, version before 12.0.64, version before 14.0.33
| VAR-202006-0025 | CVE-2020-0595 | Treck IP stacks contain multiple vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Treck IP stack implementations for embedded systems are affected by multiple vulnerabilities. This set of vulnerabilities was researched and reported by JSOF, who calls them Ripple20.CVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 UnknownCVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 Unknown. Intel(R) AMT and ISM Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. A resource management error vulnerability exists in the IPv6 subsystem in Intel AMT and ISM. A remote attacker could exploit this vulnerability to elevate privileges. The following products and versions are affected: Intel AMT before 11.8.77, before 11.12.77, before 11.22.77, before 12.0.64; ISM before 11.8.77, before 11.12.77, before 11.22.77 Version, version before 12.0.64
| VAR-202006-0024 | CVE-2020-0594 | Treck IP stacks contain multiple vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Treck IP stack implementations for embedded systems are affected by multiple vulnerabilities. This set of vulnerabilities was researched and reported by JSOF, who calls them Ripple20.CVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 UnknownCVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 Unknown. Intel(R) AMT and ISM Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. There are security vulnerabilities in the IPv6 subsystem in Intel AMT and ISM. A remote attacker could exploit this vulnerability to elevate privileges. The following products and versions are affected: Intel AMT before 11.8.77, before 11.12.77, before 11.22.77, before 12.0.64; ISM before 11.8.77, before 11.12.77, before 11.22.77 Version, version before 12.0.64
| VAR-202006-0241 | CVE-2020-0543 | Multiple Intel Product Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). Description:
The microcode_ctl packages provide microcode updates for Intel. =========================================================================
Ubuntu Security Notice USN-4388-1
June 09, 2020
linux-gke-5.0, linux-oem-osp1 vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description:
- linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems
- linux-oem-osp1: Linux kernel for OEM systems
Details:
It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)
It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)
Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)
It was discovered that the USB susbsystem's scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2020-12464)
Bui Quang Minh discovered that the XDP socket implementation in the Linux
kernel did not properly validate meta-data passed from user space, leading
to an out-of-bounds write vulnerability. A local attacker with the
CAP_NET_ADMIN capability could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-12659)
Xiumei Mu discovered that the IPSec implementation in the Linux kernel did
not properly encrypt IPv6 traffic in some situations. An attacker could use
this to expose sensitive information. (CVE-2020-1749)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
linux-image-5.0.0-1042-gke 5.0.0-1042.43
linux-image-5.0.0-1059-oem-osp1 5.0.0-1059.64
linux-image-gke-5.0 5.0.0.1042.27
linux-image-oem-osp1 5.0.0.1059.58
Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update
Advisory ID: RHSA-2020:2680-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2680
Issue date: 2020-06-23
CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549
====================================================================
1. Summary:
Updated microcode_ctl packages that fix several security bugs and add
various
enhancements are now available.
Red Hat Product Security has rated this update as having a security impact
of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64
Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64
Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64
3. Description:
Security Fix(es):
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
* hw: L1D Cache Eviction Sampling (CVE-2020-0549)
* hw: Vector Register Data Sampling (CVE-2020-0548)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
Bug Fix(es):
* Update Intel CPU microcode to microcode-20200609 release:
- Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision
0x61f
up to 0x621;
- Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision
0x718
up to 0x71a;
- Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to
0x28;
- Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e
up to 0x2f;
- Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25
up to 0x26;
- Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to
0x1c;
- Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision
0x21
up to 0x22;
- Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151
up to 0x1000157;
- Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode
(in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065
up to 0x2006906;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c
up to 0x4002f01;
- Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c
up to 0x5002f01;
- Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6
up to 0xdc;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46
up to 0x78;
- Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca
up to 0xd6;
- Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode
from revision 0xca up to 0xd6;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from
revision
0xca up to 0xd6;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision
0xca
up to 0xd6;
- Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to
0xd6;
- Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca
up to 0xd6;
- Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to
0xd6.
* Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to
revision
0xdc, use 0xd6 by default.
* Enable 06-2d-07 (SNB-E/EN/EP) caveat by default.
* Enable 06-55-04 (SKL-SP/X/W) caveat by default.
* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.
* Re-generate initramfs not only for the currently running kernel,
but for several recently installed kernels as well.
* Change the URL in the intel-microcode2ucode.8 to point to the GitHub
repository since the microcode download section at Intel Download Center
does not exist anymore.
4. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1788786 - CVE-2020-0548 hw: Vector Register Data Sampling
1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling
1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)
1849060 - [rhel-7.3.z] Enable SNB-EP caveat by default
6. Package List:
Red Hat Enterprise Linux Server AUS (v. 7.3):
Source:
microcode_ctl-2.1-16.33.el7_3.src.rpm
x86_64:
microcode_ctl-2.1-16.33.el7_3.x86_64.rpm
microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.3):
Source:
microcode_ctl-2.1-16.33.el7_3.src.rpm
x86_64:
microcode_ctl-2.1-16.33.el7_3.x86_64.rpm
microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.3):
Source:
microcode_ctl-2.1-16.33.el7_3.src.rpm
x86_64:
microcode_ctl-2.1-16.33.el7_3.x86_64.rpm
microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-0543
https://access.redhat.com/security/cve/CVE-2020-0548
https://access.redhat.com/security/cve/CVE-2020-0549
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/solutions/5142691
https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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bOOd
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202006-0240 | CVE-2020-0586 | Intel(R) SPS Initialization vulnerability in |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Improper initialization in subsystem for Intel(R) SPS versions before SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0 may allow an authenticated user to potentially enable escalation of privilege and/or denial of service via local access. Intel(R) SPS There is an initialization vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Server Platform Services (SPS) is a server platform service program of Intel Corporation. There is a security vulnerability in Intel SPS versions earlier than SPS_E3_04.01.04.109.0 and SPS_E3_04.08.04.070.0. The vulnerability is caused by the incorrect initialization of the program. A local attacker could exploit this vulnerability to elevate privileges and/or cause a denial of service
| VAR-202006-0027 | CVE-2020-0597 | Treck IP stacks contain multiple vulnerabilities |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Out-of-bounds read in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 14.0.33 may allow an unauthenticated user to potentially enable denial of service via network access. Treck IP stack implementations for embedded systems are affected by multiple vulnerabilities. This set of vulnerabilities was researched and reported by JSOF, who calls them Ripple20.CVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 UnknownCVE-2020-0594 Unknown
CVE-2020-0595 Unknown
CVE-2020-0597 Unknown
CVE-2020-11896 Affected
CVE-2020-11897 Not Affected
CVE-2020-11898 Affected
CVE-2020-11899 Not Affected
CVE-2020-11900 Affected
CVE-2020-11901 Not Affected
CVE-2020-11902 Not Affected
CVE-2020-11903 Not Affected
CVE-2020-11904 Not Affected
CVE-2020-11905 Not Affected
CVE-2020-11906 Affected
CVE-2020-11907 Affected
CVE-2020-11908 Not Affected
CVE-2020-11909 Not Affected
CVE-2020-11910 Not Affected
CVE-2020-11911 Affected
CVE-2020-11912 Affected
CVE-2020-11913 Not Affected
CVE-2020-11914 Affected
CVE-2020-8674 Unknown. Intel(R) AMT and ISM Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be put into a state. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. A remote attacker could exploit this vulnerability to cause a denial of service
| VAR-202006-1506 | CVE-2020-5589 | Made by multiple Sony Bluetooth In headphones Bluetooth Pairing processing vulnerabilities |
CVSS V2: 8.3 CVSS V3: 8.8 Severity: HIGH |
SONY Wireless Headphones WF-1000X, WF-SP700N, WH-1000XM2, WH-1000XM3, WH-CH700N, WH-H900N, WH-XB700, WH-XB900N, WI-1000X, WI-C600N and WI-SP600N with firmware versions prior to 4.5.2 have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing and operate such as changing volume of the product. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer
| VAR-202006-0406 | CVE-2020-12773 | Realtek ADSL/PON Modem SoC Firmware vulnerabilities |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A security misconfiguration vulnerability exists in the SDK of some Realtek ADSL/PON Modem SoC firmware, which allows attackers using a default password to execute arbitrary commands remotely via the build-in network monitoring tool. Realtek ADSL/PON Modem SoC There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Realtek ADSL/PON Modem SoC is a SoC (system on a chip) product of China Taiwan Realtek Semiconductor (Realtek). A security vulnerability exists in the Linux SDK in Realtek ADSL/PON Modem SoCs
| VAR-202006-0471 | CVE-2020-13960 | D-Link DSL 2730-U and DIR-600M Vulnerabilities in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote attackers to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise would have had an NXDOMAIN error, by registering a subdomain of the domain.name domain name. D-Link DSL 2730-U and DIR-600M An unspecified vulnerability exists in the device.Information may be obtained and tampered with. D-Link DIR-600M and D-Link DSL 2730-U are both wireless routers from Taiwan's D-Link Corporation.
D-Link DSL 2730-U IN_1.10 version, IN_1.11 version, and DIR-600M version 3.04 DNS resolver search path has a security vulnerability
| VAR-202006-1711 | CVE-2020-9041 | Couchbase Server and Sync Gateway Vulnerability in improper shutdown and release of resources in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In Couchbase Server 6.0.3 and Couchbase Sync Gateway through 2.7.0, the Cluster management, views, query, and full-text search endpoints are vulnerable to the Slowloris denial-of-service attack because they don't more aggressively terminate slow connections. Couchbase Server and Sync Gateway Contains vulnerabilities related to improper shutdown and release of resources.Service operation interruption (DoS) It may be put into a state. Both Couchbase Sync Gateway and Couchbase Server are products of Couchbase Corporation in the United States. Couchbase Sync Gateway is a secure web gateway for data access and data synchronization over the web. Couchbase Server is a distributed open source NoSQL (non-relational) database, which mainly supports functions such as data query, full-text search and active global replication. An attacker could exploit this vulnerability to cause a denial of service
| VAR-202006-0391 | CVE-2020-12695 | Universal Plug and Play (UPnP) SUBSCRIBE can be abused to send traffic to arbitrary destinations |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue. The Universal Plug and Play (UPnP) protocol in effect prior to April 17, 2020 can be abused to send traffic to arbitrary destinations using the SUBSCRIBE functionality. The UPnP protocol, as specified by the Open Connectivity Foundation (OCF), is designed to provide automatic discovery and interaction with devices on a network. The UPnP protocol is designed to be used in a trusted local area network (LAN) and the protocol does not implement any form of authentication or verification. Many common Internet-connected devices support UPnP, as noted in previous research from Daniel Garcia (VU#357851) and Rapid7. Garcia presented at DEFCON 2019 and published a scanning and portmapping tool. The UPnP Device Protection service was not widely adopted. A vulnerability in the UPnP SUBSCRIBE capability permits an attacker to send large amounts of data to arbitrary destinations accessible over the Internet, which could lead to a Distributed Denial of Service (DDoS), data exfiltration, and other unexpected network behavior. The OCF has updated the UPnP specification to address this issue. This vulnerability has been assigned CVE-2020-12695 and is also known as Call Stranger. Although offering UPnP services on the Internet is generally considered to be a misconfiguration, a number of devices are still available over the Internet according to a recent Shodan scan. A remote, unauthenticated attacker may be able to abuse the UPnP SUBSCRIBE capability to send traffic to arbitrary destinations, leading to amplified DDoS attacks and data exfiltration. In general, making UPnP available over the the Internet can pose further security vulnerabilities than the one described in this vulnerability note. Open Connectivity Foundation UPnP There is a vulnerability in the specification regarding improper default permissions.Information is obtained and service operation is interrupted (DoS) It may be put into a state. A security vulnerability exists in UPnP versions prior to 2020-04-17.
For the stable distribution (buster), these problems have been fixed in
version 2:2.7+git20190128+0c1e29f-6+deb10u3.
We recommend that you upgrade your wpa packages.
For the detailed security status of wpa please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/wpa
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmCBxcZfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QRbw//chJxW9vhszfe/MrHkuEBC/y0jzkQ0GxJG/DT+EXvHnq8KyVht92B81sU
Ia860UeNygOY1vAe8izNVpxPEi1PpI7Y6VfvqcWC5dMFNEmOk8yMzJXPDYtwrO3b
q7Fq6MJys6HTooIInCVjdwVTmvVfocEiOl2Oy+smBE8ylkUPIShJj+UsnBR3qMCB
9IoxgeFsHl4HpRzsC1uiTMmNPUqqychqzyn26aA+Vp5nfPkvpsSc6aA68BBUm529
5udANpQneYrsQ+EKMm2wQmw9xNWbrqzRUCmi/XGxJ5YEibOjMLZeBMWq35MRQKDS
BaaEPbjPMbBP7p6yp795pdt/XgNL1cJPejEBBQWPs3PrRuW/inhjJbSvenPl5AIB
wOV8OzoxDw0m5DdYr2IuYRNu3zt743e/v5oDhDOiSteBl7zjs4cUohfOryaH/htN
7Ok3BbhfVc7xfW/XhXNq2axXPGDdSOI3Y6ZXPgiTlX3eIm8Culg7Rm52JprbAc0a
aP0pkGjHO3MAIsvRU/H7WGJbhCdS0i/XTAbuJming5zzCpigGaQG9wOawYH4lNJV
BNEX/DjjcsZ4oETxWn0sG/LVIl3m2TCry2cayZsy8806nTqlhFS2py5tx6gn5NBi
e5JGaYRgwa6TUxj4UjWnbdIKMpElbtXbMIOHSvG2Gnx/21siyg0=
=CU/j
-----END PGP SIGNATURE-----
. In addition minidlna was susceptible to the
"CallStranger" UPnP vulnerability. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: gssdp and gupnp security update
Advisory ID: RHSA-2021:1789-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1789
Issue date: 2021-05-18
CVE Names: CVE-2020-12695
====================================================================
1. Summary:
An update for gssdp and gupnp is now available for Red Hat Enterprise Linux
8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
GUPnP is an object-oriented open source framework for creating UPnP devices
and control points, written in C using GObject and libsoup. The GUPnP API
is intended to be easy to use, efficient and flexible.
GSSDP implements resource discovery and announcement over SSDP and is part
of gUPnP.
The following packages have been upgraded to a later upstream version:
gssdp (1.0.5), gupnp (1.0.6). (BZ#1846589, BZ#1861928)
Security Fix(es):
* hostapd: UPnP SUBSCRIBE misbehavior in WPS AP (CVE-2020-12695)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.4 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1846006 - CVE-2020-12695 hostapd: UPnP SUBSCRIBE misbehavior in WPS AP
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source:
gssdp-1.0.5-1.el8.src.rpm
gupnp-1.0.6-1.el8.src.rpm
aarch64:
gssdp-1.0.5-1.el8.aarch64.rpm
gssdp-debuginfo-1.0.5-1.el8.aarch64.rpm
gssdp-debugsource-1.0.5-1.el8.aarch64.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm
gupnp-1.0.6-1.el8.aarch64.rpm
gupnp-debuginfo-1.0.6-1.el8.aarch64.rpm
gupnp-debugsource-1.0.6-1.el8.aarch64.rpm
ppc64le:
gssdp-1.0.5-1.el8.ppc64le.rpm
gssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm
gssdp-debugsource-1.0.5-1.el8.ppc64le.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm
gupnp-1.0.6-1.el8.ppc64le.rpm
gupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm
gupnp-debugsource-1.0.6-1.el8.ppc64le.rpm
s390x:
gssdp-1.0.5-1.el8.s390x.rpm
gssdp-debuginfo-1.0.5-1.el8.s390x.rpm
gssdp-debugsource-1.0.5-1.el8.s390x.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm
gupnp-1.0.6-1.el8.s390x.rpm
gupnp-debuginfo-1.0.6-1.el8.s390x.rpm
gupnp-debugsource-1.0.6-1.el8.s390x.rpm
x86_64:
gssdp-1.0.5-1.el8.i686.rpm
gssdp-1.0.5-1.el8.x86_64.rpm
gssdp-debuginfo-1.0.5-1.el8.i686.rpm
gssdp-debuginfo-1.0.5-1.el8.x86_64.rpm
gssdp-debugsource-1.0.5-1.el8.i686.rpm
gssdp-debugsource-1.0.5-1.el8.x86_64.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm
gupnp-1.0.6-1.el8.i686.rpm
gupnp-1.0.6-1.el8.x86_64.rpm
gupnp-debuginfo-1.0.6-1.el8.i686.rpm
gupnp-debuginfo-1.0.6-1.el8.x86_64.rpm
gupnp-debugsource-1.0.6-1.el8.i686.rpm
gupnp-debugsource-1.0.6-1.el8.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64:
gssdp-debuginfo-1.0.5-1.el8.aarch64.rpm
gssdp-debugsource-1.0.5-1.el8.aarch64.rpm
gssdp-devel-1.0.5-1.el8.aarch64.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.aarch64.rpm
gupnp-debuginfo-1.0.6-1.el8.aarch64.rpm
gupnp-debugsource-1.0.6-1.el8.aarch64.rpm
gupnp-devel-1.0.6-1.el8.aarch64.rpm
noarch:
gssdp-docs-1.0.5-1.el8.noarch.rpm
ppc64le:
gssdp-debuginfo-1.0.5-1.el8.ppc64le.rpm
gssdp-debugsource-1.0.5-1.el8.ppc64le.rpm
gssdp-devel-1.0.5-1.el8.ppc64le.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.ppc64le.rpm
gupnp-debuginfo-1.0.6-1.el8.ppc64le.rpm
gupnp-debugsource-1.0.6-1.el8.ppc64le.rpm
gupnp-devel-1.0.6-1.el8.ppc64le.rpm
s390x:
gssdp-debuginfo-1.0.5-1.el8.s390x.rpm
gssdp-debugsource-1.0.5-1.el8.s390x.rpm
gssdp-devel-1.0.5-1.el8.s390x.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.s390x.rpm
gupnp-debuginfo-1.0.6-1.el8.s390x.rpm
gupnp-debugsource-1.0.6-1.el8.s390x.rpm
gupnp-devel-1.0.6-1.el8.s390x.rpm
x86_64:
gssdp-debuginfo-1.0.5-1.el8.i686.rpm
gssdp-debuginfo-1.0.5-1.el8.x86_64.rpm
gssdp-debugsource-1.0.5-1.el8.i686.rpm
gssdp-debugsource-1.0.5-1.el8.x86_64.rpm
gssdp-devel-1.0.5-1.el8.i686.rpm
gssdp-devel-1.0.5-1.el8.x86_64.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.i686.rpm
gssdp-utils-debuginfo-1.0.5-1.el8.x86_64.rpm
gupnp-debuginfo-1.0.6-1.el8.i686.rpm
gupnp-debuginfo-1.0.6-1.el8.x86_64.rpm
gupnp-debugsource-1.0.6-1.el8.i686.rpm
gupnp-debugsource-1.0.6-1.el8.x86_64.rpm
gupnp-devel-1.0.6-1.el8.i686.rpm
gupnp-devel-1.0.6-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2020-12695
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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2GSN
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
. (CVE-2020-12695)
It was discovered that ReadyMedia (MiniDLNA) allowed remote code execution. =========================================================================
Ubuntu Security Notice USN-4734-2
February 16, 2021
wpa vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in wpa_supplicant and hostapd.
Software Description:
- wpa: client support for WPA and WPA2
Details:
USN-4734-1 fixed several vulnerabilities in wpa_supplicant. This
update provides the corresponding update for Ubuntu 14.04 ESM.
It was discovered that wpa_supplicant did not properly handle P2P
(Wi-Fi Direct) group information in some situations, leading to a
heap overflow. A physically proximate attacker could use this to cause a
denial of service or possibly execute arbitrary code. (CVE-2021-0326)
It was discovered that hostapd did not properly handle UPnP subscribe
messages in some circumstances. An attacker could use this to cause a
denial of service. (CVE-2020-12695)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 ESM:
hostapd 1:2.1-0ubuntu1.7+esm3
wpasupplicant 2.1-0ubuntu1.7+esm3
After a standard system update you need to reboot your computer to make
all the necessary changes
| VAR-202006-1562 | CVE-2020-9099 | plural Huawei Product authentication vulnerabilities |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Huawei products IPS Module; NGFW Module; NIP6300; NIP6600; NIP6800; Secospace USG6300; Secospace USG6500; Secospace USG6600; USG9500 with versions of V500R001C00; V500R001C20; V500R001C30; V500R001C50; V500R001C60; V500R001C80; V500R005C00; V500R005C10; V500R005C20; V500R002C00; V500R002C10; V500R002C20; V500R002C30 have an improper authentication vulnerability. Attackers need to perform some operations to exploit the vulnerability. Successful exploit may obtain certain permissions on the device. plural Huawei The product contains an authentication vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. (Vulnerability ID: HWPSIRT-2020-03160)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9099.
Huawei has released software updates to fix this vulnerability. This advisory is available at the following link:
www.huawei.com/en/psirt/security-advisories/huawei-sa-20200506-02-authentication-en
| VAR-202006-1930 | No CVE | Arbitrary File Read Vulnerability in Schneider Electric Modicon Quantum |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Schneider Electric Modicon Quantum is a large programmable logic controller (PLC) for process applications, high availability and safety solutions.
An arbitrary file read vulnerability exists in Schneider Electric Modicon Quantum. A remote attacker can exploit this vulnerability to browse arbitrary resources by constructing HTTP requests.